To document Connected App consumer keys and other default Salesforce configurations as false positives:
1. **Location**: Specify the code location or configuration where the consumer key or default setting is used
2. **Detailed Explanation**:
- Specify that the consumer keys are securely stored and not exposed inappropriately
- Justify why the flagged configuration does not pose a security risk (e.g., the consumer key is securely stored and not exposed to unauthorized access)
3. **Security Measures**:
- Highlight the use of secure storage mechanisms, such as protected custom settings or metadata
- Explain how access to the keys is restricted to authorized users only
- Describe additional security measures like restricted access, encryption, or admin-configurable options
4. **Use Cases**: Provide relevant use cases to justify the configuration and describe any special circumstances that require the configuration
5. **References**: Reference any Salesforce-approved practices or guidelines that support your approach
6. **Supporting Evidence**: Attach relevant documentation, such as Salesforce security guidelines, use case explanations, or prior approvals for similar findings
Ensure the document is clear, professional, and includes all necessary references to help reviewers understand the context and rationale.