Skip to content

Commit bf2d61b

Browse files
authored
Merge pull request MicrosoftDocs#7020 from MicrosoftDocs/chrisda
Chrisda to Master
2 parents 4dc505c + 4f3de6e commit bf2d61b

File tree

9 files changed

+53
-51
lines changed

9 files changed

+53
-51
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ The following examples show how to use the Exchange Online PowerShell V2 module
5656

5757
The EXO V2 module uses the Active Directory Authentication Library to fetch an app-only token using the application Id, tenant Id (organization), and certificate thumbprint. The application object provisioned inside Azure AD has a Directory Role assigned to it, which is returned in the access token. Exchange Online configures the session RBAC using the directory role information that's available in the token.
5858

59-
## Setup app-only authentication
59+
## Set up app-only authentication
6060

6161
An initial onboarding is required for authentication using application objects. Application and service principal are used interchangeably, but an application is like a class object while a service principal is like an instance of the class. You can learn more about this at [Application and service principal objects in Azure Active Directory](https://docs.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals).
6262

exchange/exchange-ps/exchange/New-AntiPhishPolicy.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ New-AntiPhishPolicy [-Name] <String>
2727
[-AdminDisplayName <String>]
2828
[-AuthenticationFailAction <SpoofAuthenticationFailAction>]
2929
[-Confirm]
30-
[-EnableAntiSpoofEnforcement <Boolean>]
3130
[-Enabled <Boolean>]
3231
[-EnableMailboxIntelligence <Boolean>]
3332
[-EnableMailboxIntelligenceProtection <Boolean>]
3433
[-EnableOrganizationDomainsProtection <Boolean>]
3534
[-EnableSimilarDomainsSafetyTips <Boolean>]
3635
[-EnableSimilarUsersSafetyTips <Boolean>]
36+
[-EnableSpoofIntelligence <Boolean>]
3737
[-EnableTargetedDomainsProtection <Boolean>]
3838
[-EnableTargetedUserProtection <Boolean>]
3939
[-EnableUnauthenticatedSender <Boolean>]
@@ -153,27 +153,6 @@ Accept pipeline input: False
153153
Accept wildcard characters: False
154154
```
155155

156-
### -EnableAntispoofEnforcement
157-
This setting is part of spoof protection.
158-
159-
The EnableAntispoofEnforcement parameter specifies whether to enable or disable antispoofing protection for the policy. Valid values are:
160-
161-
- $true: Antispoofing is enabled for the policy. This is the default and recommended value. You specify the spoofed senders to allow or block using the Set-PhishFilterPolicy cmdlet.
162-
- $false: Antispoofing is disabled for the policy. We only recommend this value if you have a domain that's protected by another email filtering service.
163-
164-
```yaml
165-
Type: Boolean
166-
Parameter Sets: (All)
167-
Aliases:
168-
Applicable: Exchange Online
169-
170-
Required: False
171-
Position: Named
172-
Default value: None
173-
Accept pipeline input: False
174-
Accept wildcard characters: False
175-
```
176-
177156
### -Enabled
178157
The Enabled parameter specifies whether the policy is enabled. Valid values are:
179158

@@ -298,6 +277,27 @@ Accept pipeline input: False
298277
Accept wildcard characters: False
299278
```
300279

280+
### -EnableSpoofIntelligence
281+
This setting is part of spoof protection.
282+
283+
The EnableSpoofIntelligence parameter specifies whether to enable or disable antispoofing protection for the policy. Valid values are:
284+
285+
- $true: Antispoofing is enabled for the policy. This is the default and recommended value. You specify the spoofed senders to allow or block using the Set-PhishFilterPolicy cmdlet.
286+
- $false: Antispoofing is disabled for the policy. We only recommend this value if you have a domain that's protected by another email filtering service.
287+
288+
```yaml
289+
Type: Boolean
290+
Parameter Sets: (All)
291+
Aliases:
292+
Applicable: Exchange Online
293+
294+
Required: False
295+
Position: Named
296+
Default value: None
297+
Accept pipeline input: False
298+
Accept wildcard characters: False
299+
```
300+
301301
### -EnableTargetedDomainsProtection
302302
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
303303

exchange/exchange-ps/exchange/New-App.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -463,7 +463,9 @@ Accept wildcard characters: False
463463
```
464464

465465
### -UserList
466-
The UserList parameter specifies who can use an organizational app. Valid values are mailboxes or mail users in your organization. You can use any value that uniquely identifies the user. For example:
466+
The UserList parameter specifies who can use an organizational app. This parameter is limited to 1000 users. In the cloud-based service, this value is less relevant as Office Add-in management is moving to [Centralized Deployment](https://docs.microsoft.com/office/dev/add-ins/publish/centralized-deployment).
467+
468+
Valid values are mailboxes or mail users in your organization. You can use any value that uniquely identifies the user. For example:
467469

468470
- Name
469471
- Alias

exchange/exchange-ps/exchange/New-RpcClientAccess.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in Exchange Server 2010.
1616

17-
Use the New-RpcClientAccess cmdlet to create configuration information for the Exchange RPC Client Access service on a Client Access server. This setup task is performed by default on new installations of the Client Access server role on Microsoft Exchange Server 2010.
17+
Use the New-RpcClientAccess cmdlet to create configuration information for the Exchange RPC Client Access service on a Client Access server. This set up task is performed by default on new installations of the Client Access server role on Microsoft Exchange Server 2010.
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

exchange/exchange-ps/exchange/Set-AntiPhishPolicy.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,13 @@ Set-AntiPhishPolicy -Identity <AntiPhishPolicyIdParameter>
2727
[-AdminDisplayName <String>]
2828
[-AuthenticationFailAction <SpoofAuthenticationFailAction>]
2929
[-Confirm]
30-
[-EnableSpoofIntelligence <Boolean>]
3130
[-Enabled <Boolean>]
3231
[-EnableMailboxIntelligence <Boolean>]
3332
[-EnableMailboxIntelligenceProtection <Boolean>]
3433
[-EnableOrganizationDomainsProtection <Boolean>]
3534
[-EnableSimilarDomainsSafetyTips <Boolean>]
3635
[-EnableSimilarUsersSafetyTips <Boolean>]
36+
[-EnableSpoofIntelligence <Boolean>]
3737
[-EnableTargetedDomainsProtection <Boolean>]
3838
[-EnableTargetedUserProtection <Boolean>]
3939
[-EnableUnauthenticatedSender <Boolean>]
@@ -158,27 +158,6 @@ Accept pipeline input: False
158158
Accept wildcard characters: False
159159
```
160160

161-
### -EnableSpoofIntelligence
162-
This setting is part of spoof protection.
163-
164-
The EnableSpoofIntelligence parameter specifies whether to enable or disable antispoofing protection for the policy. Valid values are:
165-
166-
- $true: Antispoofing is enabled for the policy. This is the default and recommended value. You specify the spoofed senders to allow or block using the Set-PhishFilterPolicy cmdlet.
167-
- $false: Antispoofing is disabled for the policy. We only recommend this value if you have a domain that's protected by another email filtering service.
168-
169-
```yaml
170-
Type: Boolean
171-
Parameter Sets: (All)
172-
Aliases:
173-
Applicable: Exchange Online
174-
175-
Required: False
176-
Position: Named
177-
Default value: None
178-
Accept pipeline input: False
179-
Accept wildcard characters: False
180-
```
181-
182161
### -Enabled
183162
The Enabled parameter specifies whether the antiphish policy is enabled or disabled. Valid values are:
184163

@@ -304,6 +283,27 @@ Accept pipeline input: False
304283
Accept wildcard characters: False
305284
```
306285

286+
### -EnableSpoofIntelligence
287+
This setting is part of spoof protection.
288+
289+
The EnableSpoofIntelligence parameter specifies whether to enable or disable antispoofing protection for the policy. Valid values are:
290+
291+
- $true: Antispoofing is enabled for the policy. This is the default and recommended value. You specify the spoofed senders to allow or block using the Set-PhishFilterPolicy cmdlet.
292+
- $false: Antispoofing is disabled for the policy. We only recommend this value if you have a domain that's protected by another email filtering service.
293+
294+
```yaml
295+
Type: Boolean
296+
Parameter Sets: (All)
297+
Aliases:
298+
Applicable: Exchange Online
299+
300+
Required: False
301+
Position: Named
302+
Default value: None
303+
Accept pipeline input: False
304+
Accept wildcard characters: False
305+
```
306+
307307
### -EnableTargetedDomainsProtection
308308
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
309309

exchange/exchange-ps/exchange/Set-App.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -212,7 +212,7 @@ Accept wildcard characters: False
212212
```
213213

214214
### -UserList
215-
The UserList parameter specifies who can use an organizational app. This parameter is currently limited to 1000 users. This will not change in the future as we are planning on moving to [Centralized Deployment](https://docs.microsoft.com/office/dev/add-ins/publish/centralized-deployment).
215+
The UserList parameter specifies who can use an organizational app. This parameter is limited to 1000 users. In the cloud-based service, this value is less relevant as Office Add-in management is moving to [Centralized Deployment](https://docs.microsoft.com/office/dev/add-ins/publish/centralized-deployment).
216216

217217
Valid values are mailboxes or mail users in your organization. You can use any value that uniquely identifies the user. For example:
218218

exchange/exchange-ps/exchange/Set-MapiVirtualDirectory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Accept wildcard characters: False
7575
```
7676
7777
### -ApplyDefaults
78-
The ApplyDefaults switch specifies whether to apply the correct defaults to the related internal IIS application settings. Typically, this switch is used only by Exchange setup during the installation of Exchange Cumulative Updates or Service Packs and you shouldn't need to use it.
78+
The ApplyDefaults switch specifies whether to apply the correct defaults to the related internal IIS application settings. Typically, this switch is used only by Exchange Setup during the installation of Exchange Cumulative Updates or Service Packs and you shouldn't need to use it.
7979
8080
This switch doesn't affect the values you configure by using the IISAuthenticationMethods, InternalUrl or ExternalUrl parameters.
8181

exchange/exchange-ps/exchange/Set-ThrottlingPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ Set-ThrottlingPolicy [-Identity] <ThrottlingPolicyIdParameter>
173173
## DESCRIPTION
174174
Throttling policy settings are stored in Active Directory.
175175

176-
By default, there is one default user throttling policy named GlobalThrottlingPolicy with a throttling scope of Global. Microsoft Setup creates this policy as part of the Client Access server role. You shouldn't replace, re-create, or remove the existing default throttling policy. However, you can edit any additional throttling policies with the scope of Organization or Regular if you want to change your user throttling settings. You can create polices with the scope of Organization or Regular using the New-ThrottlingPolicy cmdlet.
176+
By default, there is one default user throttling policy named GlobalThrottlingPolicy with a throttling scope of Global. Exchange Setup creates this policy as part of the Client Access server role. You shouldn't replace, re-create, or remove the existing default throttling policy. However, you can edit any additional throttling policies with the scope of Organization or Regular if you want to change your user throttling settings. You can create polices with the scope of Organization or Regular using the New-ThrottlingPolicy cmdlet.
177177

178178
For more information about how to control the resources consumed by individual users, see [User workload management in Exchange Server](https://docs.microsoft.com/Exchange/server-health/workload-management).
179179

exchange/exchange-ps/exchange/Set-UMMailbox.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -381,7 +381,7 @@ Accept wildcard characters: False
381381
### -PhoneProviderId
382382
This parameter is available only in the cloud-based service.
383383

384-
The PhoneProviderId parameter specifies the user's phone number and mobile service provider. This information is used to provide custom call forwarding and cancelling voice mail setup instructions based on the mobile phone provider.
384+
The PhoneProviderId parameter specifies the user's phone number and mobile service provider. This information is used to provide custom call forwarding and cancelling voice mail set up instructions based on the mobile phone provider.
385385

386386
```yaml
387387
Type: String

0 commit comments

Comments
 (0)