Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Limiting OneDrive Sharing

Tip of the Week: Limiting OneDrive Sharing

Statistically speaking, there’s a pretty good chance that you use Microsoft Office 365 in your business, which means you can use OneDrive, Microsoft’s contribution to cloud-based storage and collaboration. If this is how your users work productively, they are probably already familiar with how they can share these documents - but what if there are some things you don’t want freely shared around? Today, we’re going over how you can restrict OneDrive sharing capabilities.

Microsoft makes file and folder sharing in OneDrive pretty easy - log in, right-click the file/folder, and click Share.

This enables a user to share content with their contacts, an email address, or obtain a copy of a shareable link that brings the user accessing it to the content. By default, this allows access to edit the content, but this can be adjusted to read-only.

This is extremely useful when sharing files on an individual basis, but do you really want to monitor your team (or, in other words, babysit them) to ensure that they are only using this capability to send content to those authorized to access it? Probably not, which is why it is nice that OneDrive has global settings that authorize an administrator to go further than individual file and folder permissions to control a user’s sharing capabilities.

Limiting OneDrive File Sharing for a User

Using your admin access over your organization’s OneDrive, visit https://admin.microsoft.com/ and sign in. Once you’ve done so:

  • Find Admin centers on the left side of your screen. Click SharePoint.
  • This should bring you to the new SharePoint admin center. If it is still the old one, go to the new version by clicking on Open it now.
  • One the left side of your screen, locate Policies and select Sharing.

This gives you access to the global settings, which will apply any changes you make to all accounts. To be more granular, and edit individual user settings, access Users, Active Users, and finally, the one you want to grant or rescind privileges from. You should see a tab labeled OneDrive, under which you’ll find Sharing options.

The privacy and security of your data is important - so make sure you have tight control over your company’s data and information. Voyage Technology is here to lend a hand. To speak to one of our professionals, give us a call at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Google Privacy Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Mobile Devices communications Managed Service Upgrade Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Facebook Productivity Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Miscellaneous AI Remote Work Server Managed Service Provider Information Holiday Outsourced IT Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 Business Continuity Government Training Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Two-factor Authentication Mobile Office Networking Apple App Employer-Employee Relationship BYOD Vendor Managed Services Mobile Device Management Voice over Internet Protocol Chrome Gmail Budget How To WiFi BDR Applications Computing Hacker Access Control Information Technology Avoiding Downtime Marketing Tip of the week Office 365 Conferencing IT Support Storage Password Managed IT Services Bring Your Own Device Big Data HIPAA Router Operating System Virtual Private Network Computers Health Risk Management Help Desk Website Analytics Office Tips Retail Augmented Reality Healthcare Excel The Internet of Things Cooperation Free Resource Project Management Windows 7 Patch Management Social Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Going Green Vendor Management Solutions Physical Security Customer Service Display Cybercrime Printer Paperless Office Infrastructure Monitoring Document Management Remote Workers Windows 11 Firewall Telephone Scam 2FA Data loss Safety Entertainment Vulnerabilities Sports Mouse Images 101 Administration Telephone System Multi-Factor Authentication Robot Mobility Cost Management IT Management Customer Relationship Management VPN Employees Meetings Data Privacy Settings Wireless Printing Integration Content Filtering User Tip Modem Hacking Processor Presentation Computer Repair Mobile Security YouTube Holidays Cryptocurrency Wireless Technology Data Storage Smart Technology Video Conferencing Virtual Desktop Machine Learning Managed Services Provider LiFi Data storage Saving Time Virtual Machines Professional Services Word Outlook Managed IT Service Maintenance Money Downloads Antivirus Humor iPhone Supply Chain Licensing Cyber security Deep Learning Outsourcing Multi-Factor Security Tech Social Network Telework CES Tablet IoT Communitications Undo Dark Web Workplace Trends Supply Chain Management Alert Education File Sharing Regulations Hiring/Firing Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment Mobile Computing How To Microsoft Excel Paperless Co-managed IT Search Gamification Flexibility Notifications Staff Value Organization Travel Social Networking Application Best Practice Technology Care Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Buisness Business Communications Wearable Technology Memory IT solutions Scams Content Remote Working IBM Legal Health IT Unified Threat Management Motherboard Data Breach Business Growth Hybrid Work Comparison Google Play Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Human Resources Wasting Time Cables Cortana Trend Micro Alt Codes Network Congestion Specifications Security Cameras User Error Microchip Internet Exlporer Software as a Service Competition Fraud Downtime Google Apps Managing Costs Hosted Solution IT Maintenance Username Point of Sale eCommerce Typing Business Intelligence Black Friday SSID Database Surveillance Virtual Assistant Shortcuts Tech Support IT Technicians Virtual Machine User Ransmoware Knowledge Network Management Google Drive Proxy Server Reviews Cookies Vendors Monitors Cyber Monday Medical IT 5G Tactics Development Hotspot Transportation Be Proactive Websites Mirgation Hypervisor Unified Communications Workforce Experience IP Address Google Docs Shopping Nanotechnology Optimization Bitcoin Threats PowerPoint Running Cable SharePoint Addiction Google Wallet Electronic Medical Records Language Employer/Employee Relationships Workplace Strategies Chatbots Recovery Meta Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Hard Drives Windows 8 Amazon Writing Distributed Denial of Service Laptop Service Level Agreement Internet Service Provider Domains Drones Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Outsource IT Evernote Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Refrigeration Environment Halloween Media Download Net Neutrality Public Speaking Twitter Alerts SQL Server Error History Small Businesses Financial Data Lithium-ion battery Browsers Smartwatch Connectivity IT Hacks Displays Social Engineering Break Fix Entrepreneur Scary Stories Fun Upload Procurement Remote Computing Azure

Blog Archive