Integrate Microsoft SharePoint Online
Monitor SharePoint Online sites for exposed secrets in documents, pages, and shared files.
Why Monitor SharePoint Online?
SharePoint serves as your organization's central knowledge repository where teams store technical documentation, configuration guides, and project files. Developers and IT staff frequently embed credentials, API keys, and configuration secrets in SharePoint documents during knowledge sharing and documentation processes, creating security vulnerabilities that can persist undetected for months or years.
Capabilities
| Feature | Support | Details |
|---|---|---|
| Historical Scanning | ✅ (Supported) | Analyze existing documents and their histories |
| Incremental Scanning | ✅ (Supported) | Regular scheduled scanning for new content |
| Monitored Perimeter | ✅ (Supported) | Granular monitoring of sites and drives |
| Team Perimeter | ⏳ (Coming Soon) | Team-based access control (Coming Soon) |
| Presence Check | ❌ (Not Supported) | Not applicable for documents |
| Source Visibility | ❌ (Not Supported) | All sites pages and drives show as private |
| File Scanning | ✅ (Supported) | Comprehensive file support |
What we scan:
- SharePoint pages and wiki content
- Shared files and document libraries
- Office documents, PDF files, text documents, etc...
Plan requirements: Available for GitGuardian Business and Enterprise plans. Try it for free with a 30-day trial - any detected incidents remain accessible after the trial ends.
Detector coverage: To minimize false positives, Generic High Entropy Secret and Generic Password are disabled. All other detectors are enabled.
Related integrations: Consider also integrating Microsoft OneDrive to scan user-specific content and private files.
Integration with GitGuardian SaaS
Prerequisites: To enable the integration you will need:
- Owner or Manager account on your GitGuardian Dashboard
- Microsoft 365 Administrator or SharePoint Administrator permissions in your tenant
-
Prepare your environment
- Ensure you have an administrator account on your Microsoft 365 organization, with the necessary permissions to install Microsoft Entra ID Enterprise applications.
-
Install the integration
- Navigate to Sources integration
- Find Microsoft SharePoint in the File Storage section. You may use the search bar to quickly find the integration.
- Click Install

-
Authorize GitGuardian
- Click Install on the integration page
- Select your Microsoft 365 administrator account when prompted
- Review and accept the requested permissions
That's it! GitGuardian immediately begins scanning your sites pages and files history and starts monitoring for new secrets.
Integration with GitGuardian Self-Hosted
Infrastructure requirements
We recommend using dedicated workers for this integration. For more detailed information on scaling and configuration, please visit our scaling page.
Additional requirements for SharePoint:
- Apache Tika deployment (as part of GitGuardian's charts) to scan non-text files (.docx, .xlsx, .pdf, etc.)
Create the Azure Entra ID Application for GitGuardian
If you are using a self-hosted GitGuardian instance, you must first configure a dedicated Azure Entra ID Application.
You must be logged as an Microsoft Entra ID administrator to complete this process
-
In your Microsoft Azure Tenant, browse to your Entra ID applications and create a new application, and click the "Create your own application" button
-
Choose a name for your application and register it to integrate with Microsoft Entra ID
-
Set a Redirect URI matching your GitGuardian Self-Hosted Instance:
https://<your instance url>/api/v1/sharepoint-online/app/install_callback/

- Set permissions for your application
Browse to Manage / API Permissions to set the needed permissions. Choose Application permissions if you are asked :

Your application must be allowed the following Graph API permissions:
Delegated permissions:
- User.Read
Application permissions:
- Files.Read.All
- Sites.Read.All
- Organization.Read.All
You must also "Grant admin consent" for all these permissions.

- Generate a Secret for your application
Browse to Manage / Certificates & secrets to create a Client Secret, create a secret and copy it while it is displayed.
Store the Application (Client) ID and the Client Secret in a secure location like a vault or a secret manager
Reference your newly created application in GitGuardian Self-Hosted
-
Navigate to the Sharepoint Online integration page
-
Click Configure Sharepoint Online app

-
Set the Application ID and Secret you just created in Microsoft Azure Entra Id
Perform the OAuth2 installation flow
-
Install the integration
- Navigate to Sources integration
- Find Microsoft SharePoint in the File Storage section. You may use the search bar to quickly find the integration.
- Click Install

-
Authorize GitGuardian
- Click Install on the integration page
- Select your Microsoft 365 administrator account when prompted
- Review and accept the requested permissions

That's it! GitGuardian immediately begins scanning your sites pages and files history and starts monitoring for new secrets.