Join Pete Zerger for an in-depth discussion in this video Audit sharing activity in SharePoint, part of Microsoft Cybersecurity Stack: Securing Enterprise Information.
- [Instructor] Sharing is a key activity in…SharePoint Online and OneDrive for Business…and it's widely used in Office 365 organizations.…Administrators can use sharing, auditing…in the Office 365 audit log to determine…how sharing is being used within their organization.…Sharing events,…excluding sharing policy and sharing link events,…are different from file and folder related events…in one primary way.…And that is that one user is taking an action…that has some effect on another user.…
For example,…User A gives User B access to a file,…User A is the acting user and B is the target user.…The Sharing schema provides two additional fields…in the audit log related to sharing events.…The first of those is TargetUserOrGroupName…which stores the UPN or the name of the…target user or group that the resource was shared with.…User B in our previous example.…TargerUserOrGroupType identifies whether the…target user or group is a member, a guest,…a group or a partner.…
These two fields, in addition to other properties…from the Office 365 audit log schema,…
In this course—the third installment in the series—Microsoft MVP Pete Zerger demonstrates how to leverage the Microsoft cybersecurity stack to more effectively protect corporate information—on any device and in any cloud. Pete explains how to use Azure Information Protection (AIP) to protect information, as well as how to secure data on mobile devices. Plus, he covers identifying and controlling shadow IT, securing structured data in Azure, and more.
- Securing information on any device
- What is Azure Information Protection (AIP)?
- Configuring classification and labeling
- Classifying and protecting data in bulk
- Challenges of securing data on mobile devices
- Data loss prevention (DLP) on mobile devices
- Identifying and controlling shadow IT
- Securing collaboration and DLP
- Configuring dynamic data masking
- Protecting Azure SQL with SQL Threat Detection