Security and Compliance Checks
This article provides information on the Security and Compliance checks feature in Syskit Point.
The Security and Compliance Checks, visible directly on your Syskit Point home screen, pinpoint the most important vulnerabilities and misalignments with Microsoft 365 best practices. These checks keep you aware and help you react quickly to keep your environment secure and under control.
Collecting all the important info about the security and compliance state of your environment is a time-consuming and repetitive administration task. Syskit Point performs regular security and compliance checks for you, and presents the results directly on your home screen.
Please note: The Security and Compliance checks email is sent to Syskit Point admins weekly, on Wednesdays.
If there are no vulnerabilities in your environment, there is no email sent.
If Wednesday is less than 2 days from your installation date, the email will be sent next week.
When you acquire SysKit Point, a default rule will automatically apply default governance policies to your workspaces.
The default policies are configured to detect vulnerabilities without sending any emails or creating any tasks.
All vulnerabilities detected by Syskit Point are displayed on the Security & Compliance Dashboard
Both the vulnerabilities detected by default policies, as well as the policies created by Syskit Point admins, are displayed on the Security & Compliance Dashboard
Security & Compliance Dashboard
On the home Dashboard, you can click and drill down to a specific report to investigate further by clicking the View All button.
On your home screen, you can see the number of:
High-risk vulnerabilities
Medium-risk vulnerabilities
Low-risk vulnerabilities
You are also able to apply policies manually or set up policy rules if you haven't already by clicking the Manage Policies button.
After clicking View All, the Security and Compliance checks dashboard will open, showing the following:
Orphaned Workspaces (1) - shows the number of workspaces without an active owner. It helps you manage your Microsoft 365 workspace's health and helps ensure there are no workspaces without owners in your tenant.
Inactive Guest Users (2) - shows the number of guest users that have been inactive for a certain amount of time and helps you optimize your environment and keep it safe.
Blocked Users with Assigned Licenses (3) - shows the number of users with one or more active licenses assigned that have been blocked, which helps you detect and remove licenses that are not being utilized.
Private Workspaces Shared with Everyone (4) - shows the number of private workspaces shared with Everyone, Everyone except external users, or All Users security groups, which helps you detect and remove access on workspaces that pose a potential security risk.
Workspaces with Not Enough Owners (5) – shows the number of workspaces that don't have enough owners. You will be able to investigate further and assign additional owners if needed. Keep an eye on workspaces with only 1 owner because if that one owner leaves, a workspace is left without an owner.
Workspaces with Too Many Members (6) – shows the number of workspaces with too many members. If there are too many members, it may be more difficult to control access and permissions, leading to security concerns. This helps you keep track of and manage groups with more members than the limit you set.
Orphaned Users (7) - shows the number of orphaned users and takes you to the Orphaned Users report, which helps detect and remove blocked or deleted users from your Microsoft 365 workspaces.
Workspaces with Shadow Users (8) – shows the number of workspaces with shadow users - users who have access to specific content on the SharePoint site but are not members of the Microsoft 365 Group or Team associated with it. Access given to shadow users can be a security concern if you don't keep up with them regularly. This helps you keep track of and remove access given to shadow users.
Workspaces with Too Many Owners (9) – shows the number of workspaces with too many owners. If there are too many owners, no one feels accountable for access and content management. This helps you keep track of and remove extra members.
Tenant Storage Limit (10) - shows whether you reached the tenant storage limit based on the percentage set for the policy.
Automated Governance
To keep all vulnerabilities under control proactively and prevent possible issues, explore and [set up governance policies and policy rules] in Syskit Point.
Please note! If a user, security group, or mail-enabled security group is added to the Governance-Excluded Users list, those users do not receive any Governance-related tasks or task-related emails. For more details on setting up Governance-Excluded Users, take a look at this article.
Navigate Security and Compliance Checks
Take a look at the following articles to learn how to settle your security and compliance checks:
Please note! In case you have any security and compliance checks that need to be resolved, an email is automatically sent each Wednesday to Syskit Point admins. Click the Resolve button within the email to access the reports in Syskit Point directly and perform the needed actions.
Last updated