Salesforce Apex execution monitoring

Apex batch processes and queries follow an order of execution in Salesforce. If there are multiple Apex triggers executing INSERT, UPDATE, and DELETE commands in the Oracle database hosted by Salesforce or any other external databases linked to it, the flow of saving changes made to the database also depends on the order of execution.

Track when anyone modifies, accesses, or views records from databases using Apex Salesforce Object Query Language (SOQL) and Salesforce Object Search Language (SOSL) queries to ensure no malicious changes are made to sensitive information hosted in your databases.

resources-banner

Monitoring Apex execution activities using Log360

All changes carried out using Apex query languages, triggers, and batch processes are recorded as logs in Salesforce. Though any changes made in Salesforce using Apex can be tracked by the Log Inspector tool, it can be a tedious task to access the Developer Console of Apex to view this log information, interpret it, and identify anomalies.

Log360 helps you audit all Salesforce Apex execution activities, analyze them, and identify deviant and malicious activities that could be potential threats to your organization. It extracts the event logs and debug logs from the Salesforce instance, and monitors:

  • The user who executed the query.
  • The time of execution of the query.
  • The type of query executed (DDL statements, DML statements, workflow methods, triggers, and callouts).
  • The modifications made to the database (values before and after query execution).
  • The reports exported and records accessed.

Consider that a normal user, without any privileges, raises an Apex request to retrieve records from your database that contains confidential information. The user raises the request from a class called "Without Sharing," which executes all queries in the System mode.

Running queries in this mode will return all records requested by the user, violating object permissions, sharing rules, and field-level security specified for that user. This event can result in a data exfiltration incident, which can be prevented using Log360. Log360 allows you to configure alerts for processes initiated in the System mode by normal users to avoid such security hazards.

Log360's auditing and alerting capabilities

Log360 generates interactive reports in the form of graphs and charts after analyzing logs obtained from Salesforce. It reports on logon and logoff activities, report export activities, and recent content change and distribution activities to help you spot anomalies and take necessary action.

salesforce-apex-execution-monitoring

Using Log360, you can configure alerts for malicious activities to get notified via SMS and email about impending attacks.