12 September, 2010

Item-Level Permissions:Part2

In addition to managing security for the list as a whole, you can set security on an individual list item to further refine who can access the information stored in the list. List item security is managed similar to list security, using the same concept of inheritance and permission levels.

To edit permissions on a specific list item, perform the following steps:

1. On the list page, click the Manage Permissions link in the context menu of the desired list item. You can also select the Item Permissions command from the Manage group of the List Tools - Items ribbon after selecting the desired list item.

2. On the Permissions screen, select the Stop Inheriting Permissions command from the Inheritance group on the Permission Tools – Edit ribbon.

3. On the confirmation message, click the OK button.

4. On the Permissions screen, check the box next to one or more users, and select the Edit User Permissions command from the Modify group on the Permission Tools Edit ribbon.

5. On the Edit Permissions window, select the appropriate permission levels for this user.

6. Click the OK button.

The Permissions page will refresh and display the updated user permissions. Giving users Read access to a specific list item will cause them to not see the Edit Item option in that list item’s context menu or anywhere else where it would otherwise be displayed.

Just like list security, you can grant a user access to a specific list item by selecting the GrantPermissions command from the Grant group of the Permission Tools-Edit ribbon and performing the same actions described previously to add users to a list. You can also revoke users’ access to the list item completely by checking the box next to their names and selecting the Remove User Permissions command from the Modify group. Revoking a user’s access completely will cause the list item to never
be displayed to that user when viewing the list.

Note: List item security can be applied to folders within the list by following the same steps needed for list items after selecting the Manage Permissions option in a folder’s context menu. Use this to control user permissions to groups of related list items or to hide entire folders of content from specific users or groups.


If you have any doubts or queries regarding the above mentioned information then please let me know,Thanks...

SharePoint 2010: List Permissions-Part1

An important decision when managing your list is who will have access to the content and how much control over the content they will be given. Lists leverage the permission levels of the site they live in to determine the security of the user. When first created, a list inherits the security settings of the site it is in.

Unique List Permissions

You can decide to break this inheritance and give unique permissions to the list. This is most common when working with lists that contain sensitive information that not all site users should see. Another example is a list that all users should have the ability to update, even those site users who normally have only a Read permission level.

To break permission inheritance for a list, perform the following steps:

1. On the list page, select the List Permissions command from the Settings group on the List Tools - List ribbon.
2. On the Permissions screen, select the Stop Inheriting Permissions command from the Inheritance group on the Permission Tools – Edit ribbon.
3. On the confirmation message, click the OK button.

Once these steps are completed, you will be able to manage the permissions levels for users within the list. At any time, you can revert to the site’s users and permission level security by selecting the Inherit Permissions command from the Inheritance group on the Permission Tools – Edit ribbon.

As an administrator, you have many options for changing list permissions. Access can be granted based on SharePoint groups or domain users and groups.

To add users to the list security, perform the following steps:

1. On the Permissions page, select the Grant Permissions command from the Grant group on the Permission Tools - Edit ribbon.
2. On the Grant Permissions window, enter the e-mail address or account name of one or more users or groups you wish to add in the Users/Groups box. You can verify that the information you entered is correct by clicking the Check Names icon.
3. If you do not know the exact e-mail addresses or account names of the people or groups you want to give access to, you can click the Browse icon. This icon will open a window that will allow you to search for accounts within your organization. When you have found a user you wish to grant list access to, select that user in the list, and click the Add button. After you have done this for all of the users and groups you wish to add, click the OK button.
4. Select the permission level that you want to use to determine your new users abilities in the list. These permission levels are managed in the site.
5. Click the OK button.

You will now notice that the users you have added show up in the list of users on the Permissions page. You can edit the permissions of a user or group by checking the box next to the name and selecting the Edit User Permissions command from the Modify group of the Permission Tools - Edit ribbon.

Likewise, you can revoke a user’s access to the list by checking the box next to the name and selecting the Remove User Permissions command from the same ribbon group.


If you have any doubts or queries regarding the above mentioned information then please let me know,Thanks...

SharePoint 2010: Creating Lists

A custom list is the most basic type of list in SharePoint and provides a good introduction to using and managing SharePoint lists. There are multiple ways to create a custom list in SharePoint. The quickest way is to choose the Custom List option on your site’s Create page or window.

SharePoint’s list creation functionality is provided in two varieties depending on the availability of Microsoft Silverlight on your computer. Without Silverlight, you are presented with a Create page that contains links to various types of list organized into sections based on their functional usage. With Silverlight, you are shown a Create window allowing you to filter items you can create by Type and Category.

You will also notice an option on the Create page or window that will enable you to create a custom list using the Datasheet view rather than the standard view that the Custom List option uses.

To create a new custom list without Silverlight installed, follow these steps:

1. On the site’s home page, click the More Options… link in the Site Actions menu.
2. On the Create page, click the Custom List link in the Custom Lists section.
3. On the New page, enter a name and description for the list.
4. Select Yes under the Navigation options if you want to show a link to this list
on the Quick Launch area of the site.
5. Click the Create button.


To create a new custom list using the Silverlight Create window,follow these steps:

1. On the site’s home page, click the More Options… link in the Site Actions menu.
2. On the Create window, select the Custom List icon in the Installed Items section.
3. In the Custom List section, click the More Options button.
4. In the Name and Description section, enter a name and description for the list.
5. Select Yes under the Navigation options if you want to show a link to this list on the Quick Launch area of the site.
6. Click the Create button.

That's it-Done, The custom list has been successfully created.. If You have any queries or doubts regarding the above mentioned info then please let me know,Thanks..

SharePoint2010: Site Collection Auditing



SharePoint Server provides the ability to audit the usage of your SharePoint environment. The SharePoint Server auditing capabilities allow you to track all activities that occur within the environment. The site collection administrator has the ability to set auditing requirements within the environment that determine the types of actions that should be tracked. Reports are then available that can be used to review the logged events. These reports could also be used to create any needed audit reporting or statistics. You also have the ability to set audit logging settings to control the volume of audit information kept over time.

To manage audit settings for a site collection, follow these steps:

1. Navigate to the Site Settings page for the top-level site in the site collection.

2. On the Site Settings page, in the Site Collection Administration section, click
the Site Collection Audit Settings link.

3. On the Configure Audit Settings page, identify any audit log trimming settings,
and select the items to audit:

a. In the Audit Log Trimming section, identify if automatic audit log trimming
should be enabled, identify the number of days of audit log data to retain,
and specify a location to store audit reporting before trimming the audit log.

b. In the Documents and Items section, check the boxes in front of the events
to audit which can include the following:
• Opening or downloading documents, viewing items in lists, or viewing
item properties
• Editing items
• Checking out or checking in items
• Moving or copying items to another location in the site
• Deleting or restoring items

c. In the Lists, Libraries, and Sites section, check the boxes in front of the items
to audit which can include the following:
• Editing content types and columns
• Searching site content
• Editing users and permissions

d. Once all of the appropriate audit options have been set, click the OK button.

The auditing options are set, and you are returned to the Site Settings page.
The information about audited actions will be tracked as the associated actions occur in the environment. You can then run the audit reports to view the audit history for captured events.

To view the auditing reports, follow these steps:

1. Navigate to the Site Settings page for the top-level site in the site collection.
2. On the Site Settings page, in the Site Collection Administration section, click
the Audit Log Reports link.
3. On the View Auditing Reports page, click the name of the report you want to
execute.
4. For the Run a Custom Report option, the Run a Custom Report Page is
presented.


On this page, follow these steps:

a. In the File Location section, select where the report should be saved once it
is generated.

b. In the Location section, check if the report should be restricted to a specific
list, and if so, select the web site where the list is located and select the list.

c. In the Date Range section, specify the optional Start Date and/or End Date to
which the report should be restricted.

d. In the Users section, specify which users the report should be restricted to.

e. In the Events section, specify the events the report should be restricted to.

This list can include the following events:
• Opening or downloading documents, viewing items in lists, or viewing
item properties
• Editing items
• Checking out or checking in items
• Moving or copying items to another location in the site
• Deleting or restoring items
• Editing content types and columns
• Searching site content
• Editing users and permissions
• Editing auditing settings and deleting audit log events
• Workflow events
• Custom events

f. Once all of the appropriate report settings have been entered, click the OK

5. The report is generated, and the file is saved to the library specified.The generated XML file is saved to the location you specify, and you are returned to the View Auditing Reports page.

You can select to download any of the listed auditing reports. The following are
the reports included:
• Content Activity Reports
• Content modifications: Lists logged events for changes to site content
including documents, list items, and pages
• Content type and list modifications: Lists logged events for modifications to
content types, lists, and libraries
• Content viewing: Lists logged events for viewing content within the site
• Deletion: Lists logged events for content deletions and restorations
• Custom Reports
• Run a custom report: Enables you to create a custom report to retrieve logged
events for specific actions
• Information Management Policy Reports
• Expiration and Disposition: Lists logged events related to the expiration and
disposition of content
• Policy modifications: Lists logged events related to the creation and use of
content information management policies
• Security and Site Settings Reports
• Auditing settings: Lists logged events related to changes made to the auditing
settings
• Security settings: Lists logged events related to SharePoint security
configuration settings


If you have any queries or doubts regarding the above mentioned information then please let me know,Thanks...