-
Notifications
You must be signed in to change notification settings - Fork 17
Docs/accessanalyzer sharepoint permissions dedupe 11 6 12 0 20260219 #406
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: dev
Are you sure you want to change the base?
Changes from all commits
8ed4d4f
d03a7df
9b6eed6
89fc8ba
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -1,86 +1,106 @@ | ||||||
| --- | ||||||
| title: "SharePoint Access & Sensitive Data Auditing Configuration" | ||||||
| description: "SharePoint Access & Sensitive Data Auditing Configuration" | ||||||
| title: "SharePoint required permissions for Access Analyzer" | ||||||
| description: "SharePoint required permissions for Access Analyzer" | ||||||
| sidebar_position: 10 | ||||||
| --- | ||||||
|
|
||||||
| # SharePoint Access & Sensitive Data Auditing Configuration | ||||||
|
|
||||||
| Permissions are required on the SharePoint Farm, Web Application, and the SharePoint Database in | ||||||
| order for Enterprise Auditor to execute Access Auditing (SPAA) and/or Sensitive Data Discovery | ||||||
| Auditing scans. | ||||||
|
|
||||||
| ## Configure SharePoint Farm Permissions | ||||||
|
|
||||||
| Follow the steps to configure the SharePoint Farm level permissions on SharePoint 2013 through | ||||||
| SharePoint 2019 farms. | ||||||
|
|
||||||
| **Step 1 –** In the SharePoint Central Administration Center, navigate to the Security section. | ||||||
|
|
||||||
| **Step 2 –** Select the Manage the farm administrators group option under Users. | ||||||
|
|
||||||
| **Step 3 –** If the Farm Read group exists, add the service account to that group. If the Farm Read | ||||||
| group has been deleted, it is necessary to create a new group with Read privileges at the Farm | ||||||
| level: | ||||||
|
|
||||||
| - Select More under the Groups section. | ||||||
| - Select New Group from the New drop-down menu. | ||||||
| - Ensure the group has the Read – Can view pages and list items and download documents permission. | ||||||
| - Add the service account to this new group. | ||||||
|
|
||||||
| The service account has Read level access at the Farm level. | ||||||
|
|
||||||
| ## Configure SharePoint Web Application Permissions | ||||||
|
|
||||||
| Follow the steps to configure the SharePoint web application level permissions on SharePoint 2013 | ||||||
| through SharePoint 2019 farms. | ||||||
|
|
||||||
| **Step 1 –** In the SharePoint Central Administration Center, navigate to the Application Management | ||||||
| section. | ||||||
|
|
||||||
| **Step 2 –** Select Manage web applications option under Web Applications. | ||||||
|
|
||||||
| **Step 3 –** Create a new policy for the desired web application. Follow these steps: | ||||||
|
|
||||||
| - Click Permission Policy. The Manage Permission Policy Levels window opens. | ||||||
| - Click Add Permission Policy Level. Select the following: | ||||||
|
|
||||||
| - Check the Site Collection Auditor permission. | ||||||
| - Check the Open Items box in the Site Permissions Grant column. | ||||||
| - Click Save. | ||||||
|
|
||||||
| **Step 4 –** Repeat Step 3 for each web application in scope. It is recommended to give these | ||||||
| policies the same name. | ||||||
|
|
||||||
| **Step 5 –** Add the service account to the newly created roles. Follow these steps: | ||||||
|
|
||||||
| - Select a web application with the newly created role. | ||||||
| - Click User Policy. The Policy for Web Application window opens. | ||||||
| - Click Add Users. Leave all zones select and click Next. | ||||||
| - Add the service account in the Users textbox. | ||||||
| - Check the newly created role with site collection auditor in the Permissions section. Click | ||||||
| Finish. | ||||||
|
|
||||||
| **Step 6 –** Repeat Step 5 for each web application in scope. | ||||||
|
|
||||||
| The service account is provisioned as a Site Collection Auditor on all web applications to be | ||||||
| # SharePoint required permissions for Access Analyzer | ||||||
|
|
||||||
| ## Overview | ||||||
|
|
||||||
| Enterprise Auditor requires specific permissions on the SharePoint farm, web applications, and | ||||||
| databases to execute Access Auditing (SPAA) and Sensitive Data Discovery Auditing scans. | ||||||
| Agent-less scans require additional permissions on the SharePoint Application Server. | ||||||
|
|
||||||
| ## Application server permissions (agent-less only) | ||||||
|
|
||||||
| Agent-less scans perform all data collection from the Enterprise Auditor Console server across the | ||||||
| network. The service account requires the following permissions on the SharePoint Application | ||||||
| Server: | ||||||
|
|
||||||
| - Membership in the local `Backup Operators` group — required so Enterprise Auditor can read the | ||||||
| remote registry to identify the server's role in the farm and locate the SharePoint | ||||||
| configuration database. | ||||||
| - Membership in the local `WSS_WPG` group — required for read access to system resources used | ||||||
| by Microsoft SharePoint Foundation. | ||||||
|
|
||||||
| ## SharePoint farm permissions | ||||||
|
|
||||||
| The service account must be a member of the `Farm Read` group at the farm level. This allows | ||||||
| Enterprise Auditor to call the SharePoint web services to gather permissions, site hierarchy, and | ||||||
| content information remotely. | ||||||
|
|
||||||
| Follow these steps to configure farm-level permissions on SharePoint 2013 through SharePoint 2019: | ||||||
|
|
||||||
| 1. In the SharePoint **Central Administration Center**, navigate to the **Security** section. | ||||||
| 2. Select **Manage the farm administrators group** under **Users**. | ||||||
| 3. If the `Farm Read` group exists, add the service account to that group. If the group has been | ||||||
| deleted, create a new group: | ||||||
| - Select **More** under the **Groups** section. | ||||||
| - Select **New Group** from the **New** drop-down menu. | ||||||
| - Ensure the group has the `Read – Can view pages and list items and download documents` | ||||||
| permission. | ||||||
| - Add the service account to the new group. | ||||||
|
|
||||||
| The service account now has Read-level access at the farm level. | ||||||
|
|
||||||
| ## SharePoint web application permissions | ||||||
|
|
||||||
| The service account requires a custom policy role with `Site Collection Auditor` and `Open Items` | ||||||
| permissions at the web application level. This allows Enterprise Auditor to execute web service | ||||||
| calls against **Central Administration**. | ||||||
|
|
||||||
| Follow these steps to configure web application-level permissions on SharePoint 2013 through | ||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
|
||||||
| SharePoint 2019: | ||||||
|
|
||||||
| 1. In the **Central Administration Center**, navigate to the **Application Management** section. | ||||||
| 2. Select **Manage web applications** under **Web Applications**. | ||||||
| 3. Create a new permission policy for the web application: | ||||||
| - Click **Permission Policy**. The **Manage Permission Policy Levels** window opens. | ||||||
| - Click **Add Permission Policy Level** and configure the following: | ||||||
| - Select the `Site Collection Auditor` permission. | ||||||
| - Select the `Open Items` box in the **Site Permissions Grant** column. | ||||||
| - Click **Save**. | ||||||
| 4. Repeat step 3 for each web application in scope. Use the same policy name across all web | ||||||
| applications. | ||||||
| 5. Add the service account to the newly created role for each web application: | ||||||
| - Select a web application with the newly created role. | ||||||
| - Click **User Policy**. The **Policy for Web Application** window opens. | ||||||
| - Click **Add Users**, leave all zones selected, and click **Next**. | ||||||
| - Enter the service account in the **Users** field. | ||||||
| - Select the newly created role with `Site Collection Auditor` in the **Permissions** section, | ||||||
| then click **Finish**. | ||||||
| 6. Repeat step 5 for each web application in scope. | ||||||
|
|
||||||
| The service account is provisioned as `Site Collection Auditor` on all web applications to be | ||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||
| audited. | ||||||
|
|
||||||
| ## Configure SharePoint Database Server Permissions | ||||||
| ## SharePoint database server permissions | ||||||
|
|
||||||
| The service account requires the `SPDataAccess` database role membership on the SharePoint | ||||||
| configuration database and all content databases. This allows Enterprise Auditor to execute read | ||||||
| operations directly against the SharePoint databases and gather information about web application | ||||||
| and content database locations. | ||||||
|
|
||||||
| Follow the steps to configure the SharePoint database server permissions on SharePoint 2013 through | ||||||
| SharePoint 2019 farms. | ||||||
| Follow these steps to configure database server permissions: | ||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
|
||||||
|
|
||||||
| **Step 1 –** Navigate to the SharePoint database server user configuration via SQL Management | ||||||
| Studio. | ||||||
| 1. Open the SharePoint database server user configuration in SQL Server Management Studio. | ||||||
| 2. Grant the service account the `SPDataAccess` database role membership on the following | ||||||
| databases: | ||||||
| - The SharePoint Configuration database (`SharePoint_Config`) | ||||||
| - All SharePoint Content databases that house web application data (by default, content | ||||||
| databases begin with `WSS_Content`, but they can be customized) | ||||||
|
|
||||||
| **Step 2 –** Provision the service account to have: | ||||||
| The service account is provisioned with the required SharePoint database permissions. | ||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||
|
|
||||||
| - SPDataAccess Database role membership | ||||||
| - This database role membership needs to be configured on: | ||||||
| ## MySites and OneDrive permissions | ||||||
|
|
||||||
| - SharePoint Configuration database (ShaerPoint_Config) | ||||||
| - All SharePoint Content databases housing web application data (by default the content | ||||||
| databases begin with WSS*Content*, but they can be customized) | ||||||
| MySites and OneDrive permissions depend on the SharePoint Access Data Collector configuration: | ||||||
|
|
||||||
| The service account is provisioned with SharePoint database permissions. | ||||||
| - **Force temporary admin access**: Granting the service account temporary admin access to | ||||||
| personal sites — either directly or as a member of the `Company Administrators` group — | ||||||
| requires the SharePoint Farm Administrator role or `Site Collection Auditor` at the web | ||||||
| application that hosts MySites. | ||||||
| - **Skip inaccessible personal sites**: This option scans only sites where the service account | ||||||
| already has administrative access. You must provision the service account before the scan to | ||||||
| scan OneDrives and personal sites. | ||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[Netwrix.FollowTheStepsTo] Avoid 'Follow these steps to'. Use a direct heading and numbered list instead.