Skip to main content
Search My Knowledge Base

or browse by Topic instead

Topic: "Security"

2 ways to see what users have access to in SharePoint

You know how on Facebook and LinkedIn you have the feature to see what your profile looks like to other users? I am sure you wondered what kind of access do users have in SharePoint on a given site and what exactly do they “see” when they land on one. Today I would like to explain two ways to check user access… keep reading >

How to enable Item Level Permissions in SharePoint

Here is a real-life scenario. You have built a list in SharePoint so that users can submit entries, but you only want users to be able to read or modify their own entries. An example of such list could be a submission form to Human Resources (Vacation Request) or a HelpDesk ticketing system. Unlike other types of lists, you might not necessarily… keep reading >

6 ways to build a super secure document library in SharePoint

One of the biggest concerns many organizations have when they store files and document in SharePoint is the security and integrity of their content. I have no doubt Microsoft goes above and beyond to keep files secure and encrypted in SharePoint. However, at the end of the day, SharePoint is used by humans. And humans are prone to errors. So what can… keep reading >

IT or Business? Who should manage SharePoint site security?

One of the decisions you have to make once you create an Intranet portal in SharePoint is who will manage SharePoint site security. I have recently published a similar post on pros and cons of AD groups vs. SharePoint groups. However, that was more of a technical decision. Today, I want to concentrate more on the governance aspect of the same topic.… keep reading >

Active Directory Groups or SharePoint Groups?

A very common question/decision point for IT departments embracing Office 365 and SharePoint is whether to rely on Active Directory Groups or SharePoint Groups when managing security in SharePoint. Both methods have their pros and cons. In this blog I would like to explain the difference between the 2 methods and provide a recommendation. Before we do that, let me first explain… keep reading >