If it doesn’t exist, and you’re stuck in the “Windows” folder, simply right-click on the right-hand sidebar and create a new key. Name it “Explorer,” without the quotes. Click on that new key in the left-hand sidebar, and then right-click again on the right-hand sidebar and create a new DWORD (32-bit value). Name it “DisableSearchBoxSuggestions,” without the quotes or the comma. Then, double-click on it and set its value to 1. Finally, reboot your computer.
It is well known that you can manage the Windows Firewall with the MMC snap-in and the command line tool netsh.exe. PowerShell offers a few cmdlets that allow you in many cases to analyze and modify rules faster than the two other tools.
Summary: Describes how users sign in to Office 2013 and how they can set sign-in IDs.
Audience: IT Professionals
Office 2013 users can sign in by using either of two types of credentials: Microsoft account, or Organization or School. The second type of credential is the user ID that is assigned by the organization or school for the purpose of accessing Office 365. The user supplies these credentials within the user interface (UI) or, in certain cases, the credentials can be picked up from the operating system.
In this article:
The sign-in UI
Sign-in settings
Single sign-on, Active Directory, and federated sign-in
The sign-in UI
Sign-in is a two-step process that involves discovery and authentication. In the discovery step, the user enters the email address that is associated with his or her account. The Sign in user interface is shown in the following screen shot.
Figure: User interface for signing into Office
The next step is authentication.
When users enter an email address that is associated with a Microsoft account, they are taken to a Microsoft account version of the sign-in UI. The Can’t access your account? link goes to a page that contains password reset instructions.
Figure: User interface for signing into Office with a Microsoft account ID
When users enter an email account that is associated with their organization or school, they are taken to the organization version of the sign-in UI.
Figure: User interface for signing into Office with an Organization ID
Sign-in settings
You can enable one of four sign-in states by using the Block sign-in to Office Registry setting. This setting controls whether users can provide credentials to Office 2013, and whether they can use their Microsoft account or the user ID that is assigned by your organizations, or both.
The Registry key for this setting is: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Common\SignIn\SignInOptions
To enable a sign-in option, set SignInOptions to a particular numeric value as shown in the following table. The type for the SignInOptions setting is DWORD. The table also describes how each selection affects users.
SignInOptions settings
SIGNINOPTIONS SETTINGS
If you set SignInOptions to this…
This is what it means
This is the effect on users
0
Microsoft account or organization ID
Users can sign in and access Office content by using their Microsoft account or one that is assigned by your organization.
1
Microsoft account only
Users can sign in only by using their Microsoft account.
2
Organization only
Users can sign in only by using the user ID that is assigned by your organization. This can be either a user ID in Azure Active Directory or a user ID in Active Directory Domain Services (AD DS) on Windows Server.
3
AD DS only
Users can sign in only by using a user ID in Active Directory Domain Services (AD DS) on Windows Server.
4
None allowed
Users can’t sign in with any ID.
If you disable, or do not configure, the Block sign-in to Office setting, the default setting is 0, which means that users can sign in by using their Microsoft account or one that is assigned by your organization.
Single sign-on, Active Directory, and federated sign-in
When a user signs in to Office 2013, Office automatically tries to use the Active Directory Domain Services (AD DS) account with which the user logged into the operating system. If that Active Directory account is federated with Office 365, the customer automatically receives all the benefits of signing into Office 365 without having to perform any additional steps. For more information about federating your domain with Office 365, see Prepare for single sign-on.
There is no doubt Office 2016/2013 is very well integrated with web. You can install new templates for its components, download clip art and various kind of resources needful for your documents easily in this productivity suite. You can also save your documents to cloud storage service such as OneDrive. So there are many features in Office 2016/2013, which require that you should be signed in. But what if you don’t find the sign in option or even if you find it, you receive the following message when you try to sign in:
This feature has been disabled by your administrator
Recently, we found that on one of the Office 2013 copy we have, sign-in option at the right top of the screen is missing. In such a condition, there exists no path which could allow us to get logged in, so that we can personalize our experience with Office. In this article, we’re going to share you the fix for such an issue:
Sign in feature disabled in Office 2013/2016
1. Press Windows Key + R combination, type put Regedt32.exe in Run dialog box and hit Enter to open the Registry Editor.
2. In the left pane, navigate to following location:
3. Since you’re facing the issue, in the right pane of above mentioned key, you’ll see the SignInOptions named registry DWORD (REG_DWORD). It must be showing the Value data equals to 3, double click on this DWORD to modify:
4. In the above shown box, change the Value datato1from3. Click OK. If you like you can delete the same DWORD as well. Now close the Registry Editor and reboot the machine to get results. After reboot, you’ll be able to sign in to Office 2013. (See https://www.marcsiegel.us/configure-user-sign-in-for-office-2013-microsoft-docs/ )
admx admin templates need to be copied to C:\Windows\PolicyDefinitions and the corresponding resource files (en-us) need to be copied to C:\Windows\PolicyDefinitions\en-US
If you have Office 2016 and you want to block your staff from easily saving content in the cloud, you can disable the SHARE button using the following Group Policy Object (GPO):
User Configuration -> Administrative Templates -> “Office Product Name” -> Disable Items in User Interface -> Custom -> Disable Commands > ENABLE and enter 26594
Note that you need to set each Office products rules separately; there is no global “turn off the SHARE button” GPO. That means you have to set:
User Configuration -> Administrative Templates -> Microsoft Word 2016 -> Disable Items in User Interface -> Custom -> Disable Commands > ENABLE and enter 26594
and
User Configuration -> Administrative Templates -> Microsoft Excel 2016 -> Disable Items in User Interface -> Custom -> Disable Commands > ENABLE and enter 26594
and
User Configuration -> Administrative Templates -> Microsoft PowerPoint 2016 -> Disable Items in User Interface -> Custom -> Disable Commands > ENABLE and enter 26594
and..
You can download the codes for Microsoft Office 2013 HERE and Office 2010 HERE to figure out what the codes are for Office 2010 and 2013 products. The codes are different. For example you use code 18147 to disable the SHARE button in Word 2013.
This download contains files for and information about each of the control IDs for built-in UI commands and menu items in all applications that use the Office 2016 Fluent UI.
Method 1: You can use the Registry Editor to remove Office Sign In Option from Office 2016.
Here are the steps to follow:
1. On your computer, notebook or laptop go to your Start Screen.
2. From there press “Win + R” dedicated keyboard keys.
3. The Run box will be displayed.
4. There enter “regedit” in order to run Registry Editor.
5. on Registry go to path “HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Common\SignIn”.
6. Then, go to the right panel of Registry and right click on a blank space.
7. Select “New” and pick “DWORD Value”.
8. Name this new value “SignInOptions”.
9. Right click on the new key and set its value to 3.
10. Close Registry Editor and Reboot your Windows 7, open an Office App to check if it works.
Method 2: You can use the Group Policy to remove Office Sign In Option from Office 2016.
Here are the steps to follow:
1. Download the Office 2016 Administrative Template files and install it.
After self-extracting, we can get a folder and open the admx folder inside, where you can see some language-specific folders and Office application specific admx files.
Copy the ADMX files to C:\Windows\PolicyDefinitions
Copy the adml file under the corresponding language file to the corresponding language folder in C:\Windows\PolicyDefinitions
2.Press Windows+R to open Run>type gpedit.msc > hit Enter to launch the Group Policy Editor
3.Go to this path: Local Computer Policy > User Configuration > Administrative Templates > Microsoft Office 2016 > Miscellaneous
4. You should now see the option ‘Block signing into Office‘ > double click on it
Select ‘None allowed’ to disable the sign-in option.
5. Reboot your Windows 7, open an Office App to check if it works.
Note: Blocking signing in Office may affect the use of the Office cloud service.
Rather than browsing for mapped drive letter you can locate the same folder by entering/browsing for the full Universal Naming Convention (UNC) path, i.e, \\server\share.
In the above example the Server name is ‘MyNas’ the Share name is ‘public’ and the folder is ‘MyFolder’. So the UNC path is \\MyNas\public\MyFolder’.
2. Alternatively, change Windows to make mapped shares visible
Note: This solution involves changing the Windows registry.
1. Press the Windows button, type ‘regedit.exe’ and press enter.
2. In the Windows that opens, navigate to:
4. Type EnableLinkedConnections, and then press ENTER.
5. Right-click EnableLinkedConnections, and then click Modify.
6. In the Value data box, type 1, and then click OK.
7. Exit Registry Editor, and then restart the computer.
After making this registry change network shares mapped to a drive letter will be visible to all programs, including those that require elevated privileges