Syskit Point
Schedule a DemoStart a Free TrialContact UsProduct Site
  • Syskit Point
  • Releases
    • Syskit Point Cloud
      • May 13, 2025
      • May 06, 2025
      • April 29, 2025
      • April 22, 2025
      • April 08, 2025
      • April 01, 2025
      • March 25, 2025
      • March 18, 2025
      • March 11, 2025
      • March 04, 2025
      • February 25, 2025
      • February 18, 2025
      • February 11, 2025
      • February 06, 2025
      • January 28, 2025
      • January 22, 2025
      • January 14, 2025
      • January 02, 2025
      • December 17, 2024
      • December 10, 2024
      • December 03, 2024
      • November 26, 2024
      • November 19, 2024
      • November 05, 2024
      • October 29, 2024
      • October 22, 2024
      • October 15, 2024
      • October 08, 2024
      • October 01, 2024
      • September 24, 2024
      • September 18, 2024
      • September 02, 2024
      • August 26, 2024
      • August 20, 2024
      • August 12, 2024
      • August 06, 2024
      • July 29, 2024
      • July 23, 2024
      • July 02, 2024
      • June 18, 2024
      • June 04, 2024
      • May 21, 2024
      • May 09, 2024
      • April 23, 2024
      • April 9, 2024
      • March 26, 2024
      • March 12, 2024
      • February 22, 2024
      • February 06, 2024
      • January 19, 2024
      • January 18, 2024
      • December 19, 2023
      • November 30, 2023
      • November 15, 2023
      • November 2, 2023
      • November 2, 2023 - Announcement
      • October 17, 2023
      • October 3, 2023
      • September 21, 2023
      • September 14, 2023
      • September 7, 2023
      • August 23, 2023
      • August 9, 2023
      • July 26, 2023
      • July 12, 2023
      • May 16, 2023
    • Syskit Point Data Center
      • Syskit Point 2025.2
        • Syskit Point 2025.2.90
        • Syskit Point 2025.2.86
        • Syskit Point 2025.2.82
        • Syskit Point 2025.2.78
      • Syskit Point 2024.6
        • Syskit Point 2024.6.73
        • Syskit Point 2024.6.71
        • Syskit Point 2024.6.70
      • Syskit Point 2024.5
        • Syskit Point 2024.5.67
        • Syskit Point 2024.5.65
      • Syskit Point 2024.4
        • Syskit Point 2024.4.60
        • Syskit Point 2024.4.54
        • Syskit Point 2024.4.52
      • Syskit Point 2024.3
        • Syskit Point 2024.3.48
      • Syskit Point 2024.2
        • Syskit Point 2024.2.45
      • Syskit Point 2024.1
        • Syskit Point 2024.1.43
        • Syskit Point 2024.1.41
      • Syskit Point 2023.5
        • Syskit Point 2023.5.39
      • Syskit Point 2023.4
        • Syskit Point 2023.4.1
        • Syskit Point 2023.4.0
      • Syskit Point 2023.3
      • Syskit Point 2023.2
      • Syskit Point 2023.1
        • Syskit Point 2023.1.3
        • Syskit Point 2023.1.2
        • Syskit Point 2023.1.1
        • Syskit Point 2023.1.0
      • Syskit Point 2022.5
        • Syskit Point 2022.5.1
        • Syskit Point 2022.5.0
      • Syskit Point 2022.4
        • Syskit Point 2022.4.1
        • Syskit Point 2022.4.0
      • Syskit Point 2022.3
        • Syskit Point 2022.3.1
        • Syskit Point 2022.3.0
      • Syskit Point 2022.2
        • Syskit Point 2022.2.3
        • Syskit Point 2022.2.2
        • Syskit Point 2022.2.1
        • Syskit Point 2022.2.0
      • Syskit Point 2021.12
      • Syskit Point 2021.11
      • Syskit Point 2021.10
      • Syskit Point 20
      • Syskit Point 19
        • Syskit Point 19.0.2
        • Syskit Point 19.0.1
        • Syskit Point 19.0.0
  • Requirements
    • Permission Requirements
    • Change Log
  • Set Up Point Cloud
    • Overview
    • Free Trial
    • Free Trial Limits
    • Manage Syskit Point Subscriptions
  • Set Up Point Data Center
    • Deployment
      • Overview
      • System Requirements
      • Deploy Syskit Point
      • Connect to Microsoft 365 Tenant
      • Set Up Custom Domain and SSL Certificate
      • Upgrade Syskit Point
      • Azure Networking
    • Activation
      • Activate Syskit Point
      • Free Trial Data Center
  • Licensing & Activation
    • Licensed Users Count
    • Activation Privacy Statement
  • Get to Know Syskit Point
    • The Syskit Point Starter Kit
    • Navigate Through Syskit Point
    • Collect Microsoft 365 Data
  • Microsoft 365 Inventory
    • Microsoft 365 Inventory Overview
    • Explore Your Microsoft 365 Dashboard
    • Sites
    • Microsoft Teams & Groups
    • Users
    • Copilot Readiness
  • Configuration
    • Syskit Point Configuration Guide
    • Assign and Manage Access to Syskit Point
    • Enable Microsoft Teams Activity Tracking
    • Configure Storage Management in Syskit Point
    • Set Up E-Mail
    • Connect Service Account
    • Customize Audit Logs Collection
    • Upgrade SQL to Managed Identity Authentication
    • Enable Power Platform Data Collection
    • Enable Power BI Data Collection
    • Ignore Service Account Activity Tracking
    • Customize License Reports
    • Customize E-Mails
    • Report Data Limits
    • Turn On Auditing
    • Exclude Users from Receiving Governance Tasks
    • Customize Dashboard
    • Customize Syskit Point Appearance
    • Configure Your Environment for Storage Management
    • Save Custom Views
    • Audit for Syskit Point Settings
    • Manage Connection
  • Reporting
    • Overview
    • External Sharing Reports
    • Access Reports
    • Audit Reports
    • Cleanup & Health Reports
    • Licenses Reports
    • Analytics Reports
    • Sensitivity Labels Reports
    • Power Platform Reports
    • Power BI Reports
  • Storage Management
    • Storage Management Overview
    • Free Up Storage
    • Storage Reports
    • Limit Storage Usage
    • Storage Versioning Limits
  • Governance & Automation
    • Syskit Point Tasks
    • Access Review
      • Enable Automated Access Review
      • Create and Apply Access Review Policies
      • Modify Access Review Options
      • Monitor Access Review in Syskit Point
      • Manually Request Access Review in Syskit Point
    • Lifecycle Management
      • Lifecycle Management - Deprecated
      • Identify Inactive Workspaces
      • Enable Lifecycle Management Automation
      • Monitor Lifecycle Management Tasks in Syskit Point
      • Run Lifecycle Management Actions in Syskit Point
    • Policies
      • Set Up Policies
      • Rules
      • Blocked Users with Assigned Licenses
      • Inactive Guest Users
      • Inactive Workspaces
      • Minimum Number of Owners
      • Maximum Number of Owners
      • Orphaned Workspaces
      • Orphaned Users
      • Tenant Storage Limit
      • Workspaces with Too Many Members
      • Workspaces with Shadow Users
      • Private Workspaces Shared with Everyone
      • Workspaces Without a Sensitivity Label
      • Apply Policies
      • Upgrade to Rules
    • Security and Compliance Checks
      • Security and Compliance Checks
      • Inactive Workspaces
      • Orphaned Workspaces
      • Inactive Guest Users
      • Blocked Users with Assigned Licenses
      • Workspaces with Not Enough Owners
      • Orphaned Users
      • Workspaces with Too Many Owners
      • Tenant Storage Limit
      • Workspaces with Too Many Members
      • Workspaces with Shadow Users
      • Private Workspaces Shared with Everyone
      • Workspaces Without a Sensitivity Label
    • Provisioning
      • Set Up Provisioning
      • Enable or Disable Provisioning
      • Register Yammer App
      • Enable Sensitivity Labels
      • Restrict Microsoft 365 Groups Creation
      • Templates
      • Content & Structure
      • Configure Provisioning Failure Notifications
      • Approval Processes
      • Approve/Reject Requests
      • Manage Requests
      • Hide Workspace Name
    • Access Requests
      • Set Up Access Requests
      • Create Access Requests
      • Apply Access Requests
      • Approval Process
    • Metadata
      • Manage Custom Metadata
      • Request Metadata Review
      • Monitor Metadata Review
    • Sensitivity Review
      • Request Sensitivity Review
      • Monitor Sensitivity Review
    • Privacy Review
      • Request Privacy Review
      • Monitor Privacy Review
    • Syskit Point Teams App
    • Schedule Reports
    • Configure Alerts
    • Manage Sensitivity Labels
  • Access Management
    • Track Microsoft 365 External Users and Their Activities
    • Check Access for Specific Microsoft 365 User
    • Copy User Permissions
    • Delete and Restore Users
    • View Permission Changes in Microsoft 365
    • Supervise Microsoft Teams Private Channels
    • Manage Private Channels Access
    • Complete Power Platform Actions
  • Integrations
    • Overview
    • Syskit Point API
    • Webhooks
    • Examples
      • Webhooks
      • ServiceNow
      • Jira
  • FAQ
    • Security
    • Security Self Assessment Questionnaire
    • Storage Management
    • Free Trial
    • Licensing
    • Activation
    • Purchasing and Discounts
    • Customer Terms
    • Privacy and Compliance
    • Partner Program
    • Site Storage Limits
    • Orphaned Users
    • Inactive Users Detection
    • Provisioning - Content & Structure
  • Troubleshooting
    • Export Diagnostic Logs
    • Setup Diagnostic Logs Export
    • Analytics and Usage Report Issues
  • Explore Syskit Point for Site Owners/Collaborators
    • Syskit Point for Collaborators
    • Resolve Governance Tasks
      • My Tasks
      • Complete Access Review Tasks
      • Complete Metadata Review Tasks
      • Complete Privacy Review Tasks
      • Complete Sensitivity Review Tasks
      • Resolve Inactive Workspaces Tasks
      • Resolve Lifecycle Management Tasks
      • Resolve Inactive Guest Users Tasks
      • Resolve Minimum Number of Owners Tasks
      • Resolve Maximum Number of Owners Tasks
      • Resolve Orphaned Workspaces Tasks
      • Resolve Tenant Storage Limit Task
    • Manage Access
      • Manage External Sharing
      • Manage Users
    • Manage Workspaces
      • Request New Workspace
      • Request Workspace Access
      • Manage Workspaces
      • Manage Custom Metadata
    • Reporting
      • Syskit Icons Glossary
      • Inventory Reports
      • Schedule Reports
      • Alerts
      • Cleanup & Health Reports
      • External Sharing Reports
      • Access Reports
Powered by GitBook
On this page
  • Manage External Users
  • Manage Sites with External Sharing
  • Manage Sharing Links
  • Manage Sites Shared with Anyone

Was this helpful?

  1. Explore Syskit Point for Site Owners/Collaborators
  2. Manage Access

Manage External Sharing

This article provides details helpful to group owners on how to Manage External Sharing.

PreviousManage AccessNextManage Users

Last updated 1 year ago

Was this helpful?

External Sharing is the ability to share documents, folders, and sites with someone who is not part of your Teams or Sites usually or might not even be within your organization.

This can be done through sharing links or by adding external users to Microsoft Teams & Groups or sites.

Sharing links allow you to send a link to a specific document or folder to someone outside of your organization. This gives them access to view or edit the file.

External users are people who are not part of your organization but who are granted access to specific workspaces, such as a site or a Microsoft Team.

Managing external sharing is important for collaborators and owners of workspaces because it helps to ensure that confidential or sensitive information is not shared with unauthorized individuals.

Syskit Point helps you manage external sharing, which means you can easily control who has access to your organization's data and limit the risk of data breaches or other security issues.

You are only able to manage external sharing for workspaces where you are the owner.

In this article, you will learn how to:

Manage External Users

You can manage external users by taking the following steps:

  • On the Syskit Point home page, navigate to the section titled External Collaboration (1)

Under the External Collaboration section, you will have two options to manage external users:

  • External Users (2)

  • Sites With External Sharing (3)

To manage external users:

  • Click the External Users button, and you will be redirected to the Users site with the filter showing External Users

  • Here you will be able to access the User Activity and User Access reports and can complete the following actions:

    • Add to Groups

    • Configure Alerts

  • Additionally, clicking on the user and opening the user details screen provides the option to:

    • Promote to Owner

    • Remove from Group

    • Remove Access from a workspace

Once you've identified all your external users, you might see a name or two that are outdated and should not have access to particular content. You can then choose whether to remove them from the Group or completely remove workspace access. The User Activity and User Access reports can help with that as well.

User Activity reports help you track progress, resolve conflicts, and assess performance, while User Access reports let you monitor access to sensitive information and identify potential security breaches.

For example, let's say you're working with a team on a project. User Activity reports allow you to see who accessed shared documents when they did so, and the changes they made.

Manage Sites with External Sharing

Let's say that as a team owner, you want to see every file under your ownership that is exposed to someone outside of your organization. This will not only make for phenomenal housekeeping but will also prevent potential data breaches from happening within your own teams.

By reviewing your externally shared content, in a couple of clicks, you can make sure that no sensitive data is unnecessarily exposed.

You can manage sites with external sharing by going back to the External Collaboration section of the Dashboard.

To start, complete the next steps:

  • Click the Sites with External Sharing button, and you will be redirected to the Sites page with the filter showing Externally Shared Sites (1)

  • Selecting an externally shared site provides the following options, located on the right side of the screen:

    • Add Admins

    • Remove Admins

    • Change Admins

    • Configure Alerts

    • Change Metadata

Clicking on a site will open the details screen for that site and provide several more actions you can take.

On the right side of the screen, under Manage, you will have the option to:

  • Grant Access - where you can add users to the site and assign the level of access you want to provide

  • Change Admins - allows you to change the admins in charge of the side

  • Configure Alerts - lets you set up specific alerts for your site

Scrolling to the Lifecycle Management section on the left side, you can choose to:

  • Keep the site

  • Archive the site

  • Delete the site

In the middle part, under the content section, you will find a list of all content included in this site. Depending on the item selected, you will have additional options to:

  • Stop Inheriting Permissions

  • Delete Unique Permissions

Clicking either action provides a pop-up that will ask you to confirm your choice.

The permissions section provides a list of users and the level of access they were given to the site. Selecting a user provides the options to:

  • Remove Access

  • Edit Permissions

Manage Sharing Links

It's time to put an end to accidental data leaks and security breaches caused by improper sharing practices.

Syskit Point provides a straightforward and effective method to identify and resolve misconfigured or outdated sharing links, ensuring the security and accessibility of your valuable data.

You can manage sharing links by taking the following steps:

  • On the Syskit Point home page, click the Dashboard button

  • Navigate to the section titled External Collaboration (1)

Under the External Collaboration section, you will have two options to manage externally shared links:

  • Links Shared with Anyone (2)

  • Sites Shared with Anyone (3)

To manage links shared with anyone, complete the following:

  • Click the Links Shared with Anyone button, and you will be redirected to the Sharing Links report (1)

  • Here, you can select the workspace with externally shared links, and on the right side of the screen, you will have the option to Remove All Sharing Links

    • Clicking Remove All Sharing Links will remove all the sharing links from all of the items included in the workspace

    • You can also complete this as a bulk action by selecting all of the workspaces before clicking Remove All Sharing Links

  • Alternatively, you can remove a sharing link from a specific item in the workspace, for example, a folder

    • To do this, select the folder you want to change and click the Remove Sharing Link button on the right side of the screen

Manage Sites Shared with Anyone

While talking about proper governance and Microsoft 365 security, one of the first things you will want to expose and address is all the content under your ownership that is shared with anyone.

This segment potentially exposes you and your organization to data leakage and should be one of your priorities. Through Syskit Point – you can achieve this in a couple of clicks.

To manage sites that have been shared with anyone, go back to the External Collaboration section of the Dashboard.

To start, complete the next steps:

  • Click the Sites Shared with Anyone button, and you will be redirected to the Sites page with the filter showing Anonymously Shared Sites (1)

  • Selecting an externally shared site provides the following options, located on the right side of the screen:

    • Add Admins

    • Remove Admins

    • Change Admins

    • Configure Alerts

    • Change Metadata

Clicking on a site will open the details screen for that site and provide several more actions you can take.

On the right side of the screen, under Manage, you will have the option to:

  • Grant Access - where you can add users to the site and assign the level of access you want to provide

  • Change Admins - allows you to change the admins in charge of the side

  • Configure Alerts - lets you set up specific alerts for your site

Scrolling to the Lifecycle Management section on the left side, you can choose to:

  • Keep the site

  • Archive the site

  • Delete the site

In the middle part, under the content section, you will find a list of all content that is included in this site. Depending on the item selected, you will have additional options to:

  • Stop Inheriting Permissions

  • Delete Unique Permissions

Clicking either action provides a pop-up that will ask you to confirm your choice.

The permissions section provides a list of users and the level of access they were given to the site. Selecting a user provides the options to:

  • Remove Access

  • Edit Permissions

For instructions on how to complete these actions, take a look at this article.
Manage External Users
Manage Sites with External Sharing
Manage Sharing Links
Manage Sites Shared with Anyone
Manage External Sharing - Users
Manage External Sharing - Links