Best practices for migrating to SharePoint and OneDrive

Best practices for migrating to SharePoint and OneDrive

This article is contributed. See the original author and article here.

Many organizations are coming up on their first-year anniversary of supporting a remote workforce. While some have already started transitioning people back to the office, whether in full-time or hybrid mode, others are looking to make remote work permanent. Either way, having modern collaboration tools that help people share information and work together in real time has become absolutely essential to maintaining productivity. Last year, many IT organizations found themselves scrambling to quickly get people access to tools and information they needed to work from home effectively. Now, they’re in a position to think more strategically about the best ways to support a remote workforce. For organizations who’ve deployed Microsoft 365, one of those ways is by migrating content to SharePoint and OneDrive.  


 


Why migrate?


 


Your organization may have any number of reasons for migrating to SharePoint and OneDrive. Maybe you were already planning the migration when the pandemic hit, maybe you realized that asking people to VPN in to access on-premises file shares wasn’t providing a good employee experience, or maybe your subscription to 3rd party cloud storage is expiring and you realized you can centralize administration and save costs by moving to Microsoft 365.


But the most important reason to migrate is that SharePoint and OneDrive work securely and seamlessly with Microsoft Teams, the digital hub for teamwork that over 115 million daily users rely on to connect and collaborate. And the integration between Teams, SharePoint, and OneDrive empowers you to set governance and compliance policies at an organizational level that can be extended across Teams, SharePoint, and OneDrive—something you can’t do with third-party tools.


With content stored in SharePoint and OneDrive, you can configure secure sharing policies, use Microsoft Information Protection to create policies for automatic classification of sensitive data, or implement information barriers to restrict communication and collaboration between specific business units or teams to avoid conflicts of interest from occurring or between certain people to safeguard internal information. You can also monitor shared content, adding an extra layer of security and control. Through detailed audit logs and reports available in the Microsoft 365 Security and Compliance Center, you can trace SharePoint and OneDrive activity at the folder, file, and user levels, so you can see at a glance if any unauthorized users have tried to access sensitive company or client information. Every user action, including changes and modifications made to files and folders, is recorded for a full audit trail. In addition, even remotely, you also get device visibility and control that’s especially important for thwarting breaches and ransomware attacks.


 


What are the critical steps for a successful migration?


 


No matter what your reasons for migrating to SharePoint and OneDrive, the process can seem overwhelming. You have so much to consider: What content do you have, and where is it stored? What will you move? What needs extra consideration, like regulatory compliance? How will you get data from file shares or third-party cloud apps into SharePoint and OneDrive? And those are just some of the logistical aspects—you also need to think about things like timing for the migration and how to communicate what’s happening to the rest of the organization. To help, we’ve outlined some critical steps for you to consider for a successful migration.


migrationprocess-fileshare.png


Consider your current environment


 


The first step is to understand your current environment. Many organizations have a combination of solutions: file servers with many years’ worth of data, third-party storage solutions holding archived data for legal or regulatory reasons, or third-party cloud storage apps adopted by specific business units. In considering your current environment, you’ll want to review:


 



  • Where your data is located, and whether you need it. As a first step you need to determine what content you have, what you need to keep, and what you want to get rid of.

  • What content people are using. You’ll also want to understand how people across the organization are using the file shares or cloud storage apps to do their daily jobs, so you can plan around the way people work to avoid disrupting productivity.

  • Who has access to what. You probably have certain groups who need to share a lot of information with external parties—clients, partners, or vendors. You’ll need to know what access has been granted so you can ensure they still have access once the content is migrated.

  • How you want to structure things going forward. Once you’ve collected that information from the business, you can reconsider your file and permissions structures for more streamlined administration and better security.

  • Whether you need help. All of this can be daunting, so consider enlisting support: Microsoft FastTrack services can help you get started by helping to assess your environment and develop a plan, If you need help with migrating your file shares, on-premises SharePoint environments, or other cloud sharing solutions to Microsoft 365.


 


Create a high-level timeline and outline any risks


 


Develop a high-level timeline for your migration based on priority and your earlier assessments. This will help you determine cutover dates for all content and users and address any risks you’ve identified, such as sites or file shares that need to be scrubbed, legal hold or eDiscovery issues, or even holidays or other important business dates or events that you need to consider.


 


Choose the right tool(s)


 


You may not want or need to migrate all your data the same way. For example, your organization may prefer to have users in some business units manually move their content to OneDrive or SharePoint from share network files or other sharing apps, while other business units with many TBs of customer content or sensitive IP may prefer that IT and security teams work together to move content to its new location. Microsoft offers a broad range of tools to help you migrate different types of content, depending on your needs:


 


mm-main-landing.png


 


Manual Upload. You can ask users to manually upload their files to SharePoint or OneDrive. This works best for smaller files like general Word documents, Excel spreadsheets, and PowerPoint presentations.
Best for: Moving small individual files


 


OneDrive Sync App. For individual users who have a lot of content to move, they can install the OneDrive Sync App for Windows or Mac to drag and drop files from file shares or their computer’s File Explorer to OneDrive. This app also lets users easily manage and access OneDrive files in the same way they manage and access files in File Explorer.
Best for: Moving a personal file library to the cloud


 


SharePoint Migration Tool. You can use the SharePoint Migration Tool (SPMT) to migrate your files from SharePoint on-premises document libraries, lists, or regular files shares.


You can also use the new PowerShell cmdlets based on the SharePoint Migration Tool (SPMT) migration engine to move files from SharePoint 2010 and SharePoint 2013 on-premises document libraries and list items, and file shares to Microsoft 365.
Best for: Migrating SharePoint Server 2010, 2013, and 2016 environments


 


 


SharePoint Assessment Tool. You can use this simple command line executable to assess and identify issues with your on-premises SharePoint Server content prior to migration. It also includes the SharePoint Migration Identity Management Tool, that performs identity mapping by scanning SharePoint, Active Directory, and Azure Active Directory.
Best for: Assessing SharePoint Server 2010 and 2013 content prior to migration


 


Migration Manager. Available in the SharePoint Admin center, Migration Manager provides a centralized way of connecting servers, creating tasks, and automatically distributing your migration tasks.
Best for: Migrating network file shares


 


Migration manager.png



 


Mover. Automated cloud-to-cloud migration service for Office 365 tenant-to-tenant migrations or moving from cloud apps like Box and DropBox.
Best for: Migrating data from other cloud service providers


 


Mover.png



 


Azure Data Box. The Microsoft Azure Data Box is a service that lets you order a device from the Microsoft Azure portal. You can then copy TBs of data from your servers to the device, ship it back to Microsoft, and your data is copied into Azure. Once your data is in Azure, you can use SPMT to migrate content to SharePoint.
Best for: Removing the dependency on your WAN link to transfer data when migrating files


 


Plan your migration and communicate the plan


 


Depending on the tool you choose to use for your migration and your organization’s business needs, you may want to plan your migration during off-work hours or on weekends, if possible, just to avoid disrupting daily business. You may decide to move content and users in waves by business units or teams, or you may decide to move certain content types first—for example, moving smaller documents and working your way up to larger files such as video or CAD files. Whenever and however you decide to move content, you should also create a communications plan, giving people plenty of advanced notice and explaining what they should expect and when. If you have a change management team, you could also work with them on ensuring that documentation and training materials are readily available when the migration begins.


 


Prepare and run your migration


 


Before you begin your actual migration, consider running a pilot to ensure you’ve worked out most of the kinks. A successful pilot can help build confidence, especially with leadership and other key stakeholders, and can help you mitigate risks. Select people from across the organization who own data that they are sharing with each other and/or with external parties so you can test how permissions transfer. You can keep your pilot running even during the actual migration just to help minimize surprises.


On the selected migration date—one you’ve communicated ahead of time to everyone in the organization—ensure people cannot edit or add files. We also suggest leveraging the “Big Bang” approach that involves moving all your users at once providing highest concurrency, throughput and speed.


To keep key stakeholders up-to-date on the progress consider publishing a report that highlights data migrated, status and any errors which can be mostly eliminated by re-running your transfers. Once concluded, your change management team can help with user adoption and onboarding for a smooth transition to OneDrive and SharePoint.



Learn more and stay engaged..


 


Check out all the details on migrating to Microsoft 365 documented here


 


We are very thrilled to showcase the tools and best practices for migrating to Microsoft 365 . Please join us for these webinars 


 


Choosing the right tools for your Microsoft 365 migration on April 6, 2021 at 9:00 am PT.



Best practices for data migrations to Microsoft 365 on April 13, 2021 at 9:00 am PT.


 


Also, check out our latest episode of Sync Up- a OneDrive podcast to hear the experts on success factors that can help you drive an effective migration.


 


https://html5-player.libsyn.com/embed/episode/id/18429635/height/90/theme/custom/thumbnail/yes/direction/backward/render-playlist/no/custom-color/f99400/


 


We continue to evolve OneDrive as a place to access, share, and collaborate on all your files in Office 365, keeping them protected and readily accessible on all your devices, anywhere.


 


You can stay up-to-date on all things via the OneDrive Blog and the OneDrive release notes.


Check out the new and updated OneDrive documentation.


Take advantage of end-user training resources on our Office support center.


 


Thank you again for your support of OneDrive. We look forward to your continued feedback on UserVoice and hope to connect with you at Ignite or another upcoming Microsoft or community-led event.


 


Thanks for your time reading all about OneDrive,


 


Ankita Kirti


OneDrive | Microsoft

The Best of Microsoft Compliance at Ignite March 2021

The Best of Microsoft Compliance at Ignite March 2021

This article is contributed. See the original author and article here.

This will be your guide to the best things about Microsoft Compliance at Ignite March 2021. Bookmark it. Save it.  Come back to it. Share it. Reference it. Enjoy.


 


PreviewImage.png


 


Microsoft Ignite March 2021 may be over but that does not mean you have to stop learning about Microsoft Compliance.  Earlier this year Microsoft CVP of Security, Compliance, and Identity (SCI), Vasu Jakkal spoke about how Microsoft surpassed over $10 billion of security business revenue. And while that’s a significant milestone we are just getting started.  Don’t be fooled…we are not just best in suite; we are best in breed. Just ask Gartner – the Magic Quadrants we reside in say so.  


 


Anyway, I digress.  Here is a quick recap of the Compliance announcements you may have missed:


 



 


Additionally, here goes the list of on-demand sessions you must absolutely watch in case you missed any of our Compliance goodies.


 


Security Keynote


CVP Vasu Jakkal talked about Microsoft’s vision on Security for All including how to reduce complexity and defend your organization against business risk with innovations in security, compliance, identity, and management. She is joined by a start studded cast in Security leader Andrew Conway, Identity leader Irina Nechaeva, and Compliance leader as they dig into the latest news, releases, and updates. WATCH ON-DEMAND Security for All


 


Compliance Keynote


Microsoft Compliance GM Alym Rayani illuminates how Microsoft’s risk management and compliance solutions enable you to identify and respond to these emerging risks while keeping your most important information safe. WATCH ON-DEMAND Manage risk and secure information across your environment


 


Compliance Sessions



 


Ask the Experts



 


Security & Compliance Certifications



 


Security & Learning Path (Online – Free)



 


Compliance Blogs



 


To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity.


 


Follow Christopher on Twitter and LinkedIn

SQL Server 2019 の累積的な更新プログラム適用後に発生するイベント名 feature_restriction_usage が見つからないエラーについて

This article is contributed. See the original author and article here.

こんにちは SQL Server サポートチームです。


今回は SQL Server 2019 CU2 以降を適用した際に ERRORLOG に記録されるエラーについてご説明します。


  


■概要


SQL Server 2019 CU2 以降で拡張イベントの”sqlserver.feature_restriction_usage”が廃止されたことにより、


累積的な更新プログラムを適用した後の初回起動時に、下記のエラーが記録されることがあります。


このエラーは更新プログラム適用後の一時的なものであり、無視していただいて問題ありません。


 


Error: 25623, Severity: 16, State: 1.


The event name, “XXXXXXXXXXXXXXXX.sqlserver.feature_restriction_usage”, is invalid, or the object could not be found


Error: 25710, Severity: 16, State: 1.


Event session “telemetry_xevents” failed to start. Refer to previous errors in the current session to identify the cause, and correct any associated problems.


Error: 25709, Severity: 16, State: 1.


One or more event sessions failed to start. Refer to previous errors in the current session to identify the cause, and correct any associated problems.


 


■発生条件


SQL Server 2019 CU1 以下のバージョンの SQL Server を使っている環境に対して、SQL Server 2019 CU2 以降の更新プログラムを適用することで発生します。


 


■影響


このエラーによるお客様のアプリケーションへの影響はありません。


 


拡張イベントの”feature_restriction_usage”は、SQL Server CEIP サービス に関連して動作する拡張イベントセッション”telemetry_xevents”で使用されています。


SQL Server CEIP サービスは、Microsoft が SQL Server の使用状態に関する情報を収集する内部機能となっており、お客様のすべてのアプリケーションの動作には影響しません。


SQL Server CEIP サービスに関する詳細は下記の公開情報をご確認ください。


 


SQL Server の使用状況および診断データの収集を構成する (CEIP)


https://docs.microsoft.com/ja-jp/sql/sql-server/usage-and-diagnostic-data-configuration-for-sql-server?view=sql-server-ver15


 


■注意事項


SQL Server CEIP サービスを停止/無効化している環境や、SQL Server CEIP サービスが”telemetry_xevents”の定義を変更する前に、SQL Server サービスが再起動された場合は引き続きエラーが記録される可能性があります。


SQL Server CEIP サービスの無効化はサポートされないため、起動した状態にする必要があります。


なお、SQL Server CEIP サービスが起動した状態であれば拡張イベントセッションの定義変更は通常数分で完了し、定義変更後は基本的に自動で”telemetry_xevents”が起動するため特に操作は不要です。

Launching threat analytics for Microsoft 365 Defender

Launching threat analytics for Microsoft 365 Defender

This article is contributed. See the original author and article here.

Threat analytics is Microsoft 365 Defender’s in-product threat intelligence (TI) solution designed to help defenders like you to efficiently understand, prevent, identify, and stop emerging threats. It provides a unique combination of in-depth TI analysis and reports from expert Microsoft security researchers, and consolidated data showing your organization’s security posture relative to the threats. Threat analytics helps you respond to and minimize the impact of active attacks.


 


As part of a unified extended detection and response (XDR) experience in Microsoft 365 Defender, threat analytics is now available for public preview. It includes better data coverage, incident management across security pillars, automatic investigation and remediation, and cross-domain hunting capabilities.  Microsoft 365 Defender threat analytics is available for Microsoft Defender for Office 365 and Microsoft Defender for Endpoint users.


 


If you’re familiar with threat analytics in Microsoft Defender for Endpoint, you’ll be excited to know that the integrated experience you’ll see in Microsoft 365 Defender threat analytics takes your report consumption to another level.


 


What’s new?


Threat analytics for Microsoft 365 Defender introduces:


 



  • Better data coverage between Microsoft Defender for Endpoint and Microsoft Defender for Office 365, making combined incident management, automatic investigation, remediation, and proactive or reactive threat hunting across-the domain possible.

  • Email-related detections and mitigations from Microsoft Defender for Office 365, in addition to the endpoint data already available from Microsoft Defender for Endpoint.

  • A view of threat-related incidents that aggregate alerts into end-to-end attack stories across Microsoft Defender for Endpoint and Microsoft Defender for Office 365 to reduce the work queue, as well as simplify and speed up your investigation.

  • Attack attempts detected and blocked by Microsoft Defender for Office 365. You can also see data that you can use to drive preventive actions that mitigate the risk of further exposure and increase resilience.

  • Enhanced design that puts actionable information in the spotlight to help you quickly identify data to urgently focus on, investigate, and leverage from the reports. 


 


Dana_Bargury_1-1616600125718.png


 


What’s in each report?


With each threat analytics report, you’ll find:



  • Detailed analyst report—deep-dive analysis, MITRE techniques, detection details, recommended mitigations, and advance hunting queries that expand detection coverage.

  • Active alerts and incidents. 

  • Impacted assets, including your devices and mailboxes.

  • Prevented email attempts, indicating whether you were a target of this threat even if the email has been blocked before delivery or delivered to the junk mail folder.

  • Mitigations and their statuses, with options to investigate further and remediate weaknesses using threat and vulnerability management (please note that email related mitigations are found in the analyst report).


 


How do I get there?



  • Threat analytics can be accessed from the Microsoft 365 security center navigation bar.

  • When a new threat report is published or updated, you’ll get a badge in the navigation bar.

  • A dedicated threat analytics card has also been added to the Microsoft 365 security center dashboard, so you can track the threats that are active on your network.


 


Dana_Bargury_2-1616600125754.png


 


Ready to check it out? Explore these threat analytics reports.


Solorigate supply chain attack


Microsoft continues to work with partners and customers to expand our knowledge of the threat actor behind the nation-state cyberattacks that compromised the supply chain of SolarWinds and impacted multiple other organizations. Microsoft previously used ‘Solorigate’ as the primary designation for the actor, but moving forward, we want to place appropriate focus on the actors behind the sophisticated attacks, rather than one of the examples of malware used by the actors. Microsoft Threat Intelligence Center (MSTIC) has named the actor behind the attack against SolarWinds, the SUNBURST backdoor, TEARDROP malware, and related components as NOBELIUM. As we release new content and analysis, we will use NOBELIUM to refer to the actor and the campaign of attacks.


 


This report about the sophisticated attack details how NOBELIUM inserted malicious code into a supply chain development process. A malicious software class was included among many other legitimate classes and then signed with a legitimate certificate. The resulting binary included a backdoor and was then discreetly distributed into targeted organizations. This attack was discovered as part of an ongoing investigation.


 


Emotet breaks hiatus with spike in cybercrime activity


Understand how Emotet operators have started to ramp up activity starting July 2020. Notable for their involvement in Ryuk ransomware distribution, Emotet operators are back with basically the same goals, utilizing similar lure themes and macro-enabled documents. Despite the recent take-down which has interrupted Emotet, your security operation centers should continuously monitor Emotet-related alerts in your antivirus and EDR solutions. Secondary payloads delivered by Emotet prior to the take-down remain a serious and real threat to your network.


 


BazaLoader: Foothold for ransomware


Possibly tied to the same cybercriminals leveraging Trickbot infrastructure, these campaigns appear to be part of ongoing attempts to shift to other entry vectors. Started in late October 2020, these campaigns use phishing emails that take recipients through link chains to implant BazaLoader. Unsurprisingly, the new implant brings in potent tools like Cobalt Strike, which make persistent, direct human attack activity possible. Microsoft’s security solutions remain effective against this threat, regardless of the recent BazaLoader activities that we’ve observed this month. Use advanced hunting to proactively hunt for this threat in your Microsoft 365 security portal (Microsoft 365 Defender) or Microsoft Security Center portal (Microsoft Defender for Endpoint).


 


IcedID’s frosty arrival can lead to data theft


Get your shields up by learning about this modular banking trojan’s modus operandi and how Microsoft 365 Defender can help detect and stop IcedID campaigns at multiple points along the attack chain and across domains, including the very start.


 

New transactable offers from Denodo, Genymobile, and Confluent in Azure Marketplace

New transactable offers from Denodo, Genymobile, and Confluent in Azure Marketplace

This article is contributed. See the original author and article here.








Microsoft partners like Denodo, Genymobile, and Confluent deliver transact-capable offers, which allow you to purchase directly from Azure Marketplace. Learn about these offers below:

















denodo_logo.jpg

Denodo Standard 8.0 (Hourly): Denodo Standard is a new, cost-effective option that helps small to medium-sized organizations get started with Denodo for departmental use cases. Its real-time integrated views can combine your Microsoft Azure data sources with data from on-premises databases and applications. Use Denodo’s modern data virtualization to accelerate your analytics and data services.


logo-genymotion-Genymotion-device-image.png

Genymotion Cloud – Run Android as a VM on Azure: Genymotion Cloud is a suite of Android operating systems based on Microsoft Azure server instances. With Genymotion Cloud, you can access an Android application or environment from any device, just as you would access a remote desktop. This enables mobile threat detection, app testing, content sharing, and more.


20200122-PNG-confluent_logo-logotype-denim.png

Apache Kafka on Confluent Cloud: Confluent Cloud lets you harness the power of Apache Kafka without the burden of infrastructure management. The fully managed event-streaming platform helps development teams deliver immediate value with real-time analytics use cases. Start streaming with Confluent Cloud on Microsoft Azure in seconds, with on-demand provisioning of elastically scalable clusters.