OneDrive Security Settings Every Admin Should Configure
OneDrive Security Settings Every Admin Should Configure
OneDrive is one of the most frequently used services in Microsoft 365, but many administrators overlook critical security configurations. Files stored in OneDrive represent sensitive business data, personal information, and intellectual property. For MSPs managing multiple organizations, properly configuring OneDrive security is essential to preventing data breaches and maintaining compliance.
This guide covers the essential OneDrive security settings every administrator should implement.
Understanding OneDrive Security Risks
Before configuring settings, understand the risks OneDrive addresses:
- Accidental external sharing: Users sharing files with external recipients without authorization
- Malicious sharing: Compromised accounts sharing sensitive files with attackers
- Overly permissive permissions: Files accessible to too many internal users
- Inactive account data: Orphaned OneDrive accounts with unprotected data
- Unmanaged device access: Uncontrolled devices accessing OneDrive files
- Data exfiltration: Unauthorized bulk downloads or sync of files
Strategic OneDrive configuration mitigates all these risks.
Foundational Configuration: SharePoint and OneDrive Settings
OneDrive security starts with SharePoint Admin Center since OneDrive leverages SharePoint infrastructure.
1. Configure Sharing Settings
Navigate to:
- SharePoint Admin Center > Policies > Sharing
Recommended Settings:
Sharing links default type:
- Set to “Internal” (shares only accessible to people in organization)
- Requires users to explicitly choose external sharing
External sharing:
- Set to “Allow external users who have been invited” minimum
- Prevents anonymous sharing
- “Only existing guests” is most restrictive and secure
Implementation rationale: Users can still share externally when business-justified, but defaults prevent accidental external exposure.
File and folder links:
- Default link type: “Specific people” (most restrictive)
- Allow users to select link type: Yes (but default to Specific people)
- “Anyone” links should be disabled if possible
This prevents users from accidentally creating “anyone can access” links.
2. Limit External Sharing Domains
Configuration:
- In Sharing settings, select “Limit external sharing”
- Choose “Allow sharing with external users in your organization’s directory” (most restrictive)
- Or configure allowed domains list
Allowed Domains List:
- Add only partner company domains
- Example:
@client-company.com,@vendor.com - Review quarterly and remove unused domains
This prevents sharing with random external email addresses.
3. Restrict Device Access
Configuration:
- SharePoint Admin Center > Policies > Access Control
- Click “Unmanaged devices”
Recommended Settings:
- Allow full access from desktop apps, mobile apps, and Web: No
- Instead select: “Allow limited, web-only access”
Effect:
- Unmanaged devices can view files in browser
- Cannot sync, download, or upload files
- Forces users to use managed devices for sensitive work
This dramatically reduces risk of data exfiltration from attacker devices.
4. Implement Idle Session Timeout
Configuration:
- SharePoint Admin Center > Policies > Access Control > Idle session timeout
- Set to “Sign out inactive users”
- Select time: “30 minutes” for sensitive data, “1 hour” for general
Effect:
- Users inactive for specified time are automatically signed out
- Prevents attackers from using abandoned sessions
- Users just need to sign back in
Especially important in shared workspaces and healthcare environments.
OneDrive-Specific Security Settings
5. Enable File Version Management and Retention
Configuration:
- Access OneDrive > More > Settings > Version history
- Set version retention: “Automatic” (keeps indefinite versions)
- Or set custom retention: “Keep version for 30 days minimum”
Why it matters:
- Ransomware attacks may encrypt current versions
- Previous versions allow recovery
- Compromised accounts can’t delete all versions without admin intervention
6. Configure Expiration Dates for Sharing Links
Configuration:
- SharePoint Admin Center > Policies > Sharing
- Set “Links must expire within this many days”: 90 days
Effect:
- Shared links automatically expire
- Prevents perpetual access
- Users re-share consciously rather than indefinitely
- Reduces risk of old links being compromised
7. Enable Password Protection for External Shares
Configuration:
- SharePoint Admin Center > Policies > Sharing
- Set “People who use a link must sign in with this organization”: Enable
- For external sharing links: “Require password” (if configured)
Rationale:
- Even if external link is compromised, attacker needs password
- Prevents casual access
- Demonstrates access control to compliance auditors
8. Disable Specific Share Options
Configuration:
- OneDrive Settings > Share > Advanced settings
Disable:
- [ ] Allow anonymous users to upload files - Off
- [ ] Allow unauthenticated flow (anonymous access) - Off
- [ ] Allow external users to reshare files - Off
Effect:
- Only authenticated users can interact with shared files
- Guests cannot reshare to additional users without authorization
- Maintains control over data access chain
9. Implement Information Barriers
For organizations with confidentiality requirements:
Configuration:
- Microsoft 365 Compliance Center > Information barriers
- Create policy: “Prevent Department A from sharing with Department B”
- Apply to affected groups
Use Cases:
- Legal departments (can’t share with general staff)
- Medical staff (patient confidentiality)
- Competitive teams (prevents internal conflicts of interest)
This is a technical control enforcing business policy.
Protecting OneDrive from Compromise
10. Configure Retention Policies for Deleted Files
Configuration:
- OneDrive Admin Center > Settings > Retention
- Set recycle bin retention: 30 days minimum (Microsoft default 93 days)
Effect:
- Deleted files aren’t immediately gone
- Admins can recover deleted files for 30+ days
- Prevents attackers from permanently deleting evidence
11. Enable Malware Detection and Blocking
Configuration:
- Microsoft 365 Defender > Email & collaboration > Policy configuration > Safe attachments
- Enable “Turn on ATP for SharePoint, OneDrive, Teams”
- Enable “Turn on the wait for scan completion”
Effect:
- Files are scanned for malware before download
- Suspected files are blocked
- Users receive alerts
This prevents malware distribution through OneDrive.
12. Configure Sync Restrictions
For compliance-sensitive environments:
Configuration:
- SharePoint Admin Center > Policies > Sync
- Restrict sync to: “Managed domains only”
- List allowed domains (internal domains)
Effect:
- OneDrive sync only works on corporate domain devices
- Prevents home computer sync of business files
- Reduces exposure of sensitive data on personal devices
Alternatively, use Intune to restrict sync via mobile app policies.
Monitoring and Auditing OneDrive
13. Enable and Review Audit Logs
Configuration:
- Compliance Center > Audit > Start recording user and admin activity
- Verify “Audit logging is enabled”
What to Monitor:
- SharePoint Admin Center > Active sites > OneDrive
- Click specific OneDrive > Activity tab
- Review for:
- Unusual file downloads (indicate exfiltration)
- External sharing activity
- Deleted file activity
- Admin access patterns
Automated Alerts (Premium P2):
- Microsoft 365 Defender > Alerts & insights
- Create alert: “Bulk file downloads from OneDrive”
- Threshold: > 50 files in 24 hours
- Action: Email security team
14. Implement Guest Access Policies
Configuration:
- Azure AD > External Identities > External collaboration settings
- Set “Guest user access permissions” to “Guest users have the same access as members” minimum (most restrictive is “Limited access”)
- Set “Admins and users in guest inviter role can invite guests”: Yes/No based on policy
Guest Expiration:
- Set “Guest user access expiration” to “90 days”
- Requires renewal, prevents orphaned guest accounts
OneDrive Governance for MSPs
15. Implement OneDrive Access Policies
Configuration:
- Create Conditional Access policy for OneDrive:
- Target: All users
- App: SharePoint Online
- Device compliance: Required
- Location: Restrict high-risk locations
- Grant: Require MFA
Effect:
- Only compliant devices can sync OneDrive
- MFA required for all access
- Suspicious locations are blocked
Remediation: Responding to OneDrive Security Issues
If you detect unauthorized external sharing:
- Immediate: Disable sharing link or reduce permissions
- Investigation: Review share timestamp and creator
- Containment: Change file permissions, notify affected parties
- Remediation: Update sharing policies to prevent recurrence
If you detect suspicious downloads:
- Check sign-in logs for that user during time of download
- Verify device type and location against known user patterns
- If compromised: Reset password, revoke sessions, review for other unauthorized activity
- Review files downloaded for data sensitivity
Compliance Integration
OneDrive security settings support:
- HIPAA: Encryption and access controls
- GDPR: Retention policies and guest expiration
- SOC 2: Audit logging and access restrictions
- NIST Cybersecurity Framework: Configuration aligns with access controls (AC-3, AC-6)
Common OneDrive Security Mistakes
Mistake: Allowing “Anyone” Links
- Prevents accidental external sharing
- Set default to “Specific people”
Mistake: No Expiration Dates
- Old shared links are compromise vectors
- Implement 90-day expiration minimum
Mistake: Allowing Unmanaged Device Sync
- Attackers can exfiltrate data via personal devices
- Restrict to managed devices only
Mistake: Not Monitoring OneDrive Activity
- Unauthorized sharing goes undetected
- Implement audit logging and automated alerts
Conclusion
OneDrive is powerful for productivity but requires thoughtful security configuration. By implementing these settings:
- You prevent accidental external data exposure
- You block unauthorized access from unmanaged devices
- You maintain audit trails for compliance
- You protect against account compromise scenarios
OneDrive security reflects your overall Microsoft 365 security maturity as an MSP.
Ready to assess your Microsoft 365 security posture? Run a free security assessment at 365 Security Assessment.