Skip to content

Commit 06e5278

Browse files
committed
Changed RecordType type value to AuditRecordType
1 parent 0f4d37b commit 06e5278

File tree

3 files changed

+29
-9
lines changed

3 files changed

+29
-9
lines changed

exchange/exchange-ps/exchange/policy-and-compliance-audit/Search-UnifiedAuditLog.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Search-UnifiedAuditLog -EndDate <ExDateTime> -StartDate <ExDateTime>
2727
[-IPAddresses <String[]>]
2828
[-ObjectIds <String[]>]
2929
[-Operations <String[]>]
30-
[-RecordType < AeD | AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointListOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | ThreatIntelligenceAtpContent | ThreatIntelligenceUrl | WorkplaceAnalytics | Yammer>]
30+
[-RecordType <AuditRecordType>]
3131
[-ResultSize <Int32>]
3232
[-SessionCommand <Initialize | ReturnLargeSet | ReturnNextPreviewPage>]
3333
[-SessionId <String>]
@@ -285,7 +285,7 @@ The RecordType parameter filters the log entries by record type. Valid values ar
285285
- Yammer
286286
287287
```yaml
288-
Type: AeD | AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointListOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | ThreatIntelligenceAtpContent | ThreatIntelligenceUrl | WorkplaceAnalytics | Yammer
288+
Type: AuditRecordType
289289
Parameter Sets: (All)
290290
Aliases:
291291
Applicable: Exchange Online

exchange/exchange-ps/exchange/policy-and-compliance/New-ActivityAlert.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ New-ActivityAlert -Multiplier <Double> -Name <String> -NotifyUser <MultiValuedPr
3030
[-Disabled <$true | $false>]
3131
[-DomainController <Fqdn>]
3232
[-EmailCulture <CultureInfo>]
33-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
33+
[-RecordType <AuditRecordType>]
3434
[-ScopeLevel <SingleUser | AllUsers>]
3535
[-Severity <Low | Medium | High | None>]
3636
[-UserId <MultiValuedProperty>]
@@ -46,7 +46,7 @@ New-ActivityAlert -Name <String> -NotifyUser <MultiValuedProperty> -Operation <M
4646
[-Disabled <$true | $false>]
4747
[-DomainController <Fqdn>]
4848
[-EmailCulture <CultureInfo>]
49-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
49+
[-RecordType <AuditRecordType>]
5050
[-Severity <Low | Medium | High | None>]
5151
[-UserId <MultiValuedProperty>]
5252
[-WhatIf] [<CommonParameters>]
@@ -62,7 +62,7 @@ New-ActivityAlert -Name <String> -NotifyUser <MultiValuedProperty> [-Operation <
6262
[-Disabled <$true | $false>]
6363
[-DomainController <Fqdn>]
6464
[-EmailCulture <CultureInfo>]
65-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
65+
[-RecordType <AuditRecordType>]
6666
[-ScopeLevel <SingleUser | AllUsers>]
6767
[-Severity <Low | Medium | High | None>]
6868
[-UserId <MultiValuedProperty>]
@@ -78,7 +78,7 @@ New-ActivityAlert -Name <String> -NotifyUser <MultiValuedProperty> -Type <Custom
7878
[-Disabled <$true | $false>]
7979
[-DomainController <Fqdn>]
8080
[-EmailCulture <CultureInfo>]
81-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
81+
[-RecordType <AuditRecordType>]
8282
[-Severity <Low | Medium | High | None>]
8383
[-UserId <MultiValuedProperty>]
8484
[-WhatIf] [<CommonParameters>]
@@ -389,6 +389,8 @@ Accept wildcard characters: False
389389
### -RecordType
390390
The RecordType parameter specifies a record type label for the activity alert. Valid values are:
391391
392+
- AeD
393+
392394
- AzureActiveDirectory
393395
394396
- AzureActiveDirectoryAccountLogon
@@ -433,6 +435,8 @@ The RecordType parameter specifies a record type label for the activity alert. V
433435
434436
- SharePointFileOperation
435437
438+
- SharePointListOperation
439+
436440
- SharePointSharingOperation
437441
438442
- SkypeForBusinessCmdlets
@@ -445,12 +449,18 @@ The RecordType parameter specifies a record type label for the activity alert. V
445449
446450
- ThreatIntelligence
447451
452+
- ThreatIntelligenceAtpContent
453+
454+
- ThreatIntelligenceUrl
455+
456+
- WorkplaceAnalytics
457+
448458
- Yammer
449459
450460
You can't use this parameter when the value of the Type parameter is ElevationOfPrivilege.
451461
452462
```yaml
453-
Type: AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer
463+
Type: AuditRecordType
454464
Parameter Sets: (All)
455465
Aliases:
456466
Applicable: Office 365 Security & Compliance Center

exchange/exchange-ps/exchange/policy-and-compliance/Set-ActivityAlert.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Set-ActivityAlert [-Identity] <ComplianceRuleIdParameter>
3232
[-Name <String>]
3333
[-NotifyUser <MultiValuedProperty>]
3434
[-Operation <MultiValuedProperty>]
35-
[-RecordType <AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer>]
35+
[-RecordType <AuditRecordType>]
3636
[-ScopeLevel <SingleUser | AllUsers>]
3737
[-Severity <Low | Medium | High | None>]
3838
[-Threshold <Int32>]
@@ -287,6 +287,8 @@ Accept wildcard characters: False
287287
### -RecordType
288288
The RecordType parameter specifies a record type label for the activity alert. Valid values are:
289289
290+
- AeD
291+
290292
- AzureActiveDirectory
291293
292294
- AzureActiveDirectoryAccountLogon
@@ -331,6 +333,8 @@ The RecordType parameter specifies a record type label for the activity alert. V
331333
332334
- SharePointFileOperation
333335
336+
- SharePointListOperation
337+
334338
- SharePointSharingOperation
335339
336340
- SkypeForBusinessCmdlets
@@ -343,12 +347,18 @@ The RecordType parameter specifies a record type label for the activity alert. V
343347
344348
- ThreatIntelligence
345349
350+
- ThreatIntelligenceAtpContent
351+
352+
- ThreatIntelligenceUrl
353+
354+
- WorkplaceAnalytics
355+
346356
- Yammer
347357
348358
You can't use this parameter when the value of the Type parameter is ElevationOfPrivilege.
349359
350360
```yaml
351-
Type: AzureActiveDirectory | AzureActiveDirectoryAccountLogon | AzureActiveDirectoryStsLogon | CRM | ComplianceDLPExchange | ComplianceDLPSharePoint | DataCenterSecurityCmdlet | Discovery | ExchangeAdmin | ExchangeAggregatedOperation | ExchangeItem | ExchangeItemGroup | MicrosoftTeams | MicrosoftTeamsAddOns | MicrosoftTeamsSettingsOperation | OneDrive | PowerBIAudit | SecurityComplianceAlerts | SecurityComplianceCenterEOPCmdlet | SecurityComplianceInsights | SharePoint | SharePointFileOperation | SharePointSharingOperation | SkypeForBusinessCmdlets | SkypeForBusinessPSTNUsage | SkypeForBusinessUsersBlocked | Sway | ThreatIntelligence | Yammer
361+
Type: AuditRecordType
352362
Parameter Sets: (All)
353363
Aliases:
354364
Applicable: Office 365 Security & Compliance Center

0 commit comments

Comments
 (0)