The Site Lists Permissions analysis lets you examine the permissions of users for individual lists within a selected site, including external users.
NOTE: List permissions are also included as part of the Comprehensive Permissions analysis. You can also view permissions for items within a selected list by running a Permissions by List Item analysis.
To generate a Site Lists Permissions analysis:
1Select the site whose list permissions you want to analyze.
NOTE: You can only analyze list permissions for one site at a time. If you multi-select, only the site on which you right-clicked will apply.
2Choose Users and Security > Site Lists Permissions. Use the information in the following table to determine the appropriate action to take.
3Specify the parameters for your analysis.
Now you can:
·run the operation immediately (by clicking the [Run Now] button)
OR
·schedule the operation to run at a later time or on a recurring basis.
OR
·save the operation as XML Instructions that can be run at a later time.
The top level of the Site Lists Permissions analysis shows all of the lists used on the site, along with the following information:
·the Security type (Inherited or Unique)
·the number of Items in the list
·the number of Items with Unique Permissions.
NOTE: If you chose to Show unique permissions only, results will include any list that contains items with unique permissions (even if the list itself has inherited permissions).
When expanded, the following information displays for each list:
·each User with permissions to the List item(s)
·if applicable, the SharePoint Group via which the user has permissions (users who have direct access are appropriately identified)
·the number of Accessible Items for that user, and
·the user's permission level(s). A plus sign (+) displays in the applicable column(s), which may include any of the five default SharePoint permission levels:
§Full Control
§Design
§Contribute
§Read
§Limited.
NOTE: If a user has a template-specific or custom permission level, it is recorded in the Other column.
Note that in the following example, the external user is identified by his external email address.
© 2025 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center