Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip: Control File Sharing for Employees in Microsoft OneDrive

Tip: Control File Sharing for Employees in Microsoft OneDrive

If your business uses Office 365, your users get access to OneDrive, Microsoft’s cloud storage. Your employees can upload, sync, and share documents to collaborate with colleagues. This can be a good thing, but you may want to control how employees are sharing company documents. 

A user can control for sharing an individual file or folder by logging into OneDrive and right-clicking the file and clicking Share.

Users can send the file to an email or type in a contact name, or they can copy a link to share via email or instant messenger. By default, the access will allow users with the link to edit the document, but the user can choose to only allow them to view the file (and not make changes).

This is just on a file/folder basis though. You may want to manage the global settings to control how users can share documents.

Managing How Files are Shared in OneDrive for Users

If you are an admin of your OneDrive account, you can sign into your account and follow these steps.

  1. On the left, look for Admin centers and click SharePoint.
  2. This should take you to the new SharePoint admin center. You may need to click Open it now to go to the new SharePoint admin center if it takes you to the old one.
  3. On the left, under Policies and click on Sharing.

These settings are going to be global settings for all accounts. You can manage an individual user’s settings by going to Users > Active Users, and select the user you want to manage. Each user will have a OneDrive tab, which also has Sharing options.

Privacy and security settings are really critical for businesses these days, so ensuring that you are doing everything in your power to restrict access to sensitive information is very important. The security experts at 415 IT can help you get control over your network and your company data. Give us a call at 415 IT today to get help!

A Brief Review of Backup Strategies
Tip of the Week: Managing Your IT Inventory Manage...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, November 15 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing Network Security Data IT Support Hosted Solutions Privacy Data Recovery Software Cloud Email IT Services Outsourced IT Managed IT Services Malware Internet Tech Term User Tips Innovation Business Efficiency Hackers Computer Windows 10 Small Business Cloud Computing Microsoft Upgrade Business Management Collaboration Phishing Ransomware Google Hardware Cybersecurity Business Continuity Managed Service Paperless Office Communication VoIp Workplace Tips Mobile Devices Android Communications Remote Monitoring Server Office 365 Managed Service Provider Encryption Passwords Managed IT Artificial Intelligence Vulnerability Backup Smartphones Internet of Things Managed IT services Browser Applications Data Management BDR Laptops Business Technology Holiday Disaster Recovery Saving Money Help Desk Wi-Fi Document Management Quick Tips Government Save Money Mobile Device Healthcare Automation Microsoft Office Tip of the week Compliance Blockchain Processor Smartphone Project Management Avoiding Downtime Employer-Employee Relationship Information Antivirus Redundancy Scam Bandwidth Windows 7 Website Access Control BYOD Windows Data Security Vendor Management Infrastructure IT Management Customer Relationship Management Miscellaneous RMM Chrome Two-factor Authentication Router VPN Social Media Analytics Machine Learning Downtime Files Recycling Virtual Private Network Employee-Employer Relationship Mobility Company Culture Gmail The Internet of Things Cooperation Network Risk Management Server Management Password Apps Word Remote Workers Regulations Patch Management Gadgets IoT Software as a Service Net Neutrality Assessment Management Tablet File Sharing Hard Drive File Management Data Loss Users Dark Web Network Management Internet Exlporer Consultation Smart Technology Alert Proactive Maintenance Storage Monitoring Bring Your Own Device Facebook HIPAA Utility Computing Financial Remote Monitoring and Management Operating System Networking OneDrive Professional Services Training Search Mobile Security Employees Unified Threat Management Unified Communications Consulting Specifications 5G Mobile VoIP Development Instant Messaging Servers Settings Personal Information Manufacturing Vendor Motherboard Chromebook Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Digital Payment Hotspot IT Consulting Cyberattacks Social Recovery Managed IT Service GDPR Connectivity Samsung Fleet Tracking Zero-Day Threat Bluetooth Virtualization Batteries Managed Services Provider Mobile Device Management Black Friday Wireless Internet Big Data Cookies Cables SharePoint Customer Service Transportation Active Directory Migration eWaste Smart Devices Vulnerabilities Mail Merge User Error Favorites Money Wasting Time Current Events Superfish Wireless Mouse Language Managing Stress Data Breach Read Only Security Cameras Break Fix Asset Tracking Backup and Disaster Recovery CIO applications Remote Work Point of Sale Tech Terms Cyber Monday Staff Employer/Employee Relationships Apple Nanotechnology Wires Downloads MSP Finance Websites Permissions Windows Server Chatbots Computing Infrastructure Hard Disk Drives Sensors Mobile Computing Address WiFi Conferencing Microsoft Excel Database Mirgation Spam Enterprise Content Management Printing Augmented Reality Notes Wearable Technology Star Wars Human Error Techology E-Commerce Theft Proactive Maintenance Solid State Drive App Authentication Google Calendar SaaS Fraud User Management Identity Theft Enterprise Resource Planning Computing Alerts Solid State Drives Payment Cards Geography Meetings Voice over Internet Protocol Projects Cache Electronic Medical Records Value of Managed Services Social Networking Technology Laws Remote Worker Virtual Reality PowerPoint Display OneNote Permission Touchscreen Travel Hacking Outlook Disaster Resistance Features Firewall Cybercrime Screen Reader Emergency Multi-Factor Security Authorization Time Management Teamwork Information Technology Identity Comparison Licensing Options Telephone Modem High-Speed Internet Printer Politics Heating/Cooling Return on Investment Remote Computing Managed Services G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Tech Support How To Test Technology Tips Trending Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Database Management Smart Tech WPA3 Legislation Statistics Shared resources Going Green Mobile Regulation Marketing Twitter Education Printers CEO Students Daniel Stevens Cyber security

Latest Blog

In managing business technology, we are always talking about downtime--how expensive downtime is, how downtime hurts productivity, how there are a multitude of separate situations that can cause downtime. That kind of doom and gloom may not get you to act, but it may just pu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...