SharePoint (Classic Sites) - Checking the granted shares Video
In this video, you will learn about checking the granted shares in Microsoft 365. The video covers how to view and manage the permissions and access rights that have been granted to others for your documents or folders.
This will help you ensure that only the intended individuals have access to your shared content and maintain the security of your information.
- 2:27
- 3169 views
-
Teams - Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3646 times
-
SharePoint (Classic Sites) - Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3282 times
-
SharePoint (Classic Sites) - Granting access to the SharePoint site to someone outside the company
- 3:46
- Viewed 3800 times
-
SharePoint (Classic Sites) - Restricting a document to read-only mode (Extract a document)
- 2:05
- Viewed 3104 times
-
SharePoint (Classic Sites) - Recovering deleted items (Recycle bin and Second-stage recycle bin)
- 2:18
- Viewed 6432 times
-
SharePoint (Classic Sites) - Targeting content using a specific audience
- 3:35
- Viewed 3238 times
-
Recovering deleted items (Recycle bin and Second-stage recycle bin)
- 2:18
- Viewed 6432 times
-
Granting access to the SharePoint site to someone outside the company
- 3:46
- Viewed 3800 times
-
Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3646 times
-
Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3282 times
-
Targeting content using a specific audience
- 3:35
- Viewed 3238 times
-
Restricting a document to read-only mode (Extract a document)
- 2:05
- Viewed 3104 times
-
Add channels and tabs
- 1:40
- Viewed 1743 times
-
Create private and shared channels
- 1:52
- Viewed 1560 times
-
Create a permission group
- 2:11
- Viewed 1375 times
-
Understand and Secure Information Sharing in Instant Messaging
- 2:38
- Viewed 1217 times
-
Use version history
- 1:57
- Viewed 1118 times
-
Share a document to someone outside of my SharePoint site
- 3:57
- Viewed 1090 times
-
SharePoint permission levels
- 2:16
- Viewed 1077 times
-
Restrict a Document to Certain Team Members
- 1:50
- Viewed 1021 times
-
Restrict a Document to Read-Only
- 0:58
- Viewed 1014 times
-
Secure Teams Upon Creation
- 2:57
- Viewed 990 times
-
Manage Privacy in Private Channels
- 2:34
- Viewed 980 times
-
Secure a Shared Document with a Password
- 1:28
- Viewed 964 times
-
Check Granted Shares
- 00:48
- Viewed 743 times
-
Modify Sharing Rules
- 00:53
- Viewed 649 times
-
Protect My Document with a Password and Expiration Date
- 01:02
- Viewed 643 times
-
Use Recycle Bins to Restore Documents
- 01:49
- Viewed 638 times
-
Share and Collaborate OneDrive
- 02:45
- Viewed 614 times
-
Restore Your OneDrive Space
- 01:42
- Viewed 602 times
-
Best Security Practices on OneDrive
- 01:27
- Viewed 594 times
-
Block a sender
- 01:54
- Viewed 540 times
-
Avoid Abusive Document Sharing
- 00:57
- Viewed 506 times
-
Prevent the forwarding of an email
- 01:01
- Viewed 473 times
-
Share a document securely with Outlook
- 02:21
- Viewed 450 times
-
Identify a fraudulent email
- 02:06
- Viewed 424 times
-
Provide an overview of best security practices in Outlook
- 01:08
- Viewed 413 times
-
Guide to Using the Microsoft Authenticator App
- 01:47
- Viewed 379 times
-
Protect an email by encrypting
- 01:10
- Viewed 378 times
-
Concept of Multi-Factor Authentication
- 01:51
- Viewed 360 times
-
Turn on Multi-Factor Authentication in the Admin Section
- 02:07
- Viewed 299 times
-
Manual Activation of Multi-Factor Authentication
- 01:40
- Viewed 260 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 135 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 113 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 100 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 100 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 98 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 98 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 93 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 92 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 91 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 90 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 88 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 86 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 85 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 83 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 81 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 70 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
What is a ransomware attack ?
- 00:29
- Viewed 22 times
-
What is cybersecurity?
- 00:52
- Viewed 21 times
-
How does two factor authentication ?
- 00:48
- Viewed 21 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Web browser
- 00:41
- Viewed 19 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
Extensions
- 00:26
- Viewed 18 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
How browser works
- 00:42
- Viewed 17 times
-
The importance of chossing a local account
- 00:40
- Viewed 17 times
-
How url filtering work?
- 00:54
- Viewed 17 times
-
BYOD - risks
- 00:41
- Viewed 17 times
-
What is a virus or malware?
- 01:27
- Viewed 16 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
In search vulnerability
- 00:32
- Viewed 16 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Security through obscurity
- 00:35
- Viewed 15 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
What is a phishing attack?
- 01:27
- Viewed 14 times
-
Phishing
- 00:50
- Viewed 14 times
-
Parental controls
- 00:31
- Viewed 13 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
BYOD - risks
- 00:41
- Viewed 17 times
-
How url filtering work?
- 00:54
- Viewed 17 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
The importance of chossing a local account
- 00:40
- Viewed 17 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Security through obscurity
- 00:35
- Viewed 15 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
In search vulnerability
- 00:32
- Viewed 16 times
-
Extensions
- 00:26
- Viewed 18 times
-
Parental controls
- 00:31
- Viewed 13 times
-
How browser works
- 00:42
- Viewed 17 times
-
Web browser
- 00:41
- Viewed 19 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Phishing
- 00:50
- Viewed 14 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
How does two factor authentication ?
- 00:48
- Viewed 21 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is a ransomware attack ?
- 00:29
- Viewed 22 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
What is a virus or malware?
- 01:27
- Viewed 16 times
-
What is a phishing attack?
- 01:27
- Viewed 14 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
What is cybersecurity?
- 00:52
- Viewed 21 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 81 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 91 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 86 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 135 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 100 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 113 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 93 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 98 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 70 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 98 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 92 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 85 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 83 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 90 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 88 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 100 times
Objectifs :
This document aims to provide a comprehensive guide on managing access permissions in SharePoint sites, ensuring that users can effectively collaborate while safeguarding sensitive information from unauthorized access.
Chapitres :
-
Introduction to SharePoint Access Management
SharePoint is a powerful tool for collaboration, but with great power comes the responsibility of managing access to sensitive information. Regularly checking who has access to your SharePoint sites and documents is crucial to prevent information leakage. -
Checking Access on SharePoint Sites
To begin managing access, you can check who has access to the SharePoint site in general. This includes understanding the permissions of various libraries and documents, which are influenced by the overall site permissions. -
Access Management for Communication Sites
If your SharePoint site is a communication site, navigate to the settings to view site permissions. Here, you will find a list of owners, members, and visitors. You have the ability to change permissions for each individual or group and can also delete them if necessary. -
Access Management for Team Sites
For SharePoint sites linked to an Office 365 Group, start by checking the membership list. To review all permissions on the site, go to settings. This section provides information on different permission groups and the names of individuals who have access to your site as visitors. -
Managing Folder and Document Access
You can also manage who can access each folder and document. In the permissions panel, you will find various groups that have access to the documents, along with links granting access. For each link, you can modify settings or remove access for individuals as needed. -
Revoking Access
If you need to revoke access, you can delete the link directly, which will close access to the document for everyone involved. This interface remains consistent whether you are using a team SharePoint site or a communication SharePoint site. -
Conclusion
Regularly reviewing who has access to your SharePoint sites and documents is essential for maintaining security. Do not hesitate to revoke access when it is no longer needed, ensuring that your collaborative environment remains secure.
FAQ :
How can I check who has access to my SharePoint site?
You can check access by going to the settings of your SharePoint site. Here, you will find a list of owners, members, and visitors, along with their permissions.
What should I do if I want to revoke someone's access to a document?
You can manage permissions for each person or group in the permissions panel. Simply select the individual and change their access settings or remove them entirely.
What is the difference between a Communication Site and a Team Site in SharePoint?
A Communication Site is designed for sharing information broadly across an organization, while a Team Site is focused on collaboration among a specific group of users.
Can I manage permissions for individual documents in SharePoint?
Yes, you can check and manage permissions for each folder and document individually, allowing you to control access at a granular level.
What happens if I delete an access link in SharePoint?
Deleting an access link will revoke access to the document for everyone who had that link, effectively closing access to the document.
Quelques cas d'usages :
Managing Access for a Project Team
In a project management scenario, a project manager can regularly check and update permissions for team members on a SharePoint Team Site to ensure that only current team members have access to sensitive project documents.
Sharing Company Announcements
A communications officer can use a SharePoint Communication Site to share company-wide announcements, regularly checking permissions to ensure that all employees have access to the latest information.
Controlling Document Access for Compliance
In a regulated industry, compliance officers can manage document access in SharePoint to ensure that only authorized personnel can view sensitive documents, regularly reviewing permissions to maintain compliance.
Revoking Access After Project Completion
After a project is completed, a project lead can revoke access to the project documents in SharePoint, ensuring that only relevant stakeholders retain access to sensitive information.
Collaborating with External Partners
When collaborating with external partners, a business can create specific access links for shared documents in SharePoint, managing permissions to ensure that external users only have access to necessary files.
Glossaire :
SharePoint
A web-based collaboration platform developed by Microsoft that integrates with Microsoft Office. It is used for storing, organizing, sharing, and accessing information from any device.
Permissions
Settings that determine what users can do with a SharePoint site, library, or document, including viewing, editing, or deleting content.
Communication Site
A type of SharePoint site designed for sharing information broadly across an organization, often used for announcements, news, and resources.
Team Site
A SharePoint site designed for collaboration among a specific group of people, often linked to an Office 365 Group, allowing for shared documents and resources.
Office 365 Group
A feature in Microsoft 365 that allows users to collaborate by providing a shared workspace for email, conversations, files, and calendar.
Access Links
URLs that grant users access to specific documents or folders in SharePoint, which can be managed to control who can view or edit the content.
Cette formation pourrait intéresser votre entreprise ?
Mandarine Academy vous offre la possibilité d'obtenir des catalogues complets et actualisés, réalisés par nos formateurs experts dans différents domaines pour votre entreprise