Skip to content

Commit 52a1042

Browse files
authored
Merge branch 'master' into master
2 parents 13c1ae5 + e1273e4 commit 52a1042

File tree

475 files changed

+4155
-2500
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

475 files changed

+4155
-2500
lines changed

.openpublishing.redirection.json

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
{
2+
"redirections": [
3+
{
4+
"source_path": "exchange/exchange-ps/exchange/policy-and-compliance-dlp/new-dlpedmsschema.md",
5+
"redirect_url": "exchange/exchange-ps/exchange/policy-and-compliance-dlp/new-dlpedmschema.md",
6+
"redirect_document_id": true
7+
}
8+
]
9+
}

exchange/docs-conceptual/exchange-online/connect-to-exchange-online-powershell/mfa-connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ description: "Learn how to connect to Exchange Online PowerShell by using multi-
1616
If you want to use multi-factor authentication (MFA) to connect to Exchange Online PowerShell, you can't use the instructions at [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md) to use remote PowerShell to connect to Exchange Online. MFA requires you to install the Exchange Online Remote PowerShell Module, and use the **Connect-EXOPSSession** cmdlet to connect.
1717

1818
> [!NOTE]
19-
> You can't use the Exchange Online Remote PowerShell Module to connect to Exchange Online PowerShell and Security & Compliance Center PowerShell in the same session (window). You need to use separate sessions of the Exchange Online Remote PowerShell Module. <br/>• Delegated Access Permission (DAP) partners can't use the procedures in this topic to connect to their customer tenant organizations in Exchange Online PowerShell. MFA and the Exchange Online Remote PowerShell Module don't work with delegated authentication. <br/>• The Exchange Online Remote PowerShell Module is not supported in PowerShell Core (macOS, Linux, or Windows Nano Server). As a workaround, you can install the module on a computer that's running a supported version of Windows (physical or virtual), and use remote desktop software to connect.
19+
> • Delegated Access Permission (DAP) partners can't use the procedures in this topic to connect to their customer tenant organizations in Exchange Online PowerShell. MFA and the Exchange Online Remote PowerShell Module don't work with delegated authentication. <br/>• The Exchange Online Remote PowerShell Module is not supported in PowerShell Core (macOS, Linux, or Windows Nano Server). As a workaround, you can install the module on a computer that's running a supported version of Windows (physical or virtual), and use remote desktop software to connect.
2020
2121
## What do you need to know before you begin?
2222

exchange/docs-conceptual/exchange-online/exchange-online-powershell.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,6 @@ Exchange Online PowerShell is the administrative interface that enables you to m
2727

2828
[Use Remote PowerShell in EOP](https://videoplayercdn.osi.office.net/hub/?csid=ux-cms-en-us-msoffice&uuid=9cb28006-c2cb-45b6-b72e-eeed8767dee7&AutoPlayVideo=false)
2929

30+
- To find the permissions you need to run a specific cmdlet, or one or more parameters on the cmdlet, see [Find the permissions required to run any Exchange cmdlet](../exchange-server/find-exchange-cmdlet-permissions.md).
3031

32+
- To learn about recipient filters in Exchange Online PowerShell, see [Recipient filters in Exchange Management Shell and Exchange Online PowerShell commands](../exchange-server/recipient-filters/recipient-filters.md).

exchange/docs-conceptual/exchange-server/recipient-filters/filter-properties.md

Lines changed: 71 additions & 64 deletions
Large diffs are not rendered by default.

exchange/docs-conceptual/exchange-server/recipient-filters/recipient-filters.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Recipient filters in Exchange Management Shell commands"
2+
title: "Recipient filters in Exchange PowerShell commands"
33
ms.author: chrisda
44
author: chrisda
55
manager: serdars
@@ -9,11 +9,11 @@ ms.topic: reference
99
ms.prod: exchange-server-itpro
1010
localization_priority: Normal
1111
ms.assetid: fb4b1396-9aae-4037-be1a-b09e336b890e
12-
description: "Learn about creating different kinds of recipient filters in the Exchange Management Shell."
12+
description: "Learn about creating different kinds of recipient filters in the Exchange Management Shell and Exchange Online PowerShell."
1313
---
1414

15-
# Recipient filters in Exchange Management Shell commands
16-
You can use several Exchange Management Shell commands to filter a set of recipients. You can create the following types of filters in an Exchange command:
15+
# Recipient filters in Exchange PowerShell commands
16+
You can use several Exchange Management Shell and Exchange Online PowerShell commands to filter a set of recipients. You can create the following types of filters in an Exchange command:
1717

1818
- Precanned filters
1919

@@ -26,7 +26,7 @@ You can use several Exchange Management Shell commands to filter a set of recipi
2626
Older versions of Exchange used LDAP filtering syntax to create custom address lists, global address lists (GALs), email address policies, and distribution groups. In Exchange Server 2007 and later versions, OPATH filtering syntax replaced LDAP filtering syntax.
2727

2828
## Precanned filters
29-
A precanned filter is a commonly used Exchange filter that you can use to meet a variety of recipient-filtering criteria for creating dynamic distribution groups, email address policies, address lists, or GALs. With precanned filters, you can use either the Exchange Management Shell or the Exchange admin center (EAC). Using precanned filters, you can do the following:
29+
A precanned filter is a commonly used Exchange filter that you can use to meet a variety of recipient-filtering criteria for creating dynamic distribution groups, email address policies, address lists, or GALs. With precanned filters, you can use either the Exchange PowerShell or the Exchange admin center (EAC). Using precanned filters, you can do the following:
3030

3131
- Determine the scope of recipients.
3232

@@ -125,7 +125,7 @@ New-DynamicDistributionGroup -Name AllContosoNorth -OrganizationalUnit contoso.c
125125
## Custom filters using the Filter parameter
126126
You can use the _Filter_ parameter to filter the results of a command to specify which objects to retrieve. For example, instead of retrieving all users or groups, you can specify a set of users or groups by using a filter string. This type of filter doesn't modify any configuration or attributes of objects. It only modifies the set of objects that the command returns.
127127

128-
Using the _Filter_ parameter to modify command results is known as server-side filtering. Server-side filtering submits the command and the filter to the server for processing. The Exchange Management Shell also supports client-side filtering, in which the command retrieves all objects from the server and then applies the filter in the local console window. To perform client-side filtering, use the **Where-Object** cmdlet. For more information about server-side and client-side filtering, see "How to Filter Data" in [Working with Command Output](https://technet.microsoft.com/library/8320e1a5-d3f5-4615-878d-b23e2aaa6b1e.aspx).
128+
Using the _Filter_ parameter to modify command results is known as server-side filtering. Server-side filtering submits the command and the filter to the server for processing. We also support client-side filtering, in which the command retrieves all objects from the server and then applies the filter in the local console window. To perform client-side filtering, use the **Where-Object** cmdlet. For more information about server-side and client-side filtering, see "How to Filter Data" in [Working with Command Output](https://technet.microsoft.com/library/8320e1a5-d3f5-4615-878d-b23e2aaa6b1e.aspx).
129129

130130
To find the filterable properties for cmdlets that have the _Filter_ parameter, you can run the **Get** command against an object and format the output by pipelining the **Format-List** parameter. Most of the returned values will be available for use in the _Filter_ parameter. The following example returns a detailed list for the mailbox Ayla.
131131

@@ -163,6 +163,8 @@ The _Filter_ parameter is available for the following recipient cmdlets:
163163

164164
- [Get-User](../../../exchange-ps/exchange/users-and-groups/get-user.md)
165165

166+
- [Get-UnifiedGroup](../../../exchange-ps/exchange/users-and-groups/Get-UnifiedGroup.md)
167+
166168
For more information about the filterable properties you can use with the _Filter_ parameter, see [Filterable properties for the Filter parameter](filter-properties.md).
167169

168170
### Example
@@ -224,4 +226,4 @@ The following table contains links to topics that will help you learn more about
224226
|**Topic**|**Description**|
225227
|:-----|:-----|
226228
|[Filterable properties for the RecipientFilter parameter](recipientfilter-properties.md) |Learn more about the filterable properties for the _RecipientFilter_ parameter. |
227-
|[Filterable properties for the Filter parameter](filter-properties.md) |Learn more about the filterable properties for the _Filter_ parameter. |
229+
|[Filterable properties for the Filter parameter](filter-properties.md) |Learn more about the filterable properties for the _Filter_ parameter. |

exchange/docs-conceptual/exchange-server/recipient-filters/recipientfilter-properties.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ description: "Learn about the recipient properties that you can use with the Rec
1414

1515
# Filterable properties for the -RecipientFilter parameter
1616

17-
Learn about the recipient properties that you can use with the _RecipientFilter_ parameter in Exchange 2016 cmdlets.
17+
Learn about the recipient properties that you can use with the _RecipientFilter_ parameter in Exchange Server 2016 or later, and Exchange Online cmdlets.
1818

19-
You use the _RecipientFilter_ parameter to create OPATH filters based on the properties of recipient objects in Exchange Server 2016. The _RecipientFilter_ parameter is available in the following cmdlets:
19+
You use the _RecipientFilter_ parameter to create OPATH filters based on the properties of recipient objects in Exchange Server 2016 or later, and Exchange Online. The _RecipientFilter_ parameter is available in the following cmdlets:
2020

2121
- [New-AddressList](../../../exchange-ps/exchange/email-addresses-and-address-books/new-addresslist.md) and [Set-AddressList](../../../exchange-ps/exchange/email-addresses-and-address-books/set-addresslist.md)
2222

@@ -314,6 +314,6 @@ The recipient properties that have been *confirmed* to work with the _Recipien
314314

315315
## For more information
316316

317-
Exchange 2007 was the first version of Exchange that required OPATH filters instead of LDAP filters. For more information about converting LDAP filters to OPATH filters, see the Microsoft Exchange Team Blog article, [Need help converting your LDAP filters to OPATH?](https://go.microsoft.com/fwlink/p/?LinkId=88854).
317+
Exchange 2007 was the first version of Exchange that required OPATH filters instead of LDAP filters. For more information about converting LDAP filters to OPATH filters, see the Microsoft Exchange Team Blog article, [Need help converting your LDAP filters to OPATH?](https://techcommunity.microsoft.com/t5/Exchange-Team-Blog/Need-help-converting-your-LDAP-filters-to-OPATH/ba-p/595108).
318318

319319
For more information about the syntax that can be used within OPATH filters, see [Exchange cmdlet syntax](../exchange-cmdlet-syntax.md).

exchange/docs-conceptual/office-365-scc/connect-to-scc-powershell/mfa-connect-to-scc-powershell.md

Lines changed: 14 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ description: "Learn how to connect to Security & Compliance Center PowerShell by
1616
If your account uses multi-factor authentication (MFA) or federated authentication, you can't use the instructions at [Connect to Office 365 Security & Compliance Center PowerShell](connect-to-scc-powershell.md) to use remote PowerShell to connect to the Office 365 Security & Compliance Center. Instead, you need to install the Exchange Online Remote PowerShell Module, and use the **Connect-IPPSSession** cmdlet to connect to Security & Compliance Center PowerShell.
1717

1818
> [!NOTE]
19-
> You can't use the Exchange Online Remote PowerShell Module to connect to Exchange Online PowerShell and Security & Compliance Center PowerShell in the same session (window). You need to use separate sessions of the Exchange Online Remote PowerShell Module. <br/>• Delegated Access Permission (DAP) partners can't use the procedures in this topic to connect to their customer tenant organizations in Security & Compliance Center PowerShell. MFA and the Exchange Online Remote PowerShell Module don't work with delegated authentication. <br/>• The Exchange Online Remote PowerShell Module is not supported in PowerShell Core (macOS, Linux, or Windows Nano Server). As a workaround, you can install the module on a computer that's running a supported version of Windows (physical or virtual), and use remote desktop software to connect.
19+
> • Delegated Access Permission (DAP) partners can't use the procedures in this topic to connect to their customer tenant organizations in Security & Compliance Center PowerShell. MFA and the Exchange Online Remote PowerShell Module don't work with delegated authentication. <br/>• The Exchange Online Remote PowerShell Module is not supported in PowerShell Core (macOS, Linux, or Windows Nano Server). As a workaround, you can install the module on a computer that's running a supported version of Windows (physical or virtual), and use remote desktop software to connect.
2020
2121
## What do you need to know before you begin?
2222

@@ -111,6 +111,19 @@ If your account uses multi-factor authentication (MFA) or federated authenticati
111111
4. **(MFA only)**: In the verification window that opens, enter the verification code, and then click **Sign in**.
112112
113113
![Enter your verification code in the Exchange Online Remote PowerShell window](../../media/d3a405ce-5364-4732-a7bb-2cc9c678da2d.png)
114+
115+
5. **(Optional)**: If you want to connect to an Exchange Online PowerShell module session in the same window, you need to run
116+
117+
```
118+
$EXOSession=New-ExoPSSSession -UserPrincipalName <UPN> [-ConnectionUri <ConnectionUri> -AzureADAuthorizationEndPointUri <AzureADUri>]
119+
```
120+
121+
and then import the Exchange Online session into the current one using an specific prefix
122+
123+
```
124+
Import-PSSession $EXOSession -Prefix EXO
125+
```
126+
114127
115128
## How do you know this worked?
116129

exchange/docs-conceptual/toc.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,13 @@
3636
href: exchange-server/find-exchange-cmdlet-permissions.md
3737
- name: Enable or disable access to Exchange Online PowerShell
3838
href: exchange-online/disable-access-to-exchange-online-powershell.md
39+
- name: Recipient filters in Exchange Management Shell commands
40+
href: exchange-server/recipient-filters/recipient-filters.md
41+
items:
42+
- name: Filterable properties for the Filter parameter
43+
href: exchange-server/recipient-filters/filter-properties.md
44+
- name: Filterable properties for the RecipientFilter parameter
45+
href: exchange-server/recipient-filters/recipientfilter-properties.md
3946
- name: Office 365 Security & Compliance Center PowerShell
4047
href: office-365-scc/office-365-scc-powershell.md
4148
items:

exchange/exchange-ps/exchange/advanced-threat-protection/Get-AdvancedThreatProtectionDocumentDetail.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
5252

5353
### -------------------------- Example 1 --------------------------
5454
```
55-
Get-AdvancedThreatProtectionTrafficDetail -Organization contoso.com -StartDate "4/26/2016" -EndDate "4/28/2016" | Format-Table
55+
Get-AdvancedThreatProtectionDocumentDetail -Organization contoso.com -StartDate "4/26/2016" -EndDate "4/28/2016" | Format-Table
5656
```
5757

5858
This example returns the detailed report of ATP detections during the specified date range.

exchange/exchange-ps/exchange/advanced-threat-protection/Get-UrlTrace.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,16 @@ Get-UrlTrace [-ClickId <Guid>] [-EndDate <DateTime>] [-Expression <Expression>]
2929
## DESCRIPTION
3030
Safe Links is a feature in Advanced Threat Protection that checks links in email messages to see if they lead to malicious web sites. When a user clicks a link in a message, the URL is temporarily rewritten and checked against a list of known, malicious web sites. Safe Links includes the URL trace reporting feature to help determine who has clicked through to a malicious web site. For more information about Advanced Threat Protection Safe Links, see [Office 365 ATP Safe Links](https://docs.microsoft.com/office365/securitycompliance/atp-safe-links).
3131

32+
The following list described the values that are returned in the output of this cmdlet:
33+
34+
- ClickId: A GUID for each URL that was analyzed in a message.
35+
36+
- Clicked: The date/time when the URL in the message body was clicked. Every analyzed URL click is recorded, even when a user clicks a URL in an existing message that's already been scanned.
37+
38+
- UrlBlocked: The URL was detected as malicious by Safe Links (only the initial block, not subsequent clicks), or the user clicked the URL while the scan in progress (users are taken to a notification page that asks them to try again after the scan is complete).
39+
40+
- UrlClicked: The URL is blocked, but the applicable Safe Links policy has the DoNotAllowClickThrough parameter value $false (click through is allowed). Updated policies aren't applied to existing messages that have already been scanned. New or updated policies are applied to new messages that were received after the policy is applied to the mailbox.
41+
3242
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see Find the permissions required to run any Exchange cmdlet (https://technet.microsoft.com/library/mt432940.aspx).
3343

3444
## EXAMPLES
@@ -43,7 +53,7 @@ This example returns the results of Safe Links actions during the specified time
4353
## PARAMETERS
4454

4555
### -ClickId
46-
The ClickId parameter filters the results by the ClickId GUID value.
56+
The ClickId parameter filters the results by the URL that was scanned in the message. Each URL is represented as a GUID value.
4757

4858
```yaml
4959
Type: Guid

exchange/exchange-ps/exchange/advanced-threat-protection/New-SafeLinksPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This example creates a new Safe Links policy named Marketing Block URL with the
4545

4646
- The policy is enabled.
4747

48-
- Users aren't allowed to click through to the original URL. This is the default value of the AllowClickThrough parameter, so you don't need to specify it.
48+
- Users aren't allowed to click through to the original URL. This is the default value of the DoNotAllowClickThrough parameter, so you don't need to specify it.
4949

5050
- User clicks on URLs are tracked in URL trace.
5151

exchange/exchange-ps/exchange/antispam-antimalware/Set-HostedOutboundSpamFilterPolicy.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,13 @@ For information about the parameter sets in the Syntax section below, see Exchan
2222

2323
```
2424
Set-HostedOutboundSpamFilterPolicy [-Identity] <HostedOutboundSpamFilterPolicyIdParameter>
25-
[-AdminDisplayName <String>] [-BccSuspiciousOutboundAdditionalRecipients <MultiValuedProperty>]
26-
[-BccSuspiciousOutboundMail <$true | $false>] [-Confirm] [-NotifyOutboundSpam <$true | $false>]
27-
[-NotifyOutboundSpamRecipients <MultiValuedProperty>] [-WhatIf] [<CommonParameters>]
25+
[-AdminDisplayName <String>]
26+
[-BccSuspiciousOutboundAdditionalRecipients <MultiValuedProperty>]
27+
[-BccSuspiciousOutboundMail <$true | $false>]
28+
[-Confirm]
29+
[-NotifyOutboundSpam <$true | $false>]
30+
[-NotifyOutboundSpamRecipients <MultiValuedProperty>]
31+
[-WhatIf] [<CommonParameters>]
2832
```
2933

3034
## DESCRIPTION

0 commit comments

Comments
 (0)