Skip to content

Commit 7b291e3

Browse files
Merge branch 'master' into local-junya-cmdletupdt
2 parents 084497f + d78a5a5 commit 7b291e3

File tree

6 files changed

+31
-25
lines changed

6 files changed

+31
-25
lines changed

exchange/docs-conceptual/connect-to-exchange-online-protection-powershell.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ If you account uses multi-factor authentication, use the steps in this section.
5656
2. The command that you need to run uses the following syntax:
5757

5858
```powershell
59-
<Connect-IPPSSession | Connect-ExchangeOnline> -UserPrincipalName <UPN> -ShowProgress $true [-ConnectionUri <URL>] [-AzureADAuthorizationEndPointUri <URL>]
59+
<Connect-IPPSSession | Connect-ExchangeOnline> -UserPrincipalName <UPN> [-ConnectionUri <URL>] [-AzureADAuthorizationEndPointUri <URL>]
6060
```
6161

6262
- _\<UPN\>_ is your account in user principal name format (for example, `[email protected]`).
@@ -65,13 +65,13 @@ If you account uses multi-factor authentication, use the steps in this section.
6565
**This example connects to Exchange Online Protection PowerShell in a Microsoft 365 organization**:
6666

6767
```powershell
68-
Connect-IPPSSession -UserPrincipalName [email protected] -ShowProgress $true -ConnectionUri https://ps.protection.outlook.com/powershell-liveid/
68+
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://ps.protection.outlook.com/powershell-liveid/
6969
```
7070

7171
**This example connects to Exchange Online Protection PowerShell in an Office 365 Germany organization**:
7272

7373
```powershell
74-
Connect-IPPSSession -UserPrincipalName [email protected] -ShowProgress $true -ConnectionUri https://ps.protection.outlook.de/powershell-liveid/ -AzureADAuthorizationEndPointUri https://login.microsoftonline.de/common
74+
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://ps.protection.outlook.de/powershell-liveid/ -AzureADAuthorizationEndPointUri https://login.microsoftonline.de/common
7575
```
7676

7777
**This example connects to Exchange Online Protection PowerShell in an Exchange Enterprise CAL with Services organization**:
@@ -110,21 +110,21 @@ If your account doesn't use multi-factor authentication, use the steps in this s
110110
3. The command that you need to run uses the following syntax:
111111

112112
```powershell
113-
<Connect-IPPSSession | Connect-ExchangeOnline> -Credential $UserCredential -ShowProgress $true -ConnectionUri <URL>
113+
<Connect-IPPSSession | Connect-ExchangeOnline> -Credential $UserCredential -ConnectionUri <URL>
114114
```
115115

116116
The required cmdlet and _ConnectionUri_ parameter values are described in the table in the [What do you need to know before you begin?](#what-do-you-need-to-know-before-you-begin) section.
117117

118118
**This example connects to Exchange Online Protection PowerShell in a Microsoft 365 organization**:
119119

120120
```powershell
121-
Connect-IPPSSession -Credential $UserCredential -ShowProgress $true -ConnectionUri https://ps.protection.outlook.com/powershell-liveid/
121+
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.protection.outlook.com/powershell-liveid/
122122
```
123123

124124
**This example connects to Exchange Online Protection PowerShell in an Office 365 Germany organization**:
125125

126126
```powershell
127-
Connect-IPPSSession -Credential $UserCredential -ShowProgress $true -ConnectionUri https://ps.protection.outlook.de/powershell-liveid/
127+
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.protection.outlook.de/powershell-liveid/
128128
```
129129

130130
**This example connects to Exchange Online Protection PowerShell in an Exchange Enterprise CAL with Services organization**:

exchange/docs-conceptual/connect-to-scc-powershell.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ To use the older Exchange Online Remote PowerShell Module to connect to Security
3535

3636
|Microsoft 365 offering|_ConnectionUri_ value|_AzureADAuthorizationEndPointUri_ value|
3737
|---|---|---|
38-
|Microsoft 365 or Microsoft 365 GCC|`https://ps.compliance.protection.outlook.com/powershell-liveid/`|Not used|
38+
|Microsoft 365 or Microsoft 365 GCC|Not used|Not used|
3939
|Microsoft 365 GCC High|`https://ps.compliance.protection.office365.us/powershell-liveid/`|`https://login.microsoftonline.us/common`|
4040
|Microsoft 365 DoD|`https://l5.ps.compliance.protection.office365.us/powershell-liveid/`|`https://login.microsoftonline.us/common`|
4141
|Office 365 Germany|`https://ps.compliance.protection.outlook.de/PowerShell-LiveID`|`https://login.microsoftonline.de/common`|
@@ -54,7 +54,7 @@ If you account uses multi-factor authentication, use the steps in this section.
5454
2. The command that you need to run uses the following syntax:
5555

5656
```powershell
57-
Connect-IPPSSession -UserPrincipalName <UPN> -ShowProgress $true [-ConnectionUri <URL>] [-AzureADAuthorizationEndPointUri <URL>]
57+
Connect-IPPSSession -UserPrincipalName <UPN> [-ConnectionUri <URL>] [-AzureADAuthorizationEndPointUri <URL>]
5858
```
5959

6060
- \<UPN\> is your account in user principal name format (for example, `[email protected]`).
@@ -63,25 +63,25 @@ If you account uses multi-factor authentication, use the steps in this section.
6363
**This example connects to Security & Compliance Center PowerShell in a Microsoft 365 or Microsoft 365 GCC organization**.
6464

6565
```powershell
66-
Connect-IPPSSession -UserPrincipalName [email protected] -ShowProgress $true -ConnectionUri https://ps.compliance.protection.outlook.com/powershell-liveid/
66+
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://ps.compliance.protection.outlook.com/powershell-liveid/
6767
```
6868

6969
**This example connects to Security & Compliance Center PowerShell in an Office 365 Germany organization**.
7070

7171
```powershell
72-
Connect-IPPSSession -UserPrincipalName [email protected] -ShowProgress $true -ConnectionUri https://ps.compliance.protection.outlook.de/PowerShell-LiveID -AzureADAuthorizationEndPointUri https://login.microsoftonline.de/common
72+
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://ps.compliance.protection.outlook.de/PowerShell-LiveID -AzureADAuthorizationEndPointUri https://login.microsoftonline.de/common
7373
```
7474

7575
**This example connects to Security & Compliance Center PowerShell in a Microsoft GCC High organization**.
7676

7777
```powershell
78-
Connect-IPPSSession -UserPrincipalName [email protected] -ShowProgress $true -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/ -AzureADAuthorizationEndPointUri https://login.microsoftonline.us/common
78+
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/ -AzureADAuthorizationEndPointUri https://login.microsoftonline.us/common
7979
```
8080

8181
**This example connects to Security & Compliance Center PowerShell in a Microsoft 365 DoD organization**.
8282

8383
```powershell
84-
Connect-IPPSSession -UserPrincipalName [email protected] -ShowProgress $true -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/ -AzureADAuthorizationEndPointUri https://login.microsoftonline.us/common
84+
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/ -AzureADAuthorizationEndPointUri https://login.microsoftonline.us/common
8585
```
8686

8787
For detailed syntax and parameter information, see [Connect-IPPSSession](https://docs.microsoft.com/powershell/module/exchange/connect-exchangeonline).
@@ -114,33 +114,33 @@ If your account doesn't use multi-factor authentication, use the steps in this s
114114
3. The command that you need to run uses the following syntax:
115115

116116
```powershell
117-
Connect-IPPSSession -Credential $UserCredential -ShowProgress $true -ConnectionUri <URL>
117+
Connect-IPPSSession -Credential $UserCredential -ConnectionUri <URL>
118118
```
119119

120120
The _ConnectionUri_ values are described in the table in the [What do you need to know before you begin?](#what-do-you-need-to-know-before-you-begin) section.
121121

122122
**This example connects to Security & Compliance Center PowerShell in a Microsoft 365 or Microsoft 365 GCC organization**.
123123

124124
```powershell
125-
Connect-IPPSSession -Credential $UserCredential -ShowProgress $true -ConnectionUri https://ps.compliance.protection.outlook.com/powershell-liveid/
125+
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.compliance.protection.outlook.com/powershell-liveid/
126126
```
127127

128128
**This example connects to Security & Compliance Center PowerShell in an Office 365 Germany organization**.
129129

130130
```powershell
131-
Connect-IPPSSession -Credential $UserCredential -ShowProgress $true -ConnectionUri https://ps.compliance.protection.outlook.de/
131+
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.compliance.protection.outlook.de/
132132
```
133133

134134
**This example connects to Security & Compliance Center PowerShell in a Microsoft GCC High organization**.
135135

136136
```powershell
137-
Connect-IPPSSession -Credential $UserCredential -ShowProgress $true -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/
137+
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/
138138
```
139139

140140
**This example connects to Security & Compliance Center PowerShell in a Microsoft 365 DoD organization**.
141141

142142
```powershell
143-
Connect-IPPSSession -Credential $UserCredential -ShowProgress $true -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/
143+
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/
144144
```
145145

146146
For detailed syntax and parameter information, see [Connect-IPPSSession](https://docs.microsoft.com/powershell/module/exchange/connect-exchangeonline).

exchange/docs-conceptual/exchange-online-powershell-v2.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -237,10 +237,10 @@ The **Get-EXO\*** cmdlets in the module have categorized output properties. Inst
237237

238238
In the biggest and most used **Get-EXO\*** cmdlets:
239239

240-
- [Get-EXOCasMailbox](../exchange-ps/exchange/Get-EXOCasMailbox.md)
241-
- [Get-EXOMailbox](../exchange-ps/exchange/Get-EXOMailbox.md)
242-
- [Get-EXOMailboxStatistics](../exchange-ps/exchange/Get-EXOMailboxStatistics.md)
243-
- [Get-EXORecipient](../exchange-ps/exchange/Get-EXORecipient.md)
240+
- [Get-EXOCasMailbox](https://docs.microsoft.com/powershell/module/exchange/get-exocasmailbox)
241+
- [Get-EXOMailbox](https://docs.microsoft.com/powershell/module/exchange/get-exomailbox.md)
242+
- [Get-EXOMailboxStatistics](https://docs.microsoft.com/powershell/module/exchange/get-exomailboxstatistics.md)
243+
- [Get-EXORecipient](https://docs.microsoft.com/powershell/module/exchange/get-exorecipient.md)
244244

245245
Property sets are controlled by the following parameters:
246246

exchange/docs-conceptual/scc-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,6 @@ Security & Compliance Center PowerShell is the administrative interface that ena
2121

2222
- To learn about the structure and layout of the cmdlet reference topics in Security & Compliance Center PowerShell, see [Exchange cmdlet syntax](exchange-cmdlet-syntax.md).
2323

24-
Many of the cmdlets that are available in Security & Compliance Center PowerShell correspond to features that are only available in the Security & Compliance Center, so the related cmdlets are exclusive to Security & Compliance Center PowerShell. But, some cmdlets that are available in Security & Compliance Center PowerShell have the same names and functionality as those in Exchange Online PowerShell (for example, [Get-User](../exchange-ps/exchange/Get-User.md)).
24+
Many of the cmdlets that are available in Security & Compliance Center PowerShell correspond to features that are only available in the Security & Compliance Center, so the related cmdlets are exclusive to Security & Compliance Center PowerShell. But, some cmdlets that are available in Security & Compliance Center PowerShell have the same names and functionality as those in Exchange Online PowerShell (for example, [Get-User](https://docs.microsoft.com/powershell/module/exchange/get-user.md)).
2525

2626
Also, some features that are available in the Security & Compliance Center (for example, [anti-spam and anti-malware](https://docs.microsoft.com/microsoft-365/security/office-365-security/anti-spam-and-anti-malware-protection?view=o365-worldwide) cmdlets are only available in [Exchange Online PowerShell](exchange-online-powershell.md)). Check the **Applies to** value in the cmdlet reference topic to verify where the cmdlet actually resides.

skype/skype-ps/skype/Set-CsTeamsMeetingPolicy.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -273,7 +273,14 @@ Accept wildcard characters: False
273273
274274
275275
### -AutoAdmittedUsers
276-
Determines what types of participants will automatically be added to meetings organized by this user. Set this to EveryoneInCompany if you would like meetings to place every external user in the lobby but allow all users in the company to join the meeting immediately. Set this to Everyone if you'd like to admit anonymous users by default. Set this to EveryoneInSameAndFederatedCompany if you would like meetings to allow federated users to join like your company's users, but place all other external users in a lobby. This setting also applies to participants joining via a PSTN device (i.e. a traditional phone).
276+
Determines what types of participants will automatically be added to meetings organized by this user.
277+
Possible values are:
278+
- EveryoneInCompany, if you would like meetings to place every external user in the lobby but allow all users in the company to join the meeting immediately.
279+
- Everyone, if you'd like to admit anonymous users by default.
280+
- EveryoneInSameAndFederatedCompany, if you would like meetings to allow federated users to join like your company's users, but place all other external users in a lobby.
281+
- OrganizerOnly, if you would like that only meeting organizers can bypass the lobby.
282+
283+
This setting also applies to participants joining via a PSTN device (i.e. a traditional phone).
277284
278285
```yaml
279286
Type: String

teams/teams-ps/teams/Add-TeamChannelUser.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,7 @@ Add-TeamChannelUser -GroupId <String> -DisplayName <String> -User <String> [-Rol
2323

2424
## DESCRIPTION
2525

26-
> [!IMPORTANT]
27-
> Modules in the PS INT gallery for Microsoft Teams run on the /beta version in Microsoft Graph and are subject to change. Int modules can be install from here <https://www.poshtestgallery.com/packages/MicrosoftTeams>.
26+
Note: This cmdlet is part of the Public Preview version of Teams PowerShell Module, for more information see [Install Teams PowerShell public preview](https://docs.microsoft.com/microsoftteams/teams-powershell-install#install-teams-powershell-public-preview) and also see [Microsoft Teams PowerShell Release Notes](https://docs.microsoft.com/microsoftteams/teams-powershell-release-notes).
2827

2928
## EXAMPLES
3029

0 commit comments

Comments
 (0)