Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Control File Sharing in OneDrive

Tip of the Week: How to Control File Sharing in OneDrive

Microsoft’s solutions are fairly common among businesses, so there’s a fair chance that you utilize Microsoft Office 365, which gives you access to Microsoft’s cloud storage solution, OneDrive. Using this, your users are better able to share documents and collaborate on them… but what if you don’t want your users sharing company documents willy-nilly? Today, our tip will cover how to control sharing in OneDrive.

In OneDrive, a user can share a singular file or folder pretty easily. All they have to do is log in, right-click on the file/folder, and click Share.

Sharing this way allows a user to share their content with one of their contacts, send it to an email address, or copy a shareable link and send it along through an instant message or, again, and email. Doing so gives the recipient access to make edits to it by default, but the sender can restrict them to read-only access if desired.

However, you probably don’t want to micromanage your entire team to make sure they are sharing files and folders with people actually authorized to receive them. Fortunately, by using the global settings of OneDrive, you can take control past the file/folder basis to control how a user can share documents.

Controlling a User’s File Sharing in OneDrive

Assuming that you have administrative access over your OneDrive account, sign in by visiting https://admin.microsoft.com/ before proceeding with the following steps:

  •  Look for Admin centers on the left side of your display. Click SharePoint.
  • You should then be directed to the new SharePoint admin center. If you are brought to the old one, you can go to the new on by clicking on Open it now.
  • Again, on the left side of the screen, find Policies and click on Sharing.

Doing so means that you have edited the global settings, applying your changes to all accounts. To manage settings on a case-by-case basis, access Users, Active Users, and select the individual who you are attempting to manage. You should find a OneDrive tab, with adjustable Sharing options.

With privacy and security being so critical for contemporary businesses, you need to make sure you are doing everything you can to maintain control of your company’s information. Our security experts can help - reach out to us at 866-348-2602 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android Disaster Recovery VoIP communications Business Continuity Smartphones IT Support Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Data Recovery Server Save Money Windows 10 Passwords Virtualization Saving Money Holiday Gadgets Social Media Chrome Tech Term Managed IT Services Managed Service Automation Microsoft Office Computers Facebook Operating System Artificial Intelligence Cybercrime BYOD Mobile Device Management Networking Internet of Things IT Support Hacking Wi-Fi Health Remote Spam Office 365 Telephone Systems Covid-19 Information Managed Service Provider Alert Information Technology Router Bandwidth BDR Social Engineering Mobility Recovery Employer-Employee Relationship Encryption Mobile Computing Applications Remote Monitoring Application Law Enforcement App History Big Data Data Breach Password Money Human Resources Remote Computing How To Mobile Office Government Blockchain Data Storage Paperless Office Patch Management Private Cloud Office Tips Training Managed IT VPN Apps Data Security Marketing Two-factor Authentication WiFi IT solutions Google Drive Entertainment Mouse Website HaaS Budget Avoiding Downtime Vulnerability Windows 7 Wireless Word Infrastructure Bring Your Own Device Servers Voice over Internet Protocol Gmail Data Management Work/Life Balance Settings Flexibility End of Support Virtual Reality Data Protection Physical Security Apple Education Safety Social HIPAA Sports Redundancy User Error USB Keyboard Meetings Vendor Managed Services Telephone System Staff Software as a Service Display Conferencing Risk Management Hacker Machine Learning Scam Connectivity Remote Work Save Time The Internet of Things Employee/Employer Relationship Lithium-ion battery RMM Vendor Management Cleaning Firewall Cryptocurrency SaaS Shadow IT Current Events Legal Telephony Samsung Procurement Internet Exlporer Network Congestion Workplace Strategy Printer Comparison Net Neutrality eWaste Value Bluetooth PDF CES Help Desk Spam Blocking Electronic Medical Records Printing Business Technology Content Management Proactive IT Hiring/Firing Access Control Managed Services Provider Wearable Technology Best Practice IT Consultant Hard Drives Virtual Assistant YouTube Retail Instant Messaging Authentication Black Market Database Humor Robot Excel Remote Workers Biometrics Processor Business Intelligence Virtual Desktop Document Management Solid State Drive Wireless Technology Update Audit Worker How to Downtime Hard Drive DDoS IT Management Google Docs SharePoint Data storage Botnet Identity Theft IT Plan Automobile Computing Computing Infrastructure Unsupported Software Customer Service Environment Augmented Reality Going Green Virus Fraud Charger Unified Threat Management Fax Server Compliance Remote Worker Computer Accessories Digital Signage OneNote Computer Care Battery Audiobook Procedure Recycling Saving Time Tablet Netflix Two Factor Authentication Wiring dark theme Practices Shopping Touchpad Cameras Google Search Domains Amazon Web Services IT Infrastructure Root Cause Analysis Cache AI Music Politics Safe Mode FinTech Advertising Criminal IaaS HBO Bing Maintenance Knowledge Bloatware GDPR Hosted Computing Social Network Skype Online Shopping Investment Notifications Data loss Wireless Internet Tablets Troubleshooting File Sharing Employees Employee/Employer Relationships Outlook Leadership Entrepreneur Camera Windows 365 Inventory Start Menu Printer Server Specifications ISP Relocation Evernote ROI Screen Mirroring Loyalty Wire Video Conferencing Books Sales Bitcoin Frequently Asked Questions Travel Shortcuts Shortcut Windows 10s Cost Management Printers Point of Sale Video Games Personal Mobile Millennials Cryptomining Wireless Charging Cast Social Networking Worker Commute Smart Office Supply Chain Management Emergency Experience Monitoring Batteries Tip of the week webinar Public Cloud Employer Employee Relationship Virtual Private Network Windows 8.1 Scalability Digitize Professional Services Workforce Cables Windows Server 2008 R2 Running Cable Assessment Business Owner Memory Customer relationships NarrowBand Windows Server 2008 Project Management Email Best Practices Search Nanotechnology IT Assessment Tools Telecommuting Manufacturing iPhone Cortana Television Computer Tips Consultant Digital Signature Managed IT Service Security Cameras Warranty Virtual CIO OneDrive Analytics Biometric Security Files Google Apps Public Computer Science HVAC Peripheral Transportation Digital Security Cameras Best Available Analysis Using Data Chromecast Regulations Computer Fan Rootkit Administrator WIndows 7 Devices Copiers 5G Colocation Distributed Denial of Service Uninterrupted Power Supply Customer Relationship Management Enterprise Content Management Quick Tip Analyitcs Benefits MSP Ergonomics Accountants Smartwatch Workers FENG Programming Microchip Thought Leadership Development Monitor Credit Cards OLED Password Management PCI DSS Password Manager Virtual Machine IBM Smart Technology 2FA Fiber Optics Flash Multi-Factor Security Employee Cabling Antivirus Streaming Media Windows Media Player Search Engine User Twitter Messaging Reputation PowerPoint NIST Policy Business Mangement Hypervisor Tech Support Software Tips Supercomputer Windows 8 Content Dark mode Techology Smart Tech Trend Micro Laptop Sync Trending IT service Emails Amazon Default App Managing Stress Addiction SMS Customers

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code