SharePoint (Classic Sites) - Targeting content using a specific audience Video
In this video training on accessibility in your day-to-day life, you will learn about the design rules, best practices, and tools to improve the accessibility of your documents.
The video covers topics such as using accessible templates in Office 365, checking accessibility in Excel, Outlook, Word, and PowerPoint, and improving email accessibility.
By following these guidelines, you will be able to make your documents more readable for blind individuals, add accessible tables and lists, and make your Outlook signature accessible.
This training will help you improve the design of your documents in terms of accessibility and make your work environment more inclusive for all.
- 3:35
- 3237 views
-
Teams - Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3646 times
-
SharePoint (Classic Sites) - Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3281 times
-
SharePoint (Classic Sites) - Granting access to the SharePoint site to someone outside the company
- 3:46
- Viewed 3800 times
-
SharePoint (Classic Sites) - Checking the granted shares
- 2:27
- Viewed 3169 times
-
SharePoint (Classic Sites) - Restricting a document to read-only mode (Extract a document)
- 2:05
- Viewed 3104 times
-
SharePoint (Classic Sites) - Recovering deleted items (Recycle bin and Second-stage recycle bin)
- 2:18
- Viewed 6432 times
-
Recovering deleted items (Recycle bin and Second-stage recycle bin)
- 2:18
- Viewed 6432 times
-
Granting access to the SharePoint site to someone outside the company
- 3:46
- Viewed 3800 times
-
Do I share with OneDrive, SharePoint, or TEAMS?
- 2:24
- Viewed 3646 times
-
Understanding the different types and roles of team sites in SharePoint
- 3:05
- Viewed 3281 times
-
Checking the granted shares
- 2:27
- Viewed 3169 times
-
Restricting a document to read-only mode (Extract a document)
- 2:05
- Viewed 3104 times
-
Add channels and tabs
- 1:40
- Viewed 1743 times
-
Create private and shared channels
- 1:52
- Viewed 1559 times
-
Create a permission group
- 2:11
- Viewed 1375 times
-
Understand and Secure Information Sharing in Instant Messaging
- 2:38
- Viewed 1216 times
-
Use version history
- 1:57
- Viewed 1118 times
-
Share a document to someone outside of my SharePoint site
- 3:57
- Viewed 1090 times
-
SharePoint permission levels
- 2:16
- Viewed 1077 times
-
Restrict a Document to Certain Team Members
- 1:50
- Viewed 1021 times
-
Restrict a Document to Read-Only
- 0:58
- Viewed 1013 times
-
Secure Teams Upon Creation
- 2:57
- Viewed 990 times
-
Manage Privacy in Private Channels
- 2:34
- Viewed 980 times
-
Secure a Shared Document with a Password
- 1:28
- Viewed 964 times
-
Check Granted Shares
- 00:48
- Viewed 743 times
-
Modify Sharing Rules
- 00:53
- Viewed 649 times
-
Protect My Document with a Password and Expiration Date
- 01:02
- Viewed 643 times
-
Use Recycle Bins to Restore Documents
- 01:49
- Viewed 638 times
-
Share and Collaborate OneDrive
- 02:45
- Viewed 614 times
-
Restore Your OneDrive Space
- 01:42
- Viewed 602 times
-
Best Security Practices on OneDrive
- 01:27
- Viewed 594 times
-
Block a sender
- 01:54
- Viewed 540 times
-
Avoid Abusive Document Sharing
- 00:57
- Viewed 506 times
-
Prevent the forwarding of an email
- 01:01
- Viewed 473 times
-
Share a document securely with Outlook
- 02:21
- Viewed 450 times
-
Identify a fraudulent email
- 02:06
- Viewed 424 times
-
Provide an overview of best security practices in Outlook
- 01:08
- Viewed 412 times
-
Guide to Using the Microsoft Authenticator App
- 01:47
- Viewed 379 times
-
Protect an email by encrypting
- 01:10
- Viewed 378 times
-
Concept of Multi-Factor Authentication
- 01:51
- Viewed 359 times
-
Turn on Multi-Factor Authentication in the Admin Section
- 02:07
- Viewed 299 times
-
Manual Activation of Multi-Factor Authentication
- 01:40
- Viewed 260 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 135 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 113 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 100 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 100 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 98 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 98 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 93 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 92 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 91 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 90 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 88 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 86 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 85 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 83 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 81 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 70 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
What is a ransomware attack ?
- 00:29
- Viewed 22 times
-
What is cybersecurity?
- 00:52
- Viewed 21 times
-
How does two factor authentication ?
- 00:48
- Viewed 21 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Web browser
- 00:41
- Viewed 19 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
Extensions
- 00:26
- Viewed 18 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
How browser works
- 00:42
- Viewed 17 times
-
The importance of chossing a local account
- 00:40
- Viewed 17 times
-
How url filtering work?
- 00:54
- Viewed 17 times
-
BYOD - risks
- 00:41
- Viewed 17 times
-
What is a virus or malware?
- 01:27
- Viewed 16 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
In search vulnerability
- 00:32
- Viewed 16 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Security through obscurity
- 00:35
- Viewed 15 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
What is a phishing attack?
- 01:27
- Viewed 14 times
-
Phishing
- 00:50
- Viewed 14 times
-
Parental controls
- 00:31
- Viewed 13 times
-
Secure your mobile and portable devices
- 00:50
- Viewed 16 times
-
Protect sensitive data personal devices
- 00:49
- Viewed 15 times
-
Best practices protecting data
- 00:25
- Viewed 19 times
-
BYOD - risks
- 00:41
- Viewed 17 times
-
How url filtering work?
- 00:54
- Viewed 17 times
-
Use of secuirty software
- 00:53
- Viewed 15 times
-
Configure automatic update
- 00:51
- Viewed 18 times
-
The importance of chossing a local account
- 00:40
- Viewed 17 times
-
Updating personal operating systems
- 00:58
- Viewed 16 times
-
Vulnerability communication process
- 00:26
- Viewed 16 times
-
How are a system's security vulnerabilities revealed?
- 00:40
- Viewed 16 times
-
Security through obscurity
- 00:35
- Viewed 15 times
-
what is vulnerability ?
- 00:27
- Viewed 16 times
-
In search vulnerability
- 00:32
- Viewed 16 times
-
Extensions
- 00:26
- Viewed 18 times
-
Parental controls
- 00:31
- Viewed 13 times
-
How browser works
- 00:42
- Viewed 17 times
-
Web browser
- 00:41
- Viewed 19 times
-
Ransomware
- 00:60
- Viewed 20 times
-
Phishing
- 00:50
- Viewed 14 times
-
Advantages of two factor authentications
- 00:47
- Viewed 16 times
-
How does two factor authentication ?
- 00:48
- Viewed 21 times
-
What is two factor authentication?
- 00:33
- Viewed 15 times
-
Recognize good and bad passwords
- 01:04
- Viewed 15 times
-
What is a ransomware attack ?
- 00:29
- Viewed 22 times
-
What is a Ddos attack ?
- 00:29
- Viewed 16 times
-
What is a virus or malware?
- 01:27
- Viewed 16 times
-
What is a phishing attack?
- 01:27
- Viewed 14 times
-
Key figures and facts abouts cybersecurity
- 01:26
- Viewed 17 times
-
What is cybersecurity?
- 00:52
- Viewed 21 times
-
Is a hacker always a cybercriminal?
- 01:31
- Viewed 81 times
-
Will I know what to do if I get hacked?
- 01:16
- Viewed 91 times
-
Do I have to be an IT expert to protect myself?
- 01:14
- Viewed 86 times
-
Do cybercriminals only target large companies?
- 01:21
- Viewed 81 times
-
Are all files safe as long as I open them with trusted software?
- 01:24
- Viewed 135 times
-
Is contactless payment safe ?
- 01:26
- Viewed 133 times
-
Are online payments riskier than in-store ones?
- 01:21
- Viewed 54 times
-
Is cloud storage less secure than my personal computer?
- 01:37
- Viewed 100 times
-
Is scanning a QR code always safe?
- 01:21
- Viewed 113 times
-
Can my mobile apps do anything without my permission?
- 01:19
- Viewed 93 times
-
Is public Wi-Fi safe if no password is required?
- 01:26
- Viewed 98 times
-
Is the sender’s email address enough to verify a message?
- 01:29
- Viewed 70 times
-
Can I safely click a link in a message?
- 01:46
- Viewed 98 times
-
Does connecting to a well-known website guarantee its safety?
- 01:27
- Viewed 92 times
-
Am I safe online if I’m careful?
- 01:22
- Viewed 80 times
-
Does private browsing make me anonymous?
- 01:27
- Viewed 85 times
-
Are updates useless if everything works fine?
- 01:28
- Viewed 83 times
-
Is a firewall the same as an antivirus?
- 01:31
- Viewed 90 times
-
Does my antivirus block all threats?
- 01:46
- Viewed 78 times
-
Is a free antivirus good enough?
- 01:38
- Viewed 87 times
-
Is signing in with Google or Facebook a bad idea ?
- 01:34
- Viewed 43 times
-
Is my password secure if it contains an @ and a number?
- 01:41
- Viewed 88 times
-
Is a strong password all I need to stay safe?
- 01:55
- Viewed 100 times
Objectifs :
This video aims to guide users on how to enable audience targeting in SharePoint document libraries, allowing specific content to be visible only to designated groups or audiences.
Chapitres :
-
Introduction to Audience Targeting
Audience targeting in SharePoint allows for the customization of content visibility based on user groups. This feature is particularly useful for organizations that need to restrict access to sensitive documents or information to specific departments or teams. -
Identifying Audiences
Audiences can be identified through various means, including: - SharePoint groups - Distribution lists - Security groups - A rule system to create a global audience For instance, you can configure a document library so that only members of the legal department can view certain documents. -
Step 1: Enabling Audience Targeting
To enable audience targeting for a document library, follow these steps: 1. Open the relevant document library. 2. Click on 'Settings' located at the top right corner. 3. Select 'Library Settings'. 4. Under the 'General Settings' column, find 'Audience targeting settings'. 5. Check the box to enable audience targeting (this box is unchecked by default). 6. Click 'OK' to validate your changes. -
Step 2: Defining Audience for Individual Items
Once audience targeting is enabled, you can specify which audience can view individual items in the library. Here’s how: 1. Navigate back to the contents of your library. 2. Identify the document you want to restrict access to. 3. Click on the three dots next to the document and select 'Properties' via the 'More' button. 4. In the document properties, click on 'Edit Item'. 5. In the 'Targeted Audience' section, click 'Modify'. 6. Choose an audience from your global audiences, security distribution groups, or SharePoint groups. -
Example: Restricting Access to Suppliers
For example, if you want a document to be visible only to your suppliers, you would: - Select the SharePoint group created for suppliers. - Search for the group and select it. - Confirm the selection and click 'Save'. This ensures that only members of the 'providers' permission group can access the document. -
Conclusion
By following these steps, you can effectively manage document visibility in SharePoint, ensuring that sensitive information is only accessible to the appropriate audiences. This enhances security and streamlines access to necessary documents for specific teams.
FAQ :
What is audience targeting in SharePoint?
Audience targeting in SharePoint is a feature that allows you to restrict the visibility of content in lists or libraries to specific groups of users, ensuring that only the intended audience can access certain documents.
How do I enable audience targeting for a SharePoint library?
To enable audience targeting for a SharePoint library, go to the library settings, find the 'Audience targeting settings' under general settings, check the 'Enable audience targeting' box, and click OK.
Can I target documents to specific SharePoint groups?
Yes, you can target documents to specific SharePoint groups by modifying the document properties and selecting the desired audience from your global audiences or SharePoint groups.
What types of groups can be used for audience targeting?
You can use SharePoint groups, security groups, or distribution lists for audience targeting in SharePoint.
What happens if I do not enable audience targeting?
If audience targeting is not enabled, all users with access to the library will be able to see all documents, regardless of any specific audience settings you may want to apply.
Quelques cas d'usages :
Restricting Access to Sensitive Documents
In a legal department, audience targeting can be used to ensure that only members of the legal team can access sensitive legal documents, preventing unauthorized access from other departments.
Managing Supplier Documentation
A company can use audience targeting to share specific documents with suppliers by creating a SharePoint group for suppliers, ensuring that only they can view or edit the relevant documents.
Internal Communication for Project Teams
Project teams can utilize audience targeting to share project-related documents only with team members, enhancing collaboration while keeping information secure from other employees.
Training Material Distribution
An organization can target training materials to specific employee groups, ensuring that only those who need the training can access the materials, thus improving training efficiency.
Compliance Document Management
Companies can apply audience targeting to compliance documents, making them accessible only to compliance officers, thereby ensuring that sensitive compliance information is not exposed to unauthorized personnel.
Glossaire :
Audience Targeting
A feature that allows content in a SharePoint library or list to be displayed only to specific groups of users, enhancing content visibility management.
SharePoint Groups
Collections of users in SharePoint that can be assigned permissions to access specific content or features within a SharePoint site.
Distribution Lists
Email lists that allow messages to be sent to multiple recipients at once, often used for communication within organizations.
Security Groups
Groups that are used to manage user permissions and access rights to resources in a network or system.
Global Audience
A set of users defined by specific criteria that can be targeted for content visibility in SharePoint.
Library Settings
Configuration options available for a document library in SharePoint, allowing users to manage permissions, audience targeting, and other features.
Permission Group
A group of users that have been assigned specific permissions to access or modify content within a SharePoint site.
Edit Item
A function that allows users to modify the properties and settings of a specific item or document within a SharePoint library.
Cette formation pourrait intéresser votre entreprise ?
Mandarine Academy vous offre la possibilité d'obtenir des catalogues complets et actualisés, réalisés par nos formateurs experts dans différents domaines pour votre entreprise