Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Tip of the Week: Sync the OneDrive Files You Need with Windows 10

Tip of the Week: Sync the OneDrive Files You Need with Windows 10

Microsoft OneDrive is a cloud file hosting service that uses synchronization to allow users real-time access to saved information. OneDrive, is most associated with Office 365, to which it offers one terabyte of cloud storage (there is a free tier for consumers as well). Since OneDrive is often used to save Word, Excel, Powerpoint, and OneNote documents, having access to this information from your navigation pane inside of Windows 10 makes it simpler for users to get to files inside of OneDrive. Today, we’ll take a look at how to set the feature up to sync with OneDrive.

OneDrive comes preinstalled on Windows 10 and is integrated into the file explorer. This means file security and syncing is easy. All a user needs to do drag-and-drop the file into a file folder as you typically would inside of Windows Explorer. But what happens if you don’t want to sync your entire OneDrive with your Windows PC? Some people tend to use the cloud for specific purposes and don’t want their whole OneDrive folder available on the computer they are working on. Fortunately, Microsoft has developed OneDrive with the availability to assign what files users want to sync with Windows 10.

Here’s how:

  1. Select the white (or blue) OneDrive cloud icon in the Windows taskbar notification area:
  2.  
  3. It will open a pop-up screen. In this screen select More > Settings.
  4.  
  5. Select the Account tab, and select Choose folders
  6.  
  7. You have to make sure the “Make all files available” box is toggled off:
  8.  

At this juncture you can select all files you want to see. Press OK and all the files you want synced with Windows 10 will be available in Explorer.

For more great tips and tricks that can help you be more productive, efficient, and effective, call the IT experts at Central Technology Solutions today at 1-844-237-4300

Taking a Look at a Manufacturer’s IT
Professional Services Depends on This Technology
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, June 06 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Hosted Solutions Data Privacy Network Security IT Services Data Backup Email Internet Malware Hackers Software IT Support Efficiency Outsourced IT Innovation Microsoft Business Mobile Devices Productivity Computer Data Recovery Hardware Managed IT Services Upgrade Business Continuity Small Business IT Support Google Cloud Computing Backup Cybersecurity Ransomware Tech Term User Tips Phishing Communication Collaboration Managed IT Services Workplace Tips Managed Service Provider Windows 10 Disaster Recovery Business Management Internet of Things Smartphones VoIP Smartphone Android Social Media Paperless Office Mobile Device Data Management Remote Monitoring Managed IT Managed Service communications Facebook Encryption Server Office 365 Windows 10 Windows Artificial Intelligence Save Money Quick Tips Network Browser Saving Money BDR Virtualization Miscellaneous Risk Management Passwords Holiday Help Desk Wi-Fi BYOD Health Healthcare Vendor Management Business Technology Password Automation Apps Mobile Device Management Government Document Management App Windows 7 Compliance Bring Your Own Device Laptops Going Green Bandwidth Training Microsoft Office Remote Work Recovery Analytics Gmail Applications Avoiding Downtime Firewall Unified Threat Management Big Data Employer-Employee Relationship Robot Users Chrome Telephone Systems Data storage SaaS Computing Infrastructure Data Security Office Data loss Vulnerability Blockchain Hosted Solution Website Wireless Computers Mobility Storage File Sharing Content Filtering IT Management Redundancy Information Tip of the week Apple Scam Project Management Processor Antivirus Two-factor Authentication Money Customer Relationship Management Virtual Private Network Regulations Proactive IT Service Downtime Budget Information Technology Operating System Printing Machine Learning Access Control Tablet Meetings Remote Computing Files Settings Flexibility IoT Customer Service Software as a Service Gadgets Social OneDrive Politics Work/Life Balance Router Virtual Reality VPN Company Culture Maintenance RMM Unified Communications Utility Computing Consulting Display Spam End of Support WiFi YouTube Network Management Internet Exlporer Remote Worker HIPAA Managed Services Provider Bitcoin Assessment Monitors Covid-19 How To Electronic Medical Records Administration Server Management Cooperation Employee-Employer Relationship Alert Management Education Outlook Mobile Security Remote Monitoring and Management LiFi Mouse Social Network Consultation Uninterrupted Power Supply Google Drive IT solutions Mobile Office Remote Workers How To Samsung File Management Hard Drive Chromebook Business Growth Word Search Payment Cards Dark Web Sports Private Cloud Augmented Reality Mobile Computing Tech Support Electronic Health Records Co-Managed IT The Internet of Things Hacker Upgrades Solid State Drive Employees Digital Payment Monitoring Professional Services Managed Services Smart Technology Current Events Websites Identity Theft Twitter Wireless Technology Legal Recycling Time Management Networking Net Neutrality Patch Management Licensing 3D Printing Cryptocurrency Transportation Law Enforcement Mobile VoIP Microsoft Excel Modem Development Zero-Day Threat Public Cloud Biometric Hacking Remote Working Multi-Factor Security Wearable Technology Virtual Assistant Vendor Travel Distributed Denial of Service Annual Convention Managing Stress Instant Messaging Employer/Employee Relationships Botnet IT Assessment Servers Data Breach Printer Alerts OneNote Processors Comparison Identity eWaste Office Tips Read Only Hacks Hard Disk Drives Virtual Machines Tech Terms Typing Batteries Mobile Device Managment Software Tips Google Calendar Unsupported Software Virus Gadget Cyber security Cookies Cables Backup and Disaster Recovery Update Best Practice Projects Disaster Automobile Gamification Trending Computer Care Wasting Time Smart Devices Mail Merge Managed IT Service San Diego Enterprise Content Management Finance Proactive Maintenance Digitize Technology Laws Specifications Solid State Drives Credit Cards Touchscreen GPS Techology Social Engineering Theft USB ROI VoIP Sponsor Legislation IT Technicians Cost Management E-Commerce Mobile Data Virtual Desktop Windows 8 Save Time Teamwork Lenovo Permissions Nanotechnology Wires Human Error Return on Investment Identities Database Crowdsourcing Sensors Address Break Fix Social Networking Vulnerabilities Authentication Database Management Shadow IT Statistics Supercomputer SharePoint Staff Connectivity Digital G Suite Obstacle History Black Friday Roanoke — Central Technology Solutions Enterprise Resource Planning Dark Data Bookmarks Personal Information Options Holidays Tracking Disaster Resistance Unified Threat Management Hotspot WPA3 Safety Financial Notes Mirgation Features Shared resources Windows Server 2008 Taxes Superfish Fraud Screen Reader Permission Google Wallet Active Directory Google Maps Hard Drives Google Docs Voice over Internet Protocol Motherboard Geography Authorization GDPR Outsourcing Bluetooth IT Budget Outsource IT Downloads Notifications PowerPoint Value of Managed Services Spyware Course Cabling Cyber Monday technology services provider Mobile Favorites Marketing Humor 5G IT Proactive IT User Error Language Fleet Tracking Procurement Black Market Migration Cache Backups Smart Tech Writing Test Emoji Buisness Drones Windows Server Shortcut Telephone Firefox Point of Sale Data Warehousing High-Speed Internet Network Congestion Deep Learning Video Conferencing Laptop Operations Star Wars Cybercrime Technology Assurance Group ’s 18 Conferencing Computer Repair Wireless Internet Business Telephone Heating/Cooling IT Consulting Computing Infrastructure Asset Tracking Technology Tips Chatbots Cyberattacks Physical Security Manufacturing Telephony Optimization MSP Retail Cortana Alt Codes Security Cameras User Management WannaCry Sync Web Server Emergency CrashOverride Students Cameras Motion Sickness Printers Peripheral CCTV Administrator Relocation Webcam IT Consultant Regulation Hard Disk Drive Error