SharePoint (Classic Sites) - Granting access to the SharePoint site to someone outside the company Video
In this video, you will learn about granting access to the SharePoint site to someone outside the company.
The video covers the process of adding external members to your SharePoint site and the different permission levels you can assign to them.
This will help you effectively manage access and collaboration with external colleagues while ensuring security.
- 3:46
- 3799 views
-
Teams - Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3645 times
-
SharePoint (Classic Sites) - Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3281 times
-
SharePoint (Classic Sites) - Checking the granted shares
- 2:27
- Viewed 3169 times
-
SharePoint (Classic Sites) - Restricting a document to read-only mode (Extract a document)
- 2:05
- Viewed 3103 times
-
SharePoint (Classic Sites) - Targeting content using a specific audience
- 3:35
- Viewed 3237 times
-
Recovering deleted items (Recycle bin and Second-stage recycle bin)
- 2:18
- Viewed 6432 times
-
Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3645 times
-
Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3281 times
-
Targeting content using a specific audience
- 3:35
- Viewed 3237 times
-
Checking the granted shares
- 2:27
- Viewed 3169 times
-
Restricting a document to read-only mode (Extract a document)
- 2:05
- Viewed 3103 times
-
Add channels and tabs
- 1:40
- Viewed 1743 times
-
Create private and shared channels
- 1:52
- Viewed 1559 times
-
Create a permission group
- 2:11
- Viewed 1375 times
-
Understand and Secure Information Sharing in Instant Messaging
- 2:38
- Viewed 1216 times
-
Use version history
- 1:57
- Viewed 1118 times
-
Share a document to someone outside of my SharePoint site
- 3:57
- Viewed 1089 times
-
SharePoint permission levels
- 2:16
- Viewed 1077 times
-
Restrict a Document to Certain Team Members
- 1:50
- Viewed 1021 times
-
Restrict a Document to Read-Only
- 0:58
- Viewed 1013 times
-
Secure Teams Upon Creation
- 2:57
- Viewed 990 times
-
Manage Privacy in Private Channels
- 2:34
- Viewed 980 times
-
Secure a Shared Document with a Password
- 1:28
- Viewed 963 times
-
Check Granted Shares
- 00:48
- Viewed 742 times
-
Modify Sharing Rules
- 00:53
- Viewed 649 times
-
Protect My Document with a Password and Expiration Date
- 01:02
- Viewed 643 times
-
Use Recycle Bins to Restore Documents
- 01:49
- Viewed 638 times
-
Share and Collaborate OneDrive
- 02:45
- Viewed 613 times
-
Restore Your OneDrive Space
- 01:42
- Viewed 602 times
-
Best Security Practices on OneDrive
- 01:27
- Viewed 594 times
-
Block a sender
- 01:54
- Viewed 539 times
-
Avoid Abusive Document Sharing
- 00:57
- Viewed 506 times
-
Prevent the forwarding of an email
- 01:01
- Viewed 473 times
-
Share a document securely with Outlook
- 02:21
- Viewed 450 times
-
Identify a fraudulent email
- 02:06
- Viewed 423 times
-
Provide an overview of best security practices in Outlook
- 01:08
- Viewed 412 times
-
Protect an email by encrypting
- 01:10
- Viewed 378 times
-
Guide to Using the Microsoft Authenticator App
- 01:47
- Viewed 378 times
-
Concept of Multi-Factor Authentication
- 01:51
- Viewed 359 times
-
Turn on Multi-Factor Authentication in the Admin Section
- 02:07
- Viewed 298 times
-
Manual Activation of Multi-Factor Authentication
- 01:40
- Viewed 259 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 134 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 112 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 99 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 99 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 97 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 97 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 92 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 91 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 90 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 89 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 87 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 85 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 84 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 82 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 80 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 69 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
What is a ransomware attack ?
- 00:29
- Viewed 21 times
-
What is cybersecurity?
- 00:52
- Viewed 20 times
-
How does two factor authentication ?
- 00:48
- Viewed 20 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Web browser
- 00:41
- Viewed 19 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
Extensions
- 00:26
- Viewed 17 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
How browser works
- 00:42
- Viewed 16 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
The importance of chossing a local account
- 00:40
- Viewed 16 times
-
How url filtering work?
- 00:54
- Viewed 16 times
-
BYOD - risks
- 00:41
- Viewed 16 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
What is a virus or malware?
- 01:27
- Viewed 15 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
In search vulnerability
- 00:32
- Viewed 15 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
Phishing
- 00:50
- Viewed 14 times
-
Security through obscurity
- 00:35
- Viewed 14 times
-
What is a phishing attack?
- 01:27
- Viewed 13 times
-
Parental controls
- 00:31
- Viewed 13 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
BYOD - risks
- 00:41
- Viewed 16 times
-
How url filtering work?
- 00:54
- Viewed 16 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
The importance of chossing a local account
- 00:40
- Viewed 16 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Security through obscurity
- 00:35
- Viewed 14 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
In search vulnerability
- 00:32
- Viewed 15 times
-
Extensions
- 00:26
- Viewed 17 times
-
Parental controls
- 00:31
- Viewed 13 times
-
How browser works
- 00:42
- Viewed 16 times
-
Web browser
- 00:41
- Viewed 19 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Phishing
- 00:50
- Viewed 14 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
How does two factor authentication ?
- 00:48
- Viewed 20 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is a ransomware attack ?
- 00:29
- Viewed 21 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
What is a virus or malware?
- 01:27
- Viewed 15 times
-
What is a phishing attack?
- 01:27
- Viewed 13 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
What is cybersecurity?
- 00:52
- Viewed 20 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 80 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 90 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 85 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 134 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 99 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 112 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 92 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 97 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 69 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 97 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 91 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 84 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 82 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 89 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 87 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 99 times
Objectifs :
This document aims to provide a comprehensive guide on how to grant access to a SharePoint site for external users, detailing the necessary steps, permissions, and security considerations involved in the process.
Chapitres :
-
Introduction to External Access in SharePoint
Granting access to your SharePoint site for individuals outside your organization can enhance collaboration. However, this capability is contingent upon your company's policies regarding external sharing. This guide will walk you through the process and considerations for adding external members to your SharePoint site. -
Understanding Company Policies
Before attempting to add external users, it is crucial to understand your organization's strategy regarding external access. If your company does not permit external invitations, you will receive an alert when trying to add an external member. -
Types of SharePoint Sites
It is important to note that sharing is only possible with team SharePoint sites. Communication sites do not allow for external sharing. Ensure you are working within the correct type of site to proceed. -
Steps to Add an External Member
Array -
Setting Permissions for External Users
Array -
Security Considerations
For security reasons, guests cannot invite others to the SharePoint site, regardless of their permissions. Regularly review who has access to your site by checking the members list. You can change permissions or remove members as necessary. -
Managing Guest Access
To view and manage your SharePoint site's guest list, visit the permissions panel. Here, you can adjust permissions or delete guests. Always grant only the necessary permissions and remove individuals who are no longer collaborating with your team. -
Conclusion
Understanding how to manage external access to your SharePoint site is essential for maintaining security and effective collaboration. By following the outlined steps and considerations, you can ensure that external users have the appropriate access while safeguarding your organization's resources.
FAQ :
Can I grant access to my SharePoint site to someone outside my organization?
Yes, you can grant access to external users, but it depends on your organization's policies. If external sharing is not allowed, you will receive an alert when trying to add an external member.
What types of permissions can I assign to external users on my SharePoint site?
You can assign external users different levels of permissions: 'Read' allows them to view content, 'Edit' gives them the same access as internal members, and 'Full Control' allows them to manage the site, but they cannot access Office 365 group resources.
How do I add an external user to my SharePoint site?
To add an external user, go to the members tab in your SharePoint site's contact sheet through Outlook, and invite them by entering their email address.
What happens if I want to remove an external user from my SharePoint site?
You can remove an external user by visiting the site's permission panel and deleting them from the members list.
Are external users able to invite others to the SharePoint site?
No, external users, regardless of their permissions, cannot invite others to the SharePoint site for security reasons.
Quelques cas d'usages :
Collaborating with External Partners
A marketing team can invite external partners to their Teams SharePoint site to collaborate on a campaign. By granting them 'Edit' permissions, the partners can contribute to documents and share insights while ensuring they do not access sensitive internal resources.
Project Management with Clients
A project manager can add a client as a 'Guest Visitor' to a SharePoint site dedicated to a project. This allows the client to view project updates and documents without giving them full access to the internal team’s resources.
Training and Workshops
An organization can create a SharePoint site for training materials and invite external trainers as 'Full Control' members. This enables them to manage the content and facilitate workshops while maintaining security over internal resources.
Regular Access Review
A compliance officer can regularly check the members list of a SharePoint site to ensure that only current collaborators have access. They can remove any external users who are no longer involved in projects to maintain security.
Glossaire :
SharePoint
A web-based collaboration platform developed by Microsoft that integrates with Microsoft Office. It is used for storing, organizing, sharing, and accessing information from any device.
External Access
The ability to grant individuals outside of an organization access to specific resources within a SharePoint site.
Communication Site
A type of SharePoint site designed for sharing information broadly across an organization, typically not allowing external sharing.
Teams SharePoint Site
A SharePoint site that is associated with a Microsoft Teams team, allowing for collaboration among team members, including external users.
Guest Visitor
An external user added to a SharePoint site with limited permissions, allowing them to view content but not access other resources or invite others.
Permissions
Settings that determine what actions users can perform on a SharePoint site, such as viewing, editing, or managing content.
Office 365 Group
A collection of people that can collaborate using shared resources like a shared mailbox, calendar, and document library in Office 365.
Cette formation pourrait intéresser votre entreprise ?
Mandarine Academy vous offre la possibilité d'obtenir des catalogues complets et actualisés, réalisés par nos formateurs experts dans différents domaines pour votre entreprise