Securing Sharing and Guest Access with PI’s Automated Policies

See our most used collaboration policies in action

Watch On-Demand
Securing sharing and guest access pi automation

Event Information

  • 30 minutes

Expert Speakers

Ron Delaney

Ron Delaney

Training and Development Manager, Customer Success, AvePoint

Tom Gawczynski

Tom Gawczynski

VP Solutions Engineering, AvePoint

Prevent Shadow Users, Unmanaged Guests and More

One of the biggest collaboration challenges for organizations is making external sharing and guest access both productive AND secure.

For example, did you know it's not just the membership of the Team or SharePoint site that can access a document hosted within that workspace? Users can easily provide access and permission to others through document sharing links.

In our dynamic, 30 minute virtual lab we will demonstrate live how to easily identify these shadow users when your security team asks you, “who has access to this document?” AND then we will show you the policies organizations use to prevent this data leak.

We will review the top automated collaboration policies used by our customers along with supporting use cases including:

  • External sharing settings

  • Scan external users

  • Owner number restrictions

  • Access request settings

  • Remove shadow users

  • Deletion restriction

Permissionsgovernancemicrosoft 365

Register to Watch On-Demand

Fields with * are required

More Similar Resources to Explore

webinars Fireside Chat 5 Ways to Ignite AI Success in 2026 LP Banner 690x387

Fireside Chat: 5 Ways to Ignite AI Success in 2026

Dezember 11., 2025 EST

View Event Details
eBook E Book LP mockup

Power Platform Governance For Copilot Studio Agents

Get the eBook
webinars AI Ready Risk Smart Webinar Graphics LP Banner 690x387

AI-Ready, Risk-Smart: How AvePoint + Microsoft Purview Empower Secure, Agentic AI

View Event Details
Checklist E Book Tablet cover 7steps M365 copilot

7 Steps to Optimize Microsoft 365 Copilot Deployment

Get the Checklist