Welcome to this demo of how to centralize SharePoint security with Site Administrator for SharePoint. I'm Jennifer LuPiba, a product marketing manager for Dell, and I'm going to give you a brief overview of how you can better report, act upon, and enforce your security settings with Site Administrator before I turn things over to Dell systems consultant Ghazwan Khairi for the demo portion of this video.
You can protect your valuable content and simplify user access management with centralized SharePoint security from Site Administrator for SharePoint. You can quickly access content exposure with Site Administrator's security dashboard and explore the possible risks of practices like the universal granting of rights or brokered permissions inheritance.
You can drill into more details on who has access to what resources, and how exactly this access was granted, fix any inappropriate permissions, and enforce security best practices as automated policies. You can delegate all of this functionality to site collection and site owners in environments where content owners are accountable for access settings. Let's have Ghazwan show you how to report, act upon, and enforce your security strategy in Site Administrator.
Hi, and welcome. This video will cover the security dashboard, which is part of site administrator for sure 0.5 or release securities one of the four focus areas around governance that is provided by site administrator for SharePoint. Let's drill down into the security box or the security dashboard. First thing we are asked to do is provide our site or site collection.
I'm going to search for my site collection, portal 14, found, we'll go ahead and select that. Now that's what's inputted into the report. I could always come back in here and change the site if I wanted. What the report is providing us with is information around security. How many users do we have having access to the site? Where is broken inheritance? What kind of content and how much content do we have where the permission-- where the access-- is given to authenticated users?
The ability to run a report for where a specific individual or group have access to. The ability to enforce policies-- two policies are found under the security dashboard-- inheritance policy, so I can come in here and say, well, this is just simply everything within this note is simply going to inherit from the parent. So I can come in here and apply it once, or just go ahead and set a policy that everything that goes through, everything that we create within this topology, any sub-sites and the list libraries are simply going to inherit permissions.
Authenticated user policy as well-- being able to remove the authenticated user if we have seven off these right now. Set a policy to remove authenticated users from having-- that group-- from having access to any link or any sub-site within this topology as well. On the right hand side, we also see recent security changes.
So a very high level overview of what permissions are, we can drill down further and see a list of who has access to the site, run a report to see broken inheritance, run a report to see open content, enforce policies by looking at specific user's access. And once we find who has access to what. So let me give you an example.
So we're going to search for Rob's access for the site, and its sub-sites, and children. And then I can come in here and revoke, grant, duplicate, and re-assign his access. I can enforce inheritance policies as well as authenticated user policies, and then drill down capabilities across all these different areas.
This concludes this video. Thanks for tuning in.
Learn more about Site Administrator for SharePoint by visiting Quest.com/SiteAdministrator.