Improved file upload experience:
- Increased file upload limit from 250MB to 2 GB
- Expanded support for a broader range of file types: SharePoint Online now accepts a broader range of file types, specifically .exe and .dll.
Uploading large files into SkyDrive Pro (applicable to team site document libraries as well); files were dragged and dropped from the desktop into the Web interface.
See SharePoint Online blocked file type list.
Increased Site collection and list look-up limits:
- Increased site collection limit from 3,000 to 10,000
- List look-up threshold increased to 12 look-ups.
*Note: this increase only applies to Office 365 Enterprise plans (including Education and Government) - Office 365 Small Business and Midsize Business remain at a single site collection and twenty site collections respectively.
Review the list of all SharePoint Online boundaries and limitations.Improved self-restoration:
- Increasing recycle bin retention duration (from 30-90 days)
- Turning versioning on by default for new SkyDrive Pro libraries with 10 versions being retained.
A user's SkyDrive Pro Recycle Bin accessed by clicking the gear icon > Site contents
- All above announcements apply to all Office 365 business plans - except the 10,000 site collection increase (only applicable to Office 365 Enterprise plans (including Education and Government).
- Does not apply to Office 365 Home Premium offering, which combines the latest Office applications with Skype and SkyDrive storage.
- Office 365 dedicated plans are not receiving this same update, because they are managed in a unique, isolated infrastructure.
- SharePoint will not execute any arbitrary EXEs or DLLs uploaded by a user to a team site or to their SkyDrive Pro.
- SharePoint will only accept uploads from authenticated users reducing risks that an outside attacker could post any malicious files.
- SharePoint has an antivirus scanning engine built in to detect malicious files.
- If user's attempt to execute a malicious file in their synced folders, Outlook and Windows have warning pop-up dialogs requesting consent from the user before the malicious file can execute.
- Many users also have antivirus scanning applications on their client computers and therefore would detect and quarantine any malicious files.
- Finally, should admins have cause to worry about these scenarios, they can enable auditing to any document library to detect which end user initially uploaded the malicious file.
No comments:
Post a Comment