SlideShare a Scribd company logo
10 points to make a rogue
SharePoint environment
really, really secure..
Presented By Peter Ward – April 3rd 2014
w- www.sohodragon.com
c- 862 220 6080
b-www.wardpeter.com
Agenda
• Context of the presentation
• Where to start?
• Understanding security permissions and how to apply it
• Create a methodology
• How to avoid data leaks
• Show user activity on all levels
• Creating a game plan
Green dot
This indicates an important point
Before We Begin
• Q&A – We will have time at the end of the presentation for questions….
But I encourage you to interrupt me and ask
• A copy of this presentation is on my blog
Reminder slide
• A copy of this presentation is on my blog
www.wardpeter.com
This means you only need to watch.
There is no need to take notes
Securing sharepoint
Context of the presentation
This SharePoint
needs to work
Summary
 2 days to take ownership
 Only Prod environment
 No Dev.
 Rogue former vendor team
Takeaways
• Understanding ownership steps
• Confidently applying security
• The little things really matter
• Process and communication is key
• Learn how to refactor an environment
• Good example of reality
SharePoint security planning
Learn learnt: Technology problems aren’t always technology problems
Audience
Networking FolksSharePoint Folks
Networking steps
SharePoint steps
Networking steps
SharePoint steps
The inherited environment
• Hosted environment
• SharePoint 2010 Enterprise
• 3 months of undocumented code and environment.
• No Visio diagrams
• Hard coded ID and passwords everywhere… and I mean everywhere
• A few URL’s a Service Account ID and password
• SQL Server Reporting Services
• Oh I forgot:
• Can’t use 3rd party tools to run audits of security
• Internal IT department has no real understanding how SharePoint works or what was
deployed or developed
Where to start
• Understand SharePoint security
• Business processes
• Create a methodology
Understanding security accounts
and how to apply it
Domain
• Active Directory Groups…. Not distribution
• Domain services- Exchange, IIS
Server
• Boxes
SharePoint
• Site Collections
• Sites
• SharePoint groups
Demarcation of
responsibility
Service accounts
Business Processes
Talk to end users face to face
Understand their language:
 What they think SharePoint actually is
 A list is a report
 Alert is an email
What, why, when, who
Now we can start
Create a methodology
Wave 1 Wave 2 Wave 3 Wave 4 Wave 5 Wave 6 Wave 7 Wave 8 Wave 9
Wave
10
Wave 1 – Kick off
 Back up the server .. Make sure this is SQL. Ask how long back ups are kept
 Ask for a back up.. To test the internal IT
 Restoring env.
 Notify the user base what is going on and in the communication have a team
member’s email and direct phone number
 Identify all the services are running
 Reboot the servers
 Enforce a change log- SharePoint list. Set up alerts to your team
Key wins:
 Immediately know if services stop… and are not related to the password changes
 Any problems you can blame the previous vendor on the morning you start
Wave 2 – Start documentation
• Technical inventory of the following:
• SharePoint, edition, SQL version
• InfoPath- purpose, template location
• Server box names
• Obtain/ create system accounts and password and purpose
• Server boxes
• Architectural diagram
• Env..
• SharePoint collections
• Central Admin
• Installed web parts
Wave 2 – continued-
Ask questions
• What’s the source code control? This should be reviewed
• Is there a DR plan for SQL db’s
• Is there a DR plan for SharePoint
• Report names and their purpose
• Understand the integration points
Now you need to break ground
Wave 3 – Removing access
• VPN access- remove
• Service accounts
• Vendor ids
• Remote access to boxes
• SharePoint env.
• Site collection administrators
Wave 4 – Users
• Reset all users passwords in PowerShell
• Ed Wilson and Craig Liebendorfer, Scripting Guys
• Don’t delete the old vendor ID yet. Because they are in code and
workflow
Wave 4 – disable unused accounts
• Wait a week for things to settle down
• Note disable.. Not delete
Wave- 4 SharePoint permissions
• Do’s
• Use Groups – Either AD or SharePoint
•Don’ts
• Not everyone needs to be Site Collection Admin
• Or Full Control
Wave 5 – Service Accounts
• Create a ID inventory file (Excel) with both old and new password
• Stop and restart services
• Restart server for good measure
Wave 6 – Firewall account
• Because there could be IP addresses of the boxes made public.
• and there was… therefore you could get to the box, with no VPN
• Use Netstat command to listen to traffic on the ports Link
Tea break
• Questions if you want.
Wave 6 – Network Traffic
Wave 6 – Network Traffic
• Port 443 secure https
• Port 80 Unsure
Think again
Think old vendor is locked out…….
Wave 7 – Email
• Change emails in AD
• Redirection capture - DNS
Wave 7 – Email
• Email forwarding
Wave 7 – Workflow
• Impersonation Steps
Create a workflow AD account . Needs to be a site collection administrator
Wave 7 – Workflow
• Hard coded email addresses
Wave 8- SP Security trimming
 Central Admin
 Internal IP address
 Only accessible via RDP login
Wave 9- Quick Sweep
 Check the Service accounts
 Logging
Wave 10- Continued
 Add in tracking into the masterpage:
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsOb
ject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1
*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.sr
c=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-
analytics.com/analytics.js','ga');
ga('create', 'UA-4669498-5',
'onecallcm.com');
ga('send', 'pageview');
</script>
Securing sharepoint
Securing sharepoint
Wave 10+- Final bit of advice
to client
• Buy password security software
• Stores IDs and passwords
• Audit log of who’s accessing IDs
IT loved this
This is the end.
This is the part of the presentation when people should clap and cheer
Questions?
• e-pw@sohodragon.com
• w-www.sohodragon.com
• b-www.wardpeter.com
• c- 862 220 6080

More Related Content

PDF
The 10 point guide to implementing just enough office 365 gov
PPTX
Share point no coding bi
PPTX
Nj sharepoint user group
PPTX
SharePoint Survey 2011 Results: How are Businesses Using SharePoint?
PDF
SPUnite17 O365 Practical Adoption Strategies
PDF
Webinar: Ignite Your Intranet with OneWindow Workplace
PPTX
7 Signs Your Intranet is Failing (...And How to Fix It!)
PDF
Hexa Corp Share Point Capabilities Presentation
The 10 point guide to implementing just enough office 365 gov
Share point no coding bi
Nj sharepoint user group
SharePoint Survey 2011 Results: How are Businesses Using SharePoint?
SPUnite17 O365 Practical Adoption Strategies
Webinar: Ignite Your Intranet with OneWindow Workplace
7 Signs Your Intranet is Failing (...And How to Fix It!)
Hexa Corp Share Point Capabilities Presentation

What's hot (20)

PDF
Social Journey Webinar with ViewDo Labs and Portal Solutions
PDF
Webinar: Best Strategies to Get the Most Out of Office 365
PDF
SPUnite17 Successful SharePoint Projects and User eXperience
PPTX
Webinar: The Rise of NextGen Intranets: Introducing OneWindow Workplace
PPTX
Best Practices - SharePoint Success Factors
PDF
"The 3 P's of SharePoint 2013; Planning, Productivity, and Policies" #SPSSV
PPT
SharePoint Governance: From Chaos to Success in 10 Steps
PPTX
Webinar: Mobile - The Power of SharePoint in the Palm of Your Hand
PDF
#SPSSAC Identifying Low Hanging Fruit for SharePoint 2013 No-Code Solutions
PPT
Share Point Services
PDF
Datapolis Guest Expert Presentation: Three must have SharePoint workflows by ...
PPTX
Balancing user experience with an out-of-the-box design in SharePoint 2013
PPT
Spug presentation nov 2013
PDF
Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...
PDF
SPCA2013 - Learn how to build business application using K2 on the SharePoint...
PDF
Managing Enterprise Projects with Project Server 2010
PDF
"5 Inspiring Reasons to Manage Projects on SharePoint 2013" SPSRED13
PPTX
The SharePoint Journey
PDF
5 inspiring reasons to manage projects on share point spsdc
PDF
SPUnite17 Modern NewsPublishing with SharePoint
Social Journey Webinar with ViewDo Labs and Portal Solutions
Webinar: Best Strategies to Get the Most Out of Office 365
SPUnite17 Successful SharePoint Projects and User eXperience
Webinar: The Rise of NextGen Intranets: Introducing OneWindow Workplace
Best Practices - SharePoint Success Factors
"The 3 P's of SharePoint 2013; Planning, Productivity, and Policies" #SPSSV
SharePoint Governance: From Chaos to Success in 10 Steps
Webinar: Mobile - The Power of SharePoint in the Palm of Your Hand
#SPSSAC Identifying Low Hanging Fruit for SharePoint 2013 No-Code Solutions
Share Point Services
Datapolis Guest Expert Presentation: Three must have SharePoint workflows by ...
Balancing user experience with an out-of-the-box design in SharePoint 2013
Spug presentation nov 2013
Why Are We Still Talking About SharePoint Governance? presented by Anders Skj...
SPCA2013 - Learn how to build business application using K2 on the SharePoint...
Managing Enterprise Projects with Project Server 2010
"5 Inspiring Reasons to Manage Projects on SharePoint 2013" SPSRED13
The SharePoint Journey
5 inspiring reasons to manage projects on share point spsdc
SPUnite17 Modern NewsPublishing with SharePoint
Ad

Similar to Securing sharepoint (20)

PDF
10 points to make a rogue SharePoint environment really, really secure..
PPT
D Cornell Securing Share Point
PDF
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
PPTX
Best practices for security and governance in share point 2013 published
PPTX
SPSNYC SharePoint Worst Practices
PDF
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
PDF
Dell share point biwug
PDF
10 Security issues facing NZ Enterprises
PPTX
All presentation SharePoint O365 and everything else
PPTX
Governance policies records
PDF
SPSDenver-Enforcing.SP.Governance
DOC
Wss Security
PDF
SharePoint 101
PDF
4 Security Guidelines for SharePoint Governance
PPTX
Securing the SharePoint Platform
PPTX
How to Effectively Govern your SharePoint Content, Deployments, and Developer...
PPTX
Demystifying SharePoint Governance and User Adoption
PPTX
HIPAA 101 Compliance Threat Landscape & Best Practices
PPTX
Nightmares of a Penetration Tester ( How to protect your network)
PPTX
SPSRI - Sharing the Point in an A/D World
10 points to make a rogue SharePoint environment really, really secure..
D Cornell Securing Share Point
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
Best practices for security and governance in share point 2013 published
SPSNYC SharePoint Worst Practices
Preventing Security Leaks in SharePoint with Joel Oleson & Christian Buckley
Dell share point biwug
10 Security issues facing NZ Enterprises
All presentation SharePoint O365 and everything else
Governance policies records
SPSDenver-Enforcing.SP.Governance
Wss Security
SharePoint 101
4 Security Guidelines for SharePoint Governance
Securing the SharePoint Platform
How to Effectively Govern your SharePoint Content, Deployments, and Developer...
Demystifying SharePoint Governance and User Adoption
HIPAA 101 Compliance Threat Landscape & Best Practices
Nightmares of a Penetration Tester ( How to protect your network)
SPSRI - Sharing the Point in an A/D World
Ad

More from Peter_1020 (8)

PPTX
What is the metaverse, and how it will impact you
PPTX
Integrating Powerful and Effective Communication with Teams and Whiteboard
PPTX
Power user guide windows 10 integration points to o365
PPTX
M365 virtual marathon speaker peter ward - chat bot in teams
PPTX
SharePoint Saturday Ahmedabad Keynote
PPTX
Spsat nyc19 190621150118
PPTX
Sp sat philly2019
PPTX
SharePoint sat newengland18 - Teams
What is the metaverse, and how it will impact you
Integrating Powerful and Effective Communication with Teams and Whiteboard
Power user guide windows 10 integration points to o365
M365 virtual marathon speaker peter ward - chat bot in teams
SharePoint Saturday Ahmedabad Keynote
Spsat nyc19 190621150118
Sp sat philly2019
SharePoint sat newengland18 - Teams

Securing sharepoint

  • 1. 10 points to make a rogue SharePoint environment really, really secure.. Presented By Peter Ward – April 3rd 2014 w- www.sohodragon.com c- 862 220 6080 b-www.wardpeter.com
  • 2. Agenda • Context of the presentation • Where to start? • Understanding security permissions and how to apply it • Create a methodology • How to avoid data leaks • Show user activity on all levels • Creating a game plan
  • 3. Green dot This indicates an important point
  • 4. Before We Begin • Q&A – We will have time at the end of the presentation for questions…. But I encourage you to interrupt me and ask • A copy of this presentation is on my blog
  • 5. Reminder slide • A copy of this presentation is on my blog www.wardpeter.com This means you only need to watch. There is no need to take notes
  • 7. Context of the presentation This SharePoint needs to work Summary  2 days to take ownership  Only Prod environment  No Dev.  Rogue former vendor team
  • 8. Takeaways • Understanding ownership steps • Confidently applying security • The little things really matter • Process and communication is key • Learn how to refactor an environment • Good example of reality SharePoint security planning Learn learnt: Technology problems aren’t always technology problems
  • 9. Audience Networking FolksSharePoint Folks Networking steps SharePoint steps Networking steps SharePoint steps
  • 10. The inherited environment • Hosted environment • SharePoint 2010 Enterprise • 3 months of undocumented code and environment. • No Visio diagrams • Hard coded ID and passwords everywhere… and I mean everywhere • A few URL’s a Service Account ID and password • SQL Server Reporting Services • Oh I forgot: • Can’t use 3rd party tools to run audits of security • Internal IT department has no real understanding how SharePoint works or what was deployed or developed
  • 11. Where to start • Understand SharePoint security • Business processes • Create a methodology
  • 12. Understanding security accounts and how to apply it Domain • Active Directory Groups…. Not distribution • Domain services- Exchange, IIS Server • Boxes SharePoint • Site Collections • Sites • SharePoint groups Demarcation of responsibility Service accounts
  • 13. Business Processes Talk to end users face to face Understand their language:  What they think SharePoint actually is  A list is a report  Alert is an email What, why, when, who
  • 14. Now we can start
  • 15. Create a methodology Wave 1 Wave 2 Wave 3 Wave 4 Wave 5 Wave 6 Wave 7 Wave 8 Wave 9 Wave 10
  • 16. Wave 1 – Kick off  Back up the server .. Make sure this is SQL. Ask how long back ups are kept  Ask for a back up.. To test the internal IT  Restoring env.  Notify the user base what is going on and in the communication have a team member’s email and direct phone number  Identify all the services are running  Reboot the servers  Enforce a change log- SharePoint list. Set up alerts to your team Key wins:  Immediately know if services stop… and are not related to the password changes  Any problems you can blame the previous vendor on the morning you start
  • 17. Wave 2 – Start documentation • Technical inventory of the following: • SharePoint, edition, SQL version • InfoPath- purpose, template location • Server box names • Obtain/ create system accounts and password and purpose • Server boxes • Architectural diagram • Env.. • SharePoint collections • Central Admin • Installed web parts
  • 18. Wave 2 – continued- Ask questions • What’s the source code control? This should be reviewed • Is there a DR plan for SQL db’s • Is there a DR plan for SharePoint • Report names and their purpose • Understand the integration points
  • 19. Now you need to break ground
  • 20. Wave 3 – Removing access • VPN access- remove • Service accounts • Vendor ids • Remote access to boxes • SharePoint env. • Site collection administrators
  • 21. Wave 4 – Users • Reset all users passwords in PowerShell • Ed Wilson and Craig Liebendorfer, Scripting Guys • Don’t delete the old vendor ID yet. Because they are in code and workflow
  • 22. Wave 4 – disable unused accounts • Wait a week for things to settle down • Note disable.. Not delete
  • 23. Wave- 4 SharePoint permissions • Do’s • Use Groups – Either AD or SharePoint •Don’ts • Not everyone needs to be Site Collection Admin • Or Full Control
  • 24. Wave 5 – Service Accounts • Create a ID inventory file (Excel) with both old and new password • Stop and restart services • Restart server for good measure
  • 25. Wave 6 – Firewall account • Because there could be IP addresses of the boxes made public. • and there was… therefore you could get to the box, with no VPN • Use Netstat command to listen to traffic on the ports Link
  • 26. Tea break • Questions if you want.
  • 27. Wave 6 – Network Traffic
  • 28. Wave 6 – Network Traffic • Port 443 secure https • Port 80 Unsure
  • 29. Think again Think old vendor is locked out…….
  • 30. Wave 7 – Email • Change emails in AD • Redirection capture - DNS
  • 31. Wave 7 – Email • Email forwarding
  • 32. Wave 7 – Workflow • Impersonation Steps Create a workflow AD account . Needs to be a site collection administrator
  • 33. Wave 7 – Workflow • Hard coded email addresses
  • 34. Wave 8- SP Security trimming  Central Admin  Internal IP address  Only accessible via RDP login
  • 35. Wave 9- Quick Sweep  Check the Service accounts  Logging
  • 36. Wave 10- Continued  Add in tracking into the masterpage: <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsOb ject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1 *new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.sr c=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google- analytics.com/analytics.js','ga'); ga('create', 'UA-4669498-5', 'onecallcm.com'); ga('send', 'pageview'); </script>
  • 39. Wave 10+- Final bit of advice to client • Buy password security software • Stores IDs and passwords • Audit log of who’s accessing IDs IT loved this
  • 40. This is the end. This is the part of the presentation when people should clap and cheer
  • 41. Questions? • e-pw@sohodragon.com • w-www.sohodragon.com • b-www.wardpeter.com • c- 862 220 6080