Roger Haueter

Modern Workplace Strategist | Microsoft Most Valuable Professional

SharePoint Migration Tool Public Preview V3

The SharePoint Migration Tool is a handy tool to migrate your data from a on-premises SharePoint or a fileshare to SharePoint Online. The public preview of Version 3 is now available and comes with the following new features:

Site migration
SharePoint sites that are "out of the box" can be migrated (sites that do not use any coding or 3rd party tools).

Migration of navigation and icons is supported.

Site descriptions
Site description can now be migrated.

SharePoint webparts
Migration support of SharePoint webparts.
Read more

SharePoint megamenu to organize your navigation

Even when search is available, most users start their SharePoint journey by navigating. That's why Microsoft developed the Megamenu which enables the users to see multiple levels of hierarchy at once. You can always choose between using the Megamenu and Cascading.

SharePoint Megamenu
Read more

Redesigned Office and Office 365 App Icons

After the last update of the Office Icons in 2013, Microsoft has now redesigned the Office and Office 365 App Icons again. The goal was to make these fluid and seamless to reflect the simple, powerful, and intelligent experiences of Office 365.

OneDrive Icon
Read more

Microsoft Cloud App Security overview

In the past, setting up security solutions required hardware, configuration on firewall, proxy and network etc. However, setting up Cloud App Security is straight forward. Microsoft Cloud App Security is a SaaS solution to provide visibility, data control, and enhanced threat protection to the cloud apps in use. This service helps to uncover Shadow IT, assess possible risks, enforce policies, investigate activities and fight threats.

Cloud App Security


App connectors
The app connectors use the existing APIs from cloud app providers to integrate the Cloud App Security with other cloud apps. An app is authorized by an administrator to connect and extend protection by querying activity logs, scanning data, accounts, and cloud content. It can also enforce policies, detects threats, and provides governance actions.Read more