Skip to content

Commit a8c8bb4

Browse files
authored
Merge branch 'master' into master
2 parents 1f33df4 + 014e816 commit a8c8bb4

13 files changed

+62
-60
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The following examples show how to use the Exchange Online PowerShell V2 module
5656

5757
The EXO V2 module uses the Active Directory Authentication Library to fetch an app-only token using the application Id, tenant Id (organization), and certificate thumbprint. The application object provisioned inside Azure AD has a Directory Role assigned to it, which is returned in the access token. Exchange Online configures the session RBAC using the directory role information that's available in the token.
5858

59-
## Setup app-only authentication
59+
## Set up app-only authentication
6060

6161
An initial onboarding is required for authentication using application objects. Application and service principal are used interchangeably, but an application is like a class object while a service principal is like an instance of the class. You can learn more about this at [Application and service principal objects in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals).
6262

exchange/exchange-ps/exchange/New-AntiPhishPolicy.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ New-AntiPhishPolicy [-Name] <String>
2727
[-AdminDisplayName <String>]
2828
[-AuthenticationFailAction <SpoofAuthenticationFailAction>]
2929
[-Confirm]
30-
[-EnableAntiSpoofEnforcement <Boolean>]
3130
[-Enabled <Boolean>]
3231
[-EnableMailboxIntelligence <Boolean>]
3332
[-EnableMailboxIntelligenceProtection <Boolean>]
3433
[-EnableOrganizationDomainsProtection <Boolean>]
3534
[-EnableSimilarDomainsSafetyTips <Boolean>]
3635
[-EnableSimilarUsersSafetyTips <Boolean>]
36+
[-EnableSpoofIntelligence <Boolean>]
3737
[-EnableTargetedDomainsProtection <Boolean>]
3838
[-EnableTargetedUserProtection <Boolean>]
3939
[-EnableUnauthenticatedSender <Boolean>]
@@ -153,27 +153,6 @@ Accept pipeline input: False
153153
Accept wildcard characters: False
154154
```
155155

156-
### -EnableAntispoofEnforcement
157-
This setting is part of spoof protection.
158-
159-
The EnableAntispoofEnforcement parameter specifies whether to enable or disable antispoofing protection for the policy. Valid values are:
160-
161-
- $true: Antispoofing is enabled for the policy. This is the default and recommended value. You specify the spoofed senders to allow or block using the Set-PhishFilterPolicy cmdlet.
162-
- $false: Antispoofing is disabled for the policy. We only recommend this value if you have a domain that's protected by another email filtering service.
163-
164-
```yaml
165-
Type: Boolean
166-
Parameter Sets: (All)
167-
Aliases:
168-
Applicable: Exchange Online
169-
170-
Required: False
171-
Position: Named
172-
Default value: None
173-
Accept pipeline input: False
174-
Accept wildcard characters: False
175-
```
176-
177156
### -Enabled
178157
The Enabled parameter specifies whether the policy is enabled. Valid values are:
179158

@@ -298,6 +277,27 @@ Accept pipeline input: False
298277
Accept wildcard characters: False
299278
```
300279

280+
### -EnableSpoofIntelligence
281+
This setting is part of spoof protection.
282+
283+
The EnableSpoofIntelligence parameter specifies whether to enable or disable antispoofing protection for the policy. Valid values are:
284+
285+
- $true: Antispoofing is enabled for the policy. This is the default and recommended value. You specify the spoofed senders to allow or block using the Set-PhishFilterPolicy cmdlet.
286+
- $false: Antispoofing is disabled for the policy. We only recommend this value if you have a domain that's protected by another email filtering service.
287+
288+
```yaml
289+
Type: Boolean
290+
Parameter Sets: (All)
291+
Aliases:
292+
Applicable: Exchange Online
293+
294+
Required: False
295+
Position: Named
296+
Default value: None
297+
Accept pipeline input: False
298+
Accept wildcard characters: False
299+
```
300+
301301
### -EnableTargetedDomainsProtection
302302
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
303303

exchange/exchange-ps/exchange/New-App.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -463,7 +463,9 @@ Accept wildcard characters: False
463463
```
464464

465465
### -UserList
466-
The UserList parameter specifies who can use an organizational app. Valid values are mailboxes or mail users in your organization. You can use any value that uniquely identifies the user. For example:
466+
The UserList parameter specifies who can use an organizational app. This parameter is limited to 1000 users. In the cloud-based service, this value is less relevant as Office Add-in management is moving to [Centralized Deployment](https://docs.microsoft.com/office/dev/add-ins/publish/centralized-deployment).
467+
468+
Valid values are mailboxes or mail users in your organization. You can use any value that uniquely identifies the user. For example:
467469

468470
- Name
469471
- Alias

exchange/exchange-ps/exchange/New-HostedContentFilterPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1002,7 +1002,7 @@ The QuarantineRetentionPeriod parameter specifies the number of days that spam m
10021002
- PhishSpamAction
10031003
- SpamAction
10041004

1005-
A valid value is an integer between 1 and 30. The default value is 30.
1005+
A valid value is an integer between 1 and 30. The default value is 15.
10061006

10071007
After the time period expires, the message is deleted.
10081008

exchange/exchange-ps/exchange/New-RpcClientAccess.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in Exchange Server 2010.
1616

17-
Use the New-RpcClientAccess cmdlet to create configuration information for the Exchange RPC Client Access service on a Client Access server. This setup task is performed by default on new installations of the Client Access server role on Microsoft Exchange Server 2010.
17+
Use the New-RpcClientAccess cmdlet to create configuration information for the Exchange RPC Client Access service on a Client Access server. This set up task is performed by default on new installations of the Client Access server role on Microsoft Exchange Server 2010.
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

exchange/exchange-ps/exchange/Set-AntiPhishPolicy.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ Set-AntiPhishPolicy -Identity <AntiPhishPolicyIdParameter>
2727
[-AdminDisplayName <String>]
2828
[-AuthenticationFailAction <SpoofAuthenticationFailAction>]
2929
[-Confirm]
30-
[-EnableAntispoofEnforcement <Boolean>]
3130
[-Enabled <Boolean>]
3231
[-EnableMailboxIntelligence <Boolean>]
3332
[-EnableMailboxIntelligenceProtection <Boolean>]
3433
[-EnableOrganizationDomainsProtection <Boolean>]
3534
[-EnableSimilarDomainsSafetyTips <Boolean>]
3635
[-EnableSimilarUsersSafetyTips <Boolean>]
36+
[-EnableSpoofIntelligence <Boolean>]
3737
[-EnableTargetedDomainsProtection <Boolean>]
3838
[-EnableTargetedUserProtection <Boolean>]
3939
[-EnableUnauthenticatedSender <Boolean>]
@@ -158,27 +158,6 @@ Accept pipeline input: False
158158
Accept wildcard characters: False
159159
```
160160

161-
### -EnableAntispoofEnforcement
162-
This setting is part of spoof protection.
163-
164-
The EnableAntispoofEnforcement parameter specifies whether to enable or disable antispoofing protection for the policy. Valid values are:
165-
166-
- $true: Antispoofing is enabled for the policy. This is the default and recommended value. You specify the spoofed senders to allow or block using the Set-PhishFilterPolicy cmdlet.
167-
- $false: Antispoofing is disabled for the policy. We only recommend this value if you have a domain that's protected by another email filtering service.
168-
169-
```yaml
170-
Type: Boolean
171-
Parameter Sets: (All)
172-
Aliases:
173-
Applicable: Exchange Online
174-
175-
Required: False
176-
Position: Named
177-
Default value: None
178-
Accept pipeline input: False
179-
Accept wildcard characters: False
180-
```
181-
182161
### -Enabled
183162
The Enabled parameter specifies whether the antiphish policy is enabled or disabled. Valid values are:
184163

@@ -304,6 +283,27 @@ Accept pipeline input: False
304283
Accept wildcard characters: False
305284
```
306285

286+
### -EnableSpoofIntelligence
287+
This setting is part of spoof protection.
288+
289+
The EnableSpoofIntelligence parameter specifies whether to enable or disable antispoofing protection for the policy. Valid values are:
290+
291+
- $true: Antispoofing is enabled for the policy. This is the default and recommended value. You specify the spoofed senders to allow or block using the Set-PhishFilterPolicy cmdlet.
292+
- $false: Antispoofing is disabled for the policy. We only recommend this value if you have a domain that's protected by another email filtering service.
293+
294+
```yaml
295+
Type: Boolean
296+
Parameter Sets: (All)
297+
Aliases:
298+
Applicable: Exchange Online
299+
300+
Required: False
301+
Position: Named
302+
Default value: None
303+
Accept pipeline input: False
304+
Accept wildcard characters: False
305+
```
306+
307307
### -EnableTargetedDomainsProtection
308308
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
309309

exchange/exchange-ps/exchange/Set-App.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@ Accept wildcard characters: False
212212
```
213213

214214
### -UserList
215-
The UserList parameter specifies who can use an organizational app. This parameter is currently limited to 1000 users. This will not change in the future as we are planning on moving to [Centralized Deployment](https://docs.microsoft.com/office/dev/add-ins/publish/centralized-deployment).
215+
The UserList parameter specifies who can use an organizational app. This parameter is limited to 1000 users. In the cloud-based service, this value is less relevant as Office Add-in management is moving to [Centralized Deployment](https://docs.microsoft.com/office/dev/add-ins/publish/centralized-deployment).
216216

217217
Valid values are mailboxes or mail users in your organization. You can use any value that uniquely identifies the user. For example:
218218

exchange/exchange-ps/exchange/Set-HostedContentFilterPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1023,7 +1023,7 @@ The QuarantineRetentionPeriod parameter specifies the number of days that spam m
10231023
- PhishSpamAction
10241024
- SpamAction
10251025

1026-
A valid value is an integer between 1 and 30. The default value is 30.
1026+
A valid value is an integer between 1 and 30.
10271027

10281028
After the time period expires, the message is deleted.
10291029

exchange/exchange-ps/exchange/Set-MapiVirtualDirectory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Accept wildcard characters: False
7575
```
7676
7777
### -ApplyDefaults
78-
The ApplyDefaults switch specifies whether to apply the correct defaults to the related internal IIS application settings. Typically, this switch is used only by Exchange setup during the installation of Exchange Cumulative Updates or Service Packs and you shouldn't need to use it.
78+
The ApplyDefaults switch specifies whether to apply the correct defaults to the related internal IIS application settings. Typically, this switch is used only by Exchange Setup during the installation of Exchange Cumulative Updates or Service Packs and you shouldn't need to use it.
7979
8080
This switch doesn't affect the values you configure by using the IISAuthenticationMethods, InternalUrl or ExternalUrl parameters.
8181

exchange/exchange-ps/exchange/Set-OwaMailboxPolicy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -615,18 +615,18 @@ Accept wildcard characters: False
615615
```
616616

617617
### -DelegateAccessEnabled
618-
This parameter is available or functional only in Exchange Server 2010.
618+
This parameter is available or functional only in on-premises Exchange.
619619

620-
The DelegateAccessEnabled parameter specifies whether delegates can use Outlook Web App to open folders that they have delegate access to. Valid values are:
620+
The DelegateAccessEnabled parameter specifies whether delegates can use Outlook on the web or Outlook Web App to open folders that they have delegate access to. Valid values are:
621621

622-
- $true: Delegates can open the mailbox in Outlook Web App. This is the default value.
623-
- $false: Delegates can't open the mailbox in Outlook Web App.
622+
- $true: Delegates can open the mailbox in Outlook on the web. This is the default value.
623+
- $false: Delegates can't open the mailbox in Outlook on the web.
624624

625625
```yaml
626626
Type: Boolean
627627
Parameter Sets: (All)
628628
Aliases:
629-
Applicable: Exchange Server 2010
629+
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
630630
631631
Required: False
632632
Position: Named

exchange/exchange-ps/exchange/Set-ThrottlingPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ Set-ThrottlingPolicy [-Identity] <ThrottlingPolicyIdParameter>
173173
## DESCRIPTION
174174
Throttling policy settings are stored in Active Directory.
175175

176-
By default, there is one default user throttling policy named GlobalThrottlingPolicy with a throttling scope of Global. Microsoft Setup creates this policy as part of the Client Access server role. You shouldn't replace, re-create, or remove the existing default throttling policy. However, you can edit any additional throttling policies with the scope of Organization or Regular if you want to change your user throttling settings. You can create polices with the scope of Organization or Regular using the New-ThrottlingPolicy cmdlet.
176+
By default, there is one default user throttling policy named GlobalThrottlingPolicy with a throttling scope of Global. Exchange Setup creates this policy as part of the Client Access server role. You shouldn't replace, re-create, or remove the existing default throttling policy. However, you can edit any additional throttling policies with the scope of Organization or Regular if you want to change your user throttling settings. You can create polices with the scope of Organization or Regular using the New-ThrottlingPolicy cmdlet.
177177

178178
For more information about how to control the resources consumed by individual users, see [User workload management in Exchange Server](https://docs.microsoft.com/Exchange/server-health/workload-management).
179179

exchange/exchange-ps/exchange/Set-UMMailbox.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -381,7 +381,7 @@ Accept wildcard characters: False
381381
### -PhoneProviderId
382382
This parameter is available only in the cloud-based service.
383383

384-
The PhoneProviderId parameter specifies the user's phone number and mobile service provider. This information is used to provide custom call forwarding and cancelling voice mail setup instructions based on the mobile phone provider.
384+
The PhoneProviderId parameter specifies the user's phone number and mobile service provider. This information is used to provide custom call forwarding and cancelling voice mail set up instructions based on the mobile phone provider.
385385

386386
```yaml
387387
Type: String

skype/skype-ps/skype/New-CsTenantDialPlan.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -162,13 +162,13 @@ Accept wildcard characters: False
162162
163163
### -NormalizationRules
164164
The NormalizationRules parameter is a list of normalization rules that are applied to this dial plan.
165-
Although this list and these rules can be created directly by using this cmdlet, we recommend that you create the normalization rules by the `New-CsVoiceNormalizationRule` (https://technet.microsoft.com/en-us/library/gg398240.aspx) cmdlet, which creates the rule and assigns it to the specified tenant dial plan.
165+
Although this list and these rules can be created directly by using this cmdlet, we recommend that you create the normalization rules by the [New-CsVoiceNormalizationRule](New-CsVoiceNormalizationRule.md) cmdlet, which creates the rule and then assign it to the specified tenant dial plan using [Set-CsTenantDialPlan](Set-CsTenantDialPlan.md) cmdlet.
166166
167167
Each time a new tenant dial plan is created, a new voice normalization rule with default settings is also created for that site, service, or per-user tenant dial plan.
168168
By default, the Identity of the new voice normalization rule is the tenant dial plan Identity followed by a slash and then followed by the name Prefix All.
169169
(For example, TAG:Redmond/Prefix All.) The number of normalization rules cannot exceed 50 per TenantDialPlan.
170170
171-
You can create a new normalization rule by calling the `New-CsVoiceNormalizationRule` (https://technet.microsoft.com/en-us/library/gg398240.aspx) cmdlet.
171+
You can create a new normalization rule by calling the [New-CsVoiceNormalizationRule](New-CsVoiceNormalizationRule.md) cmdlet.
172172
173173
```yaml
174174
Type: List

0 commit comments

Comments
 (0)