Prevent users from deleting plans in Planner
In Microsoft Planner, you can restrict users from deleting plans that were not created by them by using plan-level permissions. Here are the steps to do this:
It's important to note that these settings apply to the whole plan, so any user that has access to the plan will be affected. Also, if you want to restrict the deletion of a specific task, you could assign it to a specific user and set the task's permissions to "Only Assignee" this way only the person assigned to the task will be able to delete it.
It's also important to keep in mind that the owner of the plan can still delete the plan itself, regardless of these settings. To prevent this, you can assign the ownership of the plan to a specific user or group and only allow them to delete the plan.
Another way to restrict users from deleting plans not created by them in Microsoft Planner is by using role-based access control. You can create a role called "plan viewer" and assign it to users who should only be able to view plans but not delete them. To do this:
You can also use Azure AD Conditional Access to restrict user access to Microsoft Planner. This feature allows you to set conditions for access to resources based on user identity, device, location, and other factors. For example, you can set a condition that only users who are accessing the resource from a corporate network can delete plans in Microsoft Planner.
Another way to protect the plans is by using Azure AD Privileged Identity Management (PIM) to manage and monitor privileged access to the plan. This way, you can control who can perform privileged actions on the plans, such as delete them.
In summary, to restrict users from deleting plans not created by them in Microsoft Planner, you can use the plan-level permissions settings or role-based access control, set the Plan settings to allow only the owner or specific people to edit and delete tasks, assign a task to a specific user and set the task's permissions to "Only Assignee", assign ownership of the plan to a specific user or group, use Azure AD Conditional Access to restrict user access and Azure AD Privileged Identity Management (PIM) to manage and monitor privileged access to the plan.
- Open the Microsoft Planner app and navigate to the plan that you want to restrict.
- Click on the "More options" button (represented by three dots) and select "Plan settings" from the drop-down menu.
- In the "Plan settings" menu, click on the "Access" tab.
- Under "Who can edit tasks," you can choose to allow "Only the owner" or "Specific people" to edit tasks in the plan. This will prevent users who are not the owner of the plan or who are not specified in the "Specific people" list from deleting tasks.
- Under "Who can delete tasks" you can choose to allow "Only the owner" or "Specific people" to delete tasks in the plan. This will prevent users who are not the owner of the plan or who are not specified in the "Specific people" list from deleting tasks.
- Click "Save" to apply the changes.
It's important to note that these settings apply to the whole plan, so any user that has access to the plan will be affected. Also, if you want to restrict the deletion of a specific task, you could assign it to a specific user and set the task's permissions to "Only Assignee" this way only the person assigned to the task will be able to delete it.
It's also important to keep in mind that the owner of the plan can still delete the plan itself, regardless of these settings. To prevent this, you can assign the ownership of the plan to a specific user or group and only allow them to delete the plan.
Another way to restrict users from deleting plans not created by them in Microsoft Planner is by using role-based access control. You can create a role called "plan viewer" and assign it to users who should only be able to view plans but not delete them. To do this:
- Go to the Microsoft 365 admin center and select "Users" from the navigation menu.
- Select the user for whom you want to set a role and then click on "Edit roles."
- Select "Planner" from the list of apps and then choose "Viewer" as the role.
- Click on "Save changes" to apply the changes.
You can also use Azure AD Conditional Access to restrict user access to Microsoft Planner. This feature allows you to set conditions for access to resources based on user identity, device, location, and other factors. For example, you can set a condition that only users who are accessing the resource from a corporate network can delete plans in Microsoft Planner.
Another way to protect the plans is by using Azure AD Privileged Identity Management (PIM) to manage and monitor privileged access to the plan. This way, you can control who can perform privileged actions on the plans, such as delete them.
In summary, to restrict users from deleting plans not created by them in Microsoft Planner, you can use the plan-level permissions settings or role-based access control, set the Plan settings to allow only the owner or specific people to edit and delete tasks, assign a task to a specific user and set the task's permissions to "Only Assignee", assign ownership of the plan to a specific user or group, use Azure AD Conditional Access to restrict user access and Azure AD Privileged Identity Management (PIM) to manage and monitor privileged access to the plan.
Comments
Post a Comment