0% found this document useful (0 votes)
160 views6 pages

SysKit Point Brochure

SysKit Point is a comprehensive Office 365 governance solution that provides: - Automated IT tasks and security/control over Office 365 services like SharePoint Online, Office 365 Groups, OneDrive, and Microsoft Teams. - Tools for CSOs, compliance managers, auditors, business users, and Office 365 admins to optimize procedures, stay compliant with policies, evaluate processes, and automate reporting. - Inventory, reporting, role-based governance, and automated tasks to help stakeholders manage user access and activity across Office 365 in a centralized manner.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
160 views6 pages

SysKit Point Brochure

SysKit Point is a comprehensive Office 365 governance solution that provides: - Automated IT tasks and security/control over Office 365 services like SharePoint Online, Office 365 Groups, OneDrive, and Microsoft Teams. - Tools for CSOs, compliance managers, auditors, business users, and Office 365 admins to optimize procedures, stay compliant with policies, evaluate processes, and automate reporting. - Inventory, reporting, role-based governance, and automated tasks to help stakeholders manage user access and activity across Office 365 in a centralized manner.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

WWW.SYSKIT.

COM

The Central Point for


Office 365 Governance
SysKit Point is a comprehensive Office 365 governance solution. It is created
to empower all stakeholders to automate IT tasks and ensure security and
control over all Office 365 services - SharePoint Online, Office 365 Groups,
OneDrive, and Microsoft Teams.
Who is it for? What’s in it for you?

CSOs Optimize Internal Procedures


Helps them implement security policies
Helps with onboarding, offboarding and
related to the protection of people,
employee evaluations driven by HR.
intellectual, and tangible assets.

Compliance Managers Security and Compliance


Helps them follow the necessary rules to Stay compliant with government or
comply with government and established internal company policies (GDPR, ISO,
company policies. HIPAA).

Auditors Ensure Transparency


Helps them evaluate and improve the Review user access to sensitive
effectiveness of risk management, control, content and manage external sharing
and governance processes. in Office 365.

Business Users Collaborative Role-Based


Governance
Helps them govern and manage user
access and track the activity of users under Include different stakeholders to take

their accountability. responsibility for the management and


reporting of the resources they own.

Office 365 Admins Automated Tasks and


Reporting
Helps them with their tenant inventory and
to precisely govern Office 365 security and Save time with bulk actions or create
compliance. easy-to-read reports, export them to
Excel and PDF.
How can SysKit Point help you?

Office 365 Environment Inventory


Automatic Sync of Office 365 Automatic Detection of Office 365
Environment Inventory Environment Changes
Find the exact number of users, sites, Office 365 Groups, Get all the incremental environment changes synced every
Microsoft Teams, and OneDrive accounts at a glance. time you log into the app. For a fresh set of data, click the
sync button to receive all the new changes that happened
during your time in the app.

Office 365 & SharePoint Online Reporting


Permissions Reporting and Finding User User Management and Permission
Access Rights Assigning
See who has access to which document, site or team. Manage Office 365 user access from the user explorer and
Use built-in filtering to understand the security for any file save time from browsing through the different Office 365
within the Office 365 environment. Find users who have workloads. Cut your onboarding or offboarding process
access to a specific file or folder (where some sensitive by copying or transferring all permissions from one user to
data is usually stored) and check who they are and how another. Manage user access to different sites and groups
they obtained their access. directly from the user reports.

User Permissions and Group Membership Unique Permissions and Broken Inheritance
Check all the items where a user has permissions and Check which content has unique permissions due to
which Microsoft Teams and Office 365 Groups, they are a uncontrolled sharing. Easily compare permission differences
member of by generating easy-to-use user reports. between parent and child items.

OneDrive Adoption and Usage Reports Orphaned Users and Groups


Review individual OneDrive accounts and measure user Easily detect orphaned users, Office 365 Groups, and MS
adoption. Teams.

Office 365 Groups and MS Teams Reporting


Get more details about Groups and Microsoft Teams by
generating app-specific reports. Check the ownership of
each team or group, review membership and channels
in a single view. Monitor activities, track membership or
configuration changes through audit for each group or team.
External Sharing
Externally Shared Content and Users External Sharing Settings
Detect external users and externally shared content in Review all sharing settings on a tenant level and check
your environment with external sharing reports. Check where the sharing is enabled, which type of sharing is
external sharing in Microsoft Teams, Office 365 Groups, enabled (anonymous or authenticated) and which content is
and OneDrive. potentially vulnerable to security breaches.

Sharing Links OneDrive Sharing


Find if files were shared with anonymous users or guest users Check access to your own or any user’s OneDrive account
inside or outside the company. See when the sharing links to which you have admin access. Get an insight into who has
were created, when they expire, and what type of rights they access to your OneDrive files, including people from inside
give you. Remove them with just one click to maximize the and outside your company. Stop all file sharing when a user
security of your environment. leaves the company or in case a security breach is detected.

MS Teams and Office 365 Groups Guest


Access
Easily detect orphaned users, Teams, and OneDrive
accounts, as well as SharePoint groups and users without
permissions. Easily detect guest users in a single team/
group or all of them in your entire tenant. Check if they
have the proper access. by using cleanup reports. Perform
cleanup actions and boost your Office 365 security score
in a few seconds.

Office 365 Analytics


All Site Analytics
Get an overview of the most important site analytics for all
sites from a single screen. Check the number of site hits,
visitors, and storage.
„I don’t consider any Office 365 Admin
Document Analytics complete without a copy of SysKit Point.
It’s like trying to drive a car blindfolded..“
Detect the most popular and stale files - check how often
a certain document is being used and how many users Todd Klindt, Microsoft MVP
have been visiting the file in the last 30 days.

Single Site Analytics


Dig into each site to see when the site was last visited and
modified, as well as how many unique visitors it had in the
last 30 days.
Office 365 Auditing
Audit User, External User and Admin Actions Audit Office 365 Groups, MS Teams and
Track all users’ and admins’ activities across the Office 365 OneDrive
environment including content and permission changes Check intuitive audit log reports that display logs by each
and login attempts. Detect unauthorized changes, track Office 365 application separately, including Microsoft
suspicious external sharing, and avoid possible security Teams, OneDrive, Office 365 Groups and Sites. View
breaches. Track activities of guest users and see how they different log types: security logs, configuration setting
interact with your Office 365 content. logs, content analytics and usage logs.

Crawling the Office 365 Audit Logs Audit Errors and Issues
Find information faster by using a powerful search engine Easily troubleshoot when something goes wrong with the help
that can generate logs based on the object, user, specific of detailed activity history. Pinpoint the exact time and place
time interval, or action type. where the issue occurred and who was responsible for it.

Custom Office 365 Log Data Retention


Take advantage of extended log storage that goes
beyond Microsoft’s license restrictions (90-day default
with an E3 license). Control the storage period by setting
up a custom data retention policy. This way you can save
your logs as long as you’d like and keep a greater scope
of data that you can analyze.

Office 365 Health and Cleanup*


Office 365 Dashboard and Health Score Security Best Practices
Immediately upon starting the application, an easy-to- Find all users with directly assigned permissions, large lists
use and comprehensive dashboard will point to any and lists with broken permission inheritance. Re-evaluate
problematic areas and give an assessment of your Office the access rights if needed by changing sharing settings.
365 health status. The higher the score the more potential
problems there are to address.

Disabled Owners Cleanup Actions


Find groups or Site Collections with disabled owners. Perform cleanup actions and boost your Office 365
security score in a few seconds.

*Coming soon - Features planned in the future releases of SysKit Point


How does it work?

It is a Collaborative Web App How is the data collected?


with Role Based Security
SysKit Point uses modern authentication methods to connect
SysKit Point is a web-based application that supports to your tenant in order to provide users with maximum safety
Office 365, SharePoint Online and Microsoft Teams when using the application.
environments. The authentication is performed via Microsoft Identity platform.
Once it is installed, the app will be available through In case you have MFA enabled on your tenant, SysKit Point
a web access interface from anywhere, to different will automatically detect it and utilize it.
stakeholders.
Once authenticated SysKit Point does a full crawl of the
Both Global admins, SharePoint admins and group/ entire tenant to gather and store structure, and security data.
site owners, management, etc can use the tool.
After the initial use, it continuously crawls the environment
SysKit Point has built-in Role Based Security, which and auto discovers updates/changes in the environment.
means that delegated privileges are restricted to the
All future crawls are all incremental and thus much faster and
scope of the permissions that a specific user already
you can use the manual load at a specific site or folder to get
has in Office 365.
fresh data instantly.

Technical Overview

The installation process is simple, a next-next-finish System Requirements: Windows Server 2012 or better, 8 GB
flow and a built-in automatic configuration wizard. RAM; 4 core, x64 CPU. Plan for additional 16GB RAM, 4 core
User data is stored within its own SQL Server CPU for the SQL Server. The product can also be deployed
database in your own environment, so you have full to the equivalent Azure Virtual Machines.
control over the security of your data.

SCHEDULE A DEMO

SCHEDULE A DEMO

Address Contact Email


Krste Pavletića 1, +44 (0) 20 3322-2034 [email protected]
10000 Zagreb, +1 (631) 406-4900 www.syskit.com
Croatia, Europe +1 (855) 855-5071

You might also like