Configuration Manager technical preview version 2209

This article is contributed. See the original author and article here.

 


Improvements to the console


 


When performing a search on any node in the console, the hint text in the search bar will now indicate the scope of the search.


 



  • By default, all subfolders are searched when you perform a search in any node that contains subfolders. You can narrow down the search by selecting the “Current Node” option from the search toolbar.

  • If you want to expand the search to include all nodes, then select the “All Objects” button in the ribbon.


 


For more information, see Console changes and tips.


 


Improvements to the dark theme


 


Pop-ups in the Health attestation dashboard will now adhere to the dark theme.


 


Enable this pre-release feature to experience the dark theme. For more information, see Dark theme for the console.


 


Other updates


 


The software center logo dimension details are now added as a hint in the software center customization wizard.


 



  • The image file can’t be larger than 2 MB size. The maximum dimension of the image should be 400 Pixels wide and 100 pixels tall.


 


For more information, see Software Center settings.


 


For more details and to view the full list of new features in this update, check out our Features in Configuration Manager technical preview version 2209 documentation. 


 


Update 2209 for Technical Preview Branch is available in the Microsoft Endpoint Configuration Manager Technical Preview console. For new installations, the 2206 baseline version of Microsoft Endpoint Configuration Manager Technical Preview Branch is available on the link:  MECM2206TP-Baseline or from Eval center 


 


Technical Preview Branch releases give you an opportunity to try out new Configuration Manager features in a test environment before they are made generally available.


 


We would love to hear your thoughts about the latest Technical Preview! Send us feedback directly from the console.


 


Thanks,


The Configuration Manager team


 


Configuration Manager Resources:


Documentation for Configuration Manager Technical Previews


Try the Configuration Manager Technical Preview Branch


Documentation for Configuration Manager


Configuration Manager Forums


Configuration Manager Support

MTC Weekly Roundup – September 23

MTC Weekly Roundup – September 23

This article is contributed. See the original author and article here.

Hello and Happy Friday, MTC’ers!


 


Yesterday was the start of the Autumnal Equinox, which means the seasons are a-changin’. In the spirit of the season, let’s fall into this week’s community recap!


 


MTC Moments of the Week


 


First, we want to give a shoutout to this week’s MTC Member of the Week, @osxhone! They just joined the MTC this week and have already been given a Best Answer for their help in the OneDrive forum. Welcome, osxphone!


 


This week, we had our monthly Windows Office Hours, which takes place every third Thursday of each month here in the MTC. These office hours are a great opportunity to interact with and ask questions to a broad group of product experts, servicing experts, and engineers representing Windows, Microsoft Endpoint Manager (Microsoft Intune, Configuration Manager), security, public sector, FastTrack, and more. So, make sure you RSVP for the next session on October 20th!


 


Over on the blogs, @assafyatziv posted an article in the Security, Compliance, and Identity community showcasing the top threat protection use cases in Microsoft Defender for Cloud Apps. Check it out and let us know in the comments if you’d like to see more examples of how Microsoft Defender for Cloud Apps & Microsoft 365 Defender work together!


 


 


Unanswered Questions – Can you help them out?


 


Every week, users come to the MTC seeking guidance or technical support for their Microsoft solutions, and we want to help highlight a few of these each week in the hopes of getting these questions answered by our amazing community!


 


In the Excel forum, new contributor @willc8 is looking for possible solutions to a spreadsheet that keeps crashing.


 


Meanwhile, @Dinorah Flores is searching for a process to resolve a file path error in OneDrive for Business.


 


 


Next Week in Events – Mark Your Calendars!


 




Lastly, to wrap things up, since it now officially Fall/Autumn in the Northern hemisphere, I’ll hit you with a fun Fall fact…


 


The Fall season has its own disctinct scent that can only be smelled during certain times of the year due to the decay of leaves after they fall from the trees. All I know is that it’s one of my absolute favorite scents!


 


And with that, have a great weekend, everyone!


 


R.jfif


 

CISA Has Added One Known Exploited Vulnerability to Catalog 

This article is contributed. See the original author and article here.

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: To view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known CVEs that carry significant risk to the federal enterprise. BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the Catalog that meet the specified criteria.

New ways to connect with leaders and find solutions in Viva Engage

New ways to connect with leaders and find solutions in Viva Engage

This article is contributed. See the original author and article here.

Yesterday we announced that some exciting new capabilities to Viva Engage, like Leadership Corner and Answers within Microsoft Viva.


 


Viva Engage connects employees and leaders through communities and conversations. We’re announcing powerful new leadership capabilities to unlock the potential of your organizations.


 


Leadership Corner is a new experience for employees to engage directly with key leaders. Employees can:



  • See and participate in activities from their leaders

  • Take surveys and join the discussion with #Campaigns and AMAs (Ask Me Anything)

  • Connect with new leaders across the company


MichaelHolste_0-1663873741863.png


 


For leaders, communicators, and their delegates we’re introducing:



  • A new leader dashboard with organizational analytics

  • Storyline announcements for reaching their teams

  • Powerful social #Campaign experiences

  • New “Ask Me Anything” style events


 


MichaelHolste_1-1663873797793.png


 


These experiences will bring leadership to life, fostering a two-way dialogue throughout the organization, and creating an environment where employees thrive. Learn more about these experiences in the Viva Engage announcement blog.


 


New Microsoft Mechanics Video featuring Viva Engage


 


Additionally, we released a walk-through video of Viva Engage on Microsoft Mechanics. I’ll show you a deep dive into how to build communities, share experiences with storyline and stories, a demo of the new leadership corner, Ask me Anything’s and Answers within Microsoft Viva and more. Take a look and let us know how you are using Viva Engage in your organization.


 





 


Leadership Corner and Answers will be available in 2023 to licensed Viva suite users within the Viva Engage app.


 


Get Inspired


 


New to Viva Engage? Find best practices and inspiration on how to make the most of communities, conversations, and storyline in the new Viva Lookbook. And find even more playbooks and resources in our Viva Engage Adoption Center.


 


Learn more about what’s new for Microsoft Viva on the Microsoft 365 blog by Seth Patton, check out the Microsoft Viva website, and explore the Viva Innovation Brochure for the latest and greatest on how Viva empowers everyone to be their best.


 


– Michael Holste

CISA Has Added One Known Exploited Vulnerability to Catalog 

This article is contributed. See the original author and article here.

CISA has added one new vulnerability to it’s Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: To view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates.      

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known CVEs that carry significant risk to the federal enterprise. BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.   

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the Catalog that meet the specified criteria.      
 

Do you have slow workbooks due to size bloat? Give us a try at speeding up.

Do you have slow workbooks due to size bloat? Give us a try at speeding up.

This article is contributed. See the original author and article here.

Hey Folks – Do you have slow workbooks due to size bloat? If so, then I am super excited to unveil Excel Performance team’s new capability to detect and remove unwanted size bloat and speed up such workbooks.



At Excel, customer focus is at the core of what we do; often this uncovers new or improved innovations in features and other times in fundamentals like Performance. In this case, we observed that over time, a workbook can collect cells that have no data but still contain hidden information of little or no use anymore. These cells may have had data and formatting to start with, however now they do not have any data, but still take up space because they contain formatting. Consequently, too many of these cells can cause your workbook to slow down or become unresponsive.


 


And so, we’ve enabled you to detect and remove these cells slowing down your workbooks, with “Check Performance” in Excel for the Web!


 


Try Check Performance with Excel for the Web and send us feedback


 


When you open your workbook, Excel now detects whether your workbook contains too many of these unwanted formatted cells. If it does, Excel shows a business bar to launch the “Check Performance” feature. You can manually launch the feature from Review > Check Performance, as well.


 


Once launched, there are two ways to remove these cells:



  • By navigating to a sheet in the task pane to review each range of these cells to optimize, and then pressing the “Optimize Sheet” button, OR

  • By pressing the “Optimize All” button to remove all unwanted cells from all sheets in the workbook.


 


This is illustrated in the demo below, wherein Check Performance reduces a 3.14 MB file down to 17.5 KB, by detecting and removing more than a million unwanted formatted cells. Check Performance: Detects and removes unwanted formatted cellsCheck Performance: Detects and removes unwanted formatted cells


 









Try Check Performance yourself


(Download a copy to your OneDrive to edit)



 


Now, you may ask, why doesn’t Excel remove these cells in the background without alerting me? This is because, even though the cell has no data, removing its formatting may result in visible changes. For example, removing yellow fill from a cell may reset its fill to “No Color”, as illustrated in the demo above. We do not want any Excel users to be surprised by visual changes by doing this in the background without alerting.


 


Check Performance is available for Excel M365 subscribers in the Web! Please keep in mind features are enabled gradually to more and more users over time as we build confidence in the success of it working correctly. And so, if you do not see the “Check Performance” button in the “Review” Menu Tab, then the feature may not be enabled for you, yet. That said, we are working hard to enable it for all as soon as we can. When you see it, please try it out! We’d love to hear from you whether this meets your expectations or not. Please send us feedback by clicking Help > Feedback!


 


Finally, our upcoming plans are to enable Check Performance in Excel Windows and Mac. Also, we are investigating other areas contributing to size bloat that we can integrate into Check Performance’s detection and removal capability. We’d love to hear from you, and so once again please send us feedback by clicking Help > Feedback! Learn more on Check Performance here.


 


Got other feedback? Want to learn more about upcoming Excel features?  


Do you have an idea to make Excel better? If yes, we’d love to hear about it. Go to the Excel forum in Microsoft Feedback to submit your idea or vote for other ideas. You can also click the Feedback button in Excel and choose “I have a suggestion”.


 


Want to know more about Excel? See What’s new in Excel and subscribe to our Excel Blog to get the latest updates. Stay connected with us and other Excel fans around the world – join our Excel Community and follow us on Twitter. We look forward to hearing from you.


 


Thank You! 

CISA and NSA Publish Joint Cybersecurity Advisory on Control System Defense

This article is contributed. See the original author and article here.

CISA and the National Security Agency (NSA) have published a joint cybersecurity advisory about control system defense for operational technology (OT) and industrial control systems (ICSs). Control System Defense: Know the Opponent is intended to provide critical infrastructure owners and operators with an understanding of the tactics, techniques, and procedures (TTPs) used by malicious cyber actors. This advisory builds on NSA and CISA 2021 guidance provided to stop malicious ICS activity against connect OT, and 2020 guidance to reduce OT exposure.

CISA and NSA encourage critical infrastructure owners and operations to review the advisory, [Control System Defense: Know the Opponent], and apply the recommended mitigations and actions. For more information on CISA’s resources and efforts to improve ICS cybersecurity, visit CISA’s role in industrial control systems webpage.

ISC Releases Security Advisories for Multiple Versions of BIND 9

This article is contributed. See the original author and article here.

The Internet Systems Consortium (ISC) has released security advisories that address vulnerabilities affecting multiple versions of the ISC’s Berkeley Internet Name Domain (BIND) 9. A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions. For advisories addressing lower severity vulnerabilities, see the BIND 9 Security Vulnerability Matrix
 
CISA encourages users and administrators to review the following ISC advisories CVE-2022-2906, CVE-2022-3080, CVE-2022-38177, and CVE-2022-38178 and apply the necessary mitigations.

CISA Releases Three Industrial Control Systems Advisories

CISA Releases Three Industrial Control Systems Advisories

This article is contributed. See the original author and article here.

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

SSL

Secure .gov websites use HTTPS

A lock (lock icon) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.