SharePoint (Classic Sites) - Restricting a document to read-only mode (Extract a document) Video
In this video, you will learn how to restrict a document to read-only mode by extracting it.
This feature is useful when you need to edit a document on your SharePoint site while ensuring that no one else can make changes, even if it is shared for co-editing.
To extract the file, select it and choose "check out." Once extracted, a red tick will appear next to the document's name, indicating that you have exclusive editing rights.
Your employees will see a gray icon next to the file, indicating that it has been extracted and who extracted it.
When your employees open the document, it will open in reading mode, preventing any changes.
They will receive a message informing them that the document has been extracted.
If you want to allow your employees to edit the document again, you can switch it to "check in" mode and add a comment to clarify the changes you have made.
These comments will be available in the document's version history.
If you don't want to keep the changes made or if you haven't made any changes and want to make the document available to other colleagues, you can cancel the checkout extraction.
This will ensure that none of the changes you may have made to the document will be added to the version history.
Restricting a document to read-only mode by extracting it provides you with control over who can make changes, ensuring the integrity of your document.
- 2:05
- 3103 views
-
Teams - Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3646 times
-
SharePoint (Classic Sites) - Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3281 times
-
SharePoint (Classic Sites) - Granting access to the SharePoint site to someone outside the company
- 3:46
- Viewed 3800 times
-
SharePoint (Classic Sites) - Checking the granted shares
- 2:27
- Viewed 3169 times
-
SharePoint (Classic Sites) - Recovering deleted items (Recycle bin and Second-stage recycle bin)
- 2:18
- Viewed 6432 times
-
SharePoint (Classic Sites) - Targeting content using a specific audience
- 3:35
- Viewed 3237 times
-
Recovering deleted items (Recycle bin and Second-stage recycle bin)
- 2:18
- Viewed 6432 times
-
Granting access to the SharePoint site to someone outside the company
- 3:46
- Viewed 3800 times
-
Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3646 times
-
Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3281 times
-
Targeting content using a specific audience
- 3:35
- Viewed 3237 times
-
Checking the granted shares
- 2:27
- Viewed 3169 times
-
Add channels and tabs
- 1:40
- Viewed 1743 times
-
Create private and shared channels
- 1:52
- Viewed 1559 times
-
Create a permission group
- 2:11
- Viewed 1375 times
-
Understand and Secure Information Sharing in Instant Messaging
- 2:38
- Viewed 1216 times
-
Use version history
- 1:57
- Viewed 1118 times
-
Share a document to someone outside of my SharePoint site
- 3:57
- Viewed 1090 times
-
SharePoint permission levels
- 2:16
- Viewed 1077 times
-
Restrict a Document to Certain Team Members
- 1:50
- Viewed 1021 times
-
Restrict a Document to Read-Only
- 0:58
- Viewed 1013 times
-
Secure Teams Upon Creation
- 2:57
- Viewed 990 times
-
Manage Privacy in Private Channels
- 2:34
- Viewed 980 times
-
Secure a Shared Document with a Password
- 1:28
- Viewed 963 times
-
Check Granted Shares
- 00:48
- Viewed 743 times
-
Modify Sharing Rules
- 00:53
- Viewed 649 times
-
Protect My Document with a Password and Expiration Date
- 01:02
- Viewed 643 times
-
Use Recycle Bins to Restore Documents
- 01:49
- Viewed 638 times
-
Share and Collaborate OneDrive
- 02:45
- Viewed 614 times
-
Restore Your OneDrive Space
- 01:42
- Viewed 602 times
-
Best Security Practices on OneDrive
- 01:27
- Viewed 594 times
-
Block a sender
- 01:54
- Viewed 540 times
-
Avoid Abusive Document Sharing
- 00:57
- Viewed 506 times
-
Prevent the forwarding of an email
- 01:01
- Viewed 473 times
-
Share a document securely with Outlook
- 02:21
- Viewed 450 times
-
Identify a fraudulent email
- 02:06
- Viewed 424 times
-
Provide an overview of best security practices in Outlook
- 01:08
- Viewed 412 times
-
Protect an email by encrypting
- 01:10
- Viewed 378 times
-
Guide to Using the Microsoft Authenticator App
- 01:47
- Viewed 378 times
-
Concept of Multi-Factor Authentication
- 01:51
- Viewed 359 times
-
Turn on Multi-Factor Authentication in the Admin Section
- 02:07
- Viewed 298 times
-
Manual Activation of Multi-Factor Authentication
- 01:40
- Viewed 259 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 135 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 113 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 100 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 100 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 98 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 98 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 93 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 92 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 91 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 90 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 88 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 86 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 85 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 83 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 81 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 70 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
What is a ransomware attack ?
- 00:29
- Viewed 22 times
-
What is cybersecurity?
- 00:52
- Viewed 21 times
-
How does two factor authentication ?
- 00:48
- Viewed 20 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Web browser
- 00:41
- Viewed 19 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
Extensions
- 00:26
- Viewed 18 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
How browser works
- 00:42
- Viewed 17 times
-
The importance of chossing a local account
- 00:40
- Viewed 17 times
-
BYOD - risks
- 00:41
- Viewed 17 times
-
What is a virus or malware?
- 01:27
- Viewed 16 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
In search vulnerability
- 00:32
- Viewed 16 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
How url filtering work?
- 00:54
- Viewed 16 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Security through obscurity
- 00:35
- Viewed 15 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
What is a phishing attack?
- 01:27
- Viewed 14 times
-
Phishing
- 00:50
- Viewed 14 times
-
Parental controls
- 00:31
- Viewed 13 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
BYOD - risks
- 00:41
- Viewed 17 times
-
How url filtering work?
- 00:54
- Viewed 16 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
The importance of chossing a local account
- 00:40
- Viewed 17 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Security through obscurity
- 00:35
- Viewed 15 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
In search vulnerability
- 00:32
- Viewed 16 times
-
Extensions
- 00:26
- Viewed 18 times
-
Parental controls
- 00:31
- Viewed 13 times
-
How browser works
- 00:42
- Viewed 17 times
-
Web browser
- 00:41
- Viewed 19 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Phishing
- 00:50
- Viewed 14 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
How does two factor authentication ?
- 00:48
- Viewed 20 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is a ransomware attack ?
- 00:29
- Viewed 22 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
What is a virus or malware?
- 01:27
- Viewed 16 times
-
What is a phishing attack?
- 01:27
- Viewed 14 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
What is cybersecurity?
- 00:52
- Viewed 21 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 81 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 91 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 86 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 135 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 100 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 113 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 93 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 98 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 70 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 98 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 92 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 85 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 83 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 90 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 88 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 100 times
Objectifs :
This document aims to provide a comprehensive guide on how to manage document editing in SharePoint, specifically focusing on the checkout and check-in process to ensure exclusive editing rights and version control.
Chapitres :
-
Introduction to Document Management in SharePoint
Managing documents effectively in SharePoint is crucial for collaboration and version control. This guide will walk you through the process of checking out a document to ensure that only you can make changes, even when the document is shared for co-editing. -
Checking Out a Document
To begin editing a document exclusively, you need to check it out. Follow these steps: 1. Select the file you wish to edit. 2. Choose the 'Check Out' option. Once you have checked out the document, a red tick will appear next to the document's name, indicating that it has been extracted. This action prevents others from making changes while you are editing. -
Understanding Document Status for Colleagues
When a document is checked out, it will appear grayed out to your colleagues. They can see who has extracted the document by hovering over the file name. If they attempt to open the document, it will open in reading mode, and they will receive a message indicating that the document is currently checked out. -
Switching to Check-In Mode
After making your changes, if you want to allow your colleagues to edit the document again, you need to switch it to check-in mode. Here’s how: 1. Select the 'Check In' option. 2. Add a comment to clarify the nature of the changes you made. These comments will be recorded in the document's version history, providing context for future reference. -
Cancelling the Checkout
If you decide not to keep the changes made to the document or if you haven't made any changes, you can cancel the checkout. This will revert the document back to its previous state and make it available for others to edit. To cancel the checkout: 1. Select the 'Cancel Checkout' option. Please note that any changes made during the checkout process will not be saved or added to the version history. -
Conclusion
Understanding the checkout and check-in process in SharePoint is essential for effective document management. By following these steps, you can ensure that your edits are exclusive and that version control is maintained, allowing for a smoother collaborative experience.
FAQ :
What does it mean to check out a document in SharePoint?
Checking out a document in SharePoint means that you are taking exclusive control of that document, preventing others from making changes until you check it back in.
How can I edit a document while ensuring no one else can make changes?
You can edit a document exclusively by checking it out. This will prevent others from editing it until you check it back in.
What happens if someone tries to edit a checked-out document?
If someone tries to open a checked-out document, it will open in reading mode, and they will receive a message indicating that the document has been extracted by another user.
Can I cancel the checkout of a document?
Yes, you can cancel the checkout of a document, which will discard any changes you made and make the document available for others to edit.
What is the purpose of adding comments when checking in a document?
Adding comments when checking in a document helps clarify the changes made, and these comments will be recorded in the document's version history.
Quelques cas d'usages :
Managing Document Revisions in a Team
In a collaborative environment, a project manager can check out a project proposal document to make necessary revisions without interference from team members. Once the edits are complete, they check the document back in, adding comments to explain the changes, which helps maintain a clear version history.
Ensuring Document Integrity During Updates
A compliance officer can check out sensitive policy documents to ensure that no unauthorized changes are made while they update the content. This process ensures that the document remains secure and only the officer can make changes until they are ready to check it back in.
Facilitating Document Review Processes
An editor can check out a draft article for review, allowing them to make edits without others altering the document simultaneously. Once the review is complete, they check it back in, allowing the team to see the updated version and comments on the changes made.
Glossaire :
SharePoint
A web-based collaboration platform developed by Microsoft that allows users to store, organize, share, and access information from any device.
Check Out
A feature in SharePoint that allows a user to take exclusive control of a document, preventing others from making changes until it is checked back in.
Check In
The process of uploading a document back to SharePoint after editing, allowing others to access and edit the document.
Version History
A record of all changes made to a document, including previous versions, which can be reviewed or restored.
Reading Mode
A mode in which a document can be viewed but not edited, typically used for reviewing content.
Gray Appearance
Indicates that a document is currently checked out by another user, preventing editing by others.
Cancel Checkout
An option to discard any changes made to a document after checking it out, allowing it to be available for editing by others again.
Cette formation pourrait intéresser votre entreprise ?
Mandarine Academy vous offre la possibilité d'obtenir des catalogues complets et actualisés, réalisés par nos formateurs experts dans différents domaines pour votre entreprise