Lead Solutions Engineer
For over a decade, Metalogix has developed the
industry’s best and most trusted management
tools for SharePoint, Exchange, and Office 365,
backed by our live 24x7 support.
Over 14,000 clients rely on Metalogix tools every
minute of every day to monitor, migrate, store,
synchronize, archive, secure, and backup their
We are committed to your
Success with SharePoint!
o How important is governance in your
o Do you know who is getting access to what information?
o Do you store any financial or legal records in SharePoint?
o Do you know who can access or has accessed it?
o Do you have compliance regulations that you have to adhere to?
o If there was a security breach, who would be held responsible?
o Do you regularly run audits on usage, security, content, or permissions?
o Do you have an IS department that is asking for reports?
o How do you respond to compliance requirements for Audits?
o What does the process look like today?
A 2012 CIO survey by Gartner shows an increasing
push in collaboration, analytics, and cloud computing.
They predict that by 2016, 20% of CIOs in regulated
industries will lose their jobs for failing to implement the
discipline of information governance successfully.
Technical Governance Means…
Data is secure
System performs well
End users can quickly find their content
Storage is optimized
Content lifecycles in place, regularly reviewed
Legal and regulatory requirements being met
Corporate IT SharePoint Content
36% of SharePoint users are
breaching security policies
Only 18% of enterprises use
technical controls to prevent
access to sensitive
information. Most — 73
percent — rely on written
policies or informal
understandings with their
60% of organizations have yet
to bring SharePoint into line
with existing data compliance
Two-thirds of SharePoint-using companies in a
recent survey have admitted to having ‘no active
security policy’ in place (Emedia)
A survey revealed that 79% of respondents stored
sensitive or confidential information on their
SharePoint platform (CMSWire)
What are the 5 most
1. Failure to define (and communicate)
policies and procedures.
Start with non-technical elements
Develop a Security Policy
Implement a training plan for end users
Develop a strategy for ensuring
users know what content
34% of IT administrators said that
they'd "sneaked a peek" at
documents they weren't
authorized to view, including
employee details and salary
2. Failure to implement any kind of
permissions best practices.
Apply permissions using Least Privileged principles
Don’t give users Direct Access
Embrace SharePoint Groups and/or Active Directory Groups
Ensure Appropriate Use of the Authenticated Users Group
Clean up Orphan Users
Use Broken Inheritance Responsibly
Revoke permissions quickly
3. Failure to regularly audit access
to content and sites.
Are we adhering to Compliance or Governance requirements?
Who has been accessing specific content?
How often are specific sites being accessed?
What features of SharePoint are being used?
Are we managing the volume of log data?
4. Failure to monitor changes to security
SharePoint security changes over time
Ensure users are continuing to adhere to
Prevent users from causing havoc
We need to plan how we will stay on top of
5. Failure to empower users and admins with
the right permissions.
Find your responsible business content owners
Enable and Equip them to manage access to their
Ensure management access is limited to those
with appropriate permissions
Segment your administration responsibilities –
Power Users, business owners
Apply the Top 5 Security Essentials
Easily make changes to or revoke permissions across
any scope – even between farms
Audit Permissions to ensure only the right people
Meet compliance and governance requirements
with regular scheduled reports
Monitor what users are doing – receive Alerts for unexpected
Permissions Management wizard for the casual user
ControlPoint: Security and Compliance
• Policy driven security and permissions
across SharePoint farms
• Seamless extension to out-of-the-box
• Increased compliance insight and
• Mitigate risk of data loss due
unauthorized access to
• Provide audit trails of content
• Provide automation of
Make governance a priority
Look at your systems holistically (a business view),
regardless of where the servers sit
Clarify and document your permissions, information
architecture, templates, content types, taxonomy --
and ownership of each
First define what policies, procedures, and metrics
are needed to manage your environment, and then
look at what is possible across your various tools
30 Day Trial of ControlPoint