- b and c (Security and access)
- a, c, and e (Analytics, reports, and dashboards)
- c (Security and access)
- b (Security and access)
- c (Security and access)
- a and d (Content management)
- b and c (Sales cloud applications)
- c (Security and access)
- c and d (Security and access)
- b and d (Security and access)
- a (Security and access)
- d (Process automation)
- c (Extending custom object and applications)
- b (Change management)
- a, b, and c (Extending custom object and applications)
- b and d (Extending custom object and applications)
- a (Extending custom object and applications)
- a (Auditing and monitoring)
- a (Auditing and monitoring)
- b (Process automation)
- a, d, and e (Auditing and monitoring)
- d (Sales cloud applications)
- c (Security and access)
- a and d (Content management)
- a (Security and access)
- b (Extending custom object and applications)
- a, b, and e (Security and access)
- b, c, and d (Sales cloud applications)
- a, d, and e (Service cloud applications)
- a and c (Auditing and monitoring)
- a (Service cloud applications)
- b and d (Service cloud application)
- b and c (Service cloud application)
- a (Service cloud application)
- a and b (Service cloud application)
- a (Data management)
- c and d (Data management)
- a (Data management)
- b (Data management)
- b (Data management)
- b (Sales cloud applications)
- b (Sales cloud applications)
- c, d, and e (Sales cloud applications)
- c (Change management)
- a and d (Data management)
- b and d (Change management)
- a and d (Change management)
- a, c, and d (Change management)
- c (Security and access)
- c (Analytics, reports, and dashboards)
- d (Analytics, reports, and dashboards)
- c (Analytics, reports, and dashboards)
- a (Analytics, reports, and dashboards)
- c (Process automation)
- d (Process automation)
- b (Process automation)
- c and d (Process automation)
- d (Process automation)
- c and d (Change management)
- a (Process automation)