Sharing and Securing Content in MicroStrategy

Learn how to share and secure the content you've created within MicroStrategy with other users both inside and outside of the MicroStrategy application.
Course info
Level
Beginner
Updated
Aug 2, 2019
Duration
1h 40m
Table of contents
Description
Course info
Level
Beginner
Updated
Aug 2, 2019
Duration
1h 40m
Description

At the core of sharing content within MicroStrategy is a thorough knowledge of all the available methods for doing so. In this course, Sharing and Securing Content in MicroStrategy, you’ll learn the methods available for sharing content, both inside and outside of MicroStrategy, and how to choose the best one. First, you’ll discover the methods for sharing content with other users inside your MicroStrategy installation. Next, you’ll explore how to export and share content with users outside of MicroStrategy. Finally, you’ll learn how to secure your content and control access. When you’re finished with this course, you’ll have a foundational knowledge of all the available methods for sharing and securing content that will help you as you move forward to share the content you’ve created within MicroStrategy with others.

About the author
About the author

Erik is a Business Intelligence developer with nearly 10 years of experience on platforms such as MicroStrategy, Power BI, Tableau, SSRS and SSIS.

More from the author
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
(Music) Hi everyone. My name is Erik Whitaker, and welcome to my course, Sharing and Security Content in MicroStrategy. MicroStrategy is an excellent business intelligence tool for exploring, visualizing, and sharing data insights with others. In this course, we'll explore the various methods for sharing your content within and outside of the MicroStrategy application. Some of the major topics that we will cover include users and user groups, differing methods for sharing content both internal and external to MicroStrategy, privileges, permissions, and security roles, and how to secure content and control access. By the end of this course, you'll have knowledge of the various available methods for sharing MicroStrategy content, how to control and secure access to this content, and should feel confident in choosing which method best suits your needs on a case-by-case basis. I hope you'll join me on this journey to learn content sharing in MicroStrategy with the Sharing and Securing Content in MicroStrategy course at Pluralsight.