About Chris Welch Synergy – Global Reach. Local Service. - Cell - 808 255 9431 Online - USA | South.

Slides:



Advertisements
Similar presentations
Organizing List and Documents with Site Columns and Content Types Gayan Peiris Principal Consultant
Advertisements

JERRY GILES MNIS Unclassified Information Sharing Service PAUL HILTON.
PG&E SharePoint Users Group
Top 10 things you need to know about SharePoint Site Administration
Managing User, Computer and Group Accounts
File Server Organization and Best Practices IT Partners June, 02, 2010.
User Groups & Permissions FSU Microsoft SharePoint Training Series: September 22nd, 2011 Please log into the site at:
SharePoint 2010 Permissions Keith Tuomi. profile KEITH TUOMI SharePoint Consultant / Developer at itgroove Developing Online Systems since years.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in Acceleratio specializes in developing high-quality enterprise.
1 of 6 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
1 of 7 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Mark Kashman Senior Product Manager –
Share easilyShare responsibly Share with anyone.
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
SharePoint Users Group Content Classification Step by Step SharePoint 2007 and 2010.
Managing Active Directory Domain Services Objects
DocuShare Training Welcome to DocuShare Training.
Module 9 Configuring Messaging Policy and Compliance.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Sites Lists Advanced Site collection administration –Moving sites –Save site as template.
External user invited This creates invitation in Access Request List Invitation sent to guest with invitation URL Guest clicks URL. Verification.
HOW SHAREPOINT WORKS By Gary Newman. Root Folder Virtual Directories SP Farm DNS Iterative Forward DNS query for A host record HTTP request HTML & JS.
Module 9 Configuring Messaging Policy and Compliance.
Module 7 : Configuration I Jong S. Bok
Module 6 Securing Content. Module Overview Administering SharePoint Groups Implementing SharePoint Roles and Role Assignments Securing and Auditing SharePoint.
Getting Started Managing a Collaboration Site Kendra Holly SharePoint Analyst June 13, 2015.
Managing Site and List Security Module 6. Overview  Understanding Security  Adding Users to Sites  Creating Custom SharePoint Groups  Creating Custom.
Accessible content is available upon request. SHAREPOINT VITALITY HEALTH CHECK How to get Gold Status on your SharePoint Vitality Plan Daryl Human, TSP,
Windows SharePoint Services Managing users and rights.
Team Site Admin with SharePoint 2010 Gareth Johns IT Skills Development Advisor.
Information explosion 1.4X 44X Empower the UserEnable the Compliance Officer In Place and Extensible Easy for IT Exchange, SharePoint, Windows Outlook,
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
1 | SharePoint Saturday St. Louis 2015 EDISOVERY IN SHAREPOINT 2013 JODY SOCHA.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Search Overview Search Features: WSS and Office Search Architecture Content Sources and.
Asia Pacific SharePoint Conference 2007 May 15th to 16th, 2007 Hilton Hotel Sydney.
Inventory & Monitoring Program SharePoint Permissions Who has access? What can they do with the access? What is the easiest way to manage the permissions?
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Security Overview Functional security – users, groups, and permissions for sites, lists,
Module 5 : Security I Jong S. Bok
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
Token TOKEN User Groups Roles Claims Authentication Provider Identities STSUser Authentication Method UserGroup Role Assignment Permission Level FD.
The SharePoint Shepherd’s Course for End Users Based on the book by Robert L. Bogue Copyright 2011 AvailTek LLC All Rights Reserved.
Elaine van Bergen Bacchus van
Microsoft ® Official Course Implementing Enterprise Content Management Microsoft SharePoint 2013 SharePoint Practice.
Administration - I Jong S. Bok
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
JERRY GILES MNIS Unclassified Information Sharing Service PAUL HILTON.
Productivity Architect Meet Chris Bortlik Author, Blogger, Speaker.
Building an Extranet with Office 365 Without Spending a Ton of Money SharePoint Fest NYC.
Permission Management in SharePoint – Overview and best practices Toni Frankola Co-Founder & CEO, Acceleratio Ltd., Croatia.
SharePoint 101 – An Overview of SharePoint 2010, 2013 and Office 365
Stop Those Prying Eyes Getting to Your Data
SharePoint ESSENTIALS TOOLKIT 2017 – Product Demo
APAN SharePoint Permissions
APAN SharePoint Permissions
SharePoint Site Admin Training
Team Site Admin with SharePoint 2010
SysKit Security Manager
NRMC HQ PUBLIC FACING INTERNET PORTAL Security Model
SharePoint 2013 Site Collection Administrators
Configuring Internet-related services
NRMC HQ PUBLIC FACING INTERNET PORTAL Security Model
NRMC HQ PUBLIC FACING INTERNET PORTAL Security Model
SharePoint Foundation 2010
SharePoint services Provides team collaboration through SharePoint Sites and makes it easy for communities to work together on documents, tasks, contacts,
CS703 - Advanced Operating Systems
INSTRUCTOR NOTES/LINKS
Links Launch Outlook Launch Skype Place Skype on Do Not Disturb.
08 | Configuring SharePoint Online
SysKit Security Manager
Presentation transcript:

About Chris Welch Synergy – Global Reach. Local Service. - Cell Online - USA | South Africa | United Kingdom | Asia Pacific

SharePoint 2010 End User Security - Standardization and Customization Understanding security in the End User environment Discussion and Demonstrations All participation is welcome and appreciated

SharePoint 2010 End User Security - Standardization and Customization > Planning and understanding < How do you make a meaningful security infrastructure? So… Let’s talk a bit about security

What is security? Trust Trust in people Trust in technology Trust in business P&P Trust in the institutional setting

Best Practice Keep it simple Reduce Reuse Recycle Security is a management process

Basic Security Concepts Plan the security environment Plan the security environment What – define security What – define security Sites Sites Lists and libraries Lists and libraries Who – define roles Who – define roles Separation of Duties Separation of Duties Access – define levels Access – define levels Least Privilege Least Privilege

SharePoint Roles Standard Security Roles Standard Security Roles Farm Administrator Farm Administrator Site Collection Administrator Site Collection Administrator Service Application Administrator Service Application Administrator Site Administrator Site Administrator Users Users

Security Terms Authorization vs. Authentication Authorization vs. Authentication Risk Management Risk Management $ or other measure $ or other measure Central tenets of measuring secure systems Central tenets of measuring secure systems Confidentiality Confidentiality Integrity Integrity Availability Availability Non Repudiation Non Repudiation Others…. Others….

So What About SharePoint? Demo Interlude Demo Interlude How does SharePoint do - How does SharePoint do - Confidentiality Confidentiality Integrity Integrity Availability Availability Non-Repudiation Non-Repudiation

Discussion Point Where are the Where are the Strengths in your SharePoint security Strengths in your SharePoint security Weaknesses in your SharePoint security Weaknesses in your SharePoint security What is the trust factor

Architecture Primer SharePoint architecture SharePoint architecture Web Application Site Collection Sites Lists and Libraries

Web Application Security Performed by a Farm Administrator Performed by a Farm Administrator Security Security Authentication Authentication User Permissions User Permissions Policies Policies Anonymous Anonymous User User Permissions Permissions

Web Application Demo Authentication Providers Authentication Providers User Permissions User Permissions Remove Manage Lists permission Remove Manage Lists permission Policies Policies Create Deny Delete Permission Policy Create Deny Delete Permission Policy Apply as a User Policy Apply as a User Policy

Site Collection Administrator Site Collection Administrator Has full control of all content in a site collection Has full control of all content in a site collection Is bound by security policy settings at the Web Application level Is bound by security policy settings at the Web Application level Is managed at the site collection or farm Web Application level Is managed at the site collection or farm Web Application level Highly trusted position in user environment Highly trusted position in user environment Farm Administrator Farm Administrator Site collection security

Site Level Security Uses three basic pieces of infrastructure Uses three basic pieces of infrastructure Security principle Security principle Securable Object Securable Object Permission Level Permission Level User or GroupSite-List-Item Permission Level

Users and Groups Maintained at the site collection Maintained at the site collection Users Users Available from Authentication Provider Available from Authentication Provider Stored in user information list Stored in user information list Groups Groups AD AD SharePoint SharePoint Best Practice Discussion Best Practice Discussion Users vs. Groups Users vs. Groups

Some Limits to Consider Supported Limits Supported Limits Groups per users Groups per users Users – 2 million per SC Users – 2 million per SC Principles per group – 5000 Principles per group – 5000 SharePoint Groups – 10,000 per SC SharePoint Groups – 10,000 per SC Security Scope – 5000 Security Scope – 5000 Limits based on performance Limits based on performance

Users and Group Demo Users and Group Users and Group Review groups Review groups Create a group and discuss settings Create a group and discuss settings Suggestions Group Suggestions Group Add users Add users Settings overview Settings overview Groups page Groups page Group Group

Securable Objects Sites, lists and libraries, item Sites, lists and libraries, item Security inherited by default Security inherited by default Inheritance can be removed Inheritance can be removed Sites can be created with unique permissions Sites can be created with unique permissions Creates three groups by default Creates three groups by default Permsetup.aspx Permsetup.aspx

Securable Objects Demonstration Review settings Review settings Remove inheritance for a site Remove inheritance for a site Remove inherited principles Remove inherited principles Create a new security infrastructure Create a new security infrastructure

Permissions and Permission Levels Used to grant access Used to grant access Based upon granular permissions Based upon granular permissions Default set of permission levels Default set of permission levels FDCRL FDCRL AMRV AMRV Do not delete! Do not delete! Used to create customized security settings Used to create customized security settings

Permission Levels Stored at the top level site Stored at the top level site Inheritance can be broken, using PowerShell Inheritance can be broken, using PowerShell Best practice is to create a new Permission Level by inheriting from an existing one Best practice is to create a new Permission Level by inheriting from an existing one

Demo of Permission Levels Review permissions Review permissions Create a permission level by copying Create a permission level by copying Remove delete versions Remove delete versions Create a manage lists permission level Create a manage lists permission level Demonstrate permission dependencies Demonstrate permission dependencies

Finally Security Security Standardize where possible Standardize where possible Customize where necessary Customize where necessary Plan Plan Document Document Simplify Simplify

Questions?