Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip: Control File Sharing for Employees in Microsoft OneDrive

Tip: Control File Sharing for Employees in Microsoft OneDrive

If your business uses Office 365, your users get access to OneDrive, Microsoft’s cloud storage. Your employees can upload, sync, and share documents to collaborate with colleagues. This can be a good thing, but you may want to control how employees are sharing company documents. 

A user can control for sharing an individual file or folder by logging into OneDrive and right-clicking the file and clicking Share.

Users can send the file to an email or type in a contact name, or they can copy a link to share via email or instant messenger. By default, the access will allow users with the link to edit the document, but the user can choose to only allow them to view the file (and not make changes).

This is just on a file/folder basis though. You may want to manage the global settings to control how users can share documents.

Managing How Files are Shared in OneDrive for Users

If you are an admin of your OneDrive account, you can sign into your https://admin.microsoft.com/ account and follow these steps.

  1. On the left, look for Admin centers and click SharePoint.
  2. This should take you to the new SharePoint admin center. You may need to click Open it now to go to the new SharePoint admin center if it takes you to the old one.
  3. On the left, under Policies and click on Sharing.

These settings are going to be global settings for all accounts. You can manage an individual user’s settings by going to Users > Active Users, and select the user you want to manage. Each user will have a OneDrive tab, which also has Sharing options.

Privacy and security settings are really critical for businesses these days, so ensuring that you are doing everything in your power to restrict access to sensitive information is very important. The security experts at Central Technology Solutions can help you get control over your network and your company data. Give us a call at Central Technology Solutions today to get help!

A Brief Review of Backup Strategies
Tip of the Week: Managing Your IT Inventory Manage...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, June 03 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Privacy Data Hosted Solutions IT Services Network Security Data Backup Email Malware Internet Hackers Software IT Support Efficiency Outsourced IT Microsoft Innovation Business Data Recovery Computer Mobile Devices Productivity Managed IT Services Hardware Small Business Upgrade Business Continuity IT Support Google Cloud Computing Backup Ransomware Cybersecurity Phishing User Tips Communication Collaboration Tech Term Managed IT Services Managed Service Provider Windows 10 Business Management Disaster Recovery Workplace Tips Smartphones VoIP Internet of Things Smartphone Android Paperless Office Data Management Social Media Remote Monitoring Managed IT communications Facebook Encryption Mobile Device Managed Service Windows 10 Windows Office 365 Save Money Artificial Intelligence Network Browser Quick Tips Server Virtualization Saving Money Miscellaneous BDR Passwords Holiday Help Desk Wi-Fi BYOD Risk Management Vendor Management Apps Password Automation Healthcare App Mobile Device Management Government Document Management Compliance Windows 7 Health Business Technology Laptops Microsoft Office Applications Gmail Recovery Analytics Remote Work Firewall Avoiding Downtime Big Data Unified Threat Management Users Chrome Employer-Employee Relationship Robot Bandwidth Bring Your Own Device Going Green Training Computers Mobility Wireless Content Filtering Storage File Sharing Two-factor Authentication IT Management Redundancy Tip of the week Apple Scam Antivirus Project Management Blockchain Information Infrastructure Money Data storage Telephone Systems Computing SaaS Hosted Solution Data Security Processor Website Data loss Vulnerability Office RMM Information Technology Printing Machine Learning Operating System Tablet Proactive Meetings Remote Computing Software as a Service Router Files Settings Flexibility Maintenance Gadgets Customer Service Unified Communications Social Politics Work/Life Balance VPN Virtual Reality IoT Downtime Access Control Customer Relationship Management Virtual Private Network OneDrive Regulations Company Culture Budget IT Service Bitcoin Server Management Recycling How To Monitors Alert Utility Computing Consulting Electronic Medical Records IT solutions Outlook Uninterrupted Power Supply Augmented Reality Mouse Consultation Dark Web How To Samsung The Internet of Things Covid-19 Managed Services Provider Sports Google Drive Employee-Employer Relationship Word Search Remote Monitoring and Management Management Business Growth Chromebook Smart Technology Net Neutrality Social Network Private Cloud Mobile Office Remote Workers Mobile Computing Tech Support File Management Hacker Solid State Drive Upgrades Internet Exlporer Hard Drive Spam Digital Payment Networking Twitter YouTube Current Events Patch Management Payment Cards HIPAA WiFi Websites Identity Theft Wireless Technology Legal Time Management Licensing Cooperation Mobile Security Electronic Health Records Co-Managed IT Display Network Management Monitoring End of Support Administration Employees LiFi Professional Services Managed Services Education Assessment Computer Care MSP Security Cameras Technology Laws User Management Unsupported Software Unified Threat Management Virus Hotspot Virtual Desktop Gadget Cyberattacks Best Practice Mail Merge Manufacturing Optimization Update Black Friday Roanoke — Central Technology Solutions Automobile Touchscreen Techology Biometric Fraud Screen Reader Remote Working VoIP Sponsor Transportation Mobile VoIP Mirgation Development Zero-Day Threat Motherboard OneNote Virtual Assistant Vendor Downloads GPS Managing Stress Instant Messaging Lenovo Employer/Employee Relationships IT Assessment Social Engineering USB Tech Terms Windows 8 Save Time Statistics Remote Worker Batteries Mobile Data User Error Language eWaste Read Only Address Hard Disk Drives Virtual Machines Cyber Monday technology services provider Disaster Resistance Projects Gamification Smart Tech Crowdsourcing Digital Obstacle Cyber security Migration Supercomputer Cables Backup and Disaster Recovery Identities Data Warehousing G Suite History Wasting Time Smart Devices Dark Data Personal Information Operations Marketing Tracking Enterprise Content Management Finance Superfish Proactive Maintenance Digitize Safety Buisness Google Maps Theft Bluetooth ROI Computing Infrastructure Taxes Google Wallet Solid State Drives Credit Cards Technology Assurance Group ’s 18 Proactive IT Return on Investment Notifications Cost Management E-Commerce Spyware Course Teamwork Technology Tips Chatbots IT Budget Wires Human Error Hard Drives Google Docs Shadow IT Black Market Microsoft Excel Modem Connectivity Cabling Humor Shortcut Database Sensors Multi-Factor Security Wearable Technology Vulnerabilities Authentication Database Management WPA3 Financial Backups Notes Printer Alerts Enterprise Resource Planning Bookmarks Drones Firefox Options Holidays Writing Emoji Distributed Denial of Service Annual Convention Heating/Cooling IT Consulting Active Directory Point of Sale Features Deep Learning Shared resources Windows Server 2008 Network Congestion Comparison Identity Permission GDPR Outsourcing Cookies Outsource IT Cybercrime WannaCry Voice over Internet Protocol Computer Repair Google Calendar Geography Authorization Sync Fleet Tracking Procurement Hacking PowerPoint Value of Managed Services Physical Security Telephony Mobile Favorites Alt Codes 5G IT Retail Cortana Managed IT Service San Diego Test Cryptocurrency Servers Data Breach Windows Server 3D Printing Law Enforcement Cache Specifications Public Cloud Video Conferencing Processors Permissions Nanotechnology Laptop Travel Star Wars Telephone Legislation IT Technicians Botnet High-Speed Internet Mobile Device Managment Software Tips Asset Tracking Hacks Disaster Trending Office Tips SharePoint Staff Conferencing Typing Wireless Internet Business Telephone Break Fix Social Networking Cameras Motion Sickness Administrator CCTV Students Relocation Printers Webcam Hard Disk Drive IT Consultant Error Emergency Web Server CrashOverride Regulation