Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

SharePoint 2010 : Securing Information - Securing Site Collections

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire
6/30/2011 3:32:47 PM
The main security boundary in SharePoint 2010 is the site collection. Most of the configuration options for end users are scoped to this boundary as well. The following sections discuss what security options are available to be configured at the site collection layer as you work your way down the “stack” of layers in SharePoint 2010 (shown in Figure 2 in this article).

1. Custom Site Collection Policies

At the site collection layer, you can group different information policies together, which are then made available to list managers for use on content items within their lists. This can be useful if you have a large number of lists, each of which should be configured with the same information policy. You only have to create it once at the site collection level, and then you can apply it multiple times across multiple lists and libraries.

You can create as many site collection policies as you want—just be sure to give them descriptive names that indicate what the policy accomplishes. You can also export these policies from one site collection and import them into multiple site collections manually.

2. Auditing Activities in a Site Collection

Although some people will think that auditing should be included in a discussion on security, others will not, because it is merely a reporting tool that tells you what has happened in the site. Auditing cannot stop anyone from accessing anything to which they have permissions. Nevertheless, it is worth a brief discussion, because you can use auditing to help with compliance reports and to track chain of custody and chain of ownership for a legal dispute.

Auditing is turned on and reported at the site collection layer. The audit settings can be divided into several categories, as shown in Table 1.

Table 1. Audit Settings for a Site Collection
 DOCUMENTS AND LIST ITEMSLISTS, LIBRARIES, AND SITES
OpenX 
DownloadX 
EditXX
Check-out/Check-inX 
Move/CopyX 
Delete/RestoreX 
Search X

After you turn on auditing, especially if you are going to audit everything, be ready to see a long report, because nearly every click can be tracked in one way or another.

3. Security Trimming for Navigation

For sites that have the publishing features turned on, you have the option to turn off the security trimming of the navigation. The effect of this is that links in the navigation will appear even if the user does not have access to the sites where the links point. Security trimming for navigation is turned on by default, but in rare instances, you might want to turn it off, if for some reason it is imperative that your users see links to pages and sites to which they do not have permissions.

You can turn off this feature at the site collection level by clicking the Navigation Settings link, which will take you to the Navigation Settings page (Sitenavigationsettings.aspx).

4. Site Collection Administrators

It’s important to distinguish between site collection administrators and site owners. The latter is a group given Full Control permissions through the local site, whereas the former is a role that has pervasive authority throughout the site collection. Those who have the site collection administrator role assigned to them have complete authority throughout the site collection. Breaking permission inheritance between sites or between a site and a list or library cannot keep out a site collection administrator.

A site collection administrator’s ability to access any content in their site collection is a key reason that you’ll need a number of site collections in which to host your collaboration. If you’ve been told that your organization can do most of their collaboration within a single site collection, don’t believe it. At a minimum, each time you need a unique set of permissions at the site collection administrator layer, you’ll need another site collection. Placing information in a site collection that the site collection’s administrator should not see creates a security issue that can be resolved only by moving the content to another site collection or by removing those who should not see it from the site collection administrator’s role.

Other -----------------
- WCF and BizTalk 2009 (part 2) - Publishing Your WCF Service from the Command Line & Consuming WCF Services
- WCF and BizTalk 2009 (part 1) - Exploring the Built-in WCF Adapter Transport Support & Using the WCF Service Publishing Wizard
- SQL Server 2008 : Working with Synonyms
- SQL Server 2008 : Working with Views -Partitioned Views, Updateable Views & Indexed Views
- SQL Server 2008 : Post-Installation - Preproduction Tasks
- Microsoft PowerPoint 2010 : Expanding PowerPoint Functionality - Simplifying Tasks with Macros
- Microsoft PowerPoint 2010 : Enhancing a Presentation with VBA & Setting Developer Options
- Windows Server 2008 R2 : Manage Disk Storage - Manage Disk Storage Quotas
- Windows Server 2008 R2 : Work with RAID Volumes - Understand RAID Levels & Implement RAID
- Exchange Server 2010 : Perform Essential Public Folder Management (part 3) - Configure Client Connectivity
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Trailers Game
- The Banner Saga 2 [PS4/XOne/PC] PC Launch Trailer
- Welkin Road [PC] Early Access Trailer
- 7th Dragon III Code: VFD [3DS] Character Creation Trailer
- Human: Fall Flat [PS4/XOne/PC] Coming Soon Trailer
- Battlefleet Gothic: Armada [PC] Eldar Trailer
- Neon Chrome [PS4/XOne/PC] PC Release Date Trailer
- Rocketbirds 2: Evolution [Vita/PS4] Launch Trailer
- Battleborn [PS4/XOne/PC] 12 Min Gameplay Trailer
- 7 Days to Die [PS4/XOne/PC] Console Trailer
- Total War: Warhammer [PC] The Empire vs Chaos Warriors Gameplay Trailer
- Umbrella Corps [PS4/PC] Mercenary Customization Trailer
- Niten [PC] Debut Trailer
- Stellaris [PC] Aiming for the Stars - Dev. Diary Trailer #1
- LawBreakers [PC] Dev Diary #4: Concept Art Evolutions
programming4us programming4us
Popular tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 windows Phone 7 windows Phone 8
programming4us programming4us
 
programming4us
Natural Miscarriage
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Game Trailer