Most businesses running Microsoft 365 have a permissions problem they don’t know about. Files shared with “Everyone in the organisation,” old project sites still accessible to staff who left years ago, and OneDrive folders shared externally with no expiry date. It’s not malicious — it’s just what happens when sharing is easy and nobody’s reviewing who has access to what.

If you’ve been following our Microsoft 365 security series, you’ll know we’ve already covered how to check whether your tenant is actually secure and how to classify and label your business data. This post tackles the next critical piece: making sure the right people — and only the right people — can access your files, sites, and data.

This matters even more if you’re considering Microsoft 365 Copilot. AI tools don’t check whether someone should have access to a file — they only check whether they do. If your permissions are messy, Copilot will happily surface confidential documents in search results and chat responses for anyone with access. 

Diagram showing the hierarchy of Microsoft 365 sharing settings flowing from organisation level down to site level and individual file level, illustrating how permissions cascade

Why Oversharing Happens (And Why It’s a Bigger Problem Than You Think)

Oversharing in Microsoft 365 isn’t usually a deliberate decision. It builds up gradually through everyday actions that seem perfectly reasonable at the time.

Someone creates a Teams channel for a project and shares a few files. The project ends, but the channel stays. A staff member shares a SharePoint folder with “People in the organisation” because it’s faster than adding specific names. An external contractor gets guest access to a site and nobody removes it when the contract finishes. A manager forwards a OneDrive sharing link to a colleague, who forwards it again.

None of these are security incidents on their own. But over months and years, they create an environment where nobody — including the business owner — actually knows who can see what.

For Brisbane businesses handling sensitive data (and that’s most of you — client records, financial data, employee information, health records), this is a real compliance risk. The Privacy Act doesn’t care whether a data exposure was deliberate or accidental. If personal information is accessible to people who shouldn’t have it, that’s a problem.

And if your business is working toward Essential Eight compliance, restrictive administrative privileges and controlling user access are core requirements — not optional extras.

How Microsoft 365 Permissions Actually Work

Organisation-Level Sharing Settings

These are the broadest controls, set in the SharePoint admin centre. They define the maximum sharing level available across your entire tenant. The options range from most permissive to most restrictive: “Anyone” links (anonymous, no sign-in required), “New and existing guests” (external users who verify their identity), “Existing guests only,” and “Only people in your organisation.”

Whatever you set here becomes the ceiling. Individual sites can be more restrictive than this setting, but never less.

Our recommendation for most SMBs: Set the organisation-wide default to “New and existing guests” at most. Very few businesses genuinely need anonymous “Anyone” links. If your default is set to “Anyone,” that’s the first thing to change.

Site-Level Permissions

Every SharePoint site and Teams team has its own sharing settings and permission groups. Team sites connected to Microsoft 365 Groups use the group membership to control access — group owners become site owners, and group members become site members.

The key permission levels are straightforward: Owners can manage the site and its settings, Members can add and edit content, and Visitors can only view. Where it gets complicated is when people start creating sharing links or granting individual access outside these groups.

File and Folder Level Sharing

This is where most of the oversharing actually happens. Anyone with Edit access to a file can share it further by default, creating sharing links that may grant broader access than intended.

The default sharing link type matters a lot here. If your tenant default is “People in the organisation,” every time someone clicks “Copy Link” they’re creating a link that any staff member can use. For many files that’s fine. For confidential client documents, it absolutely isn’t.

Five Things to Fix Right Now in Your Microsoft 365 Tenant

You don’t need expensive add-ons to make meaningful improvements. Everything in this section is available with Microsoft 365 Business Premium, which is the licensing tier most of our Brisbane SMB clients are on.

1. Tighten Your Organisation-Wide Sharing Defaults

Open the SharePoint admin centre and head to Policies > Sharing. Check both the SharePoint and OneDrive sharing levels.

Set the organisation-wide sharing to “New and existing guests” unless you have a specific business reason for allowing anonymous links. Then set the default link type to “Specific people” rather than “People in the organisation.” This single change means every time someone shares a file, they’ll need to specify exactly who they’re sharing with.

You should also enable link expiration for any guest sharing links. Thirty days is a reasonable default — it forces people to consciously renew access rather than letting it persist indefinitely.

2. Audit External Sharing Across Your Sites

In the SharePoint admin centre under Sites > Active sites, you can see the external sharing setting for every site. Sort by sharing capability and look for sites set to “Anyone” or “New and existing guests” that don’t need external access.

For each site, ask a simple question: does anyone outside the organisation genuinely need access to this content? If the answer is no, restrict it to “Only people in your organisation.”

Pay special attention to team sites created for internal projects that have ended — these often retain guest access long after the external collaborator has finished their work.

3. Review Microsoft 365 Group Memberships

Every Teams team and most SharePoint sites are backed by a Microsoft 365 Group. The group membership controls who has access. Over time, groups accumulate members who no longer need access — staff who’ve changed roles, contractors who’ve finished, people added “just in case.”

In the Microsoft 365 admin centre under Teams & groups > Active teams & groups, review each group’s membership. For any group connected to a site with sensitive content, confirm that every member still needs access.

You can also set up periodic access reviews through Microsoft Entra ID (formerly Azure Active Directory). This prompts group owners to review and confirm memberships on a regular schedule — quarterly is a good starting point.

4. Check for “Everyone Except External Users” Sharing

This is one of the most common oversharing culprits in Microsoft 365. When someone shares a file or folder with “Everyone except external users,” they’re granting access to every single person in your organisation. For a 10-person business, that might be acceptable. For a 50-person business with different departments handling different client data, it’s a problem.

You can identify this through the SharePoint admin centre’s built-in sharing reports. Look for sites and content shared with broad audiences and decide whether that level of access is appropriate.

If you want to go a step further, you can hide the “Everyone except external users” option from the People Picker using PowerShell, so users can’t accidentally select it when sharing.

5. Set Up Basic Alerts for Unusual Sharing Activity

Microsoft 365 includes a Unified Audit Log that captures sharing events — who shared what, with whom, and when. You can access this through the Microsoft Purview compliance portal.

Set up alert policies for activities that warrant attention: external sharing of files from sensitive sites, creation of “Anyone” sharing links (if you haven’t disabled them), and bulk sharing activity that might indicate a compromised account.

You don’t need to review every sharing event. The goal is to have visibility when something unusual happens rather than finding out months later during an audit — or worse, after a breach.

How This Connects to Data Classification

If you followed our previous post on data classification and sensitivity labels, you might be wondering how labels and permissions work together. The short answer: they’re complementary, and neither is effective on its own.

Sensitivity labels control what people can do with a file (encrypt it, restrict printing, prevent forwarding). Permissions control who can find and open the file in the first place.

A file labelled “Confidential” with encryption is protected regardless of where it ends up. But if the SharePoint site it lives on is accessible to your entire organisation, everyone can see the file exists — even if the label prevents some of them from opening it. That’s still a metadata exposure you want to avoid.

The strongest position is labels and permissions working together: the file is labelled and encrypted, and it sits on a site with restricted access. Belt and braces.

When You Might Need More: SharePoint Advanced Management

Everything above is included with Microsoft 365 Business Premium. But if your business needs more detailed oversight — particularly larger organisations or those preparing for Copilot — Microsoft offers SharePoint Advanced Management (SAM) as an add-on.

SAM is included automatically if you have at least one Microsoft 365 Copilot licence, or it can be purchased separately at around $3 per user per month. It adds capabilities like Data Access Governance reports (which identify overshared sites across your entire tenant), Restricted Access Control (which locks sites down to specific security groups), and Site Access Reviews (which delegate permission reviews to site owners).

For businesses with 10–30 users on Business Premium, the built-in tools covered in this post are usually sufficient. For larger organisations, or those dealing with highly regulated data, SAM is worth evaluating — especially if Copilot is on the roadmap.

We can help you assess whether the built-in controls are enough or whether SAM makes sense for your situation. No pressure, just a practical conversation about what actually fits your business.

Frequently Asked Questions

What's the most common permissions mistake in Microsoft 365?
Leaving the default sharing link type set to "People in your organisation." This means every time someone shares a file using the default option, anyone in the business can access it. Changing this to "Specific people" forces users to consciously choose who gets access.
Can I see who has access to a specific SharePoint site?
Yes. In the SharePoint admin centre, select the site and click "Permissions." You'll see the site owners, members, and visitors. For more detailed file-level sharing information, you can check the Unified Audit Log in Microsoft Purview or use the site's built-in sharing reports.
How do I remove guest access for someone who no longer needs it?
You can remove guest users from individual sites through the site's permissions settings, or remove them from Microsoft 365 Groups through the admin centre. For a tenant-wide cleanup, review all guest accounts in Microsoft Entra ID and remove any that are no longer needed. Setting guest access expiry policies prevents this problem from building up again.Alternatively, as a Microsoft Reseller, we can provide you a quote.
Does tightening permissions affect productivity?
t can if you go too far too fast. The goal isn't to lock everything down — it's to make sure access matches what people actually need. Start with the organisation-wide defaults (low disruption, high impact), then address specific overshared sites. Communicate changes to your team so they understand why and know how to request access when they need it.
How does this relate to Essential Eight compliance?
Essential Eight Maturity Level 2 requires organisations to restrict user access to what's needed for their role and to validate that access regularly. Auditing and tightening Microsoft 365 permissions directly supports the "restrict administrative privileges" and "restrict Microsoft Office macros" controls, and aligns with the broader principle of least privilege that underpins the framework.

What’s Next in This Series

We’ve now covered tenant security, data classification, and permissions — the three foundations you need before safely adopting AI in your business. In our final post next week, we’ll bring it all together: Is Your Microsoft 365 Tenant Ready for AI? A Pre-Copilot Checklist — a practical guide to everything you need in place before switching on Microsoft 365 Copilot.

Ready to Find Out What’s Actually Exposed in Your Tenant?

Most businesses are surprised by what a permissions audit turns up. If you’d rather know now than find out during a breach or compliance review, book a free MSP Discovery Call with InnovateX Solutions. We’ll walk through your current sharing settings, identify the quick wins, and give you a clear picture of where you stand.