Module 6 Securing Content. Module Overview Administering SharePoint Groups Implementing SharePoint Roles and Role Assignments Securing and Auditing SharePoint.

Slides:



Advertisements
Similar presentations
JERRY GILES MNIS Unclassified Information Sharing Service PAUL HILTON.
Advertisements

Module 12 Upgrading from Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010.
Deploying and Managing Active Directory Certificate Services
Lesson 17: Configuring Security Policies
Module 5: Creating and Configuring Group Policy
SharePoint 2010 Permissions Keith Tuomi. profile KEITH TUOMI SharePoint Consultant / Developer at itgroove Developing Online Systems since years.
Managing Identity and Permissions
Definitions Collaboration – working together on team projects and sharing information, often through ad-hoc processes, to accomplish project goals. Document.
Understanding Active Directory
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Module 8: Implementing Administrative Templates and Audit Policy.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Microsoft ® Official Course Module 9 Configuring Applications.
Module 1: Installing Active Directory Domain Services
Edwin Sarmiento Microsoft MVP – Windows Server System Senior Systems Engineer/Database Administrator Fujitsu Asia Pte Ltd
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Module 2 Creating Active Directory ® Domain Services User and Computer Objects.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Module 13: Configuring Availability of Network Resources and Content.
Implementing Dynamic Host Configuration Protocol
Implementing File and Print Services
Securing Microsoft® Exchange Server 2010
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Managing Active Directory Domain Services Objects
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
About Chris Welch Synergy – Global Reach. Local Service. - Cell Online - USA | South.
Module 2 Designing Microsoft® Exchange Server 2010 Integration with the Current Infrastructure.
Module 15: Manage the Windows ® Small Business Server 2008 Environment Using Group Policy.
Module 7: Fundamentals of Administering Windows Server 2008.
Module 9 Configuring Messaging Policy and Compliance.
Module 9 Authenticating and Authorizing Users. Module Overview Authenticating Connections to SQL Server Authorizing Logins to Access Databases Authorization.
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Sites Lists Advanced Site collection administration –Moving sites –Save site as template.
Microsoft ® Official Course Module 3 Managing Active Directory Domain Services Objects.
Module 6: Configuring User Environments Using Group Policy.
Module 9 Configuring Messaging Policy and Compliance.
Module 10 Administering and Configuring SharePoint Search.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Module 14 Monitoring and Optimizing SharePoint Performance.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 3 Managing Recipient Objects. Module Overview Managing Mailboxes Managing Other Recipients Configuring Address Policies Configuring Address.
Module 3: Managing a Microsoft ® Windows ® Small Business Server Environment.
Module 12 Upgrading from Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010.
Module 7 Planning and Deploying Messaging Compliance.
Managing Site and List Security Module 6. Overview  Understanding Security  Adding Users to Sites  Creating Custom SharePoint Groups  Creating Custom.
Module 1: Implementing Active Directory ® Domain Services.
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Inventory & Monitoring Program SharePoint Permissions Who has access? What can they do with the access? What is the easiest way to manage the permissions?
Copyright © 2006 Pilothouse Consulting Inc. All rights reserved. Security Overview Functional security – users, groups, and permissions for sites, lists,
Implementing Group Policy
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Module 9 User Profiles and Social Networking. Module Overview Configuring User Profiles Implementing SharePoint 2010 Social Networking Features.
Module 10: Implementing Administrative Templates and Audit Policy.
Microsoft ® Official Course Implementing Enterprise Content Management Microsoft SharePoint 2013 SharePoint Practice.
Module 6: Configuring User Environments Using Group Policies.
Module 4: Administering Microsoft Office SharePoint Server 2007.
Module 6 Creating and Configuring Group Policy. Module Overview Overview of Group Policy Configuring the Scope of Group Policy Objects Evaluating the.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
JERRY GILES MNIS Unclassified Information Sharing Service PAUL HILTON.
Permission Management in SharePoint – Overview and best practices Toni Frankola Co-Founder & CEO, Acceleratio Ltd., Croatia.
APAN SharePoint Permissions
APAN SharePoint Permissions
Unit 3 NT1330 Client-Server Networking II Date: 1/6/2016
SysKit Security Manager
Module 8: Implementing Group Policy
Links Launch Outlook Launch Skype Place Skype on Do Not Disturb.
SysKit Security Manager
Presentation transcript:

Module 6 Securing Content

Module Overview Administering SharePoint Groups Implementing SharePoint Roles and Role Assignments Securing and Auditing SharePoint Content Configuring Security for SharePoint Content

Lesson 1: Administering SharePoint Groups Overview of Site Security Using Default Groups Using Custom Groups Group Management Comparison Using Active Directory Domain Service Groups Administrative Groups User Information List

Overview of Site Security Read View Items Open Items View Items User Group Security Principals Permissions Securable Objects Permission: Permission Level: Item Document List

Using Default Groups Visitors: Read Members: Contribute Owners: Full Control Site templates add other groups:  Viewers  Approvers  Designers  Hierarchy Managers  Restricted Readers  Style Resource Readers

Using Custom Groups When should you create a custom group? Permissions and Custom Groups Using Hierarchical Membership Management  Site Managers. Membership managed by site collection administrators  Site Members. Owned by Site Managers. Membership managed by owner Group Membership Visibility

Group Management Comparison AD DS Groups  Technical user interface  No provisioning  Centralized security management SharePoint Groups  Nontechnical user interface  Optional provisioning of membership requests  Unified view of SharePoint groups & users  Only applies to SharePoint

Using Active Directory Domain Service Groups Using AD DS Groups Without SharePoint Groups Using SharePoint Groups Without AD DS Groups Advantages and disadvantages of nesting Active Directory SharePoint

Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

Administrative Groups Site Collection Administrators SharePoint Farm Administrators Windows Administrators

Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.

User Information List People and Groups User Information List  /_catalogs/users/simple.aspx  This list exists at the site collection level  The list of users is dynamic

Lesson 2: Implementing SharePoint Roles and Role Assignments Configuring Anonymous Access Site, List, and Library Security Folder and Item Security Permission Levels Override Check Out Permission

Configuring Anonymous Access Configuring authentication of anonymous users in Central Administration Configuring authorization for anonymous users in a site Anonymous access is disabled by default

Site, List, and Library Security Site-Level Permissions  Inherit from site collection  You can choose to break the inheritance List and Library Permissions  Inherit from the site  You can choose to break the inheritance Use the Check Permissions tool to evaluate effective permissions for a user Site Collection Top-Level Site Site Collection Top-Level Site Site Library/List [Folder] Document or Item Document or Item

Folder and Item Security Items and folders inherit permissions from the list or library by default You can break inheritance and assign permissions to an item, document, or folder Indexing and Item Permissions  Indexing ASPX content pages  Potential security concerns Site Collection Top-Level Site Site Collection Top-Level Site Site Library/List [Folder] Document or Item Document or Item

Permission Levels Permission levels are collections of permissions Default permission levels Defined at the site collection Creating and customizing permission levels Permission Level: Read View Items Open Items View Versions

Override Check Out Permission Override Check Out permission Included in Full Control permission level Using a dedicated permission level for Override Check Out

Lesson 3: Securing and Auditing SharePoint Content Web Application Security Managing Web Application Permissions Configuring Auditing Information Rights Management

Web Application Security User Policy Anonymous Policy Permission Policy

Managing Web Application Permissions Defined at the Web application Use to restrict the individual permissions that can be used in site collections Example: Prevent changes to branding  Clear Apply Style Sheets and Apply Themes and Borders

Configuring Auditing Configured at the site collection level Records user actions for later examination Using audit logs to review security

Information Rights Management What is Information Rights Management? SharePoint Permissions and IRM Permissions Active Directory Rights Management Services Configuring IRM in SharePoint

Lab: Configuring Security for SharePoint Content Exercise 1: Managing SharePoint Groups Exercise 2: Creating Custom Permission Levels Exercise 3: Managing Permissions and Inheritance Exercise 4: Creating a Web Application Policy Logon information Estimated time: 30 minutes

Scenario You have installed a new SharePoint 2010 environment for evaluation by your executives. No one in the organization has used SharePoint before and the site setup will fall on you. You have been tasked with helping set up users and groups with the proper permissions on the sites until all the governance issues have been finalized, at which point permission management will be delegated to business owners. Additionally, you must set up an auditor policy on your Web application to allow the internal security team access to the sites and ensure that sensitive data is not being posted.

Module Review and Takeaways Review Questions