Skip to content Skip to footer

Securing File Sharing in Microsoft SharePoint: A Comprehensive Guide

Unlock the full potential of Microsoft SharePoint by confidently sharing your documents with both internal and external stakeholders. SharePoint comes equipped with robust security features, granting you control over who can edit documents, restricting download capabilities, and even setting expiration dates for shared access.

How to Facilitate File/Folder Sharing

Initiate the sharing process by selecting a file or folder, then doing the following:

Desktop App

Right Click on the file or folder you want to share, then go to OneDrive -> Share

Click on the Gear to access the settings window. 

Web Interface

On the web SharePoint site, left click the three dots to the right of the file or folder you want to share, then click on ‘Share’.

Click on the Gear to access the settings window.

In the ensuing window, opt for the “people you specify can edit” checkbox. Choose your selection accordingly, utilizing “People you choose” for external user sharing.

Navigate to “More Settings” and make the following choices:

  • Exercise caution with the “Allow editing” option; only grant access at the minimum required level.
  • If permissible within your organization, enable “Block download” for non-editing users to maintain control over file distribution.
  • If available, leverage all three security measures: expiration dates, passwords, and download blocking.

Utilize the expiration date feature to mitigate the risk of accidental prolonged access. Employ passwords separately from the link for an additional layer of security. Implement download blocking to ensure that files are shared exclusively with the intended users.

Proceed to share your link using either the ‘Send’ or ‘Copy Link’ options. ‘Send’ generates an email directly from Microsoft to your recipient, while copying the link allows for flexible sharing methods.

How to Adjust/Revoke Access

When a user no longer requires access to a file or folder, initiate the revocation process by clicking the three dots as indicated below and selecting “Manage access.”

In the subsequent window, select the three dots displayed below, then choose the ‘X’ icon to revoke access for a specific user.

If the link itself becomes obsolete, take proactive measures to revoke access and prevent unauthorized use. Select the three dots adjacent to the link, then click the ‘X’ icon to eliminate the link and its associated access.

Office Hours

Service and Support 24/7/365

Mon-Fri: 9 AM – 4:30 PM

Weekend and Night Hours available by appointment

Office

GT Computing
60 Connolly Parkway
Building 11 Suite 111
Hamden, CT 06514

Copyright © 2024 GT Computing. All Rights Reserved.

Go to Top