From 075bfb31554069acd5d41b97717cae695185431d Mon Sep 17 00:00:00 2001 From: Kartik P V R Date: Tue, 10 Feb 2026 19:45:30 +0530 Subject: [PATCH 1/2] DAG new report documentation --- .claude/settings.local.json | 7 +++++++ .../Get-SPODataAccessGovernanceInsight.md | 2 +- .../Start-SPODataAccessGovernanceInsight.md | 20 ++++++++++++++++--- 3 files changed, 25 insertions(+), 4 deletions(-) create mode 100644 .claude/settings.local.json diff --git a/.claude/settings.local.json b/.claude/settings.local.json new file mode 100644 index 000000000..0670f8872 --- /dev/null +++ b/.claude/settings.local.json @@ -0,0 +1,7 @@ +{ + "permissions": { + "allow": [ + "Bash(diff:*)" + ] + } +} diff --git a/sharepoint/sharepoint-ps/Microsoft.Online.SharePoint.PowerShell/Get-SPODataAccessGovernanceInsight.md b/sharepoint/sharepoint-ps/Microsoft.Online.SharePoint.PowerShell/Get-SPODataAccessGovernanceInsight.md index 03854e519..92cfae073 100644 --- a/sharepoint/sharepoint-ps/Microsoft.Online.SharePoint.PowerShell/Get-SPODataAccessGovernanceInsight.md +++ b/sharepoint/sharepoint-ps/Microsoft.Online.SharePoint.PowerShell/Get-SPODataAccessGovernanceInsight.md @@ -54,7 +54,7 @@ Specifies the entity that could cause oversharing and hence tracked by these rep Type: Microsoft.Online.SharePoint.TenantAdministration.ReportEntityEnum Parameter Sets: GetAllReportsParameterSet Aliases: -Accepted values: SharingLinks_Anyone, SharingLinks_PeopleInYourOrg, SharingLinks_Guests, SensitivityLabelForFiles, EveryoneExceptExternalUsersAtSite, EveryoneExceptExternalUsersForItems, PermissionedUsers, PermissionsReport +Accepted values: SharingLinks_Anyone, SharingLinks_PeopleInYourOrg, SharingLinks_Guests, SensitivityLabelForFiles, EveryoneExceptExternalUsersAtSite, EveryoneExceptExternalUsersForItems, PermissionedUsers, PermissionsReport, EveryoneExceptExternalUsers, Everyone Required: True Position: Named diff --git a/sharepoint/sharepoint-ps/Microsoft.Online.SharePoint.PowerShell/Start-SPODataAccessGovernanceInsight.md b/sharepoint/sharepoint-ps/Microsoft.Online.SharePoint.PowerShell/Start-SPODataAccessGovernanceInsight.md index ae9a5df92..0e8a58796 100644 --- a/sharepoint/sharepoint-ps/Microsoft.Online.SharePoint.PowerShell/Start-SPODataAccessGovernanceInsight.md +++ b/sharepoint/sharepoint-ps/Microsoft.Online.SharePoint.PowerShell/Start-SPODataAccessGovernanceInsight.md @@ -57,6 +57,12 @@ Start-SPODataAccessGovernanceInsight -ReportEntity -Workload [] ``` +### DetailedEEEUParameterSet +``` +Start-SPODataAccessGovernanceInsight -ReportEntity -ReportType + [] +``` + ## DESCRIPTION This cmdlet is used to generate DAG reports which deal with potential oversharing of sensitive data. These reports are present in Sharepoint admin center. Reports are currently available for the following scenarios: @@ -65,7 +71,7 @@ This cmdlet is used to generate DAG reports which deal with potential oversharin - Content shared with Everyone except external users (EEEU) in last 28 days. - List of sites having labelled files, as of report generation time. - List of sites having 'too-many-users', as of report generation time, to setup an oversharing baseline. -- List of sites with direct or indirect permissions to given users. *(Private Preview)* +- List of sites with direct or indirect permissions to given users. ## EXAMPLES @@ -77,6 +83,14 @@ Start-SPODataAccessGovernanceInsight -ReportEntity PermissionedUsers -Workload S The above cmdlet generates a list of SharePoint sites which can be accessed by more than 1000 users, as of report generation day. +### Example 2 + +```powershell +Start-SPODataAccessGovernanceInsight -ReportEntity EveryoneExceptExternalUsers -ReportType Snapshot +``` + +The above cmdlet generates a detailed report for all content shared with 'Everyone except external users' (Sites, groups and files) across both SharePoint sites and OneDrive accounts, as of report generation time. + ## PARAMETERS ### -CountOfUsersMoreThan @@ -168,7 +182,7 @@ Specifies the entity that could cause oversharing and hence tracked by these rep Type: Microsoft.Online.SharePoint.TenantAdministration.ReportEntityEnum Parameter Sets: (All) Aliases: -Accepted values: SharingLinks_Anyone, SharingLinks_PeopleInYourOrg, SharingLinks_Guests, SensitivityLabelForFiles, EveryoneExceptExternalUsersAtSite, EveryoneExceptExternalUsersForItems, PermissionedUsers, PermissionsReport +Accepted values: SharingLinks_Anyone, SharingLinks_PeopleInYourOrg, SharingLinks_Guests, SensitivityLabelForFiles, EveryoneExceptExternalUsersAtSite, EveryoneExceptExternalUsersForItems, PermissionedUsers, PermissionsReport, EveryoneExceptExternalUsers, Everyone Required: True Position: Named @@ -249,7 +263,7 @@ Specifies whether the report is for SharePoint sites or OneDrive accounts. ```yaml Type: Microsoft.Online.SharePoint.TenantAdministration.WorkloadEnum -Parameter Sets: (All) +Parameter Sets: EEEUParameterSet, SharingLinkParameterSet, LabelParameterSet, SitePermissionsParameterSet, UserPermissionsParameterSet Aliases: Accepted values: SharePoint, OneDriveForBusiness From 962b1fec53c7db43106710b59703d612b52cae3d Mon Sep 17 00:00:00 2001 From: Kartik P V R Date: Thu, 12 Feb 2026 15:23:44 +0530 Subject: [PATCH 2/2] Remove .claude/settings.local.json and add .claude/ to .gitignore This file should not be tracked in version control as it contains local Claude Code settings specific to individual development environments. Co-Authored-By: Claude Sonnet 4.5 --- .claude/settings.local.json | 7 ------- .gitignore | 1 + 2 files changed, 1 insertion(+), 7 deletions(-) delete mode 100644 .claude/settings.local.json diff --git a/.claude/settings.local.json b/.claude/settings.local.json deleted file mode 100644 index 0670f8872..000000000 --- a/.claude/settings.local.json +++ /dev/null @@ -1,7 +0,0 @@ -{ - "permissions": { - "allow": [ - "Bash(diff:*)" - ] - } -} diff --git a/.gitignore b/.gitignore index 67238624d..7fac9fffa 100644 --- a/.gitignore +++ b/.gitignore @@ -7,3 +7,4 @@ _repo.*/ .openpublishing.buildcore.ps1 .vscode/settings.json +.claude/