{"id":13831,"date":"2017-11-21T00:00:00","date_gmt":"2017-11-21T05:00:00","guid":{"rendered":"https:\/\/centricconsulting.com\/post\/office-365-sharing-data-with-external-users_portal\/"},"modified":"2021-12-15T00:14:32","modified_gmt":"2021-12-15T05:14:32","slug":"office-365-sharing-data-with-external-users_portal","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/office-365-sharing-data-with-external-users_portal\/","title":{"rendered":"Office 365 Information Security: Sharing Data with External Users"},"content":{"rendered":"
When it comes to collaborating, Office 365<\/a> allows colleagues to check availability in Outlook, schedule a Skype for Business<\/a> meeting, and share files in SharePoint, OneDrive for Business, or Office 365 Groups. While sharing within your organization is fairly simple, sharing with external users requires some planning.<\/p>\n External users can be anyone outside your organization – from partners to customers. A technical description of an external user is someone who does not have an account registered or licensed in your Office 365 tenant.<\/p>\n There are two types of external users \u2013 authenticated and anonymous:<\/p>\n Before you start allowing external users to access your data, you should consider the existing policies set by your organization.<\/p>\n Some of these policies may include:<\/p>\n You may also find that your organization does not have policies in place that address the sharing of content with external users except through email. If this applies to your organization, you must configure your Office 365 tenant to limit external sharing until the proper policies and controls can be put into place, limiting the risk to the organization.<\/em><\/p>\n While external sharing is a great way to extend your organization to your partners, suppliers, and perhaps even your customers, you must account for certain risks.<\/p>\n Some of those risks include:<\/p>\n While these risks – and potentially others – may apply to your organization, there are processes, settings, and tools within Office 365 that can mitigate the risks.<\/em><\/p>\n Protect your corporate assets and intellectual property by making sure you:<\/p>\n External sharing can be configured separately for different capabilities in Office 365, but primarily for SharePoint Online, OneDrive for Business, Outlook, Skype for Business, and Office 365 Groups.<\/p>\n You can share an entire site, lists and libraries, and documents. Keep in mind that external users will need to authenticate to see all of these items while anonymous users can only see documents. Additionally, SharePoint gives you the ability to limit users who can share with external users.<\/p>\n You can share free or busy information with external users that include: time slots only, subject and location, or full details.<\/p>\n You can schedule meetings or chat with external users.<\/p>\n When it comes to sharing or collaborating with partners and customers, it is critical to include external sharing as part of your Office 365 governance and security planning.<\/p>\n Remember that a governance plan is not a guarantee for security compliance.\u00a0Users and administrators must observe and follow good practices and policies to minimize the risks.<\/strong><\/p>\n There are many aspects to external sharing that are unique to every organization. Your organization should make decisions on external sharing policies during the configuration planning phase for an Office 365 implementation project. That way, your organization can realize the value of Office 365 without not compromising your intellectual property, corporate assets, or legal compliance.<\/p>\n","protected":false},"excerpt":{"rendered":" Before you allow external users to access your data, consider your organization’s existing policies and the information security risks.<\/p>\n","protected":false},"author":146,"featured_media":28589,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[],"coauthors":[15632],"acf":[],"publishpress_future_action":{"enabled":false,"date":"2024-07-31 12:41:55","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"_links":{"self":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/13831"}],"collection":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/users\/146"}],"replies":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/comments?post=13831"}],"version-history":[{"count":0,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/posts\/13831\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media\/28589"}],"wp:attachment":[{"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/media?parent=13831"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/categories?post=13831"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/tags?post=13831"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/centricconsulting.com\/wp-json\/wp\/v2\/coauthors?post=13831"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
External Sharing: Where Do You Start?<\/h2>\n
\n
What Are Some Information Security Risks?<\/h2>\n
\n
\n
What Can You Share With External Users?<\/h2>\n
SharePoint Online and OneDrive for Business:<\/h4>\n
Office 365 Groups:<\/h4>\n
\n
Exchange (Calendar):<\/h4>\n
Skype for Business:<\/h4>\n
Conclusion<\/h3>\n