Skip to content

Commit 0d447c4

Browse files
authored
Merge branch 'master' into patch-13
2 parents 36d3884 + cbf77d8 commit 0d447c4

25 files changed

+219
-217
lines changed

exchange/exchange-ps/exchange/Add-MailboxFolderPermission.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -115,10 +115,10 @@ The roles that are available, along with the permissions that they assign, are d
115115
- Contributor: CreateItems, FolderVisible
116116
- Editor: CreateItems, DeleteAllItems, DeleteOwnedItems, EditAllItems, EditOwnedItems, FolderVisible, ReadItems
117117
- None: FolderVisible
118-
- NonEditingAuthor: CreateItems, FolderVisible, ReadItems
118+
- NonEditingAuthor: CreateItems, DeleteOwnedItems, FolderVisible, ReadItems
119119
- Owner: CreateItems, CreateSubfolders, DeleteAllItems, DeleteOwnedItems, EditAllItems, EditOwnedItems, FolderContact, FolderOwner, FolderVisible, ReadItems
120-
- PublishingEditor: CreateItems, CreateSubfolders, DeleteAllItems, DeleteOwnedItems, EditAllItems, EditOwnedItems, FolderVisible, ReadItems
121120
- PublishingAuthor: CreateItems, CreateSubfolders, DeleteOwnedItems, EditOwnedItems, FolderVisible, ReadItems
121+
- PublishingEditor: CreateItems, CreateSubfolders, DeleteAllItems, DeleteOwnedItems, EditAllItems, EditOwnedItems, FolderVisible, ReadItems
122122
- Reviewer: FolderVisible, ReadItems
123123
124124
The following roles apply specifically to calendar folders:

exchange/exchange-ps/exchange/Add-PublicFolderClientPermission.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -75,28 +75,28 @@ You can specify individual folder permissions or roles, which are combinations o
7575
7676
The following individual permissions are available:
7777
78-
- ReadItems: The user has the right to read items within the specified public folder.
7978
- CreateItems: The user has the right to create items within the specified public folder.
80-
- EditOwnedItems: The user has the right to edit the items that the user owns in the specified public folder.
79+
- CreateSubfolders: The user has the right to create subfolders in the specified public folder.
80+
- DeleteAllItems: The user has the right to delete all items in the specified public folder.
8181
- DeleteOwnedItems: The user has the right to delete items that the user owns in the specified public folder.
8282
- EditAllItems: The user has the right to edit all items in the specified public folder.
83-
- DeleteAllItems: The user has the right to delete all items in the specified public folder.
84-
- CreateSubfolders: The user has the right to create subfolders in the specified public folder.
85-
- FolderOwner: The user is the owner of the specified public folder. The user has the right to view and move the public folder and create subfolders. The user can't read items, edit items, delete items, or create items.
83+
- EditOwnedItems: The user has the right to edit the items that the user owns in the specified public folder.
8684
- FolderContact: The user is the contact for the specified public folder.
85+
- FolderOwner: The user is the owner of the specified public folder. The user has the right to view and move the public folder and create subfolders. The user can't read items, edit items, delete items, or create items.
8786
- FolderVisible: The user can view the specified public folder, but can't read or edit items within the specified public folder.
87+
- ReadItems: The user has the right to read items within the specified public folder.
8888
8989
In addition to access rights, you can create rights based upon roles, which includes multiple access rights. This parameter accepts the following values for roles:
9090
91-
- None: FolderVisible
92-
- Owner: CreateItems, ReadItems, CreateSubfolders, FolderOwner, FolderContact, FolderVisible, EditOwnedItems, EditAllItems, DeleteOwnedItems, DeleteAllItems
93-
- PublishingEditor: CreateItems, ReadItems, CreateSubfolders, FolderVisible, EditOwnedItems, EditAllItems, DeleteOwnedItems, DeleteAllItems
94-
- Editor: CreateItems, ReadItems, FolderVisible, EditOwnedItems, EditAllItems, DeleteOwnedItems, DeleteAllItems
95-
- PublishingAuthor: CreateItems, ReadItems, CreateSubfolders, FolderVisible, EditOwnedItems, DeleteOwnedItems
96-
- Author: CreateItems, ReadItems, FolderVisible, EditOwnedItems, DeleteOwnedItems
97-
- NonEditingAuthor: CreateItems, ReadItems, FolderVisible
98-
- Reviewer: ReadItems, FolderVisible
91+
- Author: CreateItems, DeleteOwnedItems, EditOwnedItems, FolderVisible, ReadItems
9992
- Contributor: CreateItems, FolderVisible
93+
- Editor: CreateItems, DeleteAllItems, DeleteOwnedItems, EditAllItems, EditOwnedItems, FolderVisible, ReadItems
94+
- None: FolderVisible
95+
- NonEditingAuthor: CreateItems, DeleteOwnedItems, FolderVisible, ReadItems
96+
- Owner: CreateItems, CreateSubfolders, DeleteAllItems, DeleteOwnedItems, EditAllItems, EditOwnedItems, FolderContact, FolderOwner, FolderVisible, ReadItems
97+
- PublishingAuthor: CreateItems, CreateSubfolders, DeleteOwnedItems, EditOwnedItems, FolderVisible, ReadItems
98+
- PublishingEditor: CreateItems, CreateSubfolders, DeleteAllItems, DeleteOwnedItems, EditAllItems, EditOwnedItems, FolderVisible, ReadItems
99+
- Reviewer: FolderVisible, ReadItems
100100
101101
```yaml
102102
Type: MultiValuedProperty

exchange/exchange-ps/exchange/Get-AdvancedThreatProtectionDocumentDetail.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -117,7 +117,12 @@ Accept wildcard characters: False
117117
```
118118
119119
### -EventType
120-
The EventType parameter filters the report by the event type. The event type you specify must correspond to the report. For example, you can only specify "Anti-malware engine" or "Advanced Threat Protection" events for malware reports.
120+
The EventType parameter filters the report by the event type. Valid values are:
121+
122+
- Advanced Threat Protection
123+
- Advanced Threat Protection clean
124+
- Anti-malware engine
125+
- Anti-malware engine clean
121126
122127
You can specify multiple values separated by commas.
123128

exchange/exchange-ps/exchange/Get-AdvancedThreatProtectionDocumentReport.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,12 @@ Accept wildcard characters: False
132132
```
133133
134134
### -EventType
135-
The EventType parameter filters the report by the event type. The event type you specify must correspond to the report. For example, you can only specify "Anti-malware engine" or "Advanced Threat Protection" events for malware reports.
135+
The EventType parameter filters the report by the event type. Valid values are:
136+
137+
- Advanced Threat Protection
138+
- Advanced Threat Protection clean
139+
- Anti-malware engine
140+
- Anti-malware engine clean
136141
137142
You can specify multiple values separated by commas.
138143

exchange/exchange-ps/exchange/Get-AdvancedThreatProtectionTrafficReport.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17+
This cmdlet will be deprecated. Use the **Get-MailTrafficATPReport** cmdlet instead.
18+
1719
Use the Get-AdvancedThreatProtectionTrafficReport cmdlet to view the results of Safe Attachments and Safe Links actions in your cloud-based organization for the last 90 days.
1820

1921
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
@@ -177,7 +179,12 @@ Accept wildcard characters: False
177179
```
178180
179181
### -EventType
180-
The EventType parameter filters the report by the event type. To view the complete list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify malware filter events for malware reports.
182+
The EventType parameter filters the report by the event type. Valid values are:
183+
184+
- AdvancedProtectionMalware
185+
- AtpGoodMail
186+
187+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify Microsoft Defender for Office 365 (formerly known as Advanced Threat Protection or ATP) event types for Defender for Office 365 reports.
181188

182189
You can specify multiple values separated by commas.
183190

exchange/exchange-ps/exchange/Get-DlpDetailReport.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -171,11 +171,15 @@ Accept wildcard characters: False
171171
The EventType parameter filters the report by the event type. Valid values are:
172172

173173
- DLPActionHits
174+
- DLPActionUndo
175+
- DLPMessages
174176
- DLPPolicyFalsePositive
175177
- DLPPolicyHits
176178
- DLPPolicyOverride
177179
- DLPRuleHits
178180

181+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify DLP event types for DLP reports.
182+
179183
You can specify multiple values separated by commas.
180184

181185
```yaml

exchange/exchange-ps/exchange/Get-DlpDetectionsReport.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -160,12 +160,23 @@ Accept wildcard characters: False
160160
### -EventType
161161
The EventType parameter filters the report by the event type. Valid values are:
162162

163+
- DataRetentions
163164
- DLPActionHits
165+
- DLPActionUndo
166+
- DLPByIncidentIdActionHits
167+
- DLPByIncidentIdMessages
168+
- DLPByIncidentIdPolicyFalsePositive
169+
- DLPByIncidentIdPolicyHits
170+
- DLPByIncidentIdPolicyOverride
171+
- DLPByIncidentIdRuleHits
172+
- DLPMessages
164173
- DLPPolicyFalsePositive
165174
- DLPPolicyHits
166175
- DLPPolicyOverride
167176
- DLPRuleHits
168177

178+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify DLP event types for DLP reports.
179+
169180
You can specify multiple values separated by commas.
170181

171182
```yaml

exchange/exchange-ps/exchange/Get-MailDetailATPReport.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -147,16 +147,17 @@ Accept wildcard characters: False
147147
The EventType parameter filters the report by the event type. Valid values are:
148148
149149
- Advanced filter
150-
- Anti-malware engine
150+
- Anti-malware Engine
151151
- Campaign
152-
- File Detonation
153-
- File Reputation
152+
- File detonation
154153
- File detonation reputation
154+
- File reputation
155155
- Fingerprint matching
156156
- General filter
157157
- Impersonation brand
158158
- Impersonation domain
159159
- Impersonation user
160+
- Mailbox intelligence impersonation
160161
- Message passed
161162
- Mixed analysis detection
162163
- Spoof DMARC

exchange/exchange-ps/exchange/Get-MailDetailDlpPolicyReport.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,15 @@ Accept wildcard characters: False
140140
```
141141
142142
### -EventType
143-
The EventType parameter filters the report by the event type. To view the complete list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify malware filter events for malware reports.
143+
The EventType parameter filters the report by the event type. Valid values are:
144+
145+
- DLPActionHits
146+
- DLPPolicyFalsePositive
147+
- DLPPolicyHits
148+
- DLPPolicyOverride
149+
- DLPRuleHits
150+
151+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify DLP event types for DLP reports.
144152

145153
You can specify multiple values separated by commas.
146154

exchange/exchange-ps/exchange/Get-MailDetailMalwareReport.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17+
This cmdlet will be deprecated. Use the **Get-MailDetailATPReport** cmdlet instead.
18+
1719
Use the Get-MailDetailMalwareReport cmdlet to view the details of messages that contained malware for the last 10 days.
1820

1921
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
@@ -123,7 +125,13 @@ Accept wildcard characters: False
123125
```
124126
125127
### -EventType
126-
The EventType parameter filters the report by the event type. To view the complete list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify malware filter events for malware reports.
128+
The EventType parameter filters the report by the event type. Valid values are:
129+
130+
- AdvancedProtectionMalware
131+
- AtpGoodMail
132+
- Malware
133+
134+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify malware events types for malware reports.
127135

128136
You can specify multiple values separated by commas.
129137

exchange/exchange-ps/exchange/Get-MailDetailSpamReport.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17+
This cmdlet will be deprecated. Use the **Get-MailDetailATPReport** cmdlet instead.
18+
1719
Use the Get-MailDetailSpamReport cmdlet to view the details of spam messages for the last 10 days.
1820

1921
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
@@ -122,7 +124,27 @@ Accept wildcard characters: False
122124
```
123125
124126
### -EventType
125-
The EventType parameter filters the report by the event type. To view the complete list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify malware filter events for malware reports.
127+
The EventType parameter filters the report by the event type. Valid values are:
128+
129+
- BCL0 to BCL9
130+
- NonSpam_AdditionalSpamFilterPassed
131+
- NonSpam_BulkPassed
132+
- NonSpam_ContentScanPassed
133+
- NonSpam_ETRPassed
134+
- NonSpam_IntraOrg
135+
- NonSpam_IPAllowed
136+
- NonSpam_SafeSender
137+
- Spam_AdditionalSpamFiltered
138+
- Spam_BulkFiltered
139+
- Spam_ContentScanFiltered
140+
- Spam_ETRFiltered
141+
- Spam_SenderBlocked
142+
- SpamContentFiltered
143+
- SpamDBEBFilter
144+
- SpamEnvelopeBlock
145+
- SpamIPBlock
146+
147+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify spam event types for spam reports.
126148

127149
You can specify multiple values separated by commas.
128150

exchange/exchange-ps/exchange/Get-MailDetailTransportRuleReport.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,7 +123,14 @@ Accept wildcard characters: False
123123
```
124124
125125
### -EventType
126-
The EventType parameter filters the report by the event type. To view the complete list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify malware filter events for malware reports.
126+
The EventType parameter filters the report by the event type. Valid values are:
127+
128+
- EncryptionManual
129+
- EncryptionPolicy
130+
- TransportRuleActionHits
131+
- TransportRuleHits
132+
133+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify rule event types for rule reports.
127134

128135
You can specify multiple values separated by commas.
129136

exchange/exchange-ps/exchange/Get-MailTrafficATPReport.md

Lines changed: 22 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -174,36 +174,28 @@ Accept wildcard characters: False
174174
### -EventType
175175
The EventType parameter filters the report by the event type. Valid values are:
176176
177-
- Message passed (Indicates a good message.)
178-
179-
Email phishing EventTypes:
180-
181-
- Advanced phish filter (Indicates a message caught by the machine learning model.)
182-
- Anti-spoof: Intra-org (Indicates an internal message caught by anti-phish spoof protection.)
183-
- Anti-spoof: external domain (Indicates an external message caught by anti-phish spoof protection.)
184-
- Dmarc (Indicates a message for which the sender was marked as not authenticated by DMARC.)
185-
- Domain impersonation\* (Indicates a message impersonating a domain protected by an anti-phish policy.)
186-
- User impersonation\* (Indicates a message impersonating a user protected by an anti-phish policy.)
187-
- Brand impersonation (Indicates a message caught by phish filters as impersonating a known brand.)
188-
- General phish filter (Indicates a message caught by basic phish protection.)
189-
- Malicious URL reputation (Indicates a message with a known malicious URL caught by phish filters.)
190-
- Phish ZAP (Indicates a phish or spam message detected and auto-purged after delivery.)
191-
192-
Email malware EventTypes:
193-
194-
- Anti-malware engine (Indicates a message caught by the anti-malware engine.)
195-
- ATP Safe Attachments\* (Indicates a message with a malicious attachment blocked by Defender for Office 365.)
196-
- ATP Safe Links\* (Indicates when a malicious link is blocked by Defender for Office 365.)
197-
- ZAP (Indicates a message with malware detected and auto-purged after delivery.)
198-
- Office 365 file reputation (Indicates a message with a known malicious file blocked.)
199-
- Anti-malware policy file type block (Indicates when the Common Attachment Types filter blocks a file.)
200-
201-
Content malware EventTypes:
202-
203-
- AtpDocumentMalware\* (Indicates malicious content detected by Safe Attachments.)
204-
- AvDocumentMalware (Indicates malware found by the anti-malware engine. Reporting requires Defender for Office 365 or E5.)
205-
206-
\* Requires Defender for Office 365 (included in Microsoft 365 E5 or in an add-in subscription).
177+
- Advanced filter
178+
- Anti-malware Engine
179+
- Campaign
180+
- File detonation
181+
- File detonation reputation
182+
- File reputation
183+
- Fingerprint matching
184+
- General filter
185+
- Impersonation brand
186+
- Impersonation domain
187+
- Impersonation user
188+
- Mailbox intelligence impersonation
189+
- Message passed
190+
- Mixed analysis detection
191+
- Spoof DMARC
192+
- Spoof external domain
193+
- Spoof intra-org
194+
- URL detonation
195+
- URL detonation reputation
196+
- URL malicious reputation
197+
198+
**Note**: Some values values correspond to features that are only available in Defender for Office 365 (plan 1 and plan 2 or plan 2 only).
207199
208200
You can enter multiple values separated by commas. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"Value1","Value2",..."ValueN"`.
209201

exchange/exchange-ps/exchange/Get-MailTrafficPolicyReport.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,17 @@ Accept wildcard characters: False
178178
```
179179
180180
### -EventType
181-
The EventType parameter filters the report by the event type. To view the complete list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify malware filter events for malware reports.
181+
The EventType parameter filters the report by the event type. Valid values are:
182+
183+
- DLPActionHits
184+
- DLPPolicyFalsePositive
185+
- DLPPolicyHits
186+
- DLPPolicyOverride
187+
- DLPRuleHits
188+
- TransportRuleActionHits
189+
- TransportRuleHits
190+
191+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify policy event types for policy reports.
182192

183193
You can specify multiple values separated by commas.
184194

exchange/exchange-ps/exchange/Get-MailTrafficReport.md

Lines changed: 37 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17+
This cmdlet will be deprecated. Use the **Get-MailFlowStatusReport** and **Get-MailTrafficATPReport** cmdlets instead.
18+
1719
Use the Get-MailTrafficReport cmdlet to view details about message traffic in your organization for the last 90 days.
1820

1921
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
@@ -220,7 +222,41 @@ Accept wildcard characters: False
220222
```
221223
222224
### -EventType
223-
The EventType parameter filters the report by the event type. To view the complete list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify malware filter events for malware reports.
225+
The EventType parameter filters the report by the event type. Valid values are:
226+
227+
- AdvancedProtectionMalware
228+
- AtpGoodMail
229+
- BCL0 to BCL9
230+
- DLPMessages
231+
- EncryptionManual
232+
- EncryptionPolicy
233+
- Expire
234+
- GoodMail
235+
- Malware
236+
- NonSpam_AdditionalSpamFilterPassed
237+
- NonSpam_AllowList
238+
- NonSpam_BulkPassed
239+
- NonSpam_ContentScanPassed
240+
- NonSpam_ETRPassed
241+
- NonSpam_IntraOrg
242+
- NonSpam_IPAllowed
243+
- NonSpam_SafeSender
244+
- Receive
245+
- SpamContentFiltered
246+
- SpamDBEBFilter
247+
- SpamEnvelopeBlock
248+
- SpamIPBlock
249+
- Spam_AdditionalSpamFiltered
250+
- Spam_BlockList
251+
- Spam_BulkFiltered
252+
- Spam_ContentScanFiltered
253+
- Spam_ETRFiltered
254+
- Spam_SenderBlocked
255+
- SpoofMail
256+
- SpoofMailCompAuthResult
257+
- TransportRuleMessages
258+
259+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type must correspond to the report.
224260

225261
You can specify multiple values separated by commas.
226262

0 commit comments

Comments
 (0)