Skip to content

Commit 9843c8f

Browse files
authored
Merge pull request MicrosoftDocs#4382 from MicrosoftDocs/chrisda
Chrisda to Master
2 parents a1af56e + 139a8cf commit 9843c8f

File tree

441 files changed

+5088
-5057
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

441 files changed

+5088
-5057
lines changed

exchange/docs-conceptual/exchange-online/exchange-online-powershell-v2/cmdlet-property-sets.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ ms.date:
77
ms.audience: Admin
88
ms.topic: article
99
ms.service: exchange-online
10+
ms.reviewer: navgupta
1011
localization_priority: Priority
1112
ms.collection: Strat_EX_Admin
1213
ms.custom:

exchange/docs-conceptual/exchange-online/exchange-online-powershell-v2/exchange-online-powershell-v2.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ ms.date:
77
ms.audience: Admin
88
ms.topic: article
99
ms.service: exchange-online
10+
ms.reviewer: navgupta
1011
localization_priority: Priority
1112
ms.collection: Strat_EX_Admin
1213
ms.custom:

exchange/docs-conceptual/exchange-server/exchange-cmdlet-syntax.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -43,11 +43,9 @@ Parameter sets are groups of parameters that can be used with each other in the
4343

4444
Many cmdlets have only one parameter set, which means that all available parameters can be used with each other. Other cmdlets have several parameter sets, which indicates some parameters perform functions that are incompatible with other parameters. For example, suppose the following parameter sets are available on the **New-SystemMessage** cmdlet:
4545

46-
```PowerShell
47-
New-SystemMessage -DsnCode <EnhancedStatusCode> -Internal <$true | $false> -Language <CultureInfo> -Text <String> [-Confirm] [-DomainController <Fqdn>] [-WhatIf] <COMMON PARAMETERS>
46+
`New-SystemMessage -DsnCode <EnhancedStatusCode> -Internal <Boolean> -Language <CultureInfo> -Text <String> [-Confirm] [-DomainController <Fqdn>] [-WhatIf] <COMMON PARAMETERS>`
4847

49-
New-SystemMessage -Language <CultureInfo> -QuotaMessageType <WarningMailboxUnlimitedSize| WarningPublicFolderUnlimitedSize | WarningMailbox | WarningPublicFolder | ProhibitSendMailbox | ProhibitPostPublicFolder | ProhibitSendReceiveMailBox> -Text <String> [-Confirm] [-DomainController <Fqdn>] [-WhatIf] <COMMON PARAMETERS>
50-
```
48+
`New-SystemMessage -Language <CultureInfo> -QuotaMessageType <QuotaMessageType> -Text <String> [-Confirm] [-DomainController <Fqdn>] [-WhatIf] <COMMON PARAMETERS>`
5149

5250
This cmdlet has two separate parameter sets. Based on the entries, you can use these parameters together in the same command:
5351

exchange/exchange-ps/exchange/active-directory/Add-ADPermission.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Add-ADPermission [-Identity] <ADRawEntryIdParameter> -User <SecurityPrincipalIdP
2929
[-Deny]
3030
[-DomainController <Fqdn>]
3131
[-ExtendedRights <ExtendedRightIdParameter[]>]
32-
[-InheritanceType <None | All | Descendents | SelfAndChildren | Children>]
32+
[-InheritanceType <ActiveDirectorySecurityInheritance>]
3333
[-InheritedObjectType <ADSchemaObjectIdParameter>]
3434
[-Properties <ADSchemaObjectIdParameter[]>]
3535
[-WhatIf] [<CommonParameters>]
@@ -53,7 +53,7 @@ Add-ADPermission -Instance <ADAcePresentationObject>
5353
[-DomainController <Fqdn>]
5454
[-ExtendedRights <ExtendedRightIdParameter[]>]
5555
[[-Identity] <ADRawEntryIdParameter>]
56-
[-InheritanceType <None | All | Descendents | SelfAndChildren | Children>]
56+
[-InheritanceType <ActiveDirectorySecurityInheritance>]
5757
[-InheritedObjectType <ADSchemaObjectIdParameter>]
5858
[-Properties <ADSchemaObjectIdParameter[]>]
5959
[-User <SecurityPrincipalIdParameter>]
@@ -323,7 +323,7 @@ Accept wildcard characters: False
323323
The InheritanceType parameter specifies whether permissions are inherited.
324324
325325
```yaml
326-
Type: None | All | Descendents | SelfAndChildren | Children
326+
Type: ActiveDirectorySecurityInheritance
327327
Parameter Sets: AccessRights, Instance
328328
Aliases:
329329
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019

exchange/exchange-ps/exchange/active-directory/Remove-ADPermission.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ Remove-ADPermission [-Identity] <ADRawEntryIdParameter> -User <SecurityPrincipal
2929
[-Deny]
3030
[-DomainController <Fqdn>]
3131
[-ExtendedRights <ExtendedRightIdParameter[]>]
32-
[-InheritanceType <None | All | Descendents | SelfAndChildren | Children>]
32+
[-InheritanceType <ActiveDirectorySecurityInheritance>]
3333
[-InheritedObjectType <ADSchemaObjectIdParameter>]
3434
[-Properties <ADSchemaObjectIdParameter[]>]
3535
[-WhatIf] [<CommonParameters>]
@@ -53,7 +53,7 @@ Remove-ADPermission -Instance <ADAcePresentationObject>
5353
[-DomainController <Fqdn>]
5454
[-ExtendedRights <ExtendedRightIdParameter[]>]
5555
[[-Identity] <ADRawEntryIdParameter>]
56-
[-InheritanceType <None | All | Descendents | SelfAndChildren | Children>]
56+
[-InheritanceType <ActiveDirectorySecurityInheritance>]
5757
[-InheritedObjectType <ADSchemaObjectIdParameter>]
5858
[-Properties <ADSchemaObjectIdParameter[]>]
5959
[-User <SecurityPrincipalIdParameter>]
@@ -305,7 +305,7 @@ Accept wildcard characters: False
305305
The InheritanceType parameter specifies whether permissions are inherited.
306306
307307
```yaml
308-
Type: None | All | Descendents | SelfAndChildren | Children
308+
Type: ActiveDirectorySecurityInheritance
309309
Parameter Sets: (All)
310310
Aliases:
311311
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019

exchange/exchange-ps/exchange/active-directory/Set-ADServerSettings.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,14 @@ Set-AdServerSettings -RunspaceServerSettings <RunspaceServerSettingsPresentation
2929

3030
### FullParams
3131
```
32-
Set-AdServerSettings [-ConfigurationDomainController <Fqdn>] [-PreferredGlobalCatalog <Fqdn>] [-RecipientViewRoot <String>] [-SetPreferredDomainControllers <MultiValuedProperty>] [-ViewEntireForest <$true | $false>]
32+
Set-AdServerSettings [-ConfigurationDomainController <Fqdn>] [-PreferredGlobalCatalog <Fqdn>] [-RecipientViewRoot <String>] [-SetPreferredDomainControllers <MultiValuedProperty>] [-ViewEntireForest <Boolean>]
3333
[-Confirm]
3434
[-WhatIf] [<CommonParameters>]
3535
```
3636

3737
### SingleDC
3838
```
39-
Set-AdServerSettings [[-PreferredServer] <Fqdn>] [-RecipientViewRoot <String>] [-ViewEntireForest <$true | $false>]
39+
Set-AdServerSettings [[-PreferredServer] <Fqdn>] [-RecipientViewRoot <String>] [-ViewEntireForest <Boolean>]
4040
[-Confirm]
4141
[-WhatIf] [<CommonParameters>]
4242
```
@@ -184,7 +184,7 @@ The ViewEntireForest parameter specifies whether all the objects in the forest a
184184
When you specify a value of $true, the value stored in the RecipientViewRoot parameter is removed and all of the recipients in the forest can be viewed and managed.
185185
186186
```yaml
187-
Type: $true | $false
187+
Type: Boolean
188188
Parameter Sets: SingleDC, FullParams
189189
Aliases:
190190
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019

exchange/exchange-ps/exchange/active-directory/Set-ADSite.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,8 @@ For information about the parameter sets in the Syntax section below, see [Excha
2222

2323
```
2424
Set-AdSite [-Identity] <AdSiteIdParameter> [-Confirm] [-DomainController <Fqdn>]
25-
[-HubSiteEnabled <$true | $false>] [-PartnerId <Int32>]
26-
[-WhatIf] [-InboundMailEnabled <$true | $false>] [<CommonParameters>]
25+
[-HubSiteEnabled <Boolean>] [-PartnerId <Int32>]
26+
[-WhatIf] [-InboundMailEnabled <Boolean>] [<CommonParameters>]
2727
```
2828

2929
## DESCRIPTION
@@ -96,7 +96,7 @@ Accept wildcard characters: False
9696
The HubSiteEnabled parameter specifies whether this site acts as a hub site. The default value is $false.
9797
9898
```yaml
99-
Type: $true | $false
99+
Type: Boolean
100100
Parameter Sets: (All)
101101
Aliases:
102102
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
@@ -146,7 +146,7 @@ The InboundMailEnabled parameter enables or disables receiving incoming messages
146146
Valid input for this parameter is $true or $false. The default value is $true. If you set the value to $false, none of the Exchange servers in the Active Directory site will be able to receive incoming messages.
147147
148148
```yaml
149-
Type: $true | $false
149+
Type: Boolean
150150
Parameter Sets: (All)
151151
Aliases:
152152
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019

exchange/exchange-ps/exchange/advanced-threat-protection/Get-AntiPhishRule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ For information about the parameter sets in the Syntax section below, see [Excha
2121
## SYNTAX
2222

2323
```
24-
Get-AntiPhishRule [[-Identity] <RuleIdParameter>] [-State <Enabled | Disabled>] [<CommonParameters>]
24+
Get-AntiPhishRule [[-Identity] <RuleIdParameter>] [-State <RuleState>] [<CommonParameters>]
2525
```
2626

2727
## DESCRIPTION
@@ -71,7 +71,7 @@ Accept wildcard characters: False
7171
The State parameter filters the results by the state of the rule. Valid values are Enabled and Disabled.
7272
7373
```yaml
74-
Type: Enabled | Disabled
74+
Type: RuleState
7575
Parameter Sets: (All)
7676
Aliases:
7777
Applicable: Exchange Online, Exchange Online Protection

exchange/exchange-ps/exchange/advanced-threat-protection/Get-SafeAttachmentRule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ For information about the parameter sets in the Syntax section below, see [Excha
2121
## SYNTAX
2222

2323
```
24-
Get-SafeAttachmentRule [[-Identity] <RuleIdParameter>] [-State <Enabled | Disabled>] [<CommonParameters>]
24+
Get-SafeAttachmentRule [[-Identity] <RuleIdParameter>] [-State <RuleState>] [<CommonParameters>]
2525
```
2626

2727
## DESCRIPTION
@@ -75,7 +75,7 @@ Accept wildcard characters: False
7575
The State parameter filters the results by the state of the rule. Valid values are Enabled and Disabled.
7676
7777
```yaml
78-
Type: Enabled | Disabled
78+
Type: RuleState
7979
Parameter Sets: (All)
8080
Aliases:
8181
Applicable: Exchange Online, Exchange Online Protection

exchange/exchange-ps/exchange/advanced-threat-protection/Get-SafeLinksRule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ For information about the parameter sets in the Syntax section below, see [Excha
2121
## SYNTAX
2222

2323
```
24-
Get-SafeLinksRule [[-Identity] <RuleIdParameter>] [-State <Enabled | Disabled>] [<CommonParameters>]
24+
Get-SafeLinksRule [[-Identity] <RuleIdParameter>] [-State <RuleState>] [<CommonParameters>]
2525
```
2626

2727
## DESCRIPTION
@@ -75,7 +75,7 @@ Accept wildcard characters: False
7575
The State parameter filters the results by the state of the rule. Valid values are Enabled and Disabled.
7676
7777
```yaml
78-
Type: Enabled | Disabled
78+
Type: RuleState
7979
Parameter Sets: (All)
8080
Aliases:
8181
Applicable: Exchange Online, Exchange Online Protection

exchange/exchange-ps/exchange/advanced-threat-protection/New-AntiPhishPolicy.md

Lines changed: 32 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -23,31 +23,31 @@ For information about the parameter sets in the Syntax section below, see [Excha
2323
```
2424
New-AntiPhishPolicy -Name <String>
2525
[-AdminDisplayName <String>]
26-
[-AuthenticationFailAction <MoveToJmf | Quarantine>]
26+
[-AuthenticationFailAction <SpoofAuthenticationFailAction>]
2727
[-Confirm]
28-
[-EnableAntiSpoofEnforcement <$true | $false>]
29-
[-EnableAuthenticationSafetyTip <$true | $false>]
30-
[-EnableAuthenticationSoftPassSafetyTip <$true | $false>]
31-
[-Enabled <$true | $false>]
32-
[-EnableMailboxIntelligence <$true | $false>]
33-
[-EnableMailboxIntelligenceProtection <$true | $false>]
34-
[-EnableOrganizationDomainsProtection <$true | $false>]
35-
[-EnableSimilarDomainsSafetyTips <$true | $false>]
36-
[-EnableSimilarUsersSafetyTips <$true | $false>]
37-
[-EnableTargetedDomainsProtection <$true | $false>]
38-
[-EnableTargetedUserProtection <$true | $false>]
39-
[-EnableUnauthenticatedSender <$true | $false>]
40-
[-EnableUnusualCharactersSafetyTips <$true | $false>]
28+
[-EnableAntiSpoofEnforcement <Boolean>]
29+
[-EnableAuthenticationSafetyTip <Boolean>]
30+
[-EnableAuthenticationSoftPassSafetyTip <Boolean>]
31+
[-Enabled <Boolean>]
32+
[-EnableMailboxIntelligence <Boolean>]
33+
[-EnableMailboxIntelligenceProtection <Boolean>]
34+
[-EnableOrganizationDomainsProtection <Boolean>]
35+
[-EnableSimilarDomainsSafetyTips <Boolean>]
36+
[-EnableSimilarUsersSafetyTips <Boolean>]
37+
[-EnableTargetedDomainsProtection <Boolean>]
38+
[-EnableTargetedUserProtection <Boolean>]
39+
[-EnableUnauthenticatedSender <Boolean>]
40+
[-EnableUnusualCharactersSafetyTips <Boolean>]
4141
[-ExcludedDomains <MultiValuedProperty>]
4242
[-ExcludedSenders <MultiValuedProperty>]
4343
[-PhishThresholdLevel <Int32>]
4444
[-TargetedDomainActionRecipients <MultiValuedProperty>]
45-
[-TargetedDomainProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>]
45+
[-TargetedDomainProtectionAction <ImpersonationAction>]
4646
[-TargetedDomainsToProtect <MultiValuedProperty>]
4747
[-TargetedUserActionRecipients <MultiValuedProperty>]
48-
[-TargetedUserProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>]
48+
[-TargetedUserProtectionAction <ImpersonationAction>]
4949
[-TargetedUsersToProtect <MultiValuedProperty>]
50-
[-TreatSoftPassAsAuthenticated <$true | $false>]
50+
[-TreatSoftPassAsAuthenticated <Boolean>]
5151
[-WhatIf] [<CommonParameters>]
5252
```
5353

@@ -135,7 +135,7 @@ The AuthenticationFailAction parameter specifies the action to take when the mes
135135
- Quarantine: Move the message to the phishing quarantine.
136136
137137
```yaml
138-
Type: Delete | MoveToJmf | Quarantine
138+
Type: SpoofAuthenticationFailAction
139139
Parameter Sets: (All)
140140
Aliases:
141141
Applicable: Exchange Online, Exchange Online Protection
@@ -175,7 +175,7 @@ The EnableAntispoofEnforcement parameter specifies whether to enable or disable
175175
- $false: Antispoofing is disabled for the policy. We only recommend this value if you have a domain that's protected by another email filtering service.
176176
177177
```yaml
178-
Type: $true | $false
178+
Type: Boolean
179179
Parameter Sets: (All)
180180
Aliases:
181181
Applicable: Exchange Online, Exchange Online Protection
@@ -195,7 +195,7 @@ The EnableAuthenticationSafetyTip parameter specifies whether to enable safety t
195195
- $false: Safety tips are disabled for messages that fail composite authentication.
196196
197197
```yaml
198-
Type: $true | $false
198+
Type: Boolean
199199
Parameter Sets: (All)
200200
Aliases:
201201
Applicable: Exchange Online, Exchange Online Protection
@@ -215,7 +215,7 @@ The EnableAuthenticationSoftPassSafetyTip parameter specifies whether to enable
215215
- $false: Safety tips are disabled for messages that fail composite authentication with low to medium confidence. This is the default value.
216216
217217
```yaml
218-
Type: $true | $false
218+
Type: Boolean
219219
Parameter Sets: (All)
220220
Aliases:
221221
Applicable: Exchange Online, Exchange Online Protection
@@ -235,7 +235,7 @@ The Enabled parameter specifies whether the policy is enabled. Valid values are:
235235
- $false: The policy is disabled.
236236
237237
```yaml
238-
Type: $true | $false
238+
Type: Boolean
239239
Parameter Sets: (All)
240240
Aliases:
241241
Applicable: Exchange Online, Exchange Online Protection
@@ -255,7 +255,7 @@ The EnableMailboxIntelligence parameter specifies whether to enable or disable m
255255
- $false: Don't use mailbox intelligence in domain and user impersonation protection. This is the default value.
256256
257257
```yaml
258-
Type: $true | $false
258+
Type: Boolean
259259
Parameter Sets: (All)
260260
Aliases:
261261
Applicable: Exchange Online, Exchange Online Protection
@@ -275,7 +275,7 @@ The EnableMailboxIntelligenceProtection specifies whether to enable or disable i
275275
- $false: Don't enable intelligence based impersonation protection. This is the default value.
276276
277277
```yaml
278-
Type: $true | $false
278+
Type: Boolean
279279
Parameter Sets: (All)
280280
Aliases:
281281
Applicable: Exchange Online, Exchange Online Protection
@@ -295,7 +295,7 @@ The EnableOrganizationDomainsProtection parameter specifies whether to enable
295295
- $false: Domain impersonation protection isn't enabled for all registered domains in the Office 365 organization. This is the default value. You can enable domain impersonation protection for specific domains by using the EnableTargetedDomainsProtection and TargetedDomainsToProtect parameters.
296296
297297
```yaml
298-
Type: $true | $false
298+
Type: Boolean
299299
Parameter Sets: (All)
300300
Aliases:
301301
Applicable: Exchange Online, Exchange Online Protection
@@ -315,7 +315,7 @@ The EnableSimilarDomainsSafetyTips parameter specifies whether to enable saf
315315
- $false: Safety tips for similar domains are disabled. This is the default value.
316316
317317
```yaml
318-
Type: $true | $false
318+
Type: Boolean
319319
Parameter Sets: (All)
320320
Aliases:
321321
Applicable: Exchange Online, Exchange Online Protection
@@ -335,7 +335,7 @@ The EnableSimilarUsersSafetyTips parameter specifies whether to enable safet
335335
- $false: Safety tips for similar users are disabled. This is the default value.
336336
337337
```yaml
338-
Type: $true | $false
338+
Type: Boolean
339339
Parameter Sets: (All)
340340
Aliases:
341341
Applicable: Exchange Online, Exchange Online Protection
@@ -355,7 +355,7 @@ The EnableTargetedDomainsProtection parameter specifies whether to enable doma
355355
- $false: The TargetedDomainsToProtect parameter isn't used. This is the default value.
356356
357357
```yaml
358-
Type: $true | $false
358+
Type: Boolean
359359
Parameter Sets: (All)
360360
Aliases:
361361
Applicable: Exchange Online, Exchange Online Protection
@@ -375,7 +375,7 @@ The EnableTargetedUserProtection parameter specifies whether to enable user im
375375
- $false: The TargetedUsersToProtect parameter isn't used. This is the default value.
376376
377377
```yaml
378-
Type: $true | $false
378+
Type: Boolean
379379
Parameter Sets: (All)
380380
Aliases:
381381
Applicable: Exchange Online, Exchange Online Protection
@@ -395,7 +395,7 @@ The EnableUnauthenticatedSender parameter specifies whether to apply a "?" s
395395
- $false: Do not apply the "?" symbol.
396396
397397
```yaml
398-
Type: $true | $false
398+
Type: Boolean
399399
Parameter Sets: (All)
400400
Aliases:
401401
Applicable: Exchange Online, Exchange Online Protection
@@ -415,7 +415,7 @@ The EnableUnusualCharactersSafetyTips parameter specifies whether to enable
415415
- $false: Safety tips for unusual characters are disabled. This is the default value.
416416
417417
```yaml
418-
Type: $true | $false
418+
Type: Boolean
419419
Parameter Sets: (All)
420420
Aliases:
421421
Applicable: Exchange Online, Exchange Online Protection
@@ -695,7 +695,7 @@ The TreatSoftPassAsAuthenticated parameter specifies whether or not to respect t
695695
Note: This parameter corresponds to the Strict filtering value in the Microsoft 365 admin center.
696696
697697
```yaml
698-
Type: $true | $false
698+
Type: Boolean
699699
Parameter Sets: (All)
700700
Aliases:
701701
Applicable: Exchange Online, Exchange Online Protection

exchange/exchange-ps/exchange/advanced-threat-protection/New-AntiPhishRule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ For information about the parameter sets in the Syntax section below, see [Excha
2424
New-AntiPhishRule [-Name] <String> -AntiPhishPolicy <String>
2525
[-Comments <String>]
2626
[-Confirm]
27-
[-Enabled <$true | $false>]
27+
[-Enabled <Boolean>]
2828
[-ExceptIfRecipientDomainIs <Word[]>]
2929
[-ExceptIfSentTo <RecipientIdParameter[]>]
3030
[-ExceptIfSentToMemberOf <RecipientIdParameter[]>]
@@ -142,7 +142,7 @@ The Enabled parameter specifies whether the rule is enabled. Valid values are:
142142
In the properties of the rule, the value of this parameter is visible in the State property.
143143
144144
```yaml
145-
Type: $true | $false
145+
Type: Boolean
146146
Parameter Sets: (All)
147147
Aliases:
148148
Applicable: Exchange Online, Exchange Online Protection

0 commit comments

Comments
 (0)