
{"id":3485,"date":"2019-05-16T10:28:05","date_gmt":"2019-05-16T10:28:05","guid":{"rendered":"https:\/\/www.kerneldatarecovery.com\/blog\/?p=3485"},"modified":"2019-05-16T10:51:34","modified_gmt":"2019-05-16T10:51:34","slug":"how-to-restrict-employee-access-to-office-365-data","status":"publish","type":"post","link":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/","title":{"rendered":"How to Restrict Employee Access to Office 365 Data?"},"content":{"rendered":"<p>It\u2019s very common for employees to leave one organization and move to another for various reasons. But, for businesses, the main concern becomes protecting their data when an employee leaves the company. As most companies heavily rely on Office 365 for storing and managing their data, they need to create an Office 365 account for every employee. And when an employee leaves the company, it becomes highly crucial for companies to restrict access to Office 365 data for their ex-employers.<\/p>\n<p>This article discusses the methods that can be used to secure your Office 365 data from an ex-employee. The Office 365 admins have complete access to every employee Office 365 account, so they can easily handle the user\u2019s data and access to their account.<\/p>\n<p>Note: <em>The steps involved in this article are only applicable to Office 365 Business Essentials, Office 365 Business Premium, and Office 365 Enterprise subscription.<\/em><\/p>\n<h4>This Article Involves:<\/h4>\n<ul>\n<li>Restrict Employee Access to Office 365 Data<\/li>\n<li>Restrict Access to Exchange Online<\/li>\n<li>Wipe and Block Employee\u2019s Mobile Device<\/li>\n<\/ul>\n<p><strong>Note: <\/strong>You need global admin credentials to perform any of these steps in your organization\u2019s Office 365 account.<\/p>\n<ol>\n<li><strong>Restricting Employees Access to Office 365 Data<\/strong><br \/>\nThe very first thing to do after an employee leaves your organization is blocking the user from accessing their Office 365 account. Follow the below steps to achieve this:<\/p>\n<ul>\n<li><strong>Sign in<\/strong> to <strong>Office 365 account<\/strong> and go to the <strong>Admin center<\/strong><\/li>\n<li>From the admin center, click <strong>Users <\/strong>and go to <strong>Active users<\/strong><\/li>\n<li>Against the users that you want to block, click <strong>Edit<\/strong><\/li>\n<li>Now, click <strong>Settings <\/strong>and select <strong>Blocked <\/strong>under the <strong>Set sign-in status<\/strong>, and then click <strong>Save<\/strong><\/li>\n<\/ul>\n<p>It will take about 24 hours to permanently prevent users from accessing your organization\u2019s office 365 account. Also, make sure you remove or disable the user from any other type of on-premises service.<\/li>\n<li><strong>Restrict Access to Exchange Online<\/strong><br \/>\nIf your organization is also using Exchange Online as a part of Office 365 subscription, then you\u2019ll also have to restrict ex-employees from accessing their mailboxes. To do this, you need to log-in to Exchange Admin Center and follow the below steps:<\/p>\n<ul>\n<li>Sign-in to your Office 365 account and go to the <strong>admin center<\/strong><\/li>\n<li>Open the lower-left navigation pane and expand the <strong>Admin section<\/strong><\/li>\n<li>From the <strong>drop-down<\/strong>, click <strong>Exchange<\/strong><\/li>\n<li>Now, in the <strong>Exchange Admin Center<\/strong>, go to Recipients, and then select <strong>Mailboxes<\/strong><\/li>\n<li>Select the User and go to the <strong>User Properties<\/strong><\/li>\n<li>Click <strong>Disable Exchange ActiveSync, Disable OWA for Devices, and Disable email connectivity<\/strong><\/li>\n<li>Now, under <strong>Email Connectivity<\/strong>, click <strong>Disable<\/strong><\/li>\n<\/ul>\n<p>This is the simplest method to block users from accessing your organization\u2019s Exchange accounts and secure your data.<\/li>\n<li><strong>Wipe Data and Block the Employee Device<\/strong><br \/>\nIf your organization has given company devices to the employees, then you\u2019ll have to wipe data and block that device so that user cannot access Office 365 data from that device. You can perform this action using the Exchange Admin Center, here\u2019s how:<\/p>\n<ul>\n<li>Log in to Office 365 account and go to the <strong>Admin Center<\/strong><\/li>\n<li>Open the lower-left navigation pane and expand the <strong>Admin section<\/strong><\/li>\n<li>From the drop-down, click <strong>Exchange<\/strong><\/li>\n<li>Now, in the <strong>Exchange Admin Center<\/strong>, go to Recipients, and then select <strong>Mailboxes<\/strong><\/li>\n<li>Select the <strong>specific user<\/strong> and click <strong>View Details under Mobile Devices<\/strong><\/li>\n<li>Select the <strong>Mobile Device<\/strong> on the details page and <strong>choose Wipe Data<\/strong>, and then click <strong>Block<\/strong><\/li>\n<li>Click <strong>Save <\/strong>to end the process<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h4>Conclusion<\/h4>\n<p>It\u2019s natural for employees to leave one organization and move to another. But, companies have to take immediate actions to restrict those employees from accessing their Office 365 data. So, here, we have elaborated some simple techniques that can be used to limit users from accessing Office 365 data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s very common for employees to leave one organization and move to another for various reasons. But, for businesses, the main concern becomes protecting their data when an employee leaves the company. As most companies heavily rely on Office 365 for storing and managing their data, they need to create an Office 365 account for [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":3490,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_stopmodifiedupdate":false,"_modified_date":""},"categories":[7],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Restrict Employee Access to Office 365 Data?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Restrict Employee Access to Office 365 Data?\" \/>\n<meta property=\"og:description\" content=\"It\u2019s very common for employees to leave one organization and move to another for various reasons. But, for businesses, the main concern becomes protecting their data when an employee leaves the company. As most companies heavily rely on Office 365 for storing and managing their data, they need to create an Office 365 account for [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Data Recovery Blog - KDR Tools\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-16T10:28:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-16T10:51:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kerneldatarecovery.com\/blog\/wp-content\/uploads\/2019\/05\/How-to-Restrict-Employee-Access-to-Office-365-Data.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"739\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Himanshu Goyal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Himanshu Goyal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Restrict Employee Access to Office 365 Data?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/","og_locale":"en_US","og_type":"article","og_title":"How to Restrict Employee Access to Office 365 Data?","og_description":"It\u2019s very common for employees to leave one organization and move to another for various reasons. But, for businesses, the main concern becomes protecting their data when an employee leaves the company. As most companies heavily rely on Office 365 for storing and managing their data, they need to create an Office 365 account for [&hellip;]","og_url":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/","og_site_name":"Data Recovery Blog - KDR Tools","article_published_time":"2019-05-16T10:28:05+00:00","article_modified_time":"2019-05-16T10:51:34+00:00","og_image":[{"width":1600,"height":739,"url":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-content\/uploads\/2019\/05\/How-to-Restrict-Employee-Access-to-Office-365-Data.jpg","type":"image\/jpeg"}],"author":"Himanshu Goyal","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Himanshu Goyal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/#article","isPartOf":{"@id":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/"},"author":{"name":"Himanshu Goyal","@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#\/schema\/person\/e9c354723937f8b521182698af05eb15"},"headline":"How to Restrict Employee Access to Office 365 Data?","datePublished":"2019-05-16T10:28:05+00:00","dateModified":"2019-05-16T10:51:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/"},"wordCount":605,"commentCount":0,"publisher":{"@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#organization"},"articleSection":["Tips &amp; Tricks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/","url":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/","name":"How to Restrict Employee Access to Office 365 Data?","isPartOf":{"@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#website"},"datePublished":"2019-05-16T10:28:05+00:00","dateModified":"2019-05-16T10:51:34+00:00","breadcrumb":{"@id":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kerneldatarecovery.com\/blog\/how-to-restrict-employee-access-to-office-365-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kerneldatarecovery.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Restrict Employee Access to Office 365 Data?"}]},{"@type":"WebSite","@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#website","url":"https:\/\/www.kerneldatarecovery.com\/blog\/","name":"Data Recovery Blog - KDR Tools","description":"Data Recovery Blog - KDR Tools","publisher":{"@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kerneldatarecovery.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#organization","name":"Data Recovery Blog - KDR Tools","url":"https:\/\/www.kerneldatarecovery.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-content\/uploads\/2019\/04\/logo.png","contentUrl":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-content\/uploads\/2019\/04\/logo.png","width":161,"height":47,"caption":"Data Recovery Blog - KDR Tools"},"image":{"@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#\/schema\/person\/e9c354723937f8b521182698af05eb15","name":"Himanshu Goyal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kerneldatarecovery.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-content\/uploads\/2021\/11\/Himanshu.jpg","contentUrl":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-content\/uploads\/2021\/11\/Himanshu.jpg","caption":"Himanshu Goyal"},"url":"https:\/\/www.kerneldatarecovery.com\/blog\/author\/himanshu-goyal\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/posts\/3485"}],"collection":[{"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/comments?post=3485"}],"version-history":[{"count":4,"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/posts\/3485\/revisions"}],"predecessor-version":[{"id":3491,"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/posts\/3485\/revisions\/3491"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/media\/3490"}],"wp:attachment":[{"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/media?parent=3485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/categories?post=3485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kerneldatarecovery.com\/blog\/wp-json\/wp\/v2\/tags?post=3485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}