The Exclude Strategy

The Exclude Strategy for authorization setup in Business Central means that users are initially granted broad rights, after which specific risk areas or sensitive functionalities are explicitly excluded. This approach is often faster to implement and requires less intensive involvement from key users, which can be an advantage, particularly for smaller organizations. However, it requires careful analysis and continuous monitoring to prevent unintended risks and compliance issues.

Our Approach to the Exclude Strategy

While the Include Strategy is our preference for maximum security, there may be situations where the Exclude Strategy (when applied correctly) is more suitable for your Business Central environment. Our consultants help you identify potential risks and precisely configure the exclusions:

  • Deep Risk Analysis:
    Identifying all critical functions, processes, and data that must be excluded to guarantee an acceptable security level.
  • Precise Exclusion Configuration:
    Technically correct setting up the exclusions within Business Central to prevent unauthorized access to sensitive areas.
  • Thorough Validation:
    Extensive testing to verify that all necessary exclusions are correctly implemented and that no unexpected gaps have arisen.

This method requires, more than the Include Strategy, continuous monitoring to ensure that new functionalities, updates, or changes in user roles do not create unwanted access. We advise and support you in setting up this monitoring.

Back to "Setting up Authorizations" in BC

Optimize Your Business Central Authorizations?

Do you want to consider the Exclude approach for your Business Central authorizations and discuss the implications?

Call us today for a no-obligation consultation and see what we can do for your company.