How to Block a Specific User’s SharePoint Online Access
Josh Reese
|
Jan 27 2023
|
3 min read
As an M365 Administrator, there will most likely come a time when you’ll want to block a specific user’s access to SharePoint Online. I ran into this issue recently for a client of mine, and I found the resources online lacking, so why not share what I’ve learned?
Before we begin, please note that blocking SharePoint Online access will block access to OneDrive as well. We accomplished blocking SharePoint Online using a Conditional Access policy. To utilize Conditional Access policies, your organization needs to have one of the following licenses:
Azure Active Directory Premium P1 or P2,
Microsoft 365 Business Premium,
Microsoft 365 E3 or E5, or
Enterprise Mobility and Security E3 or E5.
You may already be using Conditional Access policies for a variety of reasons. Some include enforcing MFA while excluding trusted location, or maybe you only allow logins to your tenant from within certain countries. Conditional Access policies offer a wide variety of options. For more information on Conditional Access policies in Azure see: Building a Conditional Access policy – Azure Active Directory – Microsoft Entra | Microsoft Learn.
The first step in building our Conditional Access policy is to log into the Azure Active Directory Admin Center. Then under “Security” there is a “Conditional Access” tab.
Then under “Conditional Access,” we can select the “Policies” tab and then “New policy.”
Next, we name our policy, “Block SharePoint Online,” then select the users or groups we want to block. In my situation I targeted one specific user, but in other situations you may want to create a security group and target that instead.
Next, you’ll click “Cloud app or actions” and include “Office 365 SharePoint Online.”
Next, you’ll set your conditions. Here I’m targeting “Any Device” for “Device Platforms,” “Any location” for “Locations,” and all “Client Apps.”
Next set “Grant” to “Block Access.”
Next, set “Session” to “Use app enforced restrictions.” This is key, and the policy will not work if this is not set.
Once you are ready, change the policy from “Report-only” to “On.”
With this policy enabled, users will not be able to access SharePoint or OneDrive from any device.
In my situation, my client required a third party user to have an email address within their tenant, but of course they did not want this third party to have access to all the company data within SharePoint. This Conditional Access policy allows the third party to continue using email while protecting the company data.
If you have questions or need assistance, please reach out to us!
This publication contains general information only and Sikich is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or any other professional advice or services. This publication is not a substitute for such professional advice or services, nor should you use it as a basis for any decision, action or omission that may affect you or your business. Before making any decision, taking any action or omitting an action that may affect you or your business, you should consult a qualified professional advisor. In addition, this publication may contain certain content generated by an artificial intelligence (AI) language model. You acknowledge that Sikich shall not be responsible for any loss sustained by you or any person who relies on this publication.
About the Author
Josh Reese
Josh Reese is a Senior Network Consultant at Sikich, assisting clients in achieving their business objectives through technology and trusted advice. He holds a Bachelor’s degree in Computer Information Systems from The University of Akron, as well as several Microsoft certifications. His primary area of focus revolves around Microsoft’s Cloud services. This includes working with both Azure and Microsoft 365 environments in order to drive clients toward full cloud enablement.
Sign up for Insights
Join 14,000+ Business executives and decision makers.
Latest Insights
Technology
Understanding the ‘Overwrite Return Path’ Settin...
February 18, 2025
Technology
Understanding the ‘Overwrite Return Path’ Settin...
February 18, 2025
As organizations continue to fortify their email security, DMARC (Domain-based Message Authentication, Reporting, and Conformance) has emerged as a p...
Translating Legacy Knowledge with Automation in Manufacturin...
February 14, 2025
Article
Translating Legacy Knowledge with Automation in Manufacturin...
February 14, 2025
Today's shop floors are rich with legacy knowledge from long-tenured workers whose intuition and hands-on experience traditionally guide decision-mak...
Navigating Regulatory Compliance in Pharma Sales with Salesf...
February 12, 2025
Salesforce
Navigating Regulatory Compliance in Pharma Sales with Salesf...
February 12, 2025
The idea that regulatory compliance in pharma sales must always be an overwhelming, manual process is a myth. While pharma has long been bound by an ...
Understanding the Windows Defender Score in Microsoft 365
February 11, 2025
Information Technology
Understanding the Windows Defender Score in Microsoft 365
February 11, 2025
The Windows Defender score, part of the Microsoft 365 Defender suite, is a valuable security metric designed to help organizations gauge and improve ...
Infographic: Hagler Systems Drives Project Visibility and Ac...
February 10, 2025
Dynamics 365
Infographic: Hagler Systems Drives Project Visibility and Ac...
February 10, 2025
For industrial and public-sector clients around the globe, Hagler Systems provides engineering consulting, manufacturing, and project delivery of com...
Cost, Efficiency, and Quality in Manufacturing: Can You Have...
February 7, 2025
Manufacturing
Cost, Efficiency, and Quality in Manufacturing: Can You Have...
February 7, 2025
Manufacturing companies have long faced the production challenge of balancing the goals of reducing costs, improving efficiency, and maintaining high...
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.