Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Tip: Control File Sharing for Employees in Microsoft OneDrive

Tip: Control File Sharing for Employees in Microsoft OneDrive

If your business uses Office 365, your users get access to OneDrive, Microsoft’s cloud storage. Your employees can upload, sync, and share documents to collaborate with colleagues. This can be a good thing, but you may want to control how employees are sharing company documents. 

A user can control for sharing an individual file or folder by logging into OneDrive and right-clicking the file and clicking Share.

Users can send the file to an email or type in a contact name, or they can copy a link to share via email or instant messenger. By default, the access will allow users with the link to edit the document, but the user can choose to only allow them to view the file (and not make changes).

This is just on a file/folder basis though. You may want to manage the global settings to control how users can share documents.

Managing How Files are Shared in OneDrive for Users

If you are an admin of your OneDrive account, you can sign into your account and follow these steps.

  1. On the left, look for Admin centers and click SharePoint.
  2. This should take you to the new SharePoint admin center. You may need to click Open it now to go to the new SharePoint admin center if it takes you to the old one.
  3. On the left, under Policies and click on Sharing.

These settings are going to be global settings for all accounts. You can manage an individual user’s settings by going to Users > Active Users, and select the user you want to manage. Each user will have a OneDrive tab, which also has Sharing options.

Privacy and security settings are really critical for businesses these days, so ensuring that you are doing everything in your power to restrict access to sensitive information is very important. The security experts at 415 IT can help you get control over your network and your company data. Give us a call at 415 IT today to get help!

A Brief Review of Backup Strategies
Tip of the Week: Managing Your IT Inventory Manage...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, May 30 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Network Security Privacy Hosted Solutions Cloud IT Services Data Recovery Efficiency Software Internet Email Managed IT Services Outsourced IT Malware Innovation Business Small Business Tech Term Cloud Computing Upgrade Hackers Windows 10 Microsoft Cybersecurity Computer User Tips Business Management Collaboration Hardware Mobile Devices Phishing Business Continuity Google Communication Managed Service VoIp Ransomware Workplace Tips Managed Service Provider Android Paperless Office Backup Smartphones Encryption Communications Quick Tips Office 365 Server Mobile Device Remote Monitoring Data Management Managed IT Disaster Recovery Holiday Internet of Things Wi-Fi Passwords Network Browser Healthcare Artificial Intelligence Business Technology Vulnerability BDR Saving Money Windows 7 Document Management Managed IT services Government Save Money Remote Work Smartphone Miscellaneous Applications Laptops Compliance Help Desk Social Media Facebook Virtualization Tip of the week Bandwidth Microsoft Office Data Security Processor Automation Vendor Management Information Project Management Avoiding Downtime Blockchain Antivirus Health Users Two-factor Authentication Employer-Employee Relationship Scam Redundancy OneDrive Chrome Router Storage Analytics Access Control Mobility Machine Learning Virtual Private Network Windows Website BYOD IT Management RMM Company Culture Proactive Customer Relationship Management Infrastructure Meetings Data Loss IoT Software as a Service Maintenance VPN Dark Web Augmented Reality Managed Services Office Internet Exlporer Professional Services Training Time Management Electronic Health Records Networking Employees Smart Technology Consulting Downtime Search Computing HIPAA Utility Computing Bring Your Own Device Unified Threat Management Employee-Employer Relationship Files Managed Services Provider Remote Workers Flexibility Password Apps Mobile Security Social Network Unified Communications Server Management Word Recycling Covid-19 Gadgets Patch Management Gmail File Management Assessment The Internet of Things Risk Management Cooperation Network Management Monitoring Payment Cards Alert Consultation Co-Managed IT Net Neutrality Regulations Financial Management Remote Monitoring and Management File Sharing Operating System Hard Drive Tablet Emergency Multi-Factor Security Wearable Technology Star Wars Private Cloud Optimization Outlook Disaster Resistance Spam Enterprise Content Management How To Test Laptop Shared resources Printer Going Green App Procurement Google Calendar Fraud Database Management Identity Theft Enterprise Resource Planning WPA3 Heating/Cooling Video Conferencing Geography Trending 5G Mobile VoIP Cache Instant Messaging Business Telephone Alerts Settings Unified Threat Management Personal Information Remote Working Virtual Reality Manufacturing Vendor Bookmarks ROI Virtual Machines Travel Shortcut Virtual Assistant Proactive IT Bitcoin Social Networking Statistics Batteries Screen Reader Cyberattacks Social GDPR Identity Fleet Tracking Servers Zero-Day Threat Biometric Firewall Modem High-Speed Internet Mobile Device Management Lenovo Wireless Internet Big Data Remote Computing Customer Service IT Assessment Comparison Licensing Transportation Active Directory Bluetooth Wireless Budget Data Warehousing Samsung Smart Devices Tech Support Recovery Favorites Credit Cards Technology Tips Wasting Time IT Consulting Current Events G Suite Distributed Denial of Service CIO applications SharePoint Smart Tech Read Only Security Cameras Legislation Mobile Asset Tracking Backup and Disaster Recovery Gamification Development Point of Sale Tech Terms Superfish Employer/Employee Relationships Apple MSP Finance Digitize Specifications Mail Merge User Error Windows Server Operations Hard Disk Drives Sensors IT Technicians Cost Management Conferencing Computers Digital Payment Hotspot Database Data Breach Motherboard Chromebook Managed IT Service Downloads Connectivity Printing Windows Server 2008 Notes Websites Human Error Mobile Office Cookies Cables E-Commerce Theft Proactive Maintenance Solid State Drive Migration eWaste Authentication Shadow IT Black Friday Address WiFi User Management Electronic Medical Records Money Solid State Drives Holidays Mouse Language Voice over Internet Protocol Projects Vulnerabilities Break Fix Value of Managed Services Remote Worker PowerPoint Techology Display Managing Stress OneNote SaaS Permission Outsource IT Nanotechnology Wires Features Permissions Cybercrime Cyber security Chatbots Authorization Outsourcing Cyber Monday Staff Teamwork Information Technology Touchscreen Hacking Microsoft Excel Options Telephone Mirgation Politics IT Computing Infrastructure Technology Laws Return on Investment Mobile Computing Regulation Marketing Education CEO Printers Students Twitter Daniel Stevens

Latest Blog

While all a business’ technology solutions are important, some are bound to take priority over the others, especially when certain ones become an industry-wide focus. A recent survey evaluated the top concerns of small-to-medium-sized businesses for the coming year. The resu...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...