OneDrive Roadmap Roundup Q2 CY2022

OneDrive Roadmap Roundup Q2 CY2022

This article is contributed. See the original author and article here.

The OneDrive team is excited to share all the recent OneDrive updates and feature releases we’ve released between April and June 2022. We’re continuing to do everything we can to provide you with a seamless experience for accessing and sharing files with your teammates and external colleagues, to keep you productive in this new world of hybrid work.


Here are the OneDrive features we’ve released in full or in preview in Q2 of 2022:


 


April 2022


 


Easily navigate to all your Teams files from OneDrive (88912)


In OneDrive, we are adding a “Your Teams” section to the “More Places” page to allow you to easily find and work with all your files in Teams.


 


Your Teams.png


 


Deleting large folders (88979)


To help you keep your workspace uncluttered, we’ve added the ability for you to delete large folders (with up to 10,000 items) at one time. This means that when you’re finished with a project, you can quickly remove all the files you no longer need from your OneDrive and SharePoint libraries.  


 


Microsoft Stream: Comment on a video or audio file in SharePoint and OneDrive (88521 )


Now, users with view permissions can leave comments in video or audio files. This can be helpful when collaborating on files to share with a larger audience, or for addressing questions of people who were unable to attend a call or meeting.


 


May 2022


 


Shift between work and personal files in OneDrive 


We’ve made it simpler for you to switch between your professional and personal OneDrive accounts, or even between separate professional accounts you might maintain for multiple clients if you’re a consultant or freelancer. By selecting your profile picture at the top right of the OneDrive page, you’ll see a list of all your Microsoft accounts, or the option to add a new one.


 


OneDriveWebAccountSwitching (1).gif


 


 


Quickly switch between document libraries


We’ve added a dropdown to OneDrive and SharePoint that lets you easily switch between multiple document libraries associated with a Teams team or a SharePoint Site. You can easily select the Dropdown library icon to switch between document libraries.


 


doclib dropdown.png


 


Pin important files to Quick Access


To easily find and access the places where you regularly work, you can pin shared libraries to the Quick Access section in the left nav of OneDrive. Pinning a document library adds it to the top of the Quick Access section. You can also un-pin document libraries from the Quick Access section.


 


quick access.gif


 


June 2022


 


File browsing in Teams


Now when you browse to a Teams channel and click the Files tab at the top, this experience will be powered by OneDrive. For example, you’ll be able to leverage familiar controls to easily move or copy your file to another library within Microsoft Teams.
You can also switch between document libraries associated with specific Teams channels (standard or private) directly in Microsoft Teams and access your files as you would directly in OneDrive and SharePoint.


AnkitaKirti_1-1656436922941.png


 


Add to OneDrive in Teams


You can now use Add shortcut to OneDrive in Teams to give yourself quick access in OneDrive to the Teams files you work with most frequently. Any changes that occur in Teams are also synced, so your files are also up to date. This feature helps you keep all your files organized in one place, no matter where they are stored.


OneDrive and SharePoint: Access your Teams standard and private channel files (88911)


When you navigate to a site in SharePoint or OneDrive, you’ll be able to access the files stored in the Teams standard and private channels associated with that site.


 


AnkitaKirti_0-1656435478699.png


 


 


OneDrive Sync Admin reports for macOS in Public Preview (81982)


OneDrive Sync Admin Reports for macOS give you more visibility into who in your organization is running the OneDrive Sync client on macOS and any errors they might be experiencing. When you open the OneDrive Sync health dashboard, you’ll see an executive summary of what’s going on with OneDrive Sync in your organization. On the left, you can see how many devices have at least one sync error. In the middle, you can see at a glance what percentage of the devices in your organization have known folders OneDrive is helping to protect. You can see what percentage of devices have the Desktop and Documents folders syncing with OneDrive, which have only one  and which have not opted in to sync those folders at all, meaning if something were to happen to those devices, all the contents of those folders would be lost. On the right, you can see how many devices are running on the current version of OneDrive, meaning they have all the latest and greatest fixes and features from Microsoft.


 


Sync health dashboardSync health dashboard


 


Rename shortcuts (93279)


We’ve added the ability to rename shortcuts you’ve added using the “Add to OneDrive” feature within OneDrive web.


 


Access your Teams standard and private channel files (88911)


When you navigate to a site in SharePoint or OneDrive, you’ll be able to access the files stored in the Teams standard and private channels associated with that site.


 


AnkitaKirti_0-1656436661440.png


 


Microsoft Stream Generate captions for a video uploaded to SharePoint and OneDrive for GCC and GCC High (85644)


Users with edit permissions to a video file uploaded to SharePoint and OneDrive can click a button in the player to generate closed captions in English.


 


OneDrive File Picker v8


The OneDrive File Picker lets you connect your custom web apps to content stored in OneDrive (both the commercial and business versions) and SharePoint. With File Picker v8, you can integrate directly with the Microsoft 365 service, saving you complexity and time during the development phase and providing your users with the same rich, familiar user experience of OneDrive or SharePoint. Users who are already logged into Microsoft 365 can seamlessly access files and content through your web app, without having to log into the Microsoft 365 account a second time.


 


File picker v8 experienceFile picker v8 experience


 


 


Learn more..


We hope you’re as excited as we are about these new features. Join us for a free webinar tomorrow to learn more about these innovations.


Register here: What’s new in OneDrive: Q2 roadmap roundup


 


FVTU--4XEAAN5Yl.jpg


 


We continue to evolve OneDrive as a place to access, share, and collaborate on all your files in Office 365, keeping them protected and readily accessible on all your devices, anywhere.


You can stay up-to-date on all things via the OneDrive Blog and the OneDrive release notes.


Check out the new and updated OneDrive documentation.


Take advantage of end-user training resources on our Office support center.


Thank you again for your support of OneDrive. We look forward to your continued feedback and hope to connect with you at another upcoming Microsoft or community-led event.


 


Thanks,


Ankita

2022 CWE Top 25 Most Dangerous Software Weaknesses

This article is contributed. See the original author and article here.

The Homeland Security Systems Engineering and Development Institute, sponsored by CISA and operated by MITRE, has released the 2022 Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses list. The list uses data from the National Vulnerability Database to compile the most frequent and critical errors that can lead to serious vulnerabilities in software. An attacker can often exploit these vulnerabilities to take control of an affected system, obtain sensitive information, or cause a denial-of-service condition. This year’s list also incorporates updated weakness data for recent Common Vulnerabilities and Exposure records in the dataset that are part of CISA’s Known Exploited Vulnerabilities Catalog.

CISA encourages users and administrators to review the 2022 CWE Top 25 Most Dangerous Software Weaknesses and evaluate recommended mitigations to determine those most suitable to adopt.

Strengthen the security posture of your SaaS apps with Defender for Cloud Apps

Strengthen the security posture of your SaaS apps with Defender for Cloud Apps

This article is contributed. See the original author and article here.

Over the last few years, organizations have increasingly adopted cloud-native SaaS applications to meet changing agility and productivity needs. While the growth of SaaS apps has enabled cost savings and other gains for organizations, it has also raised a significant challenge for security teams.  Ensuring a secure way to use essential productivity-enhancing tools has become a critical strategic priority for security teams. Today, we are thrilled to announce the public preview of SaaS Security Posture Management capabilities in Microsoft Defender for Cloud Apps that will enable you to view, identify, and remediate misconfigurations across your applications to improve your organizational security.


 


Lack of visibility, misconfigurations, and sophisticated attacks are some of the common threats that put your sensitive data and users of SaaS apps at risk. In today’s threat landscape, customers need a new approach to:



  • Proactively strengthen the security posture of SaaS apps enabled in your enterprise.

  • Detect any breach/attack on these applications and respond quickly.

  • Prevent any sensitive data leakage even in the case of an attack.


Microsoft Defender for Cloud Apps is designed to help secure your SaaS applications and protect sensitive data in your organization against evolving threats. Empower your security teams with enhanced visibility and assessment tools to identify usage patterns, assess risk and business levels, and manage more than 31,000 SaaS applications to defend against threats.


 


For each application, you have visibility into its users, their IPs, and their traffic volumes to detect anomalous behavior. Further, you can view the security, compliance, and legal risk levels (e.g. SOC2, ISO27001, GPDR, encryption protocol, etc.) of every application in your organization. After approving specific apps, access deeper protections to ones containing sensitive information with tools to detect attack attempts, suspicious behaviors, and potential data leakages.


 


New integrated SaaS security posture management with Microsoft Secure Score


It’s not enough to only know which SaaS apps are being run in your environment – for security teams, understanding best practices and managing the configurations across your organization’s SaaS apps are of equal importance. Microsoft Defender for Cloud Apps not only helps you discover all the SaaS apps in your environment but with new security posture management (SSPM) capabilities, you can also get deeper visibility and automatically identify misconfigurations and gaps in each app. Today, you can access security posture insights across Office 365, Salesforce (preview), and ServiceNow (preview), with additional SaaS apps to be added in the coming months.   This experience is integrated into the Microsoft 365 Defender dashboard to enable security teams to see their holistic security posture across the enterprise with Microsoft Secure Score.


 


Figure 1 Microsoft Defender for Cloud apps enables you to manage your security posture of apps such as Salesforce directly within Microsoft Secure Score.Figure 1 Microsoft Defender for Cloud apps enables you to manage your security posture of apps such as Salesforce directly within Microsoft Secure Score.


 


Within the Microsoft Secure Score blade, your security teams can identify misconfigurations and get a step-by-step remediation guide for every risky security configuration in your environment for the related SaaS apps.


 


Start today


Defender for Cloud Apps helps you gain visibility of your cloud apps, discover shadow IT, protect sensitive information anywhere in the cloud, enable protection against cyber threats, assess compliance, and manage your security posture across cloud apps.  In addition to Azure and Office 365 applications, Microsoft Defender for Cloud Apps enables you to protect your assets across the use of many applications including Atlassian, Box, Dropbox, Google Workspace, OneLogin, Okta, Cisco WebEx, Salesforce, Slack, ServiceNow, DocuSign, NetDocuments, GitHub, Zoom (preview), Workplace by Meta (preview), Egnyte (Preview), and more. With Defender for Cloud Apps’ extensive coverage, gain the right visibility tools to detect and prevent attacks and data leakages.


 


If you are already using Defender for Cloud Apps, you can start using the new SSPM security posture management capabilities by connecting Salesforce or connecting ServiceNow (if you already have an existing connector to Salesforce or ServiceNow, you can immediately use the new capabilities). Security assessments and recommendations will be shown automatically in Microsoft 365 Defender portal under security recommendations.


 


To learn more about Defender for Cloud Apps, read our documentation and start a trial here.

CISA Adds Eight Known Exploited Vulnerabilities to Catalog  

This article is contributed. See the original author and article here.

CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise. Note: to view the newly added vulnerabilities in the catalog, click on the arrow in the “Date Added to Catalog” column, which will sort by descending dates.     

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known CVEs that carry significant risk to the federal enterprise. BOD 22-01 requires FCEB agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the Catalog that meet the specified criteria.