Jaa


Policy recommendations for securing SharePoint sites and files

This article describes how to implement the recommended Zero Trust identity and device access policies to protect SharePoint and OneDrive. This guidance builds on the common identity and device access policies.

These recommendations are based on three different tiers of security and protection for SharePoint files that can be applied based on the granularity of your needs: starting point, enterprise, and specialized security. You can learn more about these security tiers, and the recommended client operating systems, referenced by these recommendations in the overview.

In addition to implementing this guidance, be sure to configure SharePoint sites with the right amount of protection, including setting appropriate permissions for enterprise and specialized security content.

Updating common policies to include SharePoint and OneDrive

To protect files in SharePoint and OneDrive, the following diagram illustrates which policies to update from the common identity and device access policies.

Diagram that shows the summary of policy updates for protecting the access to SharePoint

If you included SharePoint when you created the common policies, you only need to create the new policies. For Conditional Access policies, SharePoint includes OneDrive.

The new policies implement device protection for enterprise and specialized security content by applying specific access requirements to SharePoint sites that you specify.

The following table lists the policies you either need to review and update or create new for SharePoint. The common policies link to the associated configuration instructions in the Common identity and device access policies article.

Protection level Policies More information
Starting point Require MFA when sign-in risk is medium or high Include SharePoint in the assignment of cloud apps.
Block clients that don't support modern authentication Include SharePoint in the assignment of cloud apps.
Apply APP data protection policies Be sure all recommended apps are included in the list of apps. Be sure to update the policy for each platform (iOS, Android, Windows).
Use app enforced restrictions in SharePoint Add this new policy. This tells Microsoft Entra ID to use the settings specified in SharePoint. This policy applies to all users, but only affects access to sites included in SharePoint access policies.
Enterprise Require MFA when sign-in risk is low, medium or high Include SharePoint in the assignments of cloud apps.
Require compliant PCs and mobile devices Include SharePoint in the list of cloud apps.
SharePoint access control policy: Allow browser-only access to specific SharePoint sites from unmanaged devices. This prevents editing and downloading of files. Use PowerShell to specify sites.
Specialized security Always require MFA Include SharePoint in the assignment of cloud apps.
SharePoint access control policy: Block access to specific SharePoint sites from unmanaged devices. Use PowerShell to specify sites.

Use app-enforced restrictions in SharePoint

If you implement access controls in SharePoint, Conditional Access policies are created in Microsoft Entra ID to tell Microsoft Entra ID to enforce the policies you configure in SharePoint. By default, this policy applies to all users, but only affects access to the sites you specify using PowerShell when you create the access controls in SharePoint. The policy can also be scoped for specific users, groups, or sites.

To configure this policy see "Block or limit access to specific SharePoint site collections or OneDrive accounts" in Control access from unmanaged devices.

SharePoint access control policies

Microsoft recommends you protect content in SharePoint sites with enterprise and specialized security content with device access controls. You do this by creating a policy that specifies the level of protection and the sites to apply the protection to.

  • Enterprise sites: Allow browser-only access. This prevents users from downloading, printing, or syncing files.
  • Specialized security sites: Block access from unmanaged devices.

See "Block or limit access to specific SharePoint site collections or OneDrive accounts" in Control access from unmanaged devices.

How these policies work together

It's important to understand that SharePoint site permissions are typically based on business need for access to sites. These permissions are managed by site owners and can be highly dynamic. Using SharePoint device access policies ensures protection to these sites, regardless of whether users are assigned to a Microsoft Entra group associated with starting point, enterprise, or specialized security protection.

The following illustration provides an example of how SharePoint device access policies protect access to sites for a user.

Diagram that shows an example of how SharePoint device access policies protect sites.

James has starting point Conditional Access policies assigned, but he can be given access to SharePoint sites with enterprise or specialized security protection.

  • If James accesses a site he is a member of with enterprise or specialized security protection using his PC, his access is granted.
  • If James accesses an enterprise protection site he is a member of using his unmanaged phone, which is allowed for starting point users, he will receive browser-only access to the enterprise site due to the device access policy configured for this site.
  • If James accesses a specialized security site he is a member of using his unmanaged phone, he will be blocked due to the access policy configured for this site. He can only access this site using his managed PC.

Next step

Screenshot of the Step 4 - Policies for Microsoft 365 cloud apps.

Configure Conditional Access policies for: