ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Limiting OneDrive Sharing

Tip of the Week: Limiting OneDrive Sharing

Statistically speaking, there’s a pretty good chance that you use Microsoft Office 365 in your business, which means you can use OneDrive, Microsoft’s contribution to cloud-based storage and collaboration. If this is how your users work productively, they are probably already familiar with how they can share these documents - but what if there are some things you don’t want freely shared around? Today, we’re going over how you can restrict OneDrive sharing capabilities.

Microsoft makes file and folder sharing in OneDrive pretty easy - log in, right-click the file/folder, and click Share.

This enables a user to share content with their contacts, an email address, or obtain a copy of a shareable link that brings the user accessing it to the content. By default, this allows access to edit the content, but this can be adjusted to read-only.

This is extremely useful when sharing files on an individual basis, but do you really want to monitor your team (or, in other words, babysit them) to ensure that they are only using this capability to send content to those authorized to access it? Probably not, which is why it is nice that OneDrive has global settings that authorize an administrator to go further than individual file and folder permissions to control a user’s sharing capabilities.

Limiting OneDrive File Sharing for a User

Using your admin access over your organization’s OneDrive, visit https://admin.microsoft.com/ and sign in. Once you’ve done so:

  • Find Admin centers on the left side of your screen. Click SharePoint.
  • This should bring you to the new SharePoint admin center. If it is still the old one, go to the new version by clicking on Open it now.
  • One the left side of your screen, locate Policies and select Sharing.

This gives you access to the global settings, which will apply any changes you make to all accounts. To be more granular, and edit individual user settings, access Users, Active Users, and finally, the one you want to grant or rescind privileges from. You should see a tab labeled OneDrive, under which you’ll find Sharing options.

The privacy and security of your data is important - so make sure you have tight control over your company’s data and information. ClearView IT is here to lend a hand. To speak to one of our professionals, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Managed IT Services Communication Data Recovery Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Windows 10 Facebook Disaster Recovery Covid-19 Passwords Holiday Apps IT Support Managed Service Windows 10 Browser Miscellaneous Cloud Computing Outsourced IT Remote Work Internet of Things Managed Service Provider Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Gadgets Server Information Remote Bandwidth Encryption WiFi Mobile Device Management App Business Technology Virtualization Blockchain Spam History Employee/Employer Relationship Budget Gmail Office Apple Two-factor Authentication Information Technology Office 365 Conferencing Health Access Control Data Security Analytics Cybercrime Wi-Fi BDR Big Data Employer-Employee Relationship Document Management Hacker Save Money Patch Management Remote Computing Vendor Compliance Remote Monitoring Voice over Internet Protocol Help Desk Hacking Cost Management IT Management Training Retail Data storage Money Alert Customer Service Unified Threat Management Firewall Hiring/Firing Outlook Applications Augmented Reality Password Word Project Management BYOD Vulnerabilities IBM Website Computing Vendor Management Hard Drive Mobile Office Managed Services Search... Data loss Legal Best Practice Update Sports Travel Social SaaS DDoS Virtual Reality Data Breach User Social Engineering Cryptocurrency Paperless Office Antivirus Black Market Maintenance iPhone Cleaning Education Cortana Robot Windows 11 Content Filtering Chrome Monitoring Healthcare Websites Router Remote Workers Mobility Meetings Mobile Computing Windows 7 The Internet of Things YouTube Free Resource Marketing Twitter Google Maps Scam Running Cable Law Enforcement How To End of Support Laptop Printer Storage VPN Integration Downtime Tech Terms Images 101 Hack Safety Identity Theft Display Notifications Managed IT Digital Unified Communications Virtual Assistant Virtual Desktop Experience Employees Google Docs Bluetooth Taxes Avoiding Downtime HIPAA Distributed Denial of Service Office Tips Holidays Private Cloud Processor Memory Cooperation Disaster Video Conferencing Physical Security Virtual Machines Politics Machine Learning Settings Computer Repair Lithium-ion battery Multi-factor Authentication Start Menu Professional Services Solid State Drive Downloads Computer Care PowerPoint Processors Administration Vulnerability Saving Time Presentation Chromebook Software as a Service Drones Managed Services Provider Data Protection Computers Bitcoin Specifications Automobile Virtual Private Network IT Consultant Telephone How To Current Events Customer Relationship Management Co-Managed IT Wireless Technology Microchip eWaste Excel Solutions Entertainment Flexibility Heating/Cooling Writing Tablet Smart Devices Environment G Suite Tip of the week Reliable Computing Fileless Malware Windows XP Mouse VoIP Gamification Remote Working Social Networking Tracking Company Culture Be Proactive Telephone System AI Regulations Trend Micro Backup and Disaster Recovery Electronic Health Records Web Server Transportation Scalability Directions Digital Security Cameras Administrator SharePoint Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Modem Workplace Strategies Troubleshooting Bring Your Own Device Electronic Medical Records Worker Accountants eCommerce Videos Access Database Surveillance Time Management Music Public Cloud Managing Costs Equifax SSID Staffing Health IT Audit Media IP Address Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Botnet Username File Sharing Virtual Machine Micrsooft Startup Optimization Freedom of Information Smart Technology Business Owner Rental Service Redundancy Reviews Navigation 2FA Flash Cache Addiction email scam Teamwork Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor Competition Legislation News Medical IT Recovery User Tip Shopping Printing Evernote Paperless Network Management CCTV SQL Server LiFi Banking Touchscreen PCI DSS Entrepreneur Google Wallet Licensing Application Deep Learning Emails Humor Computer Malfunction Fake News Supply Chain Inbound Marketing Documents Messenger Emergency Proxy Server Gig Economy Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Business Intelligence Computing Infrastructure Azure Business Metrics Management Regulations Compliance Hosted Solution Samsung Device security Managed IT Service Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Securty Books Tech Human Resources Domains Language Business Mangement Going Green Net Neutrality Society Business Cards Electronic Payment Error Financial Data Tablets Monitors IT Visible Light Communication Scams Reading Bookmark Risk Management Google Calendar Term Google Apps Download Windows 8 Supercomputer Piracy Phone System Virus Telework HTML Public Speaking Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Relocation Browsers Smartwatch Streaming Media Comparison Google Play Work/Life Balance Google Drive Upload Procurement Tech Support Software License Social Network FinTech Keyboard Hard Drives Corporate Profile Screen Reader IT Assessment Point of Sale Computer Accessories Knowledge Data Analysis CES In Internet of Things Television Security Cameras Telephony Trends Supply Chain Management intranet Employer Employee Relationship Mobile Technology Value Shortcuts Wireless Hacks Customer Resource management Organization Shortcut Network Congestion Cabling Devices Cyber security

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?