Scope
Define which sources, folders or repositories are included.
Guide
SharePoint stores project knowledge, handovers and technical notes. That makes it a common place for credentials to appear outside controlled systems.
Practical guide
Define which sources, folders or repositories are included.
Look for passwords, keys, tokens, connection strings and private keys.
Capture source, path, owner hints, access indicators and confidence.
Rotate, revoke, remove, document and monitor recurrence.
Start focused
Start with a focused exposure assessment across your highest-risk sources: network shares, repositories, OneDrive or SharePoint.