You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This parameter is available only in the cloud-based service.
87
+
88
+
The AzureRMSLicensingEnabled parameter specifies whether the Exchange Online organization can to connect directly to Azure Rights Management. Valid values are:
89
+
90
+
- $true: The Exchange Online organization can connect directly to Azure Rights Management. This enables Office 365 Message Encryption.
91
+
92
+
- $false: The Exchange Online organization can't connect directly to Azure Rights Management. Do not configure this value unless you're directed to do so by Microsoft Customer Service and Support.
93
+
94
+
```yaml
95
+
Type: $true | $false
96
+
Parameter Sets: (All)
97
+
Aliases:
98
+
Applicable: Exchange Online
99
+
Required: False
100
+
Position: Named
101
+
Default value: None
102
+
Accept pipeline input: False
103
+
Accept wildcard characters: False
104
+
```
105
+
84
106
### -ClientAccessServerEnabled
85
107
The ClientAccessServerEnabled parameter specifies whether to enable IRM for Outlook on the web (formerly known as Outlook Web App) and Exchange ActiveSync. Valid values are:
86
108
@@ -157,6 +179,48 @@ Accept pipeline input: False
157
179
Accept wildcard characters: False
158
180
```
159
181
182
+
### -DecryptAttachmentForEncryptOnly
183
+
This parameter is available only in the cloud-based service.
184
+
185
+
The DecryptAttachmentForEncryptOnly parameter specifies whether mail recipients have unrestricted rights on the attachment or not for Encrypt-only mails sent using new Office 365 Message Encryption capabilities. Valid values are:
186
+
187
+
- $true: The recipients will have unrestricted rights on attachments sent using Encrypt-Only policy.
188
+
189
+
- $false: The recipients will not have unrestricted rights on attachments sent using Encrypt-Only policy.
190
+
191
+
```yaml
192
+
Type: $true | $false
193
+
Parameter Sets: (All)
194
+
Aliases:
195
+
Applicable: Exchange Online
196
+
Required: False
197
+
Position: Named
198
+
Default value: None
199
+
Accept pipeline input: False
200
+
Accept wildcard characters: False
201
+
```
202
+
203
+
### -DecryptAttachmentFromPortal
204
+
This parameter is available only in the cloud-based service.
205
+
206
+
The DecryptAttachmentFromPortal parameter specifies whether Office attachments are protected for recipients outside of Office 365 when Encrypt-only policy is used for sending mails using new Office 365 Message Encryption capabilities. Use this option when you don't need to retain the original protection for the attachment upon download. Valid values are:
207
+
208
+
- $true: The recipients will have permissions to download Encrypt-only attachments without protection.
209
+
210
+
- $false: The recipients will continue to have Encrypt-only attachments protected even after download.
211
+
212
+
```yaml
213
+
Type: $true | $false
214
+
Parameter Sets: (All)
215
+
Aliases:
216
+
Applicable: Exchange Online
217
+
Required: False
218
+
Position: Named
219
+
Default value: None
220
+
Accept pipeline input: False
221
+
Accept wildcard characters: False
222
+
```
223
+
160
224
### -ExternalLicensingEnabled
161
225
The ExternalLicensingEnabled parameter specifies whether to enable IRM features for messages that are sent to external recipients. Valid values are:
The SearchEnabled parameter specifies whether to enable searching of IRM-encrypted messages in Outlook on the web. Valid values are:
287
-
288
-
- $true: Searching IRM-encrypted messages in Outlook on the web is enabled. This is the default value.
289
-
290
-
- $false: Searching IRM-encrypted messages in Outlook on the web is disabled.
291
-
292
-
```yaml
293
-
Type: $true | $false
294
-
Parameter Sets: (All)
295
-
Aliases:
296
-
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Online
297
-
Required: False
298
-
Position: Named
299
-
Default value: None
300
-
Accept pipeline input: False
301
-
Accept wildcard characters: False
302
-
```
303
-
304
-
### -ServiceLocation
349
+
### -RMSOnlineKeySharingLocation
305
350
This parameter is available only in the cloud-based service.
306
351
307
-
The ServiceLocation parameter specifies the AD RMS service URL.
352
+
The RMSOnlineKeySharingLocation parameter specifies the Azure Rights Management URL that's used to get the trusted publishing domain (TPD) for the Exchange Online organization.
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
385
+
### -ServiceLocation
386
+
This parameter is available only in the cloud-based service.
387
+
388
+
The ServiceLocation parameter specifies the AD RMS service URL.
344
389
345
390
```yaml
346
-
Type: SwitchParameter
391
+
Type: Uri
347
392
Parameter Sets: (All)
348
-
Aliases:wi
349
-
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Online
393
+
Aliases:
394
+
Applicable: Exchange Online
350
395
Required: False
351
396
Position: Named
352
397
Default value: None
353
398
Accept pipeline input: False
354
399
Accept wildcard characters: False
355
400
```
356
401
357
-
### -RMSOnlineKeySharingLocation
402
+
### -SimplifiedClientAccessEnabled
358
403
This parameter is available only in the cloud-based service.
359
404
360
-
The RMSOnlineKeySharingLocation parameter specifies the Azure Rights Management URL that's used to get the trusted publishing domain (TPD) for the Exchange Online organization.
405
+
The SimplifiedClientAccessEnabled parameter specifies whether to enable the Protect button in Outlook on the web. Valid values are:
406
+
407
+
- $true: The Protect button is enabled in Outlook on the web.
408
+
409
+
- $false: The Protect button is disabled in Outlook on the web. This is the default value.
This parameter is available only in the cloud-based service.
423
+
### -TransportDecryptionSetting
424
+
The TransportDecryptionSetting parameter specifies the transport decryption configuration. Valid values are:
376
425
377
-
The AzureRMSLicensingEnabled parameter specifies whether the Exchange Online organization can to connect directly to Azure Rights Management. Valid values are:
426
+
- Disabled: Transport decryption is disabled for internal and external messages.
378
427
379
-
- $true: The Exchange Online organization can connect directly to Azure Rights Management. This enables Office 365 Message Encryption.
428
+
- Mandatory: Messages that can't be decrypted are rejected with a non-delivery report (also known as an NDR or bounce message).
380
429
381
-
- $false: The Exchange Online organization can't connect directly to Azure Rights Management. Do not configure this value unless you're directed to do so by Microsoft Customer Service and Support.
430
+
- Optional: Messages are decrypted if possible, but are delivered even if decryption fails. This is the default value.
382
431
383
432
```yaml
384
-
Type: $true | $false
433
+
Type: Disabled | Optional | Mandatory
385
434
Parameter Sets: (All)
386
435
Aliases:
387
-
Applicable: Exchange Online
436
+
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Online
388
437
Required: False
389
438
Position: Named
390
439
Default value: None
391
440
Accept pipeline input: False
392
441
Accept wildcard characters: False
393
442
```
394
443
395
-
### -SimplifiedClientAccessEnabled
396
-
This parameter is available only in the cloud-based service.
397
-
398
-
The SimplifiedClientAccessEnabled parameter specifies whether to enable the Protect button in Outlook on the web. Valid values are:
399
-
400
-
- $true: The Protect button is enabled in Outlook on the web.
401
-
402
-
- $false: The Protect button is disabled in Outlook on the web. This is the default value.
444
+
### -WhatIf
445
+
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
403
446
404
447
```yaml
405
-
Type: $true | $false
448
+
Type: SwitchParameter
406
449
Parameter Sets: (All)
407
-
Aliases:
408
-
Applicable: Exchange Online
450
+
Aliases:wi
451
+
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Online
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/policy-and-compliance-audit/Search-UnifiedAuditLog.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ monikerRange: "exchonline-ps"
11
11
## SYNOPSIS
12
12
This cmdlet is available only in the cloud-based service.
13
13
14
-
Use the Search-UnifiedAuditLog cmdlet to search the unified audit log. This log contains events from Exchange Online, SharePoint Online, OneDrive for Business, Azure Active Directory, Microsoft Teams, Power BI, Sway, and other Office 365 services. You can search for all events in a specified date rage, or you can filter the results based on specific criteria, such as the user who performed the action, the action, or the target object.
14
+
Use the Search-UnifiedAuditLog cmdlet to search the unified audit log. This log contains events from Exchange Online, SharePoint Online, OneDrive for Business, Azure Active Directory, Microsoft Teams, Power BI, Sway, and other Office 365 services. You can search for all events in a specified date range, or you can filter the results based on specific criteria, such as the user who performed the action, the action, or the target object.
15
15
16
16
For information about the parameter sets in the Syntax section below, see Exchange cmdlet syntax (https://technet.microsoft.com/library/bb123552.aspx).
This example creates a new sensitive information type rule named "Contoso Employee-Customer Confidential" that uses the document fingerprints of the files C:\\My Documents\\Contoso Employee Template.docx and D:\\Data\\Contoso Customer Template.docx.
This example modifies the existing sensitive information type rule named "Contoso Confidential" by adding a new document fingerprint for the file C:\\My Documents\\Contoso Benefits Template.docx without affecting any existing document fingerprints that are already defined.
0 commit comments