Showing posts with label Interview Questions. Show all posts
Showing posts with label Interview Questions. Show all posts

Wednesday, September 2

Security Related Question and Answers

Security Related Question and Answers


Below Q & A gives you a better deal to understand which task or report to use based on the scenario.

What can a security group do? What does it have access to? 
View Security Group 
Security Analysis for Security Group 
Action Summary for Security Group

How can I tell what security policy to update for a given item?
View Security for Securable Item 

How can I tell what security groups a user has? 
View Security Groups for User

How can I compare access between users?
Compare Security of Workday Accounts 

How can I compare security groups? 
Security Analysis for Security Groups

Who are the members of a security group?
If user-based, use View Security Group.
If not, write a custom report (PBO: Security Group, Report Field: Members).

How can I find out if a user is a member of a given security group? 
Test Security Group Membership

How can I tell if a user has access to a given target using a given security group?
Test Security Group Membership 

How did this user get to this task or item? What security group allowed it? 
Security Analysis for Action

Given a user’s security groups, what is their cumulative access in tenant?
Security Analysis for Workday Account 

How do I add or remove a security group from multiple domain security policies at once?
Maintain Permissions for Security Group

How can I tell who has access to a given task or item?
View Security for Securable Item

How can I see all the roles that are defined in tenant? 
View Assignable Roles

What if I need to add new roles?
Maintain Assignable Roles

How can I tell what roles are unassigned? 
Unassigned Organization Roles Audit 
Unassigned Roles Audit 
Unfilled Assigned Roles Audit

How can I tell what role assignments exist for a given worker?
Role Assignments for Worker Position 

How can I tell what role assignments exist for a given organization? 
Roles for Organization and Subordinates 
Worker Roles Audit

How can I tell which security groups are allowed to assign workers to each role?
Role Assignment Permissions

How can I see all the domains and business processes available for a given functional area? 
Functional Areas

How can I see the current security configuration for a given functional area?
Domain Security Policies for Functional Area
Business Process Security Policies for Functional Area 

How can I see all the security groups in the tenant? 
View Security Group

How can I see a full list of reports around security?
Run Workday Standard Reports for security-related categories. You can also write custom reports using security-related data sources.

How can I see an audit trail of changes to security policies? Who did what, and when? 
Domain Security Policy History 
Business Process Security Policy History 
Domain Security Policies Changed within Time Range 
Business Process Security Policies Changed within Time Range 
Audit Trial - Security

How can I audit a given Workday Account?
View User or Task or Object Audit Trail

How can I audit what a user viewed or changed? 
View User Activity

How can I see a history of security changes for either an organization (e.g., role assignments) or for a worker?
Security History
Security History for User

How can I activate changes to security policies? 
Activate Pending Security Policy Changes

Can I select which pending security policies to activate?
No – The Activate Security Policy Changes task will activate all pending security policy changes in the tenant since the last activation. 

If there is more than one person making security policy changes in the tenant, when one person activates pending security policy changes will it only activate that person’s changes? 
No – the Activate Security Policy Changes task will activate all pending security policy changes in the tenant since the last activation, regardless of who made the change.

How can I see what security policy edits are pending activation?
Domain Security Policies with Pending Changes
Business Process Security Policies with Pending Changes 

How can I revert back to a previous security configuration in the tenant? 
Activate Previous Security Timestamp

When I activate a previous timestamp, do my changes since that timestamp get removed or deleted?
No – your changes will still be there but instead in a pending state. You must edit the security policy manually to correct or remove the changes. 

How can I see how many times security has been activated in tenant? 
View All Security Timestamps

How can I see if there are issues with the security configuration?
Security Exception Audit

Wednesday, August 14

Related Terms and Glossary - Compensation

Compensation
Ability to offer competitive compensation packages, ability to handle global regulations and global employee and uses a single system for compensation

Compensation Grades
Provides pay range guidelines as references

Compensation Package
A grouping of compensation guidelines (grades, grade profiles, and their associated steps) and plans that you can assign to workers as a set. Packages provide a quick view of eligible plans for a particular job or group of employees.

Compensation Eligibility Rules
Determines an employees eligibility for a compensation component during staffing events

Compensation Plan
A component for which an employee is paid and for what purpose (ex. salary, hourly, allowance)

Compensation Element
Required component to link compensation in HCM with Payroll to ensure accurate payroll earnings

Compensation Grade Profile
allows localization of pay range guidelines

Compensation Element
Required component to link compensation in HCM with Payroll to ensure accurate payroll earnings

Supplemental Earning
Any compensation paid in addition to an employee's regular wages that includes, but is not limited to, severance or dismissal pay, vacation pay, back pay, bonuses, moving expenses, overtime, taxable fringe benefits, and commissions. In Workday, only supplemental earnings can be grossed-up.

Base pay element
The compensation components that are included in the calculation of base pay for the purposes of determining the compa-ration and target penetration. Example: include both this and bonuses in the base pay calculation for compa-ratio.

Compensation basis
A grouping of compensation components, such as salary, commission and allowance plans, that define estimated earnings for an employee population.

Compensation component
An umbrella term for compensation packages, grade, grade profiles, and plans that can be associated with compensation eligibility rules.

Compensation defaulting rule
A rule that establishes the criteria for how compensation components default worker compensation during staffing transactions (such as a hire or job change)

Compensation element
These link Compensation to Payroll. When this is attached to a plan that is assigned to an employee, Workday can determine which earnings to use to pay the employee.

Compensation rule
Guidelines for determining which workers are eligible for which components of compensation.

Compensation Target rule
A rule used to segment your employee population for assignment of compensation plans.

Compensation Step
A specific monetary amount within a grade or grade profile.

Reference Pay Range
A range of pay deemed appropriate for a compensation grade or grade profile. During compensation transactions, if proposed compensation for an employee extends beyond the limits of the range for the employee's grade or grade profile, Workday issues a warning yet still permits submission of the proposed compensation.

Friday, July 26

Related Terms and Glossary - Security

Security Terms


Security Groups -
A collection of system users used to grant access to Workday. Security Groups are added to security policies to give members permissions to secured items in Workday. Group of users who need to perform actions or access data

Domain Security Policy-
Rules that dictate which security group can view or modify data within the domains

Components of Configurable Security:

  • Security Groups
  • Domains
  • Domain Security Policies
  • Business Processes
  • Business Process Security Policies

What are the 3 types of security constraints?

  • Unconstrained: members have access to available data instances
  • Constrained: members will only have access to data for assigned constraints
  • Mixed: Members have a mix of constrained and unconstrained

User-based security groups-
These groups are assigned manually to individual users to grant tenant wide access in Workday. Usually intended for administrators that needs system wide access.

Two types of Security Policies-
Domain security policies and Business process security policies.

Domain-
Domains are a collection of items that share the same security, including:
- Tasks
- Reports and report fields
- Web service operations

Domain Security Policies control which security groups have access to data in the domain
- View Security for Securable Item Report

Functional Area-
Represent the main grouping of delivered domains and BP types. These groupings are typically for a specific module or area of Workday, such as Procurement, Integrations, or Personal Data. Functional areas can be enabled or disabled.

Functional Area Report-
Functional Areas report is a "top-down" report which allows you to see a top-down view of Workday functional areas and the domains and business process types in each

Business Process Security Processes-
Business Processes Security Policies control which security groups can participate in the business process (initiate, perform actions, approve, cancel, delegate, etc.)
Have to give permission for multiple policies (ex. Approve, review, etc.)
Each business process type has a single security policy that secures all business process definitions of its type

Steps for Configuring Security:
1. Identify users- who needs access to what?
2. Create security groups- identify existing security group or create a new one for your employees
3. Edit Security Policies- grand view/ modify permissions to domains or grant business process permissions (sometimes domain OR business process or sometimes combo of both)
4.Activate Pending Changes to take effect
5. Test Changes to verify changes made provide the expected access (for both those who got access and those who don't need access)

Workday-Assigned Security Groups
These Security Groups grant GENERAL access and are AUTOMATICALLY assigned by the Workday system
- Assigned to a person
- Based on process such as hiring/ terminating
Ex. Employee as self, worker, all employees, all users, manager's manager

User-Based Security Groups-
These Security Groups grant ADMINISTRATIVE access tenant wide- typically for maintenance/admin groups
- Responsibility applies throughout the system (not just supervisory orgs but for entire tenant)
- User-based security groups are manually assigned to a worker
- Multiple people can be members of the same user-based security group
○ Ex. Benefits admin, compensation admin, payroll admin, report writer, HR admin, etc.

Steps for Creating a User-Based Security Group:
1. Create user-based security group
2. Configure security group on security policies
3. Activate pending security policies
4. Assign users to security group
5. Test (user can create an exit interview, testing it on who should be able vs who should not)
*Don't forget to add group for "administered for security groups" like Security Administrator, otherwise they wont be able to access anything

Role-Based Security Groups:
These Security Groups help identify your support or leadership staff
- Membership is derived based on being assigned an organizational role
- Roles are assigned to organizations (or location hierarchies)
- Roles are assigned to positions, NOT workers
- Roles inherit from superior org if not filled (if configured to do so)
- Access can be defined as constrained and unconstrained

Steps for Creating a Role-Based Security Group:
1. Use "maintain assignable roles" to create or modify assignable roles (supplemental book page 34-35)
2. Create role-based security group
3. Configure security group on security policies
4. Activate security policy changes
5. Assign roles to jobs/ positions to organizations
Test

Job-Based Security Group:
Identify members based on a job criterion

  • Job profile
  • Job category
  • Job family
  • Management level
  • Work shift
  • Include exempt jobs
  • Include non-exempt jobs

Automatic membership, Can be constrained or unconstrained

Membership-Based Security Groups:
     1. Location (meant for more specific location, not US as a whole)
            Grants access to a task based on the location for a worker
            Once created, automatically assigned based on users location
 Example: for initial deployment of time tracking, only London workers enter time on Workday

     2. Organization
             Grants access to a task based on the user's membership in org
             Once created, automatically assigned based on organization assignments
Example: business unit, company, cost center, pay group, USA as a whole, etc.

Combination Security Groups:
    1. Intersection -
            Grants access based on membership in ALL of the included security groups
            Includes only users who meet all of the specifications
    2. Aggregation Security Group -
            Includes users who are in ANY of the selected security groups
            User does not have to be in every included group

Security Domain
A predefined set of related securable items that include reports, tasks, report fields, data sources, and data source filters
- The securable item that make up a domain cannot be changed
- Each domain has its own security policy that controls access to the security items

Which security group is assigned directly to a worker?
User based security-Tenant wide

Role based security group permissions are given to a worker when their position is linked to what?
Support Role

Editing a security policy takes effect immediately
False- Need to activate

Business Process Policies-
Defines which security groups can participate in the business process

Security group that allows self service access?
Employee as self

Groups of users who need to perform actions or access data?
Security Groups

Sunday, July 7

Core HCM Interview Questions

Core HCM Interview Questions


How can a Business Process which is In Progress be terminated?
         By Deny

Who is responsible for rescind the BP If required?
           Business Process Administrator

In BP, as a default which step will complete?
          Last Step

Can there be another step after completion?
            Yes

Why do you get an unassigned task?
 If Role is not assigned to any employee to perform the task

Who is responsible for to Cancel the BP If required?
          Initiator

Report that will return all Business Processes which the sub-processes can be used?
          Business Process Configurations Options

Business Process will not inherited if the subordinate organization has its own version of process?
         True

For you to see related action for step such as Maintain Routing restrictions, Maintain Condition Rules etc. what mode you should be in Business Process Definition?
          View Mode

If you want to add a sub-process, what step type will you use?
           Action

You can rescind in-process business process event.
          False

How to add custom notification?
Navigate to Business Process Name’s Related Action >> Business Process >> Add  Notifications

Consolidated Approval allows user to approve or deny several previous steps as a SINGLE action?
           True

How to set a step for Completion?
          On Related Action of step >> Business Process >> Set as Complete.

It is a sequence of approvals that starts with an individual, then goes to the person’s Manager,   and on up the Management chain until it gets to the top or until some exit condition is met.
           Approval Chain

Where can we define notification for a transaction?
          Business Process

How can you disable system notifications?
                         Go to Notification tab >> Maintain system notifications

How can you add additional approvers to an event while the business process is 'In Progress?
Using 'Additional Approvers button' in the Business Process tool bar, work feed and Inbox.

How to make a step as optional?
Select the Optional check box in Business Process Definition

What task can be selected to configure notifications that will inform workers or their managers about pending, due or overdue business process tasks?
                        Business Process step >> Business Process >> Maintain Step Delay

How can an employee change language?
          My Account >> Change Preferences

At what position you can’t change the staffing model?                           
    Create Position-Position Management
    Set Hiring Restriction-Job Management

What criteria are used for hiring restrictions?
          Worker Type, Time Type, Job Profile, Job Family or No job Restriction

What tasks would you use to edit position restrictions and worker position information?
            Edit position Restrictions and Edit Position 

Worker has two types of records in workday system, what are they?
    Applicant  
    Employee (or ) Contingent

How can you remove a position in Workday?
    Close a Position 
    Freeze a position

What is the relationship between Job profile and Position?
          1: M

Which Staffing model applies hiring restriction to the entire Supervisory Organization? Explain with steps involved there.
           Staffing Model is Job Management.
                 
If we have to set Hiring restrictions to the Supervisory Organization then the following steps to be performed.
Select Related Action of your Supervisory Organization for which hiring restrictions need to be set >> Organization >> Set Hiring Restrictions

In Position Management, a position still exists in the old Organization when a worker together with his/her current position has been moved into a new Organization.
        False

Changing the staffing model of a parent organization does not automatically change the staffing model of existing subordinate organizations; you must change the staffing model of the subordinate organization manually.
      True

Which Staffing Model is useful for Organizations which prefers very broad requirements?
    Job Management

Headcount Group can be closed even if there are still filled positions
   False

Once a position or headcount group has been created, the Edit Staffing model is no longer available.
           True

Headcount group can be increased or decreased?
          True

Do you need to create a Position If need to hire an employee in to an organization where the staffing model is enabled as “Job Management”? Explain.
If the Staffing model is enabled as “ Job Management” then not required to create Position because  we give hiring restrictions to the Organization level not to the individual position level.

How to Edit the Staffing model for a Supervisory Organization?
           If I have to edit staffing model then the Navigation path would be:               
Your Supervisory Org >> Related Action >> Organization >> Edit Staffing Model
Or We can edit the staffing model using ‘Maintain Staffing Model’ task.

If you turn on the no Job Restriction check box, a hiring restriction is not required  
         True

What are the two staffing models?
          Position Management
          Job Management

Which report is used to maintain Staffing Model for multiple Supervisory Organizations at a time?
 Maintain Staffing Models

How can you identify which Staffing model has been assigned to your supervisory Organization?
Your Supervisory Org >> Related Action >> Organization >> Edit Staffing Model (If positions have not been created yet). OR In the Staffing tab

Which fields allows localization in Job Profile?               
Pay Rate Type
Certifications
Workers Compensation Code
Job Exempt

How can you freeze multiple positions at a time?
            Supervisory Organization >> Staffing >> Manage Position Hiring Freeze.

How can you freeze all positions in an Supervisory Organization?
               Supervisory Organization >> Staffing >> Manager Organization Hiring Freeze.
   
Workday application data is accessible only through configurable security structure that is enforced through:
Workday Object Management System (OMS)

Workday defaults organizations roles from superior organization
True

Workday system gives users multiple ways to initiate the same task or view the same information.
True

Applicant status applies to a position , not applicant
True

Can applicants be deleted? What is the task?
Yes. Task: Mark applicants for Deletion.

Can we do mass rescind for a BP?
Yes

While hiring you can use an existing applicant or add a new applicant.
True

What are the 2 ways to convert a contingent worker to employee status?
End the contract and then hire them as an employee
Use the convert to employee task

What is the process that supports promotions, demotions, transfers, lateral moves as well as changes to position data and location?
      Change Job Process.

You cannot reorder or remove sections on the business process template.
   True

In which Job change reason the manager or organization cannot be edited
Lateral Move\Data Change

What is the task used by ‘Manager’ pull an employee into their organization? Hint: This initiation action will be allowed when the security group initiating the action does not have direct access to the worker.
Request transfer.

Is ‘Termination’ configurable event?
Yes.

Termination is complete in the system at midnight on the day after the termination
True

When is the action “Reassign task “available?
When the task is in progress

When is the action “Request Reassignment “available?
When the task is in progress

When is the action “Reassign a delegation change “available?
     When the task is in progress

When is the action “Correct “available?
When the task is in progress and successfully completed.

When is the action “Rescind “available?
When the task is successfully completed

Is Mass Cancel for 'To Do' Possible?
Yes

The Workday report writer gives you the option of creating custom reports to meet your business requirements
True

Simple reports  can be shared
False

Advanced reports can be shared
True

What are the different custom report types?
All of the above

Who can make the changes in the report or share the report with other users?
Report Owner

Who are allowed to transfer the report from one user to another user?
Report Owner and Set up Administrator

What are the steps to create a report?

        Choose Report type and Data Source
        Select Objects and Fields
        Order Columns
        Sort Output
        Define Filter Criteria

Data Sources are defined and delivered by Workday
True

Each Data Source associated with primary Business Object has its own security
True

How many instances can be enabled for a custom object?
100

Where do you view/edit custom field related data for an employee
Under Additional Data

Custom fields are effective dated
False

Which task is used to delete the temporary report in the tenant that have expired and are eligible for deletion?
Delete Temporary Report Definitions

What are the different custom field types?
Currency, Decimal, Integer, List, Text

The Tab on the Report definition allows you to control the order in which data will be presented and grouped is
Sort

What is the task to convert a report from simple to advanced?
Change to Advanced Report type

What is the Primary Org Type in Workday HCM?
Supervisory

You cannot hire into a supervisory organization prior to the org availability date
True

Which of the following is not reorganization task?
       Create Superior

Positions are created within a Supervisory Organization
True

Organization roles have responsibilities within a supervisory organization
True

Unique business processes cannot be assigned to a supervisory Organization
       False

What is the task name to create organization sub-types
Maintain Organization sub-type

Which of these is not a org type?
Location

Which org type does not have Reorg event?
Matrix Org

Workday gives you the ability to rescind reorganization task such as assign superior
True

Where in the supervisory organization can you limit the other organizational assignment?
Allowed Organizations

What is the task name to add Matrix member to the matrix organization?
Assign Matrix member

What is mandatory before creation of Location?
Time Profile

Can users override any inherited locale by changing it in their preferences?
Yes

Can organization roles be inherited down to subordinate organizations?
Yes

Organization hierarchies do not store positions , workers or transactions
True

Who will be the organization owner?
Person who creates the organization

Transfer of organization ownership is possible in WD? How?
   Yes. Task: Transfer Ownership

Can Supervisory Organization be deleted?
No. 

Organization hierarchy includes only organizations of same type.     
 True

Compensation eligibility rule use a framework i.e., completely unique to compensation and is unlike anything else in WD system
 False.

What are the mandatory Fields to create a Sup org?
Availability Date, Sub Type and Staffing Model

What is Matrix Org?
It’s Indirect Relationship.

Can you change the default organization assignment?
By Change Org Assignment

Can we reuse reorg Event?
Yes

What is Location Hierarchy?
Org Type

How many Number of org Type can be assign to a Customer?
Unlimited

Workday provides the ability to create Custom Organizations to meet your unique business needs 
True

Can we hire a worker into a Cost Center Organization?
No

What are all the tasks which I can perform while reorganization?
     Assign Superior
     Create Subordinate
     Divide Organization
     Inactivate Organization
     Move Workers

How to Inactivate Supervisory Organization?
Supervisory org, Related Actions, Reorganization, Inactivate

Can Applicant can be  present in the system before creating the supervisory organization  
Yes

Can Company can be changed once it is defaulted
Yes

Name two types of compensation plans
Allowance plan and Salary Plan

Who is responsible for compensation structure for your company?
        Compensation Administrator.

Compensation grades are used to define?
       Pay Ranges.

Compensation grade profile is used to define?
   Localization.

What are the 3 ways for a compensation change for an employee?
    Manually from a related action off the employees name.
     Request compensation change: any compensation plan can be edited.
     Request grade change: only the compensation grade or grade profile can be changed.

If you are using compensation eligibility rules and default compensation from a position, the default compensation will override the eligibility rule.
  True.

Name any 2 compensation audit report?
  Compensation component audit; Employee Compensation audit.

Employee Compensation components can include multiple currencies?
  True

Compensation package should at least have how many salary plans?
 One.

Total base pay is sum of?
 Salary and allowance plans

Which report is used to see the breakdown of all the components of compensation?
Total compensation report.

Name the task to maintain currency exchange rates?
Maintain Currency Conversion Rates.

Exchange rates are effective dated?
True.

Compensation matrix used for?
Employee Performance.

What is the use of Reimbursable check box while creating allowance plan?
When an allowance is not being paid through payroll but through an expense report.

Key Components of Compensation?                          
            1.Eligibility Rule
            2.Grade Profile
            3.Grade
            4.Salary Plan
            5.Compensation Package

What allows you to assign worker to a different compensation Range than the default?
            Grade Profiles

What currency will be used if the employee has multiple currencies in his compensation component?
Currency of Grade

What Business Process should be added so that Compensation Components will take effect?
Propose Compensation Business Process

The system will still let you enter a base pay amount that is outside the grade’s pay range.
True

What type of organization, Business process is associated with?
Sup org

Can you copy and modify the BP?
Yes

Can you delete default definition for BP?
No

Sunday, June 30

Interview Questions: Reporting

Reporting Interview Questions

What are Advance reports?
Advanced reports enable you to perform many actions on your data from primary and related business objects, including: Counting, Grouping, Summarizing, Totaling.
Output format of these reports can be table and charts.

Which filter would execute first? Filter or sub filter?
Sub filter will execute first. Because sub filters are applied on related business object, so it will filter most of the data using sub filters and then remaining data using filters.

What is RAAS?
RAAS is a normal report which is web service enabled. Making a report as web service enable will help to call that report in EIB, studio Integrations and BIRT. Otherwise, we cannot call that report in EIB, Studio or BIRT.

What are the steps to create a report?
Choose Report type and Data Source>>  Select Objects and Fields>>  Order Columns>>  Sort Output>>  Define Filter Criteria

What is Workday Reporting? What are the types of workday reports?
Workday reporting is a tool to gain information on data which is stored in workday. This information can be in table format, chart format etc.

Types: There are 2 types of Workday Reports. Custom report, Standard Reports.
Standard Reports are again of two types.
Xpresso Reports:
    These reports are delivered reports. User cannot edit these reports. User can only run reports for which S/he have access to.

Report Writer:
These reports are delivered reports. User can not directly edit these reports. User have to copy these reports and then user can edit that report.

Custom reports:
These are the custom reports created by user using report writer tool. The task to create custom report is “Create custom report”. The person who create the report is owner of that report.

How to make report as web service enable?
There are 2 ways to make a report as web service enable.
  • While creating an advance report, you can find a checkbox to make report as web service enable.
  • After creating a report, you can also go to advance tab and select web service enable checkbox. This way you can also disable report as web service, so it cannot be used in EIB, Studio and BIRT. 

What is difference between advance reports and simple reports?
Simple reports will not have option to sub filter, prompts and will have less functionality, wherein advance reports will have these features.
Also, simple reports cannot be used as web service.

The Tab on the Report definition allows you to control the order in which data will be presented and grouped is
Sort

Which Report cannot publish Web service?
Simple

What is the task to convert a report from simple to advanced?
Related action >> custom report >> Change to Advanced Report type

How do you compare the WD reporting with Relational DB?
Data Source           - View 
Object                    - Table 
Related Object       - Child Table 
Class Report Field - (CRF) Column 
Instance                 - Row

What is Matrix Report?
Matrix reports are similar, but not identical to, pivot tables and cross-tabs found in other systems. You group data in a row group and optionally a column group. Values in the matrix cells display aggregate values scoped to the intersection of the row and column groups to which the cell belongs.

What is RAAS?
You may create custom reports and enable them as a web service to be used in an Outbound EIB (Enterprise Integration Builder) as a data source. If you select this option, then you must also define Column Heading Override and Group Column Heading values on the Columns tab, and provide Label Overrides for all prompts on the Prompts tab.

What is Worklets?
A worklet is a report that can be displayed in a "tile" on the Workday "landing pages", which are: My Workday, All About Me, and My Team, and the Dashboard slide-out. Worklets provide users quick access to frequently referenced data and tasks common to a specific functional area.
You can create your own worklets by using the Report Writer and specifying either the advanced or the matrix report type, and then selecting Enable As Worklet on the Output tab. If you choose to share a worklet, it becomes available for authorized users to select when configuring their Workday landing pages.

What is Trended Worker Data source?
Trended Worker Data source encompasses a number of fields that fall into 3 general categories: 
Monthly worker snapshots. This type of data includes data about  workers as of the last day of the month, including compensation data, headcount numbers, and biographical information. 
Staffing events. These include hires, terminations, transfers, promotions, changes in position, addition or deletion of additional jobs, move events, and international assignments. 
Calculated metrics. These are calculations ,we can make based on the trended data, such as turnover rate and span of control. 
Workday automatically updates the Trended Workers data source at the end of each month. Data is collected for the last 36 months (that is, data is collected for as many months that are available in Workday, up to 36 months). Any data older than 36 months is automatically purged from the data source. Additionally, any retroactive changes that have been made to a worker in the last 3 months are automatically incorporated into the trended data.

What is Trending report?
Using Trending Report, Workday enables to report on and analyze trends in worker data such as headcount and attrition through a number of Workday delivered standard reports. We could create custom Trending report types that use trended data. By using either standard reports or custom reports, we can analyze important trends in our workforce directly in Workday, without the need for a third-party analytical tool. 
At the core of all trending report types is the Trended Workers data source. 

What is Indexed Data source?
Indexed data sources are a special type of data source optimized for performance, aggregation, and faceted filtering on large volumes of data.

Can custom  field be used in Report?
Yes.

What are the different types of custom reports? 
Simple, Advanced, Matrix, nBox, Search, Composite, Transposed, Trending.

What is the difference between Filter and Sub-Filter?
Filter is used to provide filter condition for Primary Business Object and Sub-Filter is used to provide filter condition for Secondary Business Object



Additional Reads

Wednesday, June 26

Interview Questions: Security

Workday Security Interview Questions


There is no inheritance for business process security policies (true / false)

True


Roles are used to drive business process management (true / false)

Yes


Which type of security groups is optional and customer-defined?

Job Based Security Group is optional


What type of Security Group are these: Report Writer; Setup Administrator ?
User Based Security Group

Editing a security policy takes effect immediately? (true / false)

False (Need to ‘Activate Pending Security Policy Changes)


The following are true about User-Based Security Groups

Grants access across the system

Multiple people can be members if same user-based security group


Is it possible to activate a previous timestamp while making changes needed to fix present security configuration?

  Yes
   
 You may configure securable actions and securable reporting items in a domain security policy.

 False


The following report views permissions the specified user has an action & also security policies and groups that grant access

 Security Analysis for Action


What are the different ways to assign security groups?
By the system based on a process
Manually

 Is Report Writer a role-based security group
No


  Which of the following is not securable area of business process

 Create new sub-processes


 In case a secured item is included in more than one domain security policy, workers who are granted different levels of access permission in different domains get the most access granted

  True


The following report views all domain security policies and business process security policies that use the security group:          

      Action Summary for Security Group

  Editing a child security policy does not affect inheritance in any of the others

 True


 Which Security Group is required for you to access custom reports 

  Report Writer User Based Security Group


  Can a role-based security tag to more than one org?
 Yes


  In Security Breach, whom should you contact?

 What are the steps to create Role Based Security?
 Steps-Org Role>>Maintain Org Role>>Attach the Role


 What are the two components of Workday Security?
Domain Security

Business Security


 How to disable Functional area?
Maintain Functional area


How to activate security policy?
    Activate pending Security Policy


What determines access to landing page?
Security


Which Report is used to see the Security Policy?
View Security for Securable Item
 
      Defined tasks and reports that are functionally similar
      Domains


This dictates who can view / modify data w/in the domain
Domain Security Policies


What dictates who can participate in the business process
Business Process Policies


Type of security group automatically assigned based on user’s job criteria
Job based security group


   Security policies designate permissions for security groups to view, or view and modify tasks within the domain
      Domain Security Policy


     Security Policies contain such securable items as initiation steps, step actions, and actions on the process as a whole
      Business Process Security Policy


Can you reassign a task to anyone?
No (It can be assigned to the users who have relevant security group in BP Security Policy).


Which dictates who can participate in BP?
Business Process Security Policy

------------ are assigned to users  based on administrative responsibility
  User-based

 ------------ are found as a related action off worker’s name
  User-based

 ----------- are assigned to users are based on criteria selected
  Job based

 ------------- are used to only approve business process management tasks; they do not determine task or report access and cannot initiate a business process
Job roles

 --------- report views all details about security group membership, security policies in which the group is used, the permissions it has and the functional area
  View Security Group

 ------- is automatically assigned based on criteria selected
Job based

 ------------- is used to restore inheritance in a child policy
Use Parent Permissions

Additional Reads: