bowbridge Anti-Virus for Salesforce Documentationbowbridge Anti-Virus for Salesforce

Installation & Setup

Step by step guide to install and configure bowbridge Anti Virus for Salesforce

Prerequisites

Before you start, make sure your administrator user has the ThreatProtectionAdmin permission set.

Installation

Open the Installation Assistant

Open the bowbridge app, go to Settings, select General, and click Installation Assistant.

Configure Scan Endpoint

Choose the Scan Cluster Endpoint closest to your Salesforce org location and click Save Endpoint.

Register Organisation

Click Register Org. The assistant registers your Salesforce org with the bowbridge service and stores the required connection values.

Create Default Protection Profile

Click Create Profile. The assistant creates the default Protection Profile for your org.

Start Schedulers

Click Start Schedulers. This starts the log cleanup scheduler and the weekly system report scheduler. The log cleanup job keeps File Scan Logs, URL Scan Logs, and Audit Trail entries within your retention settings. The weekly report emails administrators a summary of scan activity, license issues, and critical system events.

Assign User Permissions

Click Assign Permission Sets. This assigns the ThreatProtectionUser permission set to active users who need to open redirect and block pages when protected links are clicked.

Turn on Automatic Assignment if new and reactivated users should receive this permission set automatically.

Assign Package Licenses

Click Assign Licenses and select the profiles whose users should receive a managed package license. Users who already have a license are skipped.

Turn on Automatic License Assignment if new and reactivated standard users should receive a package license automatically.

Configure Notifications

Click Configure Notifications and set the email and in app notification options for administrators and users. See Notification Configuration for details.

Verify the Installation

  • Open the Dashboard tab and confirm that the service status is active.
  • Then run the built-in test tools to confirm scanning is working:

On this page