SlideShare a Scribd company logo
10 points to make a rogue
SharePoint environment
really, really secure..
Presented By Peter Ward – September 20th
2014
w- www.sohodragon.com
c- 862 220 6080
b-www.wardpeter.com
New Jersey SharePoint user group
• Different SharePoint discussions
each month on various topics.
Announced on meetup.com
• Meets 4th Tuesday of every
month
• 6pm – 8pm
• Microsoft Office (MetroPark)
• 101 Wood Ave, Iselin, NJ 08830
• http://www.njspug.com
Thank You Event
Sponsors
• Diamond & Platinum sponsors have tables
here in the Fireside Lounge
• Please visit them and inquire about their
products & services
• Also to be eligible for prizes make sure to
get your bingo card stamped
Agenda
• Context of the presentation
• Where to start?
• Understanding security permissions and how to apply it
• Create a methodology
• How to avoid data leaks
• Show user activity on all levels
• Creating a game plan
Green dot
This indicates an important point
Before We Begin
• Q&A – We will have time at the end of the presentation for questions….
But I encourage you to interrupt me and ask
• A copy of this presentation is on my blog
Reminder slide
• A copy of this presentation is on my blog
www.wardpeter.com
This means you only need to watch.
There is no need to take notes
10 points to make a rogue SharePoint environment really, really secure..
Context of the presentation
This SharePoint
needs to work
Summary
 2 days to take ownership
 Only Prod environment
 No Dev.
 Rogue former vendor team
Takeaways
• Understanding ownership steps
• Confidently applying security
• The little things really matter
• Process and communication is key
• Learn how to refactor an environment
• Good example of reality
SharePoint security planning
Learn learnt: Technology problems aren’t always technology problems
Audience
Networking FolksSharePoint Folks
Networking steps
SharePoint steps
Networking steps
SharePoint steps
The inherited environment
• Hosted environment
• SharePoint 2010 Enterprise
• 3 months of undocumented code and environment.
• No Visio diagrams
• Hard coded ID and passwords everywhere… and I mean everywhere
• A few URL’s a Service Account ID and password
• SQL Server Reporting Services
• Oh I forgot:
• Can’t use 3rd party tools to run audits of security
• Internal IT department has no real understanding how SharePoint works or what was
deployed or developed
Where to start
• Understand SharePoint security
• Business processes
• Create a methodology
Understanding security accounts
and how to apply it
Domain
• Active Directory Groups…. Not distribution
• Domain services- Exchange, IIS
Server
• Boxes
SharePoint
• Site Collections
• Sites
• SharePoint groups
Demarcation of
responsibility
Service accounts
Business Processes
Talk to end users face to face
Understand their language:
 What they think SharePoint actually is
 A list is a report
 Alert is an email
What, why, when, who
Now we can start
Create a methodology
Wave 1 Wave 2 Wave 3 Wave 4 Wave 5 Wave 6 Wave 7 Wave 8 Wave 9
Wave
10
Wave 1 – Kick off
 Back up the server .. Make sure this is SQL. Ask how long back ups are kept
 Ask for a back up.. To test the internal IT
 Restoring env.
 Notify the user base what is going on and in the communication have a team
member’s email and direct phone number
 Identify all the services are running
 Reboot the servers
 Enforce a change log- SharePoint list. Set up alerts to your team
Key wins:
 Immediately know if services stop… and are not related to the password changes
 Any problems you can blame the previous vendor on the morning you start
Wave 2 – Start documentation
• Technical inventory of the following:
• SharePoint, edition, SQL version
• InfoPath- purpose, template location
• Server box names
• Obtain/ create system accounts and password and purpose
• Server boxes
• Architectural diagram
• Env..
• SharePoint collections
• Central Admin
• Installed web parts
Wave 2 – continued-
Ask questions
• What’s the source code control? This should be reviewed
• Is there a DR plan for SQL db’s
• Is there a DR plan for SharePoint
• Report names and their purpose
• Understand the integration points
Now you need to break ground
Wave 3 – Removing access
• VPN access- remove
• Service accounts
• Vendor ids
• Remote access to boxes
• SharePoint env.
• Site collection administrators
Wave 4 – Users
• Reset all users passwords in PowerShell
• Ed Wilson and Craig Liebendorfer, Scripting Guys
• Don’t delete the old vendor ID yet. Because they are in code and
workflow
Wave 4 – disable unused accounts
• Wait a week for things to settle down
• Note disable.. Not delete
Wave- 4 SharePoint permissions
• Do’s
• Use Groups – Either AD or SharePoint
•Don’ts
• Not everyone needs to be Site Collection Admin
• Or Full Control
Wave 5 – Service Accounts
• Create a ID inventory file (Excel) with both old and new password
• Stop and restart services
• Restart server for good measure
Wave 6 – Firewall account
• Because there could be IP addresses of the boxes made public.
• and there was… therefore you could get to the box, with no VPN
• Use Netstat command to listen to traffic on the ports Link
Tea break
• Questions if you want.
Wave 6 – Network Traffic
Wave 6 – Network Traffic
• Port 443 secure https
• Port 80 Unsure
Think again
Think old vendor is locked out…….
Wave 7 – Email
• Change emails in AD
• Redirection capture - DNS
Wave 7 – Email
• Email forwarding
Wave 7 – Workflow
• Impersonation Steps
Create a workflow AD account . Needs to be a site collection administrator
Wave 7 – Workflow
• Hard coded email addresses
Wave 8- SP Security trimming
 Central Admin
 Internal IP address
 Only accessible via RDP login
Wave 9- Quick Sweep
 Check the Service accounts
 Logging
Wave 10- Continued
 Add in tracking into the masterpage:
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsOb
ject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1
*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.sr
c=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-
analytics.com/analytics.js','ga');
ga('create', 'UA-4669498-5',
'onecallcm.com');
ga('send', 'pageview');
</script>
10 points to make a rogue SharePoint environment really, really secure..
10 points to make a rogue SharePoint environment really, really secure..
Wave 10+- Final bit of advice
to client
• Buy password security software
• Stores IDs and passwords
• Audit log of who’s accessing IDs
IT loved this
Final bit of advice. Be aware
• Click here
This is the end.
This is the part of the presentation when people should clap and cheer
Questions?
• e-pw@sohodragon.com
• w-www.sohodragon.com
• b-www.wardpeter.com
• c- 862 220 6080

More Related Content

PPTX
User activity monitoring with SysKit
SysKit Ltd
 
PPTX
NEED AND IMPORTANCE OF ENVIRONMENTAL EDUCATION
Velentina Das
 
PPTX
Securing sharepoint
Peter_1020
 
PPTX
What's new in sharepoint 2016
Mike Maadarani
 
PPTX
Deploying and Managing PowerPivot for SharePoint
Denny Lee
 
PDF
Ultimate Project Office with BrightWork and Nintex - Event on May 6
David J Rosenthal
 
PDF
SharePoint Custom Development
C/D/H Technology Consultants
 
DOC
Narender Soni Resume - Updated
Narender Soni
 
User activity monitoring with SysKit
SysKit Ltd
 
NEED AND IMPORTANCE OF ENVIRONMENTAL EDUCATION
Velentina Das
 
Securing sharepoint
Peter_1020
 
What's new in sharepoint 2016
Mike Maadarani
 
Deploying and Managing PowerPivot for SharePoint
Denny Lee
 
Ultimate Project Office with BrightWork and Nintex - Event on May 6
David J Rosenthal
 
SharePoint Custom Development
C/D/H Technology Consultants
 
Narender Soni Resume - Updated
Narender Soni
 

Similar to 10 points to make a rogue SharePoint environment really, really secure.. (20)

PPTX
Shop talk - Project Server 2013
Chris Givens
 
PPTX
The Who, What, Why and How of Active Directory Federation Services (AD FS)
Jay Simcox
 
PDF
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Netwoven Inc.
 
PDF
2-1 Remember the Help Desk with AFCU - Jared Flanders, Final
Jared Flanders
 
PPT
Basic computers for DIU laptop project students
Alauddin Azad
 
PPTX
Webinar: Office 365 for Beginners
Cliff Ashcroft
 
PPTX
My slides from SharePoint Saturday Oslo
Rick Van Rousselt
 
PDF
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Nordic APIs
 
PPTX
Green Code Lab Challenge 2015 Subject Details
Olivier Philippot
 
PDF
Envision it SharePoint Extranet Webinar Series - Extranet User Provisioning
Envision IT
 
DOC
Sai_Resume
Sai vara prasada Rao
 
PDF
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
NCCOMMS
 
DOC
Resume
Satendra Kasana
 
DOC
Vasudeo_5.8_Years_of_Exp
vasudeo rao vaka
 
PDF
Basic of computers
Harsh Porwal
 
PPTX
Drew madelung sp designer workflows - sp-biz
Drew Madelung
 
DOC
RahulParwekar_Resume
Rahul Parwekar
 
PDF
Powerful and Quick Workflow Automation Solutions with Nintex
Netwoven Inc.
 
PPTX
SPSNYC SharePoint Worst Practices
Scott Hoag
 
PDF
How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...
Nicolas Henry
 
Shop talk - Project Server 2013
Chris Givens
 
The Who, What, Why and How of Active Directory Federation Services (AD FS)
Jay Simcox
 
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Netwoven Inc.
 
2-1 Remember the Help Desk with AFCU - Jared Flanders, Final
Jared Flanders
 
Basic computers for DIU laptop project students
Alauddin Azad
 
Webinar: Office 365 for Beginners
Cliff Ashcroft
 
My slides from SharePoint Saturday Oslo
Rick Van Rousselt
 
Lessons Learned from Building Enterprise APIs (Gustaf Nyman)
Nordic APIs
 
Green Code Lab Challenge 2015 Subject Details
Olivier Philippot
 
Envision it SharePoint Extranet Webinar Series - Extranet User Provisioning
Envision IT
 
O365Con18 - Hybrid SharePoint Deep Dive - Thomas Vochten
NCCOMMS
 
Vasudeo_5.8_Years_of_Exp
vasudeo rao vaka
 
Basic of computers
Harsh Porwal
 
Drew madelung sp designer workflows - sp-biz
Drew Madelung
 
RahulParwekar_Resume
Rahul Parwekar
 
Powerful and Quick Workflow Automation Solutions with Nintex
Netwoven Inc.
 
SPSNYC SharePoint Worst Practices
Scott Hoag
 
How to Stabilise and Improve an SAP BusinessObjects BI 4.2 Enterprise Shared ...
Nicolas Henry
 
Ad

More from SharePoint Saturday New Jersey (17)

PPTX
Building Mobile Apps With Xamarin and Visual Studio App Center
SharePoint Saturday New Jersey
 
PPTX
Azure Active Directory
SharePoint Saturday New Jersey
 
PDF
The Definitive Guide for When to Use What In Office 365
SharePoint Saturday New Jersey
 
PPTX
Sps2015 intro to office 365 admin nikkia carter
SharePoint Saturday New Jersey
 
PDF
The anatomy of office 365 groups
SharePoint Saturday New Jersey
 
PPTX
Integrating SSRS with SharePoint
SharePoint Saturday New Jersey
 
PPTX
A Beginner's Guide to Client Side Development with Javascript
SharePoint Saturday New Jersey
 
PPTX
Where to save my data, for devs!
SharePoint Saturday New Jersey
 
PPTX
SharePoint Saturday NJ 2014 Slides
SharePoint Saturday New Jersey
 
PPTX
Improving the SharePoint Development Process with Continuous Integration
SharePoint Saturday New Jersey
 
PPTX
Insights and Monitoring of SharePoint Applications
SharePoint Saturday New Jersey
 
PDF
Optimizing SQL Server 2012 for SharePoint 2013
SharePoint Saturday New Jersey
 
PDF
Integrating Office Web Apps with SharePoint 2013
SharePoint Saturday New Jersey
 
PDF
Anatomy of a mail app
SharePoint Saturday New Jersey
 
PDF
Exchange Server 2013 and SharePoint Server 2013 Integration
SharePoint Saturday New Jersey
 
PPTX
Term Store Navigation
SharePoint Saturday New Jersey
 
PPTX
Business Intelligence
SharePoint Saturday New Jersey
 
Building Mobile Apps With Xamarin and Visual Studio App Center
SharePoint Saturday New Jersey
 
Azure Active Directory
SharePoint Saturday New Jersey
 
The Definitive Guide for When to Use What In Office 365
SharePoint Saturday New Jersey
 
Sps2015 intro to office 365 admin nikkia carter
SharePoint Saturday New Jersey
 
The anatomy of office 365 groups
SharePoint Saturday New Jersey
 
Integrating SSRS with SharePoint
SharePoint Saturday New Jersey
 
A Beginner's Guide to Client Side Development with Javascript
SharePoint Saturday New Jersey
 
Where to save my data, for devs!
SharePoint Saturday New Jersey
 
SharePoint Saturday NJ 2014 Slides
SharePoint Saturday New Jersey
 
Improving the SharePoint Development Process with Continuous Integration
SharePoint Saturday New Jersey
 
Insights and Monitoring of SharePoint Applications
SharePoint Saturday New Jersey
 
Optimizing SQL Server 2012 for SharePoint 2013
SharePoint Saturday New Jersey
 
Integrating Office Web Apps with SharePoint 2013
SharePoint Saturday New Jersey
 
Anatomy of a mail app
SharePoint Saturday New Jersey
 
Exchange Server 2013 and SharePoint Server 2013 Integration
SharePoint Saturday New Jersey
 
Term Store Navigation
SharePoint Saturday New Jersey
 
Business Intelligence
SharePoint Saturday New Jersey
 
Ad

Recently uploaded (20)

PDF
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
PDF
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
PPTX
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
PDF
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
PPTX
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
PPTX
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
PDF
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
PDF
Exploring AI Agents in Process Industries
amoreira6
 
PPTX
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
PDF
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
PDF
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
PDF
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
PDF
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
PPTX
Presentation about variables and constant.pptx
kr2589474
 
PDF
Generating Union types w/ Static Analysis
K. Matthew Dupree
 
PDF
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
PPTX
Role Of Python In Programing Language.pptx
jaykoshti048
 
PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
PDF
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
PPTX
Explanation about Structures in C language.pptx
Veeral Rathod
 
On Software Engineers' Productivity - Beyond Misleading Metrics
Romén Rodríguez-Gil
 
Applitools Platform Pulse: What's New and What's Coming - July 2025
Applitools
 
GALILEO CRS SYSTEM | GALILEO TRAVEL SOFTWARE
philipnathen82
 
49785682629390197565_LRN3014_Migrating_the_Beast.pdf
Abilash868456
 
TRAVEL APIs | WHITE LABEL TRAVEL API | TOP TRAVEL APIs
philipnathen82
 
ConcordeApp: Engineering Global Impact & Unlocking Billions in Event ROI with AI
chastechaste14
 
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
Exploring AI Agents in Process Industries
amoreira6
 
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
vAdobe Premiere Pro 2025 (v25.2.3.004) Crack Pre-Activated Latest
imang66g
 
Download iTop VPN Free 6.1.0.5882 Crack Full Activated Pre Latest 2025
imang66g
 
advancepresentationskillshdhdhhdhdhdhhfhf
jasmenrojas249
 
Adobe Illustrator Crack Full Download (Latest Version 2025) Pre-Activated
imang66g
 
Presentation about variables and constant.pptx
kr2589474
 
Generating Union types w/ Static Analysis
K. Matthew Dupree
 
Using licensed Data Loss Prevention (DLP) as a strategic proactive data secur...
Q-Advise
 
Role Of Python In Programing Language.pptx
jaykoshti048
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
Explanation about Structures in C language.pptx
Veeral Rathod
 

10 points to make a rogue SharePoint environment really, really secure..

  • 1. 10 points to make a rogue SharePoint environment really, really secure.. Presented By Peter Ward – September 20th 2014 w- www.sohodragon.com c- 862 220 6080 b-www.wardpeter.com
  • 2. New Jersey SharePoint user group • Different SharePoint discussions each month on various topics. Announced on meetup.com • Meets 4th Tuesday of every month • 6pm – 8pm • Microsoft Office (MetroPark) • 101 Wood Ave, Iselin, NJ 08830 • http://www.njspug.com
  • 3. Thank You Event Sponsors • Diamond & Platinum sponsors have tables here in the Fireside Lounge • Please visit them and inquire about their products & services • Also to be eligible for prizes make sure to get your bingo card stamped
  • 4. Agenda • Context of the presentation • Where to start? • Understanding security permissions and how to apply it • Create a methodology • How to avoid data leaks • Show user activity on all levels • Creating a game plan
  • 5. Green dot This indicates an important point
  • 6. Before We Begin • Q&A – We will have time at the end of the presentation for questions…. But I encourage you to interrupt me and ask • A copy of this presentation is on my blog
  • 7. Reminder slide • A copy of this presentation is on my blog www.wardpeter.com This means you only need to watch. There is no need to take notes
  • 9. Context of the presentation This SharePoint needs to work Summary  2 days to take ownership  Only Prod environment  No Dev.  Rogue former vendor team
  • 10. Takeaways • Understanding ownership steps • Confidently applying security • The little things really matter • Process and communication is key • Learn how to refactor an environment • Good example of reality SharePoint security planning Learn learnt: Technology problems aren’t always technology problems
  • 11. Audience Networking FolksSharePoint Folks Networking steps SharePoint steps Networking steps SharePoint steps
  • 12. The inherited environment • Hosted environment • SharePoint 2010 Enterprise • 3 months of undocumented code and environment. • No Visio diagrams • Hard coded ID and passwords everywhere… and I mean everywhere • A few URL’s a Service Account ID and password • SQL Server Reporting Services • Oh I forgot: • Can’t use 3rd party tools to run audits of security • Internal IT department has no real understanding how SharePoint works or what was deployed or developed
  • 13. Where to start • Understand SharePoint security • Business processes • Create a methodology
  • 14. Understanding security accounts and how to apply it Domain • Active Directory Groups…. Not distribution • Domain services- Exchange, IIS Server • Boxes SharePoint • Site Collections • Sites • SharePoint groups Demarcation of responsibility Service accounts
  • 15. Business Processes Talk to end users face to face Understand their language:  What they think SharePoint actually is  A list is a report  Alert is an email What, why, when, who
  • 16. Now we can start
  • 17. Create a methodology Wave 1 Wave 2 Wave 3 Wave 4 Wave 5 Wave 6 Wave 7 Wave 8 Wave 9 Wave 10
  • 18. Wave 1 – Kick off  Back up the server .. Make sure this is SQL. Ask how long back ups are kept  Ask for a back up.. To test the internal IT  Restoring env.  Notify the user base what is going on and in the communication have a team member’s email and direct phone number  Identify all the services are running  Reboot the servers  Enforce a change log- SharePoint list. Set up alerts to your team Key wins:  Immediately know if services stop… and are not related to the password changes  Any problems you can blame the previous vendor on the morning you start
  • 19. Wave 2 – Start documentation • Technical inventory of the following: • SharePoint, edition, SQL version • InfoPath- purpose, template location • Server box names • Obtain/ create system accounts and password and purpose • Server boxes • Architectural diagram • Env.. • SharePoint collections • Central Admin • Installed web parts
  • 20. Wave 2 – continued- Ask questions • What’s the source code control? This should be reviewed • Is there a DR plan for SQL db’s • Is there a DR plan for SharePoint • Report names and their purpose • Understand the integration points
  • 21. Now you need to break ground
  • 22. Wave 3 – Removing access • VPN access- remove • Service accounts • Vendor ids • Remote access to boxes • SharePoint env. • Site collection administrators
  • 23. Wave 4 – Users • Reset all users passwords in PowerShell • Ed Wilson and Craig Liebendorfer, Scripting Guys • Don’t delete the old vendor ID yet. Because they are in code and workflow
  • 24. Wave 4 – disable unused accounts • Wait a week for things to settle down • Note disable.. Not delete
  • 25. Wave- 4 SharePoint permissions • Do’s • Use Groups – Either AD or SharePoint •Don’ts • Not everyone needs to be Site Collection Admin • Or Full Control
  • 26. Wave 5 – Service Accounts • Create a ID inventory file (Excel) with both old and new password • Stop and restart services • Restart server for good measure
  • 27. Wave 6 – Firewall account • Because there could be IP addresses of the boxes made public. • and there was… therefore you could get to the box, with no VPN • Use Netstat command to listen to traffic on the ports Link
  • 28. Tea break • Questions if you want.
  • 29. Wave 6 – Network Traffic
  • 30. Wave 6 – Network Traffic • Port 443 secure https • Port 80 Unsure
  • 31. Think again Think old vendor is locked out…….
  • 32. Wave 7 – Email • Change emails in AD • Redirection capture - DNS
  • 33. Wave 7 – Email • Email forwarding
  • 34. Wave 7 – Workflow • Impersonation Steps Create a workflow AD account . Needs to be a site collection administrator
  • 35. Wave 7 – Workflow • Hard coded email addresses
  • 36. Wave 8- SP Security trimming  Central Admin  Internal IP address  Only accessible via RDP login
  • 37. Wave 9- Quick Sweep  Check the Service accounts  Logging
  • 38. Wave 10- Continued  Add in tracking into the masterpage: <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsOb ject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1 *new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.sr c=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google- analytics.com/analytics.js','ga'); ga('create', 'UA-4669498-5', 'onecallcm.com'); ga('send', 'pageview'); </script>
  • 41. Wave 10+- Final bit of advice to client • Buy password security software • Stores IDs and passwords • Audit log of who’s accessing IDs IT loved this
  • 42. Final bit of advice. Be aware • Click here
  • 43. This is the end. This is the part of the presentation when people should clap and cheer
  • 44. Questions? • [email protected] • w-www.sohodragon.com • b-www.wardpeter.com • c- 862 220 6080