SharePoint (Classic Sites) - Recovering deleted items (Recycle bin and Second-stage recycle bin) Video
In this video, you will learn about recovering deleted items using the Recycle Bin and Second-stage Recycle Bin in SharePoint.
The video covers how to access the Recycle Bin on both SharePoint communication sites and SharePoint team sites, as well as the necessary permissions required.
It demonstrates how to restore a document from the Recycle Bin and explains that if the document was contained in a deleted folder, SharePoint will automatically recreate it.
The video also mentions the option to remove a document from the Recycle Bin, which sends it to the Second-stage Recycle Bin.
It emphasizes the importance of visiting the Second-stage Recycle Bin if a document cannot be found in the main Recycle Bin.
However, it warns that if a document is deleted from the Second-stage Recycle Bin, it will be permanently deleted and cannot be restored after 93 days.
This knowledge will help you effectively recover deleted items in SharePoint and avoid permanent deletion.
- 2:18
- 6432 views
-
Teams - Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3646 times
-
SharePoint (Classic Sites) - Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3282 times
-
SharePoint (Classic Sites) - Granting access to the SharePoint site to someone outside the company
- 3:46
- Viewed 3800 times
-
SharePoint (Classic Sites) - Restricting a document to read-only mode (Extract a document)
- 2:05
- Viewed 3104 times
-
SharePoint (Classic Sites) - Targeting content using a specific audience
- 3:35
- Viewed 3238 times
-
Granting access to the SharePoint site to someone outside the company
- 3:46
- Viewed 3800 times
-
Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3646 times
-
Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3282 times
-
Targeting content using a specific audience
- 3:35
- Viewed 3238 times
-
Checking the granted shares
- 2:27
- Viewed 3170 times
-
Restricting a document to read-only mode (Extract a document)
- 2:05
- Viewed 3104 times
-
Add channels and tabs
- 1:40
- Viewed 1743 times
-
Create private and shared channels
- 1:52
- Viewed 1560 times
-
Create a permission group
- 2:11
- Viewed 1375 times
-
Understand and Secure Information Sharing in Instant Messaging
- 2:38
- Viewed 1217 times
-
Use version history
- 1:57
- Viewed 1118 times
-
Share a document to someone outside of my SharePoint site
- 3:57
- Viewed 1090 times
-
SharePoint permission levels
- 2:16
- Viewed 1077 times
-
Restrict a Document to Certain Team Members
- 1:50
- Viewed 1021 times
-
Restrict a Document to Read-Only
- 0:58
- Viewed 1014 times
-
Secure Teams Upon Creation
- 2:57
- Viewed 990 times
-
Manage Privacy in Private Channels
- 2:34
- Viewed 980 times
-
Secure a Shared Document with a Password
- 1:28
- Viewed 964 times
-
Check Granted Shares
- 00:48
- Viewed 743 times
-
Modify Sharing Rules
- 00:53
- Viewed 649 times
-
Protect My Document with a Password and Expiration Date
- 01:02
- Viewed 643 times
-
Use Recycle Bins to Restore Documents
- 01:49
- Viewed 638 times
-
Share and Collaborate OneDrive
- 02:45
- Viewed 614 times
-
Restore Your OneDrive Space
- 01:42
- Viewed 602 times
-
Best Security Practices on OneDrive
- 01:27
- Viewed 594 times
-
Block a sender
- 01:54
- Viewed 540 times
-
Avoid Abusive Document Sharing
- 00:57
- Viewed 506 times
-
Prevent the forwarding of an email
- 01:01
- Viewed 473 times
-
Share a document securely with Outlook
- 02:21
- Viewed 450 times
-
Identify a fraudulent email
- 02:06
- Viewed 424 times
-
Provide an overview of best security practices in Outlook
- 01:08
- Viewed 413 times
-
Guide to Using the Microsoft Authenticator App
- 01:47
- Viewed 379 times
-
Protect an email by encrypting
- 01:10
- Viewed 378 times
-
Concept of Multi-Factor Authentication
- 01:51
- Viewed 360 times
-
Turn on Multi-Factor Authentication in the Admin Section
- 02:07
- Viewed 299 times
-
Manual Activation of Multi-Factor Authentication
- 01:40
- Viewed 260 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 135 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 113 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 100 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 100 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 98 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 98 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 93 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 92 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 91 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 90 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 88 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 86 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 85 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 83 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 81 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 70 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
What is a ransomware attack ?
- 00:29
- Viewed 22 times
-
What is cybersecurity?
- 00:52
- Viewed 21 times
-
How does two factor authentication ?
- 00:48
- Viewed 21 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Web browser
- 00:41
- Viewed 19 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
Extensions
- 00:26
- Viewed 18 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
How browser works
- 00:42
- Viewed 17 times
-
The importance of chossing a local account
- 00:40
- Viewed 17 times
-
How url filtering work?
- 00:54
- Viewed 17 times
-
BYOD - risks
- 00:41
- Viewed 17 times
-
What is a virus or malware?
- 01:27
- Viewed 16 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
In search vulnerability
- 00:32
- Viewed 16 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Phishing
- 00:50
- Viewed 15 times
-
Security through obscurity
- 00:35
- Viewed 15 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
What is a phishing attack?
- 01:27
- Viewed 14 times
-
Parental controls
- 00:31
- Viewed 13 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
BYOD - risks
- 00:41
- Viewed 17 times
-
How url filtering work?
- 00:54
- Viewed 17 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
The importance of chossing a local account
- 00:40
- Viewed 17 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Security through obscurity
- 00:35
- Viewed 15 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
In search vulnerability
- 00:32
- Viewed 16 times
-
Extensions
- 00:26
- Viewed 18 times
-
Parental controls
- 00:31
- Viewed 13 times
-
How browser works
- 00:42
- Viewed 17 times
-
Web browser
- 00:41
- Viewed 19 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Phishing
- 00:50
- Viewed 15 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
How does two factor authentication ?
- 00:48
- Viewed 21 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is a ransomware attack ?
- 00:29
- Viewed 22 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
What is a virus or malware?
- 01:27
- Viewed 16 times
-
What is a phishing attack?
- 01:27
- Viewed 14 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
What is cybersecurity?
- 00:52
- Viewed 21 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 81 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 91 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 86 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 135 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 100 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 113 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 93 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 98 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 70 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 98 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 92 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 85 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 83 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 90 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 88 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 100 times
Objectifs :
This document aims to provide a comprehensive guide on how to retrieve deleted documents from SharePoint's Recycle Bin, including the steps to restore documents and the importance of permissions.
Chapitres :
-
Introduction to SharePoint Recycle Bin
SharePoint provides a Recycle Bin feature that allows users to recover mistakenly deleted documents. Understanding how to navigate this feature is essential for effective document management within SharePoint sites. -
Accessing the Recycle Bin
To retrieve deleted documents, you first need to access the Recycle Bin. The process varies slightly depending on the type of SharePoint site you are using: - **SharePoint Communications Site**: Navigate to the content of your site and open the Recycle Bin. - **SharePoint Team Site**: Access the Recycle Bin through the site tabs. Both types of sites have a primary Recycle Bin and a second-stage Recycle Bin, which functions similarly. -
Permissions and Access Issues
To access the Recycle Bin, you must have the necessary permissions granted by the site administrator or owner. If you cannot see the Recycle Bin, it may be due to insufficient permissions or the Recycle Bin feature being deactivated. -
Restoring Documents
To restore a document from the Recycle Bin, follow these steps: 1. Select the document you wish to restore. 2. Click on the 'Restore' option. The document will be restored to its original location. If the document was in a folder that was also deleted, SharePoint will recreate that folder, but only the restored documents will be placed inside it. -
Managing Deleted Documents
You can also permanently delete documents from the Recycle Bin, which will send them to the second-stage Recycle Bin. If you cannot find a document in the main Recycle Bin, check the second-stage Recycle Bin as it serves as a safety net for documents deleted twice by mistake. However, be cautious: if you delete a document from the second-stage Recycle Bin, it will be permanently removed and cannot be restored. -
Retention Period for Deleted Documents
Documents in both the main and secondary Recycle Bins are automatically deleted after 93 days from the time of deletion. It is crucial to act promptly if you need to recover a document within this timeframe. -
Conclusion
Understanding how to effectively use the Recycle Bin in SharePoint is vital for document recovery. By following the outlined steps and being aware of permissions and retention policies, users can manage their documents more efficiently and minimize the risk of permanent loss.
FAQ :
How can I retrieve a deleted document in SharePoint?
You can retrieve a deleted document from the Recycle Bin in your SharePoint site. If you are on a communications site, go to the content of your site and open the Recycle Bin. For a team site, access the Recycle Bin from your site tabs. Select the document you want to restore and click 'Restore' to recover it.
What is the difference between the main Recycle Bin and the second stage Recycle Bin?
The main Recycle Bin holds documents that have been deleted from the SharePoint site, while the second stage Recycle Bin contains documents that have been deleted from the main Recycle Bin. The second stage serves as a backup for recovering documents that were deleted twice.
What should I do if I cannot find my document in the Recycle Bin?
If you cannot find your document in the main Recycle Bin, check the second stage Recycle Bin. If it is not there, it may have been permanently deleted, especially if it has been more than 93 days since deletion.
Do I need special permissions to access the Recycle Bin?
Yes, you need the necessary permissions granted by the site administrator or owner to access the Recycle Bin. If you do not see it, you may not have the required permissions or the Recycle Bin may be deactivated.
What happens if I delete a document from the second stage Recycle Bin?
If you delete a document from the second stage Recycle Bin, it will be permanently deleted and cannot be restored. Be cautious when deleting from this bin.
Quelques cas d'usages :
Recovering Important Documents
In a corporate environment, employees often accidentally delete important documents. By utilizing the Recycle Bin and second stage Recycle Bin in SharePoint, employees can quickly recover these documents, ensuring that critical information is not lost and productivity is maintained.
Managing Document Permissions
Site administrators can manage permissions to ensure that only authorized users can access the Recycle Bin. This helps prevent unauthorized recovery of sensitive documents and maintains data security within the organization.
Training New Employees
During onboarding, new employees can be trained on how to use the Recycle Bin in SharePoint. This knowledge helps them understand document management and recovery processes, reducing the risk of permanent data loss.
Document Lifecycle Management
Organizations can implement a document lifecycle management strategy that includes regular checks of the Recycle Bin. This ensures that documents are properly managed and that any accidental deletions can be addressed promptly.
Data Recovery Planning
In case of accidental mass deletions, having a plan that includes the use of the second stage Recycle Bin can be crucial. Organizations can prepare for potential data loss scenarios and ensure that they have a recovery strategy in place.
Glossaire :
SharePoint
A web-based collaboration platform developed by Microsoft that integrates with Microsoft Office. It is used for storing, organizing, sharing, and accessing information from any device.
Recycle Bin
A storage area in SharePoint where deleted documents are temporarily held before permanent deletion. Users can restore documents from the Recycle Bin if they are deleted by mistake.
Second Stage Recycle Bin
An additional layer of the Recycle Bin in SharePoint that holds documents that have been deleted from the main Recycle Bin. It serves as a safety net for recovering documents that were deleted twice.
Permissions
Settings that determine what actions users can perform on SharePoint sites, such as viewing, editing, or deleting content. Permissions are managed by site administrators.
Administrator
A user with elevated permissions who manages the SharePoint site, including user access and site settings.
Restore
The action of recovering a deleted document from the Recycle Bin back to its original location in SharePoint.
Permanent Deletion
The final removal of a document from SharePoint, making it impossible to recover. This occurs after documents are deleted from both the main and second stage Recycle Bins.
Cette formation pourrait intéresser votre entreprise ?
Mandarine Academy vous offre la possibilité d'obtenir des catalogues complets et actualisés, réalisés par nos formateurs experts dans différents domaines pour votre entreprise