Office 365 Pro Plus - Add a service

%3CLINGO-SUB%20id%3D%22lingo-sub-2459153%22%20slang%3D%22en-US%22%3EOffice%20365%20Pro%20Plus%20-%20Add%20a%20service%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2459153%22%20slang%3D%22en-US%22%3E%3CP%3EIs%20there%20any%20way%20to%20block%20or%20disable%20the%20button%20to%20%3CSTRONG%3EAdd%20a%20service%3C%2FSTRONG%3E%20or%20%3CSTRONG%3EAdd%20a%20place%3C%2FSTRONG%3E%20in%20Word%2C%20PowerPoint%20or%20Excel%3F%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20would%20like%20to%20keep%20the%20ability%20to%20have%20our%20organization's%20OneDrive%20and%20SharePoint%20listed%2C%20but%20not%20add%20any%20other%20organization%20or%20personal%20OneDrives%20and%20SharePoint.%26nbsp%3B%20The%20article%20above%20either%20allows%20or%20blocks%20completely.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWe%20looked%20at%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Foffice365%2Ftroubleshoot%2Fgroup-policy%2Fblock-onedrive-use-from-office%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EHow%20to%20block%20OneDrive%20use%20from%20within%20Microsoft%20365%20Apps%20for%20enterprise%20and%20Office%202016%20applications%20-%20Office%20365%20%7C%20Microsoft%20Docs%3C%2FA%3E%2C%20but%20this%20seems%20to%20either%20block%20one%20thing%2C%20but%20not%20the%20other%20and%20does%20not%20have%20any%20way%20of%20restricting%20just%20to%20our%20organization.%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blockwood-cncy_0-1623946709114.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F289569i65406E17B9E539C6%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22blockwood-cncy_0-1623946709114.png%22%20alt%3D%22blockwood-cncy_0-1623946709114.png%22%20%2F%3E%3C%2FSPAN%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blockwood-cncy_1-1623946731380.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F289570iA7E88295FFC30851%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22blockwood-cncy_1-1623946731380.png%22%20alt%3D%22blockwood-cncy_1-1623946731380.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2459153%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EOffice%20365%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EOffice%20Apps%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EProPlus%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2459345%22%20slang%3D%22en-US%22%3ERe%3A%20Office%20365%20Pro%20Plus%20-%20Add%20a%20service%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2459345%22%20slang%3D%22en-US%22%3ESome%20you%20control%20this%20via%20GPO%2Freg%20key%2Fetc%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdeployoffice%2Fprivacy%2Fmanage-privacy-controls%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdeployoffice%2Fprivacy%2Fmanage-privacy-controls%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2459831%22%20slang%3D%22en-US%22%3ERe%3A%20Office%20365%20Pro%20Plus%20-%20Add%20a%20service%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2459831%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F1002630%22%20target%3D%22_blank%22%3E%40blockwood-cncy%3C%2FA%3E%26nbsp%3BHello%2C%20the%20page%20you're%20linking%20to%20is%20about%20two%20different%20GPOs.%20So%20you%20should%20have%20a%20look%20at%20the%201%20and%202%20policy%20settings%20I've%20attached.%20Vasil%20is%20referring%20to%20the%20%22connected%20experiences%22%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fdeployoffice%2Fprivacy%2Fmanage-privacy-controls%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EUse%20policy%20settings%20to%20manage%20privacy%20controls%20for%20Microsoft%20365%20Apps%20for%20enterprise%20-%20Deploy%20Office%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E1.%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fadmx.help%2F%3FCategory%3DOffice2016%26amp%3BPolicy%3Doffice16.Office.Microsoft.Policies.Windows%3A%3AL_SignInOptions%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EBlock%20signing%20into%20Office%20(admx.help)%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E2.%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fadmx.help%2F%3FCategory%3DOffice2016%26amp%3BPolicy%3Doffice16.Office.Microsoft.Policies.Windows%3A%3AL_OnlineStorageFilter%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3EHide%20file%20locations%20when%20opening%20or%20saving%20files%20(admx.help)%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThat%20should%20do%20the%20trick.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2460412%22%20slang%3D%22en-US%22%3ERe%3A%20Office%20365%20Pro%20Plus%20-%20Add%20a%20service%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2460412%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F588790%22%20target%3D%22_blank%22%3E%40ChristianJBergstrom%3C%2FA%3E%26nbsp%3Bthanks%20for%20that%2C%20but%20that%20doesn't%20solve%20the%20whole%20problem.%26nbsp%3B%20It%20still%20allows%20me%20to%20add%20another%20organizations%20SharePoint%20and%20OneDrive.%26nbsp%3B%20It%20only%20blocks%20personal.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20want%20to%20allow%20my%20organization's%20resources%20while%20blocking%20the%20ability%20to%20add%20another%20tenant.%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blockwood-cncy_0-1623959678200.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F289661i700D12A07D544EAB%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22blockwood-cncy_0-1623959678200.png%22%20alt%3D%22blockwood-cncy_0-1623959678200.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22blockwood-cncy_1-1623959741802.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F289662iBF49A66DA5A646A7%2Fimage-size%2Fmedium%3Fv%3Dv2%26amp%3Bpx%3D400%22%20role%3D%22button%22%20title%3D%22blockwood-cncy_1-1623959741802.png%22%20alt%3D%22blockwood-cncy_1-1623959741802.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
New Contributor

Is there any way to block or disable the button to Add a service or Add a place in Word, PowerPoint or Excel?  

 

We would like to keep the ability to have our organization's OneDrive and SharePoint listed, but not add any other organization or personal OneDrives and SharePoint.  The article above either allows or blocks completely. 

 

We looked at How to block OneDrive use from within Microsoft 365 Apps for enterprise and Office 2016 applications..., but this seems to either block one thing, but not the other and does not have any way of restricting just to our organization.

blockwood-cncy_0-1623946709114.pngblockwood-cncy_1-1623946731380.png

 

 

7 Replies

@blockwood-cncy Hello, the page you're linking to is about two different GPOs. So you should have a look at the 1 and 2 policy settings I've attached. Vasil is referring to the "connected experiences" Use policy settings to manage privacy controls for Microsoft 365 Apps for enterprise - Deploy Office...

 

1. Block signing into Office (admx.help)

2. Hide file locations when opening or saving files (admx.help)

 

That should do the trick.

@ChristianJBergstrom thanks for that, but that doesn't solve the whole problem.  It still allows me to add another organizations SharePoint and OneDrive.  It only blocks personal.

 

I want to allow my organization's resources while blocking the ability to add another tenant.

blockwood-cncy_0-1623959678200.png

blockwood-cncy_1-1623959741802.png

 

Which GPOs settings did you use? Are you saying you only allow your org. to sign in (the 1 above) and have disabled personal OneDrive (the 2 above) but can somehow still continue with the attached process and sign in with another account not belonging to your org?

@ChristianJBergstrom These are the ones that I set and I was still able to add another tenant.  In the last ones you can see I still was able to add another org.  I just cannot add any personal sites.

blockwood-cncy_0-1623960246899.pngblockwood-cncy_1-1623960267084.png

blockwood-cncy_2-1623960296095.png

blockwood-cncy_3-1623960466944.pngblockwood-cncy_4-1623960515289.png

 

Hi, a bit rusty in this area! Out of curiosity, what happens when you set value 3 and not only OneDrive personal? Does it wipe your org. ODFB connection too?

Ping @Nuno Silva Would you mind taking a look at this?

 

I know you can disable most things as there are even more reg. keys to use when it comes to this topic, but what's the best way (is there a way) to achieve the requested behavior still not disabling any services? Meaning making OneDrive/SharePoint available from "Add a service" in Office but for own org. only not using any allow/deny list or shutting down services/sharing.

 

@blockwood-cncy perhaps you should look at it from another perspective. I understand you trying to prevent "third-party storage" in general, but end-users will always find a way. And there should be policies for that in your org. too. Have you considered using DLP/Sensitivity labels? In these scenarios you don't even have to bother about possible loopholes as the documents are being classified and protected.