Skip to content

Commit 1e842ef

Browse files
000-544: comparetenant
1 parent 85bf8f6 commit 1e842ef

File tree

5 files changed

+110
-1
lines changed

5 files changed

+110
-1
lines changed

_data/docs_menu.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,10 @@
1515
link: /articles/en/InformationProtection/Your SharePoint Online site classification with PnP/
1616
- name: Audit your sensitivity labels with Powershell
1717
link: /articles/en/InformationProtection/Audit your sensitivity labels with Powershell/
18+
- name: Compare admin role permissions
19+
link: /articles/en/InformationProtection/compareroles/
20+
- name: Run As Admin
21+
link: /articles/en/InformationProtection/simulateadmin/
1822

1923

2024
- label: SharePoint Online

_data/navigation.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,10 @@
1616
link: /articles/en/InformationProtection/Your%20SharePoint%20Online%20site%20classification%20with%20PnP/
1717
- name: Audit your sensitivity labels with Powershell
1818
link: /articles/en/InformationProtection/Audit%20your%20sensitivity%20labels%20with%20Powershell/
19+
- name: Compare admin role permissions
20+
link: /articles/en/InformationProtection/compareroles/
21+
- name: Run As Admin
22+
link: /articles/en/InformationProtection/simulateadmin/
1923

2024
- name: SharePoint Online
2125
link: /#

articles/en/InformationProtection/compareroles.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -119,3 +119,27 @@ Sample comparison between Security Administrator, Security Operator and Security
119119
Sample comparison between Compliance Administrator, Compliance Data Administrator, and Global Reader. It lists only some of the first granular permissions out of all the permissions that are being compared.
120120

121121
<img src="/articles/img/compareroles8.PNG" >
122+
123+
124+
125+
126+
127+
<!-- Default Statcounter code for compare roles
128+
https://powershellscripts.github.io/articles/en/InformationProtection/compareroles/
129+
-->
130+
<script type="text/javascript">
131+
var sc_project=13062630;
132+
var sc_invisible=1;
133+
var sc_security="aedba8fe";
134+
var sc_client_storage="disabled";
135+
</script>
136+
<script type="text/javascript"
137+
src="https://www.statcounter.com/counter/counter.js"
138+
async></script>
139+
<noscript><div class="statcounter"><a title="Web Analytics"
140+
href="https://statcounter.com/" target="_blank"><img
141+
class="statcounter"
142+
src="https://c.statcounter.com/13062630/0/aedba8fe/1/"
143+
alt="Web Analytics"
144+
referrerPolicy="no-referrer-when-downgrade"></a></div></noscript>
145+
<!-- End of Statcounter Code -->

articles/en/InformationProtection/simulateadmin.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
layout: page
3-
title: 'Microsoft 365: simulating admin roles'
3+
title: 'Microsoft 365: Run As [Product] Admin'
44
image: 'https://unsplash.com/s/photos/random'
55
hero_image: '/img/IMG_20220521_140146.jpg'
66
show_sidebar: false
@@ -66,3 +66,25 @@ A short video showing the **Run As** option
6666

6767
<video src="/articles/vid/RoleRunAs.mp4" controls></video>
6868

69+
70+
71+
72+
<!-- Default Statcounter code for runasadmin
73+
https://powershellscripts.github.io/articles/en/InformationProtection/simulateadmin/
74+
-->
75+
<script type="text/javascript">
76+
var sc_project=13062629;
77+
var sc_invisible=1;
78+
var sc_security="4f7c59cb";
79+
var sc_client_storage="disabled";
80+
</script>
81+
<script type="text/javascript"
82+
src="https://www.statcounter.com/counter/counter.js"
83+
async></script>
84+
<noscript><div class="statcounter"><a title="Web Analytics"
85+
href="https://statcounter.com/" target="_blank"><img
86+
class="statcounter"
87+
src="https://c.statcounter.com/13062629/0/4f7c59cb/1/"
88+
alt="Web Analytics"
89+
referrerPolicy="no-referrer-when-downgrade"></a></div></noscript>
90+
<!-- End of Statcounter Code -->
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
---
2+
layout: page
3+
title: 'Compare SharePoint tenant settings'
4+
image: 'https://unsplash.com/s/photos/random'
5+
hero_image: '/img/IMG_20220521_140146.jpg'
6+
show_sidebar: false
7+
hero_height: is-small
8+
date: '2024-11-17'
9+
---
10+
11+
12+
13+
# TL; DR;
14+
15+
You can find the script on Github here.
16+
17+
18+
# Why
19+
20+
From comparing configurations between INT and PROD environments, to migrating SharePoint settings, to troubleshooting issues, there are numerous reasons to compare the settings of two Microsoft 365 tenants.
21+
22+
1. Migration Validation
23+
During tenant-to-tenant migrations, comparing SharePoint settings between two tenants ensures that critical configurations from source are replicated correctly in the target tenant.
24+
25+
2. Compliance and Security Audits
26+
Comparing Microsoft 365 tenants helps identify discrepancies in security and compliance settings to ensure both environments meet organizational or regulatory requirements.
27+
28+
3. Troubleshooting and Issue Resolution
29+
Differences in tenant settings may explain functionality issues or inconsistencies in user experiences between tenants. If it works in your dev tenant, why doesn't it want to work in the Customer's?
30+
31+
4. Standardization Across Organizations
32+
In organizations with multiple Microsoft 365 tenants (e.g., after mergers or acquisitions), comparing settings helps align configurations for consistency and streamlined operations.
33+
34+
5. Environment Synchronization
35+
Ensures Microsoft 365 tenants used for testing or development (like a sandbox, TEST, UAT or INT), are configured similarly to production for accurate testing and validation.
36+
37+
6. Identifying Misconfigurations
38+
Quickly highlights SharePoint settings that may have been inadvertently changed or left default when they should be customized.
39+
40+
7. Understanding Impact of Policies
41+
If a new policy or feature is enabled in one tenant, comparing with a baseline tenant helps evaluate its impact or appropriateness.
42+
43+
44+
45+
46+
#
47+
48+
49+
50+
51+
# See Also
52+
53+
[Get-SPOTenant](https://learn.microsoft.com/en-us/powershell/module/sharepoint-online/get-spotenant?view=sharepoint-ps)
54+
55+
[Get-PnPTenant](https://pnp.github.io/powershell/cmdlets/Get-PnPTenant.html)

0 commit comments

Comments
 (0)