Skip to content

Commit 54e507e

Browse files
authored
Merge branch 'master' into patch-53
2 parents ed0ba49 + 89dfe2e commit 54e507e

File tree

5 files changed

+42
-14
lines changed

5 files changed

+42
-14
lines changed

exchange/exchange-ps/exchange/client-access/Set-CASMailbox.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1121,8 +1121,6 @@ Accept wildcard characters: False
11211121
```
11221122
11231123
### -PublicFolderClientAccess
1124-
This parameter is available only in the cloud-based service.
1125-
11261124
The PublicFolderClientAccess parameter enables or disables access to public folders in Microsoft Outlook. Valid values are:
11271125
11281126
- $true: The user can access public folders in Outlook if the PublicFolderShowClientControl parameter on the Set-OrganizationConfig cmdlet is set to the value $true (the default value is $false).
@@ -1133,7 +1131,7 @@ The PublicFolderClientAccess parameter enables or disables access to public fold
11331131
Type: $true | $false
11341132
Parameter Sets: AdfsAuthenticationRawConfiguration, AdfsAuthenticationParameter
11351133
Aliases:
1136-
Applicable: Exchange Online
1134+
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online
11371135
Required: False
11381136
Position: Named
11391137
Default value: $false

exchange/exchange-ps/exchange/mailboxes/Set-MailboxFolderPermission.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ The following individual permissions are available:
9898

9999
- FolderContact: The user is the contact for the specified public folder.
100100

101-
- FolderOwner: The user is the owner of the specified folder. The user can view the folder, move the move the folder, and create subfolders. The user can't read items, edit items, delete items, or create items.
101+
- FolderOwner: The user is the owner of the specified folder. The user can view the folder, move the folder, and create subfolders. The user can't read items, edit items, delete items, or create items.
102102

103103
- FolderVisible: The user can view the specified folder, but can't read or edit items within the specified public folder.
104104

exchange/exchange-ps/exchange/policy-and-compliance-audit/Search-UnifiedAuditLog.md

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Search-UnifiedAuditLog -EndDate <ExDateTime> -StartDate <ExDateTime>
2727
[-IPAddresses <String[]>]
2828
[-ObjectIds <String[]>]
2929
[-Operations <String[]>]
30-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
30+
[-RecordType <AuditRecordType>]
3131
[-ResultSize <Int32>]
3232
[-SessionCommand <Initialize | ReturnLargeSet | ReturnNextPreviewPage>]
3333
[-SessionId <String>]
@@ -41,7 +41,7 @@ The Search-UnifiedAuditLog cmdlet presents pages of data based on repeated itera
4141

4242
The Search-UnifiedAuditLog cmdlet is available in Exchange Online PowerShell. You can also view events from the unified auditing log by using the Office 365 Security & Compliance Center. For more information, see Search the audit log in the Office 365 Security & Compliance Center (https://go.microsoft.com/fwlink/p/?LinkId=708432).
4343

44-
If you want to programmatically download data from the Office 365 audit log, we recommend that you use the Office 365 Management Activity API instead of using the Search-UnifiedAuditLog cmdlet in a PowerShell script. The Office 365 Management Activity API is a REST web service that you can use to develop operations, security, and compliance monitoring solutions for your organization. For more information, see Office 365 Management Activity API reference (https://go.microsoft.com/fwlink/p/?linkid=852309).
44+
If you want to programmatically download data from the Office 365 audit log, we recommend that you use the Office 365 Management Activity API instead of using the Search-UnifiedAuditLog cmdlet in a PowerShell script. The Office 365 Management Activity API is a REST web service that you can use to develop operations, security, and compliance monitoring solutions for your organization. For more information, see Office 365 Management Activity API reference (https://docs.microsoft.com/office/office-365-management-api/office-365-management-activity-api-reference).
4545

4646
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see Find the permissions required to run any Exchange cmdlet (https://technet.microsoft.com/library/mt432940.aspx).
4747

@@ -216,6 +216,8 @@ Accept wildcard characters: False
216216
### -RecordType
217217
The RecordType parameter filters the log entries by record type. Valid values are:
218218
219+
- AeD
220+
219221
- AzureActiveDirectory
220222
221223
- AzureActiveDirectoryAccountLogon
@@ -260,6 +262,8 @@ The RecordType parameter filters the log entries by record type. Valid values ar
260262
261263
- SharePointFileOperation
262264
265+
- SharePointListOperation
266+
263267
- SharePointSharingOperation
264268
265269
- SkypeForBusinessCmdlets
@@ -272,10 +276,16 @@ The RecordType parameter filters the log entries by record type. Valid values ar
272276
273277
- ThreatIntelligence
274278
279+
- ThreatIntelligenceAtpContent
280+
281+
- ThreatIntelligenceUrl
282+
283+
- WorkplaceAnalytics
284+
275285
- Yammer
276286
277287
```yaml
278-
Type: AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer
288+
Type: AuditRecordType
279289
Parameter Sets: (All)
280290
Aliases:
281291
Applicable: Exchange Online

exchange/exchange-ps/exchange/policy-and-compliance/New-ActivityAlert.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ New-ActivityAlert -Multiplier <Double> -Name <String> -NotifyUser <MultiValuedPr
3030
[-Disabled <$true | $false>]
3131
[-DomainController <Fqdn>]
3232
[-EmailCulture <CultureInfo>]
33-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
33+
[-RecordType <AuditRecordType>]
3434
[-ScopeLevel <SingleUser | AllUsers>]
3535
[-Severity <Low | Medium | High | None>]
3636
[-UserId <MultiValuedProperty>]
@@ -46,7 +46,7 @@ New-ActivityAlert -Name <String> -NotifyUser <MultiValuedProperty> -Operation <M
4646
[-Disabled <$true | $false>]
4747
[-DomainController <Fqdn>]
4848
[-EmailCulture <CultureInfo>]
49-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
49+
[-RecordType <AuditRecordType>]
5050
[-Severity <Low | Medium | High | None>]
5151
[-UserId <MultiValuedProperty>]
5252
[-WhatIf] [<CommonParameters>]
@@ -62,7 +62,7 @@ New-ActivityAlert -Name <String> -NotifyUser <MultiValuedProperty> [-Operation <
6262
[-Disabled <$true | $false>]
6363
[-DomainController <Fqdn>]
6464
[-EmailCulture <CultureInfo>]
65-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
65+
[-RecordType <AuditRecordType>]
6666
[-ScopeLevel <SingleUser | AllUsers>]
6767
[-Severity <Low | Medium | High | None>]
6868
[-UserId <MultiValuedProperty>]
@@ -78,7 +78,7 @@ New-ActivityAlert -Name <String> -NotifyUser <MultiValuedProperty> -Type <Custom
7878
[-Disabled <$true | $false>]
7979
[-DomainController <Fqdn>]
8080
[-EmailCulture <CultureInfo>]
81-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
81+
[-RecordType <AuditRecordType>]
8282
[-Severity <Low | Medium | High | None>]
8383
[-UserId <MultiValuedProperty>]
8484
[-WhatIf] [<CommonParameters>]
@@ -389,6 +389,8 @@ Accept wildcard characters: False
389389
### -RecordType
390390
The RecordType parameter specifies a record type label for the activity alert. Valid values are:
391391
392+
- AeD
393+
392394
- AzureActiveDirectory
393395
394396
- AzureActiveDirectoryAccountLogon
@@ -433,6 +435,8 @@ The RecordType parameter specifies a record type label for the activity alert. V
433435
434436
- SharePointFileOperation
435437
438+
- SharePointListOperation
439+
436440
- SharePointSharingOperation
437441
438442
- SkypeForBusinessCmdlets
@@ -445,12 +449,18 @@ The RecordType parameter specifies a record type label for the activity alert. V
445449
446450
- ThreatIntelligence
447451
452+
- ThreatIntelligenceAtpContent
453+
454+
- ThreatIntelligenceUrl
455+
456+
- WorkplaceAnalytics
457+
448458
- Yammer
449459
450460
You can't use this parameter when the value of the Type parameter is ElevationOfPrivilege.
451461
452462
```yaml
453-
Type: AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer
463+
Type: AuditRecordType
454464
Parameter Sets: (All)
455465
Aliases:
456466
Applicable: Office 365 Security & Compliance Center

exchange/exchange-ps/exchange/policy-and-compliance/Set-ActivityAlert.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Set-ActivityAlert [-Identity] <ComplianceRuleIdParameter>
3232
[-Name <String>]
3333
[-NotifyUser <MultiValuedProperty>]
3434
[-Operation <MultiValuedProperty>]
35-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
35+
[-RecordType <AuditRecordType>]
3636
[-ScopeLevel <SingleUser | AllUsers>]
3737
[-Severity <Low | Medium | High | None>]
3838
[-Threshold <Int32>]
@@ -287,6 +287,8 @@ Accept wildcard characters: False
287287
### -RecordType
288288
The RecordType parameter specifies a record type label for the activity alert. Valid values are:
289289
290+
- AeD
291+
290292
- AzureActiveDirectory
291293
292294
- AzureActiveDirectoryAccountLogon
@@ -331,6 +333,8 @@ The RecordType parameter specifies a record type label for the activity alert. V
331333
332334
- SharePointFileOperation
333335
336+
- SharePointListOperation
337+
334338
- SharePointSharingOperation
335339
336340
- SkypeForBusinessCmdlets
@@ -343,12 +347,18 @@ The RecordType parameter specifies a record type label for the activity alert. V
343347
344348
- ThreatIntelligence
345349
350+
- ThreatIntelligenceAtpContent
351+
352+
- ThreatIntelligenceUrl
353+
354+
- WorkplaceAnalytics
355+
346356
- Yammer
347357
348358
You can't use this parameter when the value of the Type parameter is ElevationOfPrivilege.
349359
350360
```yaml
351-
Type: AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer
361+
Type: AuditRecordType
352362
Parameter Sets: (All)
353363
Aliases:
354364
Applicable: Office 365 Security & Compliance Center

0 commit comments

Comments
 (0)