SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
IT governance
Go to related article at
http://aka.ms/SPGov

What is
governance?
SharePoint 2013

Software + services

What to govern:

Centrally managed

Locally managed

Software, services + sites hosted/managed
centrally by a core IT group

Software, services + sites hosted/managed
locally by individual groups

Vary the level of data protection that you offer based on service levels. Plan how often you back up the farms
and how quickly you can guarantee the data is restored.

IT service governance

Deployment governance

Site policies

When you create an IT service to support SharePoint 2013, a key to success is whether you can
govern the service and ensure that it meets the business needs of your organization in a secure
and cost-effective way. When you add to the service, you need to do so in a manageable way.
The following elements contribute to a successful service:

In addition to governing services that you offer, you also need to govern installations of SharePoint 2013 in your
environment.

Use site policies to help control site proliferation. A site policy defines the life-cycle of a site by specifying when
the site will be closed and when it will be deleted. When you close or delete a site, any subsites are also closed
or deleted. If an Exchange mailbox is associated with a site, the mailbox is deleted from Exchange Server 2013
when the site is deleted.
Quotas

Form governance group

Communicate policies

Encourage use

A governing group defines
the initial offerings of the
service, defines the service s
ongoing policies, and meets
regularly to evaluate
success.

The policies you develop
are communicated to your
enterprise and are enforced.

Users are encouraged to
use the service and not
create their own solutions –
installations are tracked and
rogue installations are
blocked.

Tightly managed

Different types of sites require different governance policies. This is
because different sites have different requirements, which reflect their
importance to the organization. Published sites have tighter governance
over information and application management than team sites and
personal sites (My Sites).

Central published site (Intranet
home page)

Content + information stored by users

Application Management
Custom solutions

Typical amount of governance

Information Management

Quota templates define how much data can be stored in a site collection and the maximum size of uploaded
files. Associate different quota templates with site collections at different service levels.
Asset classification

Classify sites and content by value and impact of the content to the organization (such as high, medium, or low
business value/impact). That classification then controls other behaviors, such as requiring encryption for high
business impact information.
Value = Availability
If this isn t available, can my business run?

Track installations
An Active Directory Domain Services (AD DS) marker named Service Connection Point identifies the SharePoint 2013
servers in an organization. Set this marker for each domain in your organization if you want to track installations in all
domains.

Block installations
You can block installations of SharePoint 2013 to prevent users from installing it to unauthorized servers that you
don t want to support. Use a group policy in Active Directory Domain Services (AD DS) to set a registry key on all
servers to block installations.

Keep current with software updates
Always keep your servers current with the latest software updates. See the Updates Resource Center for SharePoint
2013 (http://aka.ms/SPUpdt).

Site collection upgrades
Site collections can now be upgraded independently from the content databases. Determine who, when, and how to
upgrade site collections when a new version or an update is available.

Loosely managed

Content is tagged with structured metadata,
permissions tightly controlled, content is
archived or purged per retention schedules

Content is tagged only socially and not
tracked; permissions/archiving is not
monitored or managed

Information architecture
Information architecture determines how the information in that site or solution – its
webpages, documents, lists, and data – is organized and presented to the site s users.
Information architecture is often recorded as a hierarchical list of content, search keywords,
data types, and other concepts.
Make your information architecture as efficient as possible. Identify efficiencies, such as:

Departmental site

Software + services

Data protection (backup and recovery)

If this leaks, will it hurt my business?

Governance and Site Types

IT Governance

 Negotiated performance
targets for first load of a site,
subsequent loads, and
performance at remote
locations.
 Recovery, load balancing, and
failover strategies.
 Customization policies.
 Storage limits for content and
sites.
 How to handle inactive or stale
sites.
 Multilingual support.

How is the system and infrastructure maintained and who has access at what levels? What s the maximum
upload size you want to allow? Are you controlling the use of fine-grained permissions?

Impact = Exposure

Basic concepts

Three major areas for
governing SharePoint 2013:

2.

Security, infrastructure, and web application policies

How will you govern the information in your organization, such as:
documents, lists, Web sites, and Web pages? How do you maximize the
information s usability and manageability? Who has access to what
content – how are you making content available internally and externally
and to whom?

Governance is the set of policies, roles, responsibilities, and processes that
control how an organization s business divisions and IT teams work
together to achieve its goals.

1.

 Approval process, including
length of time and approvals
necessary to create a site.
 Costs for users/departments.
 Operations-level agreement –
which teams perform which
operations and how frequently.
 Policies around problem
resolution through a help desk.

How will you control the services that you offer? What will you provide
with each service? What will you include in service-level agreements for
each service? And how do you prevent proliferation of unmanaged
servers?

Information management

Governance Segments

Service level
agreements
should include:

Group and team sites

Projects and workspaces

Use metadata to
enable search and
comparisons

Content + information stored by users

Manageable

Proportion of site types in a typical environment

Design navigation to
help users find
important information

Increases effectiveness

Meets requirements

Can the IT team effectively
implement and manage the
information?

Does the architecture add to
your organization s
effectiveness?

Does the information
architecture meet regulatory
requirements, privacy needs,
and security goals?

Questions to ask when designing a site or solution:
 How will the site or solution be structured
and divided into a set of site collections
and sites?
 How will data be presented?
 How will site users navigate?
 How will search be configured and
optimized?
 How can you organize content so that
searches return useful results?
 What types of content will live on sites?
 How will content be tagged and how will
metadata be managed?

 Does any of the content on the sites have
unique security needs?
 What is the authoritative source for
terms?
 How will information be targeted at
specific audiences?
 Do you need to have language- or
product-specific versions of your sites?
 Who will write content for the site and
what method will you use to publish it?

Govern your content by using tools for content management, including:








Use workflows and approvals for Document Centers and site pages – wherever official documentation is
stored.
Use approval for published websites to control pages.
Use version history and version control to maintain a history and master document.
Use content types with auditing and expiration for document libraries to manage document lifecycle.
Manage libraries by using the Content Organizer.
Use site policies to manage site collection lifecycles.
Use Information Rights Management and auditing to secure and audit important corporate assets and any
sites that contain sensitive information.

Determine the rules or policies that you need
to have in place for the following types of
items:

Manage versions and
records

Catalog and store
information properly

Integrate information
architecture with
search

Be sure to consider access to content when you design your solution and sites. This overlaps
with IT Governance as you consider your entire environment. Ask these questions:

Define publishing
strategy

1. How do I structure permission in a site?
2. How do I target content to a specific audience?
3. Should I use Information Rights Management (IRM) to
protect content?

Which of these factors is the highest priority
for each type of content?

Which priority do you optimize for?

Information access
Information management: permissions and audiences

Personal sites (My Sites)

Information management tools

Good information architecture supports the following goals:

IT governance: access
1. How do I make this content
accessible to external users?
2. How do I make sure that only people
who need access have it?

When thinking about content, consider the
balance between the following factors:
Pages
Lists
Documents
Records
Rich assets
Blogs and
wikis
 Feeds







 Anonymous
comments
 Anonymous
access
 Terms and
term sets
 External data

Availability

Content needs to be available when users need it,
and where they can get to it.

Access

Consider who has access to the content. If it
should be secure, is it?

Redundancy

Shared copies reduce redundancy and provide one
version of a document.

The three areas of governance are equally important. This poster describes
each area and provides key concepts for each area.

Governance Team

Governance and Training

Your governance policies should support your organization s goals and be
kept up-to-date as your organization s needs change. We recommend
that you create a team from various disciplines across your organization to
develop and maintain these policies.

Great training, good resources, and effective search are keys to user
adoption.

Application management
How will you manage the applications that are developed for your
environment? What customizations do you allow in your applications, and
what are your processes for managing those applications?

Custom solutions
Lifecycle management

Solutions or apps for SharePoint?

Follow these best practices to manage applications based on SharePoint 2013 throughout their
lifecycle:

New development model: apps for Sharepoint

Development
GOVERNANCE CHECKLIST:

Training
Education
Content
Search

Governance
team

User
Adoption




Information architects or
taxonomists
Compliance officers
Influential information
workers






IT technical specialists
Development leaders
Trainers
IT managers





Business division
leaders
Financial stakeholders
Executive
stakeholders

Strictly managed

Customizations must adhere to customization
policy; deployments and updates tested and
rigorously maintained

Determine which types of customizations you want to allow/disallow, and how you will
manage customizations. Your customization policy should include:

Guidelines for
updating
customizations

Processes for
analyzing

Approved tools for
customization

Production

Loosely managed

Rules about development environments or
customizations are less rigid

Customization policy

Service level
descriptions

Pre-production

Process for piloting
and testing
customizations

Who is responsible
for ongoing code
support

Guidelines for
packaging and
deploying
customizations
Specific policies
regarding each
potential type of
customization

Sync

Control source code
and use versioning

Sync

Test new and updated
apps and solutions

Apps for SharePoint are self-contained pieces of functionality that extend the capabilities of a
SharePoint website. An app may include SharePoint components such as lists, workflows, and site
pages, but it can also surface a remote web application and remote data in SharePoint. An app has
few or no dependencies on any other software on the device or platform where it is installed, other
than what is built into the platform. Apps have no custom code that runs on the SharePoint servers.
Design apps for end users

Keep environments in
sync to get best results
from testing

Branding
Consistent branding with a corporate style guide makes for more cohesive-looking sites and
easier development. Store approved themes in the theme gallery for consistency so that users
will know when they visit the site that they are in the right place.

Design Manager for branding
With Design Manager, you can create a visual design for your website by using whatever web
design tool or HTML editor you prefer and then upload that design into SharePoint. Design
Manager is the central hub and interface where you manage all aspects of a custom design.
Creating the visual design of a site often fits into a larger process, in which multiple people or
organizations are involved. For a roadmap of the tasks from a larger perspective, see Design
and branding in SharePoint 2013 (http://aka.ms/Tbcvxm).

Use farm solutions for administrators

Apps:
 Are easy for users (tenant administrators and site
owners) to discover and install
 Use safe SharePoint extensions
 Provide the flexibility to develop future upgrades
 Can integrate with cloud-based resources
 Are available for both SharePoint Online and onpremises SharePoint sites

Solutions:
 Can access the server-side object-model APIs
that are needed to extend SharePoint
management, configuration, and security
 Can extend Central Administration, Windows
PowerShell cmdlets, timer jobs, custom
backups, and so on
 Are installed by administrators
 Can have farm, web application, or sitecollection scope

Governance policy for apps for SharePoint
Set a policy for using apps for SharePoint in your organization. Can users purchase and download
apps? How do you make your organization s apps available? How do you tell if they re being used?
SharePoint Store
Determine whether
users can purchase or
download apps from
the SharePoint Store.

App Catalog
Make specific apps for
SharePoint available to
your users by adding
them to the App
Catalog.

App requests
Configure app
requests to control
which apps are
purchased and how
many licenses are
available.

Monitor apps
Monitor specific apps
in SharePoint Server
2013 to check for
errors and to track
usage.

Weitere ähnliche Inhalte

Mehr von David J Rosenthal

A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureDavid J Rosenthal
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsDavid J Rosenthal
 
Knowledge and Insights from Microsoft
Knowledge and Insights from MicrosoftKnowledge and Insights from Microsoft
Knowledge and Insights from MicrosoftDavid J Rosenthal
 
Secure Access to Your Enterprise
Secure Access to Your EnterpriseSecure Access to Your Enterprise
Secure Access to Your EnterpriseDavid J Rosenthal
 

Mehr von David J Rosenthal (20)

Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 
Better Meetings with Microsoft Teams
Better Meetings with Microsoft TeamsBetter Meetings with Microsoft Teams
Better Meetings with Microsoft Teams
 
What is Microsoft Teams
What is Microsoft TeamsWhat is Microsoft Teams
What is Microsoft Teams
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Knowledge and Insights from Microsoft
Knowledge and Insights from MicrosoftKnowledge and Insights from Microsoft
Knowledge and Insights from Microsoft
 
Microsoft SharePoint Syntex
Microsoft SharePoint SyntexMicrosoft SharePoint Syntex
Microsoft SharePoint Syntex
 
Microsoft Viva
Microsoft VivaMicrosoft Viva
Microsoft Viva
 
Secure Access to Your Enterprise
Secure Access to Your EnterpriseSecure Access to Your Enterprise
Secure Access to Your Enterprise
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 

What is Governance in SharePoint 2013

  • 1. IT governance Go to related article at http://aka.ms/SPGov What is governance? SharePoint 2013 Software + services What to govern: Centrally managed Locally managed Software, services + sites hosted/managed centrally by a core IT group Software, services + sites hosted/managed locally by individual groups Vary the level of data protection that you offer based on service levels. Plan how often you back up the farms and how quickly you can guarantee the data is restored. IT service governance Deployment governance Site policies When you create an IT service to support SharePoint 2013, a key to success is whether you can govern the service and ensure that it meets the business needs of your organization in a secure and cost-effective way. When you add to the service, you need to do so in a manageable way. The following elements contribute to a successful service: In addition to governing services that you offer, you also need to govern installations of SharePoint 2013 in your environment. Use site policies to help control site proliferation. A site policy defines the life-cycle of a site by specifying when the site will be closed and when it will be deleted. When you close or delete a site, any subsites are also closed or deleted. If an Exchange mailbox is associated with a site, the mailbox is deleted from Exchange Server 2013 when the site is deleted. Quotas Form governance group Communicate policies Encourage use A governing group defines the initial offerings of the service, defines the service s ongoing policies, and meets regularly to evaluate success. The policies you develop are communicated to your enterprise and are enforced. Users are encouraged to use the service and not create their own solutions – installations are tracked and rogue installations are blocked. Tightly managed Different types of sites require different governance policies. This is because different sites have different requirements, which reflect their importance to the organization. Published sites have tighter governance over information and application management than team sites and personal sites (My Sites). Central published site (Intranet home page) Content + information stored by users Application Management Custom solutions Typical amount of governance Information Management Quota templates define how much data can be stored in a site collection and the maximum size of uploaded files. Associate different quota templates with site collections at different service levels. Asset classification Classify sites and content by value and impact of the content to the organization (such as high, medium, or low business value/impact). That classification then controls other behaviors, such as requiring encryption for high business impact information. Value = Availability If this isn t available, can my business run? Track installations An Active Directory Domain Services (AD DS) marker named Service Connection Point identifies the SharePoint 2013 servers in an organization. Set this marker for each domain in your organization if you want to track installations in all domains. Block installations You can block installations of SharePoint 2013 to prevent users from installing it to unauthorized servers that you don t want to support. Use a group policy in Active Directory Domain Services (AD DS) to set a registry key on all servers to block installations. Keep current with software updates Always keep your servers current with the latest software updates. See the Updates Resource Center for SharePoint 2013 (http://aka.ms/SPUpdt). Site collection upgrades Site collections can now be upgraded independently from the content databases. Determine who, when, and how to upgrade site collections when a new version or an update is available. Loosely managed Content is tagged with structured metadata, permissions tightly controlled, content is archived or purged per retention schedules Content is tagged only socially and not tracked; permissions/archiving is not monitored or managed Information architecture Information architecture determines how the information in that site or solution – its webpages, documents, lists, and data – is organized and presented to the site s users. Information architecture is often recorded as a hierarchical list of content, search keywords, data types, and other concepts. Make your information architecture as efficient as possible. Identify efficiencies, such as: Departmental site Software + services Data protection (backup and recovery) If this leaks, will it hurt my business? Governance and Site Types IT Governance  Negotiated performance targets for first load of a site, subsequent loads, and performance at remote locations.  Recovery, load balancing, and failover strategies.  Customization policies.  Storage limits for content and sites.  How to handle inactive or stale sites.  Multilingual support. How is the system and infrastructure maintained and who has access at what levels? What s the maximum upload size you want to allow? Are you controlling the use of fine-grained permissions? Impact = Exposure Basic concepts Three major areas for governing SharePoint 2013: 2. Security, infrastructure, and web application policies How will you govern the information in your organization, such as: documents, lists, Web sites, and Web pages? How do you maximize the information s usability and manageability? Who has access to what content – how are you making content available internally and externally and to whom? Governance is the set of policies, roles, responsibilities, and processes that control how an organization s business divisions and IT teams work together to achieve its goals. 1.  Approval process, including length of time and approvals necessary to create a site.  Costs for users/departments.  Operations-level agreement – which teams perform which operations and how frequently.  Policies around problem resolution through a help desk. How will you control the services that you offer? What will you provide with each service? What will you include in service-level agreements for each service? And how do you prevent proliferation of unmanaged servers? Information management Governance Segments Service level agreements should include: Group and team sites Projects and workspaces Use metadata to enable search and comparisons Content + information stored by users Manageable Proportion of site types in a typical environment Design navigation to help users find important information Increases effectiveness Meets requirements Can the IT team effectively implement and manage the information? Does the architecture add to your organization s effectiveness? Does the information architecture meet regulatory requirements, privacy needs, and security goals? Questions to ask when designing a site or solution:  How will the site or solution be structured and divided into a set of site collections and sites?  How will data be presented?  How will site users navigate?  How will search be configured and optimized?  How can you organize content so that searches return useful results?  What types of content will live on sites?  How will content be tagged and how will metadata be managed?  Does any of the content on the sites have unique security needs?  What is the authoritative source for terms?  How will information be targeted at specific audiences?  Do you need to have language- or product-specific versions of your sites?  Who will write content for the site and what method will you use to publish it? Govern your content by using tools for content management, including:        Use workflows and approvals for Document Centers and site pages – wherever official documentation is stored. Use approval for published websites to control pages. Use version history and version control to maintain a history and master document. Use content types with auditing and expiration for document libraries to manage document lifecycle. Manage libraries by using the Content Organizer. Use site policies to manage site collection lifecycles. Use Information Rights Management and auditing to secure and audit important corporate assets and any sites that contain sensitive information. Determine the rules or policies that you need to have in place for the following types of items: Manage versions and records Catalog and store information properly Integrate information architecture with search Be sure to consider access to content when you design your solution and sites. This overlaps with IT Governance as you consider your entire environment. Ask these questions: Define publishing strategy 1. How do I structure permission in a site? 2. How do I target content to a specific audience? 3. Should I use Information Rights Management (IRM) to protect content? Which of these factors is the highest priority for each type of content? Which priority do you optimize for? Information access Information management: permissions and audiences Personal sites (My Sites) Information management tools Good information architecture supports the following goals: IT governance: access 1. How do I make this content accessible to external users? 2. How do I make sure that only people who need access have it? When thinking about content, consider the balance between the following factors: Pages Lists Documents Records Rich assets Blogs and wikis  Feeds        Anonymous comments  Anonymous access  Terms and term sets  External data Availability Content needs to be available when users need it, and where they can get to it. Access Consider who has access to the content. If it should be secure, is it? Redundancy Shared copies reduce redundancy and provide one version of a document. The three areas of governance are equally important. This poster describes each area and provides key concepts for each area. Governance Team Governance and Training Your governance policies should support your organization s goals and be kept up-to-date as your organization s needs change. We recommend that you create a team from various disciplines across your organization to develop and maintain these policies. Great training, good resources, and effective search are keys to user adoption. Application management How will you manage the applications that are developed for your environment? What customizations do you allow in your applications, and what are your processes for managing those applications? Custom solutions Lifecycle management Solutions or apps for SharePoint? Follow these best practices to manage applications based on SharePoint 2013 throughout their lifecycle: New development model: apps for Sharepoint Development GOVERNANCE CHECKLIST: Training Education Content Search Governance team User Adoption    Information architects or taxonomists Compliance officers Influential information workers     IT technical specialists Development leaders Trainers IT managers    Business division leaders Financial stakeholders Executive stakeholders Strictly managed Customizations must adhere to customization policy; deployments and updates tested and rigorously maintained Determine which types of customizations you want to allow/disallow, and how you will manage customizations. Your customization policy should include: Guidelines for updating customizations Processes for analyzing Approved tools for customization Production Loosely managed Rules about development environments or customizations are less rigid Customization policy Service level descriptions Pre-production Process for piloting and testing customizations Who is responsible for ongoing code support Guidelines for packaging and deploying customizations Specific policies regarding each potential type of customization Sync Control source code and use versioning Sync Test new and updated apps and solutions Apps for SharePoint are self-contained pieces of functionality that extend the capabilities of a SharePoint website. An app may include SharePoint components such as lists, workflows, and site pages, but it can also surface a remote web application and remote data in SharePoint. An app has few or no dependencies on any other software on the device or platform where it is installed, other than what is built into the platform. Apps have no custom code that runs on the SharePoint servers. Design apps for end users Keep environments in sync to get best results from testing Branding Consistent branding with a corporate style guide makes for more cohesive-looking sites and easier development. Store approved themes in the theme gallery for consistency so that users will know when they visit the site that they are in the right place. Design Manager for branding With Design Manager, you can create a visual design for your website by using whatever web design tool or HTML editor you prefer and then upload that design into SharePoint. Design Manager is the central hub and interface where you manage all aspects of a custom design. Creating the visual design of a site often fits into a larger process, in which multiple people or organizations are involved. For a roadmap of the tasks from a larger perspective, see Design and branding in SharePoint 2013 (http://aka.ms/Tbcvxm). Use farm solutions for administrators Apps:  Are easy for users (tenant administrators and site owners) to discover and install  Use safe SharePoint extensions  Provide the flexibility to develop future upgrades  Can integrate with cloud-based resources  Are available for both SharePoint Online and onpremises SharePoint sites Solutions:  Can access the server-side object-model APIs that are needed to extend SharePoint management, configuration, and security  Can extend Central Administration, Windows PowerShell cmdlets, timer jobs, custom backups, and so on  Are installed by administrators  Can have farm, web application, or sitecollection scope Governance policy for apps for SharePoint Set a policy for using apps for SharePoint in your organization. Can users purchase and download apps? How do you make your organization s apps available? How do you tell if they re being used? SharePoint Store Determine whether users can purchase or download apps from the SharePoint Store. App Catalog Make specific apps for SharePoint available to your users by adding them to the App Catalog. App requests Configure app requests to control which apps are purchased and how many licenses are available. Monitor apps Monitor specific apps in SharePoint Server 2013 to check for errors and to track usage.