Back to Blog
Privacy & Security

Excel Metadata in Collaborative Editing: Hidden Risks of Real-Time Co-Authoring

Real-time co-authoring in Excel has transformed how teams work on spreadsheets together. Features like simultaneous editing in SharePoint, OneDrive, and Microsoft 365 make collaboration seamless — but they also create metadata trails that most users never see. Every co-authoring session records who edited what, when they were present, what changes they made, and how the document evolved over time. Understanding these hidden metadata risks is critical for anyone sharing sensitive spreadsheets with colleagues, clients, or external partners.

Privacy & Security Team
April 15, 2026
18 min read

How Co-Authoring Creates Metadata Trails

When multiple people edit an Excel file simultaneously through SharePoint, OneDrive, or Microsoft 365, the platform must coordinate changes across all participants. This coordination requires tracking detailed information about each editor, their session, and their contributions. What most users do not realize is that this tracking information persists long after the editing session ends.

Traditional single-user editing embeds a single “Last Modified By” name and a modification timestamp. Co-authoring multiplies this by every participant. Each co-authoring session records the identity of every editor, the exact time they joined and left, which cells they modified, and a full change history that can be reviewed by anyone with access to the file’s version history.

This metadata exists at multiple layers: within the Excel file itself, in the SharePoint or OneDrive version history, in activity logs maintained by the platform, and in audit trails accessible to administrators. Even if you clean the Excel file’s internal metadata, the platform-level records often remain intact.

The Collaboration Paradox

Co-authoring is designed for transparency — everyone should see who is editing and what they changed. But when the file is later shared externally or with people who were not part of the original collaboration, that same transparency becomes a privacy liability. Internal team dynamics, individual contributions, editing patterns, and even work schedules become visible to unintended audiences.

Types of Metadata Generated During Co-Authoring

Co-authoring generates several distinct categories of metadata, each with its own privacy implications:

Metadata TypeWhat It RecordsPrivacy Risk
Author & co-author identitiesFull names, email addresses, Microsoft account profiles of all editorsReveals team structure and individual involvement
Presence indicatorsWho was actively editing at any given time, cursor positions, selected cellsExposes work schedules and time zones
Change attributionWhich user changed which cells, with before-and-after valuesReveals decision-making process and who made specific decisions
Version historyFull snapshots of the file at various points, with timestamps and editor namesPreserves deleted content and earlier drafts permanently
Comments and @mentionsThreaded discussions, resolved comments, tagged individualsInternal discussions may persist even after resolution
Activity logsPlatform-level logs of file opens, edits, shares, downloads, and permission changesCreates a complete audit trail accessible to admins

The combination of these metadata types creates a remarkably detailed picture of the collaboration process. An external party who gains access to the file and its history can reconstruct not just what the final spreadsheet says, but how it was built, who made which decisions, what values were changed along the way, and what internal discussions shaped the final numbers.

Version History: The Permanent Record Problem

Version history is arguably the most significant metadata risk in collaborative editing. When co-authoring is enabled through SharePoint or OneDrive, the platform automatically saves versions of the file at regular intervals and after each co-authoring session. These versions create a permanent record that cannot be removed by simply editing the current version of the file.

Consider a common scenario: a team collaborates on a pricing spreadsheet. Early versions contain internal cost breakdowns, margin calculations, and notes about competitor pricing. The team refines the spreadsheet, removes sensitive columns, and prepares a “clean” version for the client. But the version history still contains every earlier draft with all the sensitive data intact.

Version History Carries Forward

When you share a file via a SharePoint or OneDrive link, the recipient may be able to access the version history depending on their permission level. Even “View Only” permissions can allow version history access in some configurations. A file that looks clean in its current version may expose months of sensitive edits through its history. Always create a fresh copy of the file before sharing externally — do not share the original collaborative document.

What Version History Reveals

  • Deleted data — Columns, rows, or entire sheets that were removed from the final version remain accessible in earlier versions. This includes sensitive data like internal cost structures, employee information, or draft calculations that were intentionally removed.
  • Value changes over time — How numbers evolved reveals the negotiation or decision-making process. A price that changed from $50 to $75 to $60 tells a story about internal pricing discussions that the final $60 figure alone does not.
  • Who changed what — Each version is attributed to a specific user. This reveals who has authority over pricing decisions, who performs data entry versus review, and the internal approval chain.
  • Timing patterns — When versions were saved reveals work schedules, time zone information, and how much time was spent on specific changes. Rapid successive versions may indicate rushed work or contentious edits.

Comments, Threads, and @Mentions

Co-authoring encourages communication directly within the spreadsheet through comments, threaded discussions, and @mentions. These are powerful collaboration tools, but they create metadata that is easy to overlook when preparing a file for external sharing.

Excel’s comment system has evolved significantly. Modern Excel supports threaded comments (called “Comments”) and legacy comments (now called “Notes”). Both types embed the commenter’s name and timestamp. Threaded comments also support @mentions, which link to specific Microsoft 365 user profiles and can reveal email addresses and organizational information.

Resolved Comments Persist

When a threaded comment is “resolved,” it is hidden from the default view but not deleted. The entire thread, including all replies and the identity of who resolved it, remains in the file. Anyone who knows to look at the comment pane and toggle “Show Resolved” can read the full discussion.

@Mentions Reveal Org Structure

When you @mention a colleague in a comment, Excel embeds their Microsoft 365 profile information in the file. This includes their full name and email address. A file with multiple @mentions reveals team members, their roles (based on context), and internal reporting relationships.

Internal Discussions Exposed

Comments like “@Sarah, should we lower this to match CompetitorX’s pricing?” or “@Finance Team, this margin is too thin — can we cut vendor costs?” reveal strategic thinking, competitive awareness, and internal cost pressures that should never be visible to external parties.

Comment Timestamps as Evidence

Every comment carries an exact timestamp showing when it was posted. In legal or compliance contexts, these timestamps can establish when specific individuals knew about certain data points, potentially creating liability around knowledge and decision timing.

Change Attribution and the “Show Changes” Feature

Excel for Microsoft 365 includes a “Show Changes” feature specifically designed for co-authored workbooks. This feature displays a detailed log of every change made to the workbook, including who made the change, when they made it, what the old value was, and what the new value is.

While this is valuable for internal collaboration, the change log creates a forensic-level record of the document’s evolution. If the file is shared with external parties, they can use Show Changes to reconstruct the entire editing timeline. This is particularly dangerous for files that contain financial data, HR information, or competitive intelligence.

What Show Changes Reveals

Change #1: Cell D4 changed from “$125,000” to “$98,000”

Modified by: Sarah.Johnson@company.com

Date: March 12, 2026 at 2:34 PM

Sheet: Q2 Projections

Change #2: Cell D4 changed from “$98,000” to “$110,000”

Modified by: VP.Finance@company.com

Date: March 12, 2026 at 4:15 PM

Sheet: Q2 Projections

This change log reveals that a financial projection was initially reduced by an analyst, then partially restored by a VP — exposing the internal negotiation over budget figures, the authority levels of specific individuals, and the timeline of the decision-making process.

Show Changes vs. Track Changes

“Show Changes” in co-authored workbooks is different from the legacy “Track Changes” feature. Track Changes was removed from Excel for Microsoft 365 because it was incompatible with co-authoring. Show Changes is automatically enabled when a workbook is stored in SharePoint or OneDrive and does not require manual activation — meaning changes are being logged whether or not the user is aware of it.

Platform-Level Activity Logs

Beyond the metadata stored within the Excel file itself, SharePoint and OneDrive maintain their own activity logs for every document. These platform-level logs record actions that the Excel file’s internal metadata does not capture:

  • File access events — Every time someone opens the file, even without editing, is logged with their identity and timestamp. This reveals who has reviewed the document, how many times, and when.
  • Sharing and permission changes — Every share action, permission grant, link creation, and access revocation is recorded. This creates a complete chain of custody showing how the file was distributed.
  • Download events — When someone downloads a local copy of the file, the platform logs the event. This is significant because downloaded copies escape the platform’s access controls and carry their metadata to uncontrolled environments.
  • External sharing records — If the file is shared with external users (outside the organization), the platform logs the external email addresses, the permission level granted, and whether the external user actually accessed the file.

These platform-level logs are accessible to SharePoint administrators and, in Microsoft 365 E5 environments, through the unified audit log and Microsoft Purview. While individual users cannot typically access other users’ activity logs, administrators and compliance officers have full visibility. In legal discovery scenarios, these logs can be subpoenaed and used as evidence.

Real-World Risk Scenarios

The following scenarios illustrate how collaborative editing metadata creates real-world privacy and security risks:

Scenario 1: The Client Proposal

A sales team collaborates on a pricing proposal in SharePoint. Multiple team members edit the pricing sheet, with early versions containing cost breakdowns, minimum acceptable margins, and notes like “Client has budget of $200K — start high.” The team cleans up the final version and sends the SharePoint link to the client.

Risk: The client accesses the version history through the shared link and sees the internal cost structure and negotiation strategy. The “start high” comment reveals the team’s approach, undermining the entire negotiation.

Scenario 2: The HR Spreadsheet

An HR team co-authors a compensation analysis spreadsheet. Different HR staff add salary data for their departments. The file’s change history shows exactly which HR representative entered which salary figures, revealing the internal organizational structure and who has access to compensation data for specific teams.

Risk: A manager who gains access to the change history can determine not only salary ranges across departments but also identify which HR representative to approach for compensation information, bypassing normal approval channels.

Scenario 3: The Board Report

Finance and operations teams collaborate on a quarterly board report spreadsheet. Resolved comments contain discussions about whether to include certain liabilities, how to characterize revenue shortfalls, and debates about restating previous quarter figures. The final report looks polished and factual.

Risk: A board member (or their analyst) reviews the resolved comments and discovers internal disagreements about financial reporting, raising concerns about the reliability of the numbers and potentially triggering an audit.

Protecting Against Co-Authoring Metadata Risks

Mitigating co-authoring metadata risks requires a combination of workflow changes, technical controls, and organizational awareness. Here are the key strategies:

1. Separate Internal and External Files

  • Never share the original collaborative file — Always create a new copy of the file before sharing externally. Download the current version, save it as a new file, and share the new file. This breaks the connection to the version history, comments, and activity logs.
  • Use a “publish” workflow — Establish a process where collaborative working files are kept in an internal SharePoint site and “published” versions are created as separate, cleaned copies in a different location designated for external sharing.
  • Name files distinctly — Use naming conventions that distinguish working files from shareable files. For example, “Q2_Budget_WORKING.xlsx” for the collaborative version and “Q2_Budget_FINAL.xlsx” for the cleaned external version.

2. Clean Metadata Before Sharing

  • Run Document Inspector — Use Excel’s built-in Document Inspector (File → Info → Check for Issues → Inspect Document) on the copy before sharing. Remove all findings, including comments, document properties, hidden content, and invisible objects.
  • Delete all comments and notes — Both resolved and active threaded comments, as well as legacy notes, must be explicitly deleted. The Document Inspector catches these, but manual verification is recommended.
  • Clear author and “Last Modified By” fields — Update the document properties to remove individual names. Replace them with a generic department name or leave them blank.
  • Use MetaData Analyzer — Verify your metadata cleanup with a dedicated metadata analysis tool to confirm that no residual co-authoring artifacts remain in the file.

3. Configure SharePoint and OneDrive Sharing Settings

  • Limit version history access — When sharing via links, ensure that external users do not have access to version history. Configure sharing permissions to grant only “View Only” access without history, or share a downloaded copy rather than a link.
  • Disable co-authoring for sensitive files — For highly sensitive documents, consider disabling co-authoring by checking out the file (in SharePoint) or using the “Open in Desktop App” option with exclusive editing. This prevents the multi-user change tracking that creates the most detailed metadata.
  • Set expiration dates on shared links — External sharing links should have expiration dates to limit the window during which version history and activity data could be accessed.
  • Block downloads when possible — If the recipient only needs to view the data, use “View Only” sharing with download blocking enabled. This prevents the recipient from obtaining a local copy that they can analyze for metadata at their leisure.

4. Organizational Policies and Training

  • Train teams on comment hygiene — Educate employees that comments in co-authored files should be written as if they could be read by external parties. Avoid strategic discussions, competitive references, and personal opinions in spreadsheet comments. Use Teams or Slack for sensitive discussions instead.
  • Establish a “clean before share” culture — Make metadata cleaning a standard part of the file-sharing workflow, not an afterthought. Include metadata review in document approval checklists.
  • Define sensitivity classifications — Use Microsoft Information Protection labels or equivalent to classify spreadsheets by sensitivity level. High-sensitivity files should require mandatory metadata cleaning before external sharing.
  • Audit periodically — Regularly audit externally shared files to verify that metadata cleaning processes are being followed. Use SharePoint admin reports to identify files shared externally that still contain co-authoring metadata.

Co-Authoring Metadata Cleanup Checklist

Use this checklist every time you prepare a co-authored Excel file for external sharing.

Before Sharing a Co-Authored File

  • Have I created a new copy of the file, separate from the collaborative original?
  • Have I deleted all threaded comments, including resolved threads?
  • Have I deleted all legacy notes (formerly called “Comments”)?
  • Have I run Document Inspector and removed all findings?
  • Have I cleared or replaced the Author and Last Modified By fields?
  • Am I sharing the new copy (not a link to the original collaborative file)?
  • If I must share via link, have I verified that version history is not accessible?
  • Have I checked for hidden sheets, named ranges, and pivot table caches that may contain co-author information?
  • Have I verified the cleanup with MetaData Analyzer or a similar tool?

Co-Authoring vs. Traditional File Sharing: A Metadata Comparison

Understanding the difference in metadata exposure between co-authored files and traditionally shared files helps clarify why co-authoring requires additional precautions:

Metadata CategoryTraditional (Email/Download)Co-Authored (SharePoint/OneDrive)
Author identitySingle creator nameAll co-author names and emails
Edit historyLast modified date onlyFull change log with cell-level attribution
Version historyNone (unless manually saved)Automatic version snapshots with full content
Deleted contentRecoverable only via forensic toolsFully preserved in version history
Access trackingNoneComplete log of who viewed/edited and when
Internal discussionsNot embedded in fileComments, threads, and @mentions embedded

Conclusion

Real-time co-authoring has made Excel collaboration faster and more efficient, but it has also created metadata risks that did not exist in the era of emailing spreadsheet attachments back and forth. Every co-authoring session generates a rich trail of identities, changes, comments, and version snapshots that persist long after the collaboration ends.

The key takeaway is simple: never share your collaborative working file directly with external parties. Always create a fresh copy, clean it thoroughly, and verify that no co-authoring artifacts remain. Treat the version history, change log, and comment threads of a co-authored file as internal-only information that requires the same protection as any other confidential business data.

Organizations that embrace co-authoring should pair it with metadata governance — clear policies about comment hygiene, mandatory cleanup workflows before external sharing, and periodic audits to ensure compliance. The productivity gains of real-time collaboration are real, but so are the metadata risks. Managing both is essential for any team that shares Excel files beyond their organization.

Check Your Co-Authored Files for Hidden Metadata

Use MetaData Analyzer to inspect your Excel files for co-authoring artifacts, hidden comments, author information, and other metadata before sharing externally. See exactly what your collaborative spreadsheets reveal.