Elaine van Bergen Bacchus van

Slides:



Advertisements
Similar presentations
MOSS 2007 Document Management Adam McCarthy 1 st April 2009.
Advertisements

Maggie Swearingen. Sr. Manager at Protiviti Information Architect Using SharePoint for 5 years Specialize in user adoption, taxonomy planning and governance.
Microsoft ® Official Course Microsoft SharePoint 2013 Sriram – SharePoint Practice Developing Microsoft SharePoint Server 2013 Core Solutions.
Agenda 22 7.SharePoint Changes 8.Items & Lists 9.Files & Libraries 10.SharePoint & Office 11.Help 12.Wrap Up.
SharePoint Mobile Improving efficiency of the mobile workforce Anthony Pham Product Support Manager KWizCom
Document Management: Doing it right in SP Online Presented by Deliveron Consulting Services
Eleonora Babayants Galaxy Consulting. Information Governance  It is the set of policies, procedures, processes, roles, metrics, and controls implemented.
Build a SharePoint App with Microsoft Access. About me.
The What Why and How.  MCTS  These certifications provide the foundation for Microsoft Certification  MCITP  These certifications build on the technical.
SPC204 Security Problems in SharePoint 2010 Authentication and Authorization.
Office 365 Platform Flexible Tools App Manifest Web Page HTML/CSS/JS App.
m AUTHOR EXECUTIVE TRACK CONSULTANTMAUIDAN HOLME.
Securing Microsoft® Exchange Server 2010
Microsoft Confidential - Internal Only Cloud Services for Collaboration – the road to Wave 15.
Module 8 Configuring and Securing SharePoint Services and Service Applications.
Confidential Property of B2B Technologies January Governance or How to Tame SharePoint 2010.
About Chris Welch Synergy – Global Reach. Local Service. - Cell Online - USA | South.
Module 9 Configuring Messaging Policy and Compliance.
External user invited This creates invitation in Access Request List Invitation sent to guest with invitation URL Guest clicks URL. Verification.
Presented By: Hi-Link Technology Group Stamford, CT.
Module 9 Configuring Messaging Policy and Compliance.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
James Akrigg Microsoft Ltd Integrating InfoPath Forms Into Workflow Solutions And Business Processes.
Module 6 Securing Content. Module Overview Administering SharePoint Groups Implementing SharePoint Roles and Role Assignments Securing and Auditing SharePoint.
Management of Change ► The health, safety, security, environmental, technical and other impacts of temporary and permanent changes are formally assessed,
Security and the Questions Business Users should be asking the Techies.
Managing Content with SharePoint 2007 Module 0. Overview  Introduction  About This Course  Course Outline  Using Virtual PC.
Roles 1. Your Role: End User End Users use Inside NCDOT and Connect NCDOT for basic browsing and reading Typical tasks can include: Open or download files.
WIN a Netbook!!! Drop a business card in the basket to win.
Information explosion 1.4X 44X Empower the UserEnable the Compliance Officer In Place and Extensible Easy for IT Exchange, SharePoint, Windows Outlook,
1 | SharePoint Saturday St. Louis 2015 EDISOVERY IN SHAREPOINT 2013 JODY SOCHA.
Rights Metadata in DRS Basic Rights Functions in: – Batch Builder – EAS – DRS Web Admin.
© 2012 Kollabria All Rights Reserved ApplicationsApplications.
Inventory & Monitoring Program SharePoint Permissions Who has access? What can they do with the access? What is the easiest way to manage the permissions?
Windows SharePoint 2007 Introduction. What is Microsoft SharePoint 2007? Microsoft SharePoint 2007 is the central information sharing and collaboration.
SharePoint 2013 Creation of Lists (and useful application of them)
Token TOKEN User Groups Roles Claims Authentication Provider Identities STSUser Authentication Method UserGroup Role Assignment Permission Level FD.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Module 4: Administering Microsoft Office SharePoint Server 2007.
SharePoint Governance And the role of the Site Owner.
Instructor Antoine Victor Professional Data Management LLC  QuickStart Contractor Director of Operations Schedule Developers.
SharePoint University of the Highlands and Islands SharePoint for Records Management.
Module 8: Implementing Group Policy. Overview Multimedia: Introduction to Group Policy Implementing Group Policy Objects Implementing GPOs on a Domain.
Talking Points Provides EY people with greater working flexibility and collaboration opportunities. EY people can have access to technology that enables.
Transportation Agenda 19. Transportation Your Role: Designer Designers organize SharePoint content and determine how to display that content Typical tasks.
BASIS.ed Technology Coordinators
Stop Those Prying Eyes Getting to Your Data
Identity and Access Management
Document & Web Content Management
The Dirtiest Word In SharePoint: Governance!
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Power BI Security Best Practices
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Case Study – Energy Conglomerate from Australia
Quick Comparison of workspaces
CIS 349 Possible Is Everything/tutorialrank.com
CMGT 245 Possible Is Everything/snaptutorial.com
CIS 349 Education for Service/tutorialrank.com
What Is Sharepoint? Mohsen Ashkboos
Office 365 SharePoint Document Management and Collaboration Enhanced with Less Dev Time “By using Microsoft Azure with Office 365, Ways can focus on developing.
سياسة الإفصاح والشفافية ببنك التنمية الصناعية
SharePoint Security for the Site Owner
SharePoint Foundation 2010
SharePoint Foundation 2010
Health Care Law and Compliance
Module 8: Implementing Group Policy
SharePoint Online Assessment Results
Access Control and Site Security
SysKit Security Manager
Presentation transcript:

Elaine van Bergen Bacchus van Loo

@laneyvb

Regulatory LandscapeConsiderationsHow SharePoint permissions workWhat about Office 365 ?Permissions and PoliciesMethodology

80%

Transparency/ Collaboration Data Protection/ Management

Role Assignment User Group Security Scope Permission Level FD RC Site

Role Assignment User Group Security Scope Permission Level FD RC Site

Role Assignment User Group Security Scope Permission Level FD RC Site

Role Assignment User Group Security Scope Permission Level FD RC Site

Role Assignment User Group Security Scope Permission Level FD RC Site

Role Assignment User Group Security Scope Permission Level FD RC Site

Role Assignment User Group Security Scope Permission Level FD RC Site

Role Assignment User Group Security Scope Permission Level FD RC Site

W Library Security Scope Site

Role Assignment Site W Library Security Scope Site

Permission Level FD RC

Site

W W Library Site W

User

Role Assignment User Group Security Scope Permission Level FD RC Site

Group

Role Assignment User Group Security Scope Permission Level FD RC Site AD UserAD Security Group

Role Assignment User Group Security Scope Permission Level FD RC Site

Role Assignment User Group Security Scope Permission Level FD RC Site Policies ANONYMOUS ACCESS & POLICY USER POLICY Web App Permissions

Policies ANONYMOUS ACCESS & POLICY USER POLICY

Policies ANONYMOUS ACCESS & POLICY USER POLICY

Implement Optimization Monitoring Control AnalyzeIdentifyAssess Risks Assessment Access Metadata Design

Regulatory LandscapeConsiderationsHow SharePoint permissions workWhat about Office 365 ?Permissions and PoliciesMethodology