Security and Compliance Checks

This article provides information on the Security and Compliance checks feature in Syskit Point.

The Security and Compliance Checks, visible directly on your Syskit Point home screen, pinpoint the most important vulnerabilities and misalignments with Microsoft 365 best practices. These checks keep you aware and help you react quickly to keep your environment secure and under control.

Collecting all the important info about the security and compliance state of your environment is a time-consuming and repetitive administration task. Syskit Point performs regular security and compliance checks for you, and presents the results directly on your home screen.

Please note: The Security and Compliance checks email is sent to Syskit Point admins weekly, on Wednesdays.

  • If there are no vulnerabilities in your environment, there is no email sent.

  • If Wednesday is less than 2 days from your installation date, the email will be sent next week.

When you acquire SysKit Point, a default rule will automatically apply default governance policies to your workspaces.

  • The default policies are configured to detect vulnerabilities without sending any emails or creating any tasks.

  • All vulnerabilities detected by Syskit Point are displayed on the Security & Compliance Dashboard

  • Both the vulnerabilities detected by default policies, as well as the policies created by Syskit Point admins, are displayed on the Security & Compliance Dashboard

Security & Compliance Dashboard

On the home Dashboard, you can click and drill down to a specific report to investigate further by clicking the View All button.

On your home screen, you can see the number of:

  • High-risk vulnerabilities

  • Medium-risk vulnerabilities

  • Low-risk vulnerabilities

You are also able to apply policies manually or set up policy rules if you haven't already by clicking the Manage Policies button.

After clicking View All, the Security and Compliance checks dashboard will open, showing the following:

  • Orphaned Workspaces (1) - shows the number of workspaces without an active owner. It helps you manage your Microsoft 365 workspace's health and helps ensure there are no workspaces without owners in your tenant.

  • Inactive Guest Users (2) - shows the number of guest users that have been inactive for a certain amount of time and helps you optimize your environment and keep it safe.

  • Tenant Storage Limit (3) - shows whether you reached the tenant storage limit based on the percentage set for the policy.

  • Blocked Users with Assigned Licenses (4) - shows the number of users with one or more active licenses assigned that have been blocked, which helps you detect and remove licenses that are not being utilized.

  • Workspaces with Not Enough Owners (5) – shows the number of workspaces that don't have enough owners. You will be able to investigate further and assign additional owners if needed. Keep an eye on workspaces with only 1 owner because if that one owner leaves, a workspace is left without an owner.

  • Orphaned Users (6) - shows the number of orphaned users and takes you to the Orphaned Users report, which helps detect and remove blocked or deleted users from your Microsoft 365 workspaces.

  • Workspaces with Too Many Members (7) – shows the number of workspaces with too many members. If there are too many members, it may be more difficult to control access and permissions, which can lead to security concerns. This helps you keep track of and manage groups with more members than the limit you set.

  • Workspaces with Too Many Owners (8) – shows the number of workspaces with too many owners. If there are too many owners, no one feels accountable for access and content management. This helps you keep track of and remove extra members.

  • Workspaces with Shadow Users (9) – shows the number of workspaces with shadow users - users that have access to specific content on the SharePoint site but are not members of the Microsoft 365 Group or Team associated with it. Access given to shadow users can be a security concern if you don't keep up with them regularly. This helps you keep track of and remove access given to shadow users.

Automated Governance

To keep all vulnerabilities under control proactively and prevent possible issues, explore and [set up governance policies and policy rules] in Syskit Point.

Take a look at the following articles to learn how to settle your security and compliance checks:

Please note! In case you have any security and compliance checks that need to be resolved, an email is automatically sent each Wednesday to Syskit Point admins. Click the Resolve button within the email to access the reports in Syskit Point directly and perform the needed actions.

Last updated