Exercise 1: Take Action with Health CheckRun Health Check, review your security score, and implement password policies
Exercise 2: Update Session SecurityTighten session timeout and login settings to reduce unauthorized access risk
Exercise 3: Dive into User SecurityAudit profiles and permission sets to enforce the Principle of Least Privilege
Exercise 4: Configure Health CheckUpload a custom security baseline and remediate remaining Health Check risks
Exercise 5: Fix Remaining Risks (Optional)Address lower-priority findings and fine-tune your security posture
Exercise 6: Secure Your Data with ShieldUse Data Detect to scan for sensitive PII and configure Shield Event Monitoring