Microsoft has released new OneDrive file viewers that are turning up in Teams clients. The new viewers are more intelligent and make it easier to work with files, especially Office documents. However, even intelligent viewers can only function when a solid network connection is available and often a local synchronized copy of Teams files is the way to work.
It’s easy to create a list of group-enabled SharePoint Online sites using the Get-SPOSite cmdlet. But it’s much more interesting to probe a little deeper to uncover extra information about the group using the GroupId property returned if you specify the Detailed parameter. This post explains a PowerShell script written to examine the possibilities, including how to highlight sites belonging to deleted groups that are kept by retention policies.
Outlook 2013 introduced the concept of hybrid mode (sometimes called Exchange Fast Access) to allow clients configured in cached Exchange mode to fetch data direct from the server when possible. The mode works well, except when you’re connected on a poor network as the attempts to fetch data from the server might cause Outlook to hang. A registry setting gives a way to force Outlook to operate in classic cached mode and use the OST exclusively when it needs data.
Microsoft Cloud App Security (MCAS) can integrate with Azure Information Protection to allow automated policy-driven application of Office 365 sensitivity labels to Office documents and PDFs. You can depend on users to apply labels manually as they create documents, but it’s easy for humans to forget to add protection where a computer won’t. You’ll pay extra for MCAS, but it could be worthwhile.
Teams App Permissions policies allow Office 365 tenants to exert a fine degree of control over the apps users are allowed to install. You can amend the default policy or create new policies and assign the policies to user accounts through the Teams Admin Center or with PowerShell.