18.9.52.1 Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'

Information

This policy setting lets you prevent apps and features from working with files on OneDrive using the Next Generation Sync Client.

The recommended state for this setting is: 'Enabled'.

Rationale:

Enabling this setting prevents users from accidentally uploading confidential or sensitive corporate information to the OneDrive cloud service using the Next Generation Sync Client.

Solution

To establish the recommended configuration via GP, set the following UI path to 'Enabled':

Computer Configuration\Policies\Administrative Templates\Windows Components\OneDrive\Prevent the usage of OneDrive for file storage

Note: This Group Policy path may not exist by default.

It is provided by the Group Policy template 'SkyDrive.admx/adml' that is included with the Microsoft Windows 8.1 & Server 2012 R2 Administrative Templates (or newer).

However, we strongly recommend you only use the version included with the Microsoft Windows 10 Release 1607 & Server 2016 Administrative Templates (or newer).

Older versions of the templates had conflicting settings in different template files for both OneDrive & SkyDrive, until it was cleaned up properly in the above version.

Note #2:
In older Microsoft Windows Administrative Templates, this setting was named _Prevent the usage of SkyDrive for file storage_, but it was renamed starting with the Windows 10 RTM (Release 1507) Administrative Templates.

Impact:

Users can't access OneDrive from the OneDrive app and file picker.

Windows Store apps can't access OneDrive using the 'WinRT' API.

OneDrive doesn't appear in the navigation pane in File Explorer.

OneDrive files aren't kept in sync with the cloud.

Users can't automatically upload photos and videos from the camera roll folder.

Note: If your organization uses Office 365, be aware that this setting will prevent users from saving files to OneDrive/SkyDrive.

See Also

https://workbench.cisecurity.org/files/1933

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-20(4), CSCv6|13

Plugin: Windows

Control ID: 0992a7dc1ecfc880b6b56917d79488c06162d0af389c28457154b6ec3ee536b3