Securing Sharing and Guest Access with PI’s Automated Policies

See our most used collaboration policies in action (Presentation in English)

Bekijk on-demand
Securing sharing and guest access pi automation

Evenementen informatie

    Sprekers

    author
    Ron Delaney

    Training and Development Manager, AvePoint

    author
    Tom Gawczynski

    Vice President, Solution Engineering, AvePoint

    Prevent Shadow Users, Unmanaged Guests and More

    One of the biggest collaboration challenges for organizations is making external sharing and guest access both productive AND secure.

    For example, did you know it's not just the membership of the Team or SharePoint site that can access a document hosted within that workspace? Users can easily provide access and permission to others through document sharing links.

    In our dynamic, 30 minute virtual lab we will demonstrate live how to easily identify these shadow users when your security team asks you, “who has access to this document?” AND then we will show you the policies organizations use to prevent this data leak.

    We will review the top automated collaboration policies used by our customers along with supporting use cases including:

    External sharing settings

    Scan external users

    Owner number restrictions

    Access request settings

    Remove shadow users

    Deletion restriction

    Permissionsgovernancemicrosoft 365

    Registreer om te bekijken Op aanvraag

    Velden met * zijn verplicht