Home | Connectors | SharePoint | SharePoint - OpenText Webroot Unity Integration and Automation

SharePoint - OpenText Webroot Unity Integration and Automation

Integrate SharePoint Cloud Storage and OpenText Webroot Unity Security / Identity Access Management apps with any of the apps from the library with just a few clicks. Create automated workflows by integrating your apps.

Common Integration Use Cases Between SharePoint and OpenText Webroot Unity

1. Secure Document Repository for Security Policies and Endpoint Standards

Data flow: OpenText Webroot Unity ? SharePoint

Security teams can publish approved endpoint protection policies, phishing response guides, malware handling procedures, and device hardening standards from OpenText Webroot Unity into SharePoint for enterprise-wide access. SharePoint serves as the controlled document repository where employees, IT support, and regional administrators can access the latest versions with permissions, version history, and auditability.

Business value: Reduces policy confusion, improves compliance, and ensures staff always reference the current security documentation.

2. Incident Response Collaboration Workspace

Data flow: OpenText Webroot Unity ? SharePoint

When OpenText Webroot Unity detects a threat such as ransomware, malware, or phishing activity, incident details can be pushed into a dedicated SharePoint site or list for the security operations team. SharePoint can store incident notes, remediation checklists, evidence files, and task assignments, enabling coordinated response across security, infrastructure, and compliance teams.

Business value: Speeds up incident coordination, improves accountability, and creates a centralized record for post-incident review.

3. Security Awareness and Phishing Campaign Content Management

Data flow: Bi-directional

Security teams can manage awareness materials in SharePoint, including phishing simulations, training guides, and user advisories, while OpenText Webroot Unity can provide threat intelligence inputs that inform the content. For example, if a new phishing pattern is detected, the security team can update SharePoint training content and distribute it to HR, managers, and end users.

Business value: Keeps awareness content aligned with current threats and improves employee readiness against social engineering attacks.

4. Endpoint Exception and Access Request Workflow

Data flow: SharePoint ? OpenText Webroot Unity

Business users or application owners can submit endpoint exception requests through a SharePoint form, such as allowing a blocked application, approving a temporary device exemption, or requesting a policy change for a managed workstation. Approved requests can then be routed to OpenText Webroot Unity administrators for review and implementation.

Business value: Standardizes exception handling, reduces email-based approvals, and provides a clear audit trail for security exceptions.

5. Compliance Evidence Collection for Security Audits

Data flow: OpenText Webroot Unity ? SharePoint

OpenText Webroot Unity can export endpoint protection status, threat detection summaries, and remediation reports into SharePoint libraries used by compliance, internal audit, and risk teams. SharePoint can organize evidence by audit period, business unit, or control framework, making it easier to support regulatory reviews and internal assessments.

Business value: Simplifies audit preparation, reduces manual evidence gathering, and improves traceability for security controls.

6. Centralized Security Operations Knowledge Base

Data flow: OpenText Webroot Unity ? SharePoint

Security administrators can use SharePoint as a knowledge base for known threats, remediation steps, endpoint troubleshooting guides, and standard operating procedures based on alerts and trends from OpenText Webroot Unity. This helps service desk teams resolve common endpoint issues faster and consistently.

Business value: Improves first-line support resolution rates and reduces escalation volume to security specialists.

7. Executive Security Reporting Portal

Data flow: OpenText Webroot Unity ? SharePoint

OpenText Webroot Unity security metrics such as blocked threats, infected endpoints, policy compliance, and remediation trends can be published into SharePoint dashboards for leadership visibility. SharePoint can serve as the executive portal where CIO, CISO, and business leaders review security posture alongside supporting documents and action plans.

Business value: Gives leadership a single view of endpoint security performance and supports faster decision-making.

8. Onboarding and Offboarding Security Checklist Management

Data flow: SharePoint ? OpenText Webroot Unity

HR and IT can manage employee onboarding and offboarding checklists in SharePoint, including endpoint protection enrollment, device assignment, and access revocation tasks. As part of the workflow, OpenText Webroot Unity administrators can be notified to apply or remove endpoint protection policies for new hires, contractors, or departing employees.

Business value: Reduces security gaps during employee transitions and ensures endpoint controls are applied consistently.

How to integrate and automate SharePoint with OpenText Webroot Unity using OneTeg?