SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
10 points to make a rogue
SharePoint environment
really, really secure..
Presented By Peter Ward – September 20th
2014
w- www.sohodragon.com
c- 862 220 6080
b-www.wardpeter.com
New Jersey SharePoint user group
• Different SharePoint discussions
each month on various topics.
Announced on meetup.com
• Meets 4th Tuesday of every
month
• 6pm – 8pm
• Microsoft Office (MetroPark)
• 101 Wood Ave, Iselin, NJ 08830
• http://www.njspug.com
Thank You Event
Sponsors
• Diamond & Platinum sponsors have tables
here in the Fireside Lounge
• Please visit them and inquire about their
products & services
• Also to be eligible for prizes make sure to
get your bingo card stamped
Agenda
• Context of the presentation
• Where to start?
• Understanding security permissions and how to apply it
• Create a methodology
• How to avoid data leaks
• Show user activity on all levels
• Creating a game plan
Green dot
This indicates an important point
Before We Begin
• Q&A – We will have time at the end of the presentation for questions….
But I encourage you to interrupt me and ask
• A copy of this presentation is on my blog
Reminder slide
• A copy of this presentation is on my blog
www.wardpeter.com
This means you only need to watch.
There is no need to take notes
Context of the presentation
This SharePoint
needs to work
Summary
 2 days to take ownership
 Only Prod environment
 No Dev.
 Rogue former vendor team
Takeaways
• Understanding ownership steps
• Confidently applying security
• The little things really matter
• Process and communication is key
• Learn how to refactor an environment
• Good example of reality
SharePoint security planning
Learn learnt: Technology problems aren’t always technology problems
Audience
Networking FolksSharePoint Folks
Networking steps
SharePoint steps
Networking steps
SharePoint steps
The inherited environment
• Hosted environment
• SharePoint 2010 Enterprise
• 3 months of undocumented code and environment.
• No Visio diagrams
• Hard coded ID and passwords everywhere… and I mean everywhere
• A few URL’s a Service Account ID and password
• SQL Server Reporting Services
• Oh I forgot:
• Can’t use 3rd party tools to run audits of security
• Internal IT department has no real understanding how SharePoint works or what was
deployed or developed
Where to start
• Understand SharePoint security
• Business processes
• Create a methodology
Understanding security accounts
and how to apply it
Domain
• Active Directory Groups…. Not distribution
• Domain services- Exchange, IIS
Server
• Boxes
SharePoint
• Site Collections
• Sites
• SharePoint groups
Demarcation of
responsibility
Service accounts
Business Processes
Talk to end users face to face
Understand their language:
 What they think SharePoint actually is
 A list is a report
 Alert is an email
What, why, when, who
Now we can start
Create a methodology
Wave 1 Wave 2 Wave 3 Wave 4 Wave 5 Wave 6 Wave 7 Wave 8 Wave 9
Wave
10
Wave 1 – Kick off
 Back up the server .. Make sure this is SQL. Ask how long back ups are kept
 Ask for a back up.. To test the internal IT
 Restoring env.
 Notify the user base what is going on and in the communication have a team
member’s email and direct phone number
 Identify all the services are running
 Reboot the servers
 Enforce a change log- SharePoint list. Set up alerts to your team
Key wins:
 Immediately know if services stop… and are not related to the password changes
 Any problems you can blame the previous vendor on the morning you start
Wave 2 – Start documentation
• Technical inventory of the following:
• SharePoint, edition, SQL version
• InfoPath- purpose, template location
• Server box names
• Obtain/ create system accounts and password and purpose
• Server boxes
• Architectural diagram
• Env..
• SharePoint collections
• Central Admin
• Installed web parts
Wave 2 – continued-
Ask questions
• What’s the source code control? This should be reviewed
• Is there a DR plan for SQL db’s
• Is there a DR plan for SharePoint
• Report names and their purpose
• Understand the integration points
Now you need to break ground
Wave 3 – Removing access
• VPN access- remove
• Service accounts
• Vendor ids
• Remote access to boxes
• SharePoint env.
• Site collection administrators
Wave 4 – Users
• Reset all users passwords in PowerShell
• Ed Wilson and Craig Liebendorfer, Scripting Guys
• Don’t delete the old vendor ID yet. Because they are in code and
workflow
Wave 4 – disable unused accounts
• Wait a week for things to settle down
• Note disable.. Not delete
Wave- 4 SharePoint permissions
• Do’s
• Use Groups – Either AD or SharePoint
•Don’ts
• Not everyone needs to be Site Collection Admin
• Or Full Control
Wave 5 – Service Accounts
• Create a ID inventory file (Excel) with both old and new password
• Stop and restart services
• Restart server for good measure
Wave 6 – Firewall account
• Because there could be IP addresses of the boxes made public.
• and there was… therefore you could get to the box, with no VPN
• Use Netstat command to listen to traffic on the ports Link
Tea break
• Questions if you want.
Wave 6 – Network Traffic
Wave 6 – Network Traffic
• Port 443 secure https
• Port 80 Unsure
Think again
Think old vendor is locked out…….
Wave 7 – Email
• Change emails in AD
• Redirection capture - DNS
Wave 7 – Email
• Email forwarding
Wave 7 – Workflow
• Impersonation Steps
Create a workflow AD account . Needs to be a site collection administrator
Wave 7 – Workflow
• Hard coded email addresses
Wave 8- SP Security trimming
 Central Admin
 Internal IP address
 Only accessible via RDP login
Wave 9- Quick Sweep
 Check the Service accounts
 Logging
Wave 10- Continued
 Add in tracking into the masterpage:
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsOb
ject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1
*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.sr
c=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-
analytics.com/analytics.js','ga');
ga('create', 'UA-4669498-5',
'onecallcm.com');
ga('send', 'pageview');
</script>
Wave 10+- Final bit of advice
to client
• Buy password security software
• Stores IDs and passwords
• Audit log of who’s accessing IDs
IT loved this
Final bit of advice. Be aware
• Click here
This is the end.
This is the part of the presentation when people should clap and cheer
Questions?
• e-pw@sohodragon.com
• w-www.sohodragon.com
• b-www.wardpeter.com
• c- 862 220 6080

Contenu connexe

Similaire à 10 points to make a rogue SharePoint environment really, really secure..

Shop talk - Project Server 2013
Shop talk - Project Server 2013Shop talk - Project Server 2013
Shop talk - Project Server 2013Chris Givens
 
The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)Jay Simcox
 
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013Netwoven Inc.
 
2-1 Remember the Help Desk with AFCU - Jared Flanders, Final
2-1 Remember the Help Desk with AFCU - Jared Flanders, Final2-1 Remember the Help Desk with AFCU - Jared Flanders, Final
2-1 Remember the Help Desk with AFCU - Jared Flanders, FinalJared Flanders
 
Basic computers for DIU laptop project students
Basic computers for DIU laptop project studentsBasic computers for DIU laptop project students
Basic computers for DIU laptop project studentsAlauddin Azad
 
Webinar: Office 365 for Beginners
Webinar: Office 365 for BeginnersWebinar: Office 365 for Beginners
Webinar: Office 365 for BeginnersCliff Ashcroft
 
My slides from SharePoint Saturday Oslo
My slides from SharePoint Saturday OsloMy slides from SharePoint Saturday Oslo
My slides from SharePoint Saturday OsloRick Van Rousselt
 
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)Nordic APIs
 
Green Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject DetailsGreen Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject DetailsOlivier Philippot
 
Envision it SharePoint Extranet Webinar Series - Extranet User Provisioning
Envision it SharePoint Extranet Webinar Series  - Extranet User ProvisioningEnvision it SharePoint Extranet Webinar Series  - Extranet User Provisioning
Envision it SharePoint Extranet Webinar Series - Extranet User ProvisioningEnvision IT
 
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenO365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenNCCOMMS
 
Basic of computers
Basic of computers Basic of computers
Basic of computers Harsh Porwal
 
Drew madelung sp designer workflows - sp-biz
Drew madelung   sp designer workflows - sp-bizDrew madelung   sp designer workflows - sp-biz
Drew madelung sp designer workflows - sp-bizDrew Madelung
 
Powerful and Quick Workflow Automation Solutions with Nintex
Powerful and Quick Workflow Automation Solutions with NintexPowerful and Quick Workflow Automation Solutions with Nintex
Powerful and Quick Workflow Automation Solutions with NintexNetwoven Inc.
 
SPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst PracticesSPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst PracticesScott Hoag
 
How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...
How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...
How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...Nicolas Henry
 

Similaire à 10 points to make a rogue SharePoint environment really, really secure.. (20)

Shop talk - Project Server 2013
Shop talk - Project Server 2013Shop talk - Project Server 2013
Shop talk - Project Server 2013
 
The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)The Who, What, Why and How of Active Directory Federation Services (AD FS)
The Who, What, Why and How of Active Directory Federation Services (AD FS)
 
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
 
2-1 Remember the Help Desk with AFCU - Jared Flanders, Final
2-1 Remember the Help Desk with AFCU - Jared Flanders, Final2-1 Remember the Help Desk with AFCU - Jared Flanders, Final
2-1 Remember the Help Desk with AFCU - Jared Flanders, Final
 
Basic computers for DIU laptop project students
Basic computers for DIU laptop project studentsBasic computers for DIU laptop project students
Basic computers for DIU laptop project students
 
Webinar: Office 365 for Beginners
Webinar: Office 365 for BeginnersWebinar: Office 365 for Beginners
Webinar: Office 365 for Beginners
 
My slides from SharePoint Saturday Oslo
My slides from SharePoint Saturday OsloMy slides from SharePoint Saturday Oslo
My slides from SharePoint Saturday Oslo
 
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
 
Green Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject DetailsGreen Code Lab Challenge 2015 Subject Details
Green Code Lab Challenge 2015 Subject Details
 
Envision it SharePoint Extranet Webinar Series - Extranet User Provisioning
Envision it SharePoint Extranet Webinar Series  - Extranet User ProvisioningEnvision it SharePoint Extranet Webinar Series  - Extranet User Provisioning
Envision it SharePoint Extranet Webinar Series - Extranet User Provisioning
 
Sai_Resume
Sai_ResumeSai_Resume
Sai_Resume
 
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas VochtenO365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
 
Resume
ResumeResume
Resume
 
Vasudeo_5.8_Years_of_Exp
Vasudeo_5.8_Years_of_ExpVasudeo_5.8_Years_of_Exp
Vasudeo_5.8_Years_of_Exp
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
 
Drew madelung sp designer workflows - sp-biz
Drew madelung   sp designer workflows - sp-bizDrew madelung   sp designer workflows - sp-biz
Drew madelung sp designer workflows - sp-biz
 
RahulParwekar_Resume
RahulParwekar_ResumeRahulParwekar_Resume
RahulParwekar_Resume
 
Powerful and Quick Workflow Automation Solutions with Nintex
Powerful and Quick Workflow Automation Solutions with NintexPowerful and Quick Workflow Automation Solutions with Nintex
Powerful and Quick Workflow Automation Solutions with Nintex
 
SPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst PracticesSPSNYC SharePoint Worst Practices
SPSNYC SharePoint Worst Practices
 
How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...
How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...
How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...
 

Plus de SharePoint Saturday New Jersey

Building Mobile Apps With Xamarin and Visual Studio App Center
Building Mobile Apps With Xamarin and Visual Studio App CenterBuilding Mobile Apps With Xamarin and Visual Studio App Center
Building Mobile Apps With Xamarin and Visual Studio App CenterSharePoint Saturday New Jersey
 
The Definitive Guide for When to Use What In Office 365
The Definitive Guide for When to Use What In Office 365The Definitive Guide for When to Use What In Office 365
The Definitive Guide for When to Use What In Office 365SharePoint Saturday New Jersey
 
A Beginner's Guide to Client Side Development with Javascript
A Beginner's Guide to Client Side Development with JavascriptA Beginner's Guide to Client Side Development with Javascript
A Beginner's Guide to Client Side Development with JavascriptSharePoint Saturday New Jersey
 
Improving the SharePoint Development Process with Continuous Integration
Improving the SharePoint Development Process with Continuous IntegrationImproving the SharePoint Development Process with Continuous Integration
Improving the SharePoint Development Process with Continuous IntegrationSharePoint Saturday New Jersey
 
Exchange Server 2013 and SharePoint Server 2013 Integration
Exchange Server 2013 and SharePoint Server 2013 IntegrationExchange Server 2013 and SharePoint Server 2013 Integration
Exchange Server 2013 and SharePoint Server 2013 IntegrationSharePoint Saturday New Jersey
 

Plus de SharePoint Saturday New Jersey (17)

Building Mobile Apps With Xamarin and Visual Studio App Center
Building Mobile Apps With Xamarin and Visual Studio App CenterBuilding Mobile Apps With Xamarin and Visual Studio App Center
Building Mobile Apps With Xamarin and Visual Studio App Center
 
Azure Active Directory
Azure Active DirectoryAzure Active Directory
Azure Active Directory
 
The Definitive Guide for When to Use What In Office 365
The Definitive Guide for When to Use What In Office 365The Definitive Guide for When to Use What In Office 365
The Definitive Guide for When to Use What In Office 365
 
Sps2015 intro to office 365 admin nikkia carter
Sps2015 intro to office 365 admin   nikkia carterSps2015 intro to office 365 admin   nikkia carter
Sps2015 intro to office 365 admin nikkia carter
 
The anatomy of office 365 groups
The anatomy of office 365 groupsThe anatomy of office 365 groups
The anatomy of office 365 groups
 
Integrating SSRS with SharePoint
Integrating SSRS with SharePointIntegrating SSRS with SharePoint
Integrating SSRS with SharePoint
 
A Beginner's Guide to Client Side Development with Javascript
A Beginner's Guide to Client Side Development with JavascriptA Beginner's Guide to Client Side Development with Javascript
A Beginner's Guide to Client Side Development with Javascript
 
Where to save my data, for devs!
Where to save my data, for devs!Where to save my data, for devs!
Where to save my data, for devs!
 
SharePoint Saturday NJ 2014 Slides
SharePoint Saturday NJ 2014 SlidesSharePoint Saturday NJ 2014 Slides
SharePoint Saturday NJ 2014 Slides
 
Improving the SharePoint Development Process with Continuous Integration
Improving the SharePoint Development Process with Continuous IntegrationImproving the SharePoint Development Process with Continuous Integration
Improving the SharePoint Development Process with Continuous Integration
 
Insights and Monitoring of SharePoint Applications
Insights and Monitoring of SharePoint ApplicationsInsights and Monitoring of SharePoint Applications
Insights and Monitoring of SharePoint Applications
 
Optimizing SQL Server 2012 for SharePoint 2013
Optimizing SQL Server 2012 for SharePoint 2013Optimizing SQL Server 2012 for SharePoint 2013
Optimizing SQL Server 2012 for SharePoint 2013
 
Integrating Office Web Apps with SharePoint 2013
Integrating Office Web Apps with SharePoint 2013Integrating Office Web Apps with SharePoint 2013
Integrating Office Web Apps with SharePoint 2013
 
Anatomy of a mail app
Anatomy of a mail appAnatomy of a mail app
Anatomy of a mail app
 
Exchange Server 2013 and SharePoint Server 2013 Integration
Exchange Server 2013 and SharePoint Server 2013 IntegrationExchange Server 2013 and SharePoint Server 2013 Integration
Exchange Server 2013 and SharePoint Server 2013 Integration
 
Term Store Navigation
Term Store NavigationTerm Store Navigation
Term Store Navigation
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 

Dernier

VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 

Dernier (20)

VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 

10 points to make a rogue SharePoint environment really, really secure..

  • 1. 10 points to make a rogue SharePoint environment really, really secure.. Presented By Peter Ward – September 20th 2014 w- www.sohodragon.com c- 862 220 6080 b-www.wardpeter.com
  • 2. New Jersey SharePoint user group • Different SharePoint discussions each month on various topics. Announced on meetup.com • Meets 4th Tuesday of every month • 6pm – 8pm • Microsoft Office (MetroPark) • 101 Wood Ave, Iselin, NJ 08830 • http://www.njspug.com
  • 3. Thank You Event Sponsors • Diamond & Platinum sponsors have tables here in the Fireside Lounge • Please visit them and inquire about their products & services • Also to be eligible for prizes make sure to get your bingo card stamped
  • 4. Agenda • Context of the presentation • Where to start? • Understanding security permissions and how to apply it • Create a methodology • How to avoid data leaks • Show user activity on all levels • Creating a game plan
  • 5. Green dot This indicates an important point
  • 6. Before We Begin • Q&A – We will have time at the end of the presentation for questions…. But I encourage you to interrupt me and ask • A copy of this presentation is on my blog
  • 7. Reminder slide • A copy of this presentation is on my blog www.wardpeter.com This means you only need to watch. There is no need to take notes
  • 8.
  • 9. Context of the presentation This SharePoint needs to work Summary  2 days to take ownership  Only Prod environment  No Dev.  Rogue former vendor team
  • 10. Takeaways • Understanding ownership steps • Confidently applying security • The little things really matter • Process and communication is key • Learn how to refactor an environment • Good example of reality SharePoint security planning Learn learnt: Technology problems aren’t always technology problems
  • 11. Audience Networking FolksSharePoint Folks Networking steps SharePoint steps Networking steps SharePoint steps
  • 12. The inherited environment • Hosted environment • SharePoint 2010 Enterprise • 3 months of undocumented code and environment. • No Visio diagrams • Hard coded ID and passwords everywhere… and I mean everywhere • A few URL’s a Service Account ID and password • SQL Server Reporting Services • Oh I forgot: • Can’t use 3rd party tools to run audits of security • Internal IT department has no real understanding how SharePoint works or what was deployed or developed
  • 13. Where to start • Understand SharePoint security • Business processes • Create a methodology
  • 14. Understanding security accounts and how to apply it Domain • Active Directory Groups…. Not distribution • Domain services- Exchange, IIS Server • Boxes SharePoint • Site Collections • Sites • SharePoint groups Demarcation of responsibility Service accounts
  • 15. Business Processes Talk to end users face to face Understand their language:  What they think SharePoint actually is  A list is a report  Alert is an email What, why, when, who
  • 16. Now we can start
  • 17. Create a methodology Wave 1 Wave 2 Wave 3 Wave 4 Wave 5 Wave 6 Wave 7 Wave 8 Wave 9 Wave 10
  • 18. Wave 1 – Kick off  Back up the server .. Make sure this is SQL. Ask how long back ups are kept  Ask for a back up.. To test the internal IT  Restoring env.  Notify the user base what is going on and in the communication have a team member’s email and direct phone number  Identify all the services are running  Reboot the servers  Enforce a change log- SharePoint list. Set up alerts to your team Key wins:  Immediately know if services stop… and are not related to the password changes  Any problems you can blame the previous vendor on the morning you start
  • 19. Wave 2 – Start documentation • Technical inventory of the following: • SharePoint, edition, SQL version • InfoPath- purpose, template location • Server box names • Obtain/ create system accounts and password and purpose • Server boxes • Architectural diagram • Env.. • SharePoint collections • Central Admin • Installed web parts
  • 20. Wave 2 – continued- Ask questions • What’s the source code control? This should be reviewed • Is there a DR plan for SQL db’s • Is there a DR plan for SharePoint • Report names and their purpose • Understand the integration points
  • 21. Now you need to break ground
  • 22. Wave 3 – Removing access • VPN access- remove • Service accounts • Vendor ids • Remote access to boxes • SharePoint env. • Site collection administrators
  • 23. Wave 4 – Users • Reset all users passwords in PowerShell • Ed Wilson and Craig Liebendorfer, Scripting Guys • Don’t delete the old vendor ID yet. Because they are in code and workflow
  • 24. Wave 4 – disable unused accounts • Wait a week for things to settle down • Note disable.. Not delete
  • 25. Wave- 4 SharePoint permissions • Do’s • Use Groups – Either AD or SharePoint •Don’ts • Not everyone needs to be Site Collection Admin • Or Full Control
  • 26. Wave 5 – Service Accounts • Create a ID inventory file (Excel) with both old and new password • Stop and restart services • Restart server for good measure
  • 27. Wave 6 – Firewall account • Because there could be IP addresses of the boxes made public. • and there was… therefore you could get to the box, with no VPN • Use Netstat command to listen to traffic on the ports Link
  • 28. Tea break • Questions if you want.
  • 29. Wave 6 – Network Traffic
  • 30. Wave 6 – Network Traffic • Port 443 secure https • Port 80 Unsure
  • 31. Think again Think old vendor is locked out…….
  • 32. Wave 7 – Email • Change emails in AD • Redirection capture - DNS
  • 33. Wave 7 – Email • Email forwarding
  • 34. Wave 7 – Workflow • Impersonation Steps Create a workflow AD account . Needs to be a site collection administrator
  • 35. Wave 7 – Workflow • Hard coded email addresses
  • 36. Wave 8- SP Security trimming  Central Admin  Internal IP address  Only accessible via RDP login
  • 37. Wave 9- Quick Sweep  Check the Service accounts  Logging
  • 38. Wave 10- Continued  Add in tracking into the masterpage: <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsOb ject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1 *new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.sr c=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google- analytics.com/analytics.js','ga'); ga('create', 'UA-4669498-5', 'onecallcm.com'); ga('send', 'pageview'); </script>
  • 39.
  • 40.
  • 41. Wave 10+- Final bit of advice to client • Buy password security software • Stores IDs and passwords • Audit log of who’s accessing IDs IT loved this
  • 42. Final bit of advice. Be aware • Click here
  • 43. This is the end. This is the part of the presentation when people should clap and cheer
  • 44. Questions? • e-pw@sohodragon.com • w-www.sohodragon.com • b-www.wardpeter.com • c- 862 220 6080