Skip to content

Commit fb0b80e

Browse files
authored
Merge branch 'master' into patch-11
2 parents 457886b + 6df661c commit fb0b80e

File tree

459 files changed

+9055
-1298
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

459 files changed

+9055
-1298
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom:
1414
ms.assetid:
1515
search.appverid: MET150
1616
ROBOTS: NOINDEX, NOFOLLOW
17-
description: "Learn about using the Exchange Online V2 module in scripts and other long-running tasks with Modern Authentication and app-only authentication."
17+
description: "Learn about using the Exchange Online V2 module in scripts and other long-running tasks with modern authentication and app-only authentication."
1818
---
1919

2020
# App-only authentication for unattended scripts in the EXO V2 module
@@ -34,7 +34,7 @@ To update from an earlier version of the of the EXO V2 module, run the following
3434
Update-Module -Name ExchangeOnlineManagement -RequiredVersion 2.0.3-Preview -AllowPrerelease
3535
```
3636

37-
Auditing and reporting scenarios in Exchange Online often involve scripts that run unattended. In most cases, these unattended scripts access Exchange Online PowerShell using Basic authentication (a username and password). Even when the connection to Exchange Online PowerShell uses Modern authentication, the credentials are stored in a local file or a secret vault that's access at run-time.
37+
Auditing and reporting scenarios in Exchange Online often involve scripts that run unattended. In most cases, these unattended scripts access Exchange Online PowerShell using Basic authentication (a username and password). Even when the connection to Exchange Online PowerShell uses modern authentication, the credentials are stored in a local file or a secret vault that's access at run-time.
3838

3939
Because storing user credentials locally is not a safe practice, we're releasing this feature to support authentication for unattended scripts (automation) scenarios using AzureAD applications and self-signed certificates.
4040

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Exchange Online PowerShell allows you to manage your Exchange Online settings fr
2121

2222
> [!NOTE]
2323
>
24-
> - We're eventually going to [disable Basic authentication in Exchange Online](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-april-2020-update/ba-p/1275508), and the connection method described in this topic uses Basic authentication. We recommend that you use the [Exchange Online PowerShell V2 module](exchange-online-powershell-v2.md) to connect to Exchange Online PowerShell, because it uses Modern authentication in all scenarios.
24+
> - We're eventually going to [disable Basic authentication in Exchange Online](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-april-2020-update/ba-p/1275508), and the connection method described in this topic uses Basic authentication. We recommend that you use the [Exchange Online PowerShell V2 module](exchange-online-powershell-v2.md) to connect to Exchange Online PowerShell, because it uses modern authentication in all scenarios.
2525
>
2626
> - The Exchange Online PowerShell V2 module works with multi-factor authentication (MFA). For MFA connection instructions using the older Exchange Online Remote PowerShell Module, see [Connect to Exchange Online PowerShell using multi-factor authentication](mfa-connect-to-exchange-online-powershell.md).
2727
>

exchange/docs-conceptual/exchange-online-powershell-v2.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Exchange Online PowerShell with Modern Authentication using V2 Module
2+
title: Exchange Online PowerShell with modern authentication using V2 Module
33
ms.author: chrisda
44
author: chrisda
55
manager: dansimp
@@ -13,10 +13,10 @@ ms.collection: Strat_EX_Admin
1313
ms.custom:
1414
ms.assetid:
1515
search.appverid: MET150
16-
description: "Learn how to install and use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell with Modern Authentication."
16+
description: "Learn how to install and use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell with modern authentication."
1717
---
1818

19-
# Use the Exchange Online PowerShell with Modern Authentication using V2 module
19+
# Use the Exchange Online PowerShell with modern authentication using V2 module
2020

2121
The Exchange Online PowerShell V2 module (abbreviated as the EXO V2 module) enables admins to connect to their Exchange Online environment in Microsoft 365 to retrieve data, create new objects, update existing objects, remove objects as well as configure Exchange Online and its features.
2222

@@ -32,7 +32,7 @@ Connect-ExchangeOnline -EnableErrorReporting -LogDirectoryPath <Path to store lo
3232

3333
The Exchange Online PowerShell V2 module contains a small set of new cmdlets that are optimized for bulk data retrieval scenarios (think: thousands and thousands of objects). Until you create a session to connect to your Exchange Online organization, you'll only see these new cmdlets in the module. After you connect to your Exchange Online organization, you'll see all of the older remote PowerShell cmdlets.
3434

35-
The EXO V2 module use Modern authentication for all cmdlets. You can't use Basic authentication in the EXO V2 module; however, you still need to configure the Basic authentication setting in WinRM as described later in this topic.
35+
The EXO V2 module use modern authentication for all cmdlets. You can't use Basic authentication in the EXO V2 module; however, you still need to configure the Basic authentication setting in WinRM as described later in this topic.
3636

3737
The new cmdlets in the EXO V2 module are meant to replace their older, less efficient equivalents. However, the original cmdlets are still available in the EXO V2 module for backwards compatibility **after** you create a session to connect to your Exchange Online organization.
3838

exchange/docs-conceptual/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@
2626
- name: Exchange Online PowerShell
2727
href: exchange-online-powershell.md
2828
items:
29-
- name: Connect to Exchange Online PowerShell
29+
- name: Connect to Exchange Online PowerShell - Basic auth
3030
href: connect-to-exchange-online-powershell.md
3131
items:
3232
- name: Connect to Exchange Online PowerShell using multi-factor authentication
@@ -42,14 +42,14 @@
4242
href: filter-properties.md
4343
- name: Filterable properties for the RecipientFilter parameter
4444
href: recipientfilter-properties.md
45-
- name: Exchange Online PowerShell V2
45+
- name: Exchange Online PowerShell V2 - modern auth
4646
href: exchange-online-powershell-v2.md
4747
items:
4848
- name: Property sets in V2 cmdlets
4949
href: cmdlet-property-sets.md
5050
- name: Filters in the V2 module
5151
href: filters-v2.md
52-
- name: App-only authentication
52+
- name: App-only authentication for unattended scripts
5353
href: app-only-auth-powershell-v2.md
5454
- name: Security & Compliance Center PowerShell
5555
href: scc-powershell.md

exchange/exchange-ps/exchange/Get-PhishFilterPolicy.md

Lines changed: 4 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,6 @@ For information about the parameter sets in the Syntax section below, see [Excha
2626
```
2727
Get-PhishFilterPolicy [[-Identity] <HostedConnectionFilterPolicyIdParameter>]
2828
[-AllowedToSpoof <String>]
29-
[-ConfidenceLevel <ConfidenceLevel>]
3029
[-DecisionSetBy <DecisionSetBy>]
3130
[-Detailed]
3231
[-SpoofAllowBlockList]
@@ -114,32 +113,11 @@ Accept pipeline input: False
114113
Accept wildcard characters: False
115114
```
116115
117-
### -ConfidenceLevel
118-
The ConfidenceLevel parameter filters the results by the specified confidence level. Valid values are:
119-
120-
-Low
121-
-High
122-
123-
You can only see the ConfidenceLevel value in the results when you include the Detailed switch in the command.
124-
125-
```yaml
126-
Type: ConfidenceLevel
127-
Parameter Sets: (All)
128-
Aliases:
129-
Applicable: Exchange Online, Exchange Online Protection
130-
131-
Required: False
132-
Position: Named
133-
Default value: None
134-
Accept pipeline input: False
135-
Accept wildcard characters: False
136-
```
137-
138116
### -DecisionSetBy
139117
The DecisionSetBy parameter filters the results by who allowed or blocked the spoofed sender. Valid values are:
140118
141-
-Admin
142-
-SpoofProtection
119+
- Admin
120+
- SpoofProtection
143121
144122
```yaml
145123
Type: DecisionSetBy
@@ -159,8 +137,8 @@ The Detailed switch specifies whether to return detailed information in the resu
159137
160138
Specifically, this switch returns the following additional properties:
161139
162-
- ConfidenceLevel
163-
- DomainPairsCountInCategory
140+
- ConfidenceLevel: Level of signals indicated by spoof intelligence that these domains may be suspicious, based on historical sending patterns and the reputation score of the domains.
141+
- DomainPairsCountInCategory: The spoofed domains displayed are separated into two categories: suspicious domain pairs and non-suspicious domain pairs. For more information, see [this topic](https://docs.microsoft.com/microsoft-365/security/office-365-security/walkthrough-spoof-intelligence-insight).
164142
165143
```yaml
166144
Type: SwitchParameter

exchange/exchange-ps/exchange/Get-RecoverableItems.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
5858

5959
### Example 1
6060
```powershell
61-
Get-RecoverableItems -Identity [email protected] -Subject -SubjectContains "FY17 Accounting" -FilterItemType IPM.Note -FilterStartTime "2/1/2018 12:00:00 AM" -FilterEndTime "2/5/2018 11:59:59 PM"
61+
Get-RecoverableItems -Identity [email protected] -SubjectContains "FY17 Accounting" -FilterItemType IPM.Note -FilterStartTime "2/1/2018 12:00:00 AM" -FilterEndTime "2/5/2018 11:59:59 PM"
6262
```
6363

6464
This example returns all of the available recoverable deleted messages with the specified subject in the mailbox [email protected] for the specified date/time range.

exchange/exchange-ps/exchange/New-AuthenticationPolicy.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -329,7 +329,7 @@ Accept wildcard characters: False
329329
### -BlockLegacyAuthActiveSync
330330
This parameter is available only in on-premises Exchange.
331331
332-
The BlockLegacyAuthActiveSync switch specifies whether to allow only Modern authentication with Exchange ActiveSync in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
332+
The BlockLegacyAuthActiveSync switch specifies whether to allow only modern authentication with Exchange ActiveSync in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
333333
334334
This switch disables the following legacy authentication methods with Exchange ActiveSync:
335335
@@ -339,7 +339,7 @@ This switch disables the following legacy authentication methods with Exchange A
339339
340340
- Windows authentication (NTLM and Kerberos)
341341
342-
Before you disable the legacy authentication methods for this protocol, verify that hybrid Modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support Modern authentication.
342+
Before you disable the legacy authentication methods for this protocol, verify that hybrid modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support modern authentication.
343343
344344
```yaml
345345
Type: SwitchParameter
@@ -357,7 +357,7 @@ Accept wildcard characters: False
357357
### -BlockLegacyAuthAutodiscover
358358
This parameter is available only in on-premises Exchange.
359359
360-
The BlockLegacyAuthAutodiscover switch specifies whether to allow only Modern authentication with Autodiscover in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
360+
The BlockLegacyAuthAutodiscover switch specifies whether to allow only modern authentication with Autodiscover in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
361361
362362
This switch disables the following legacy authentication methods with Autodiscover:
363363
@@ -367,7 +367,7 @@ This switch disables the following legacy authentication methods with Autodiscov
367367
368368
- Windows authentication (NTLM and Kerberos)
369369
370-
Before you disable the legacy authentication methods for this protocol, verify that hybrid Modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support Modern authentication.
370+
Before you disable the legacy authentication methods for this protocol, verify that hybrid modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support modern authentication.
371371
372372
```yaml
373373
Type: SwitchParameter
@@ -385,7 +385,7 @@ Accept wildcard characters: False
385385
### -BlockLegacyAuthImap
386386
This parameter is available only in on-premises Exchange.
387387
388-
The BlockLegacyAuthImap switch specifies whether to allow only Modern authentication with IMAP in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
388+
The BlockLegacyAuthImap switch specifies whether to allow only modern authentication with IMAP in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
389389
390390
This switch disables the following legacy authentication methods with IMAP:
391391
@@ -395,7 +395,7 @@ This switch disables the following legacy authentication methods with IMAP:
395395
396396
- Windows authentication (NTLM and Kerberos)
397397
398-
Before you disable the legacy authentication methods for this protocol, verify that hybrid Modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support Modern authentication.
398+
Before you disable the legacy authentication methods for this protocol, verify that hybrid modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support modern authentication.
399399
400400
```yaml
401401
Type: SwitchParameter
@@ -413,7 +413,7 @@ Accept wildcard characters: False
413413
### -BlockLegacyAuthMapi
414414
This parameter is available only in on-premises Exchange.
415415
416-
The BlockLegacyAuthMapi switch specifies whether to allow only Modern authentication with MAPI in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
416+
The BlockLegacyAuthMapi switch specifies whether to allow only modern authentication with MAPI in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
417417
418418
This switch disables the following legacy authentication methods with MAPI:
419419
@@ -423,7 +423,7 @@ This switch disables the following legacy authentication methods with MAPI:
423423
424424
- Windows authentication (NTLM and Kerberos)
425425
426-
Before you disable the legacy authentication methods for this protocol, verify that hybrid Modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support Modern authentication.
426+
Before you disable the legacy authentication methods for this protocol, verify that hybrid modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support modern authentication.
427427
428428
```yaml
429429
Type: SwitchParameter
@@ -441,7 +441,7 @@ Accept wildcard characters: False
441441
### -BlockLegacyAuthOfflineAddressBook
442442
This parameter is available only in on-premises Exchange.
443443
444-
The BlockLegacyAuthOfflineAddressBook switch specifies whether to allow only Modern authentication with Offline Address Books in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
444+
The BlockLegacyAuthOfflineAddressBook switch specifies whether to allow only modern authentication with Offline Address Books in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
445445
446446
This switch disables the following legacy authentication methods with Offline Address Books:
447447
@@ -451,7 +451,7 @@ This switch disables the following legacy authentication methods with Offline Ad
451451
452452
- Windows authentication (NTLM and Kerberos)
453453
454-
Before you disable the legacy authentication methods for this protocol, verify that hybrid Modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support Modern authentication.
454+
Before you disable the legacy authentication methods for this protocol, verify that hybrid modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support modern authentication.
455455
456456
```yaml
457457
Type: SwitchParameter
@@ -469,7 +469,7 @@ Accept wildcard characters: False
469469
### -BlockLegacyAuthPop
470470
This parameter is available only in on-premises Exchange.
471471
472-
The BlockLegacyAuthPop switch specifies whether to allow only Modern authentication with POP in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
472+
The BlockLegacyAuthPop switch specifies whether to allow only modern authentication with POP in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
473473
474474
This switch disables the following legacy authentication methods with POP:
475475
@@ -479,7 +479,7 @@ This switch disables the following legacy authentication methods with POP:
479479
480480
- Windows authentication (NTLM and Kerberos)
481481
482-
Before you disable the legacy authentication methods for this protocol, verify that hybrid Modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support Modern authentication.
482+
Before you disable the legacy authentication methods for this protocol, verify that hybrid modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support modern authentication.
483483
484484
```yaml
485485
Type: SwitchParameter
@@ -497,7 +497,7 @@ Accept wildcard characters: False
497497
### -BlockLegacyAuthRpc
498498
This parameter is available only in on-premises Exchange.
499499
500-
The BlockLegacyAuthRpc switch specifies whether to allow only Modern authentication with RPC in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
500+
The BlockLegacyAuthRpc switch specifies whether to allow only modern authentication with RPC in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
501501
502502
This switch disables the following legacy authentication methods with RPC:
503503
@@ -507,7 +507,7 @@ This switch disables the following legacy authentication methods with RPC:
507507
508508
- Windows authentication (NTLM and Kerberos)
509509
510-
Before you disable the legacy authentication methods for this protocol, verify that hybrid Modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support Modern authentication.
510+
Before you disable the legacy authentication methods for this protocol, verify that hybrid modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support modern authentication.
511511
512512
```yaml
513513
Type: SwitchParameter
@@ -525,7 +525,7 @@ Accept wildcard characters: False
525525
### -BlockLegacyAuthWebServices
526526
This parameter is available only in on-premises Exchange.
527527
528-
The BlockLegacyAuthWebServices switch specifies whether to allow only Modern authentication with Exchange Web Services (EWS) in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
528+
The BlockLegacyAuthWebServices switch specifies whether to allow only modern authentication with Exchange Web Services (EWS) in Exchange 2019 CU2 or later hybrid environments. You don't need to specify a value with this switch.
529529
530530
This switch disables the following legacy authentication methods with EWS:
531531
@@ -535,7 +535,7 @@ This switch disables the following legacy authentication methods with EWS:
535535
536536
- Windows authentication (NTLM and Kerberos)
537537
538-
Before you disable the legacy authentication methods for this protocol, verify that hybrid Modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support Modern authentication.
538+
Before you disable the legacy authentication methods for this protocol, verify that hybrid modern authentication is enabled and working in your Exchange hybrid environment, and that your email clients support modern authentication.
539539
540540
```yaml
541541
Type: SwitchParameter

exchange/exchange-ps/exchange/New-CaseHoldPolicy.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -146,15 +146,13 @@ The ExchangeLocation parameter specifies the mailboxes to include in the policy.
146146
147147
- A distribution group or mail-enabled security group (all mailboxes that are currently members of the group).
148148
149-
To specify a mailbox or distribution group, you can use any value that uniquely identifies it. For example:
149+
To specify a mailbox or distribution group, you can use the following values:
150150
151151
- Name
152152
153-
- Distinguished name (DN)
153+
- SMTP address
154154
155-
- Email address
156-
157-
- GUID
155+
- Azure AD ObjectId (You can use the [Get-AzureADUser](https://docs.microsoft.com/powershell/module/azuread/get-azureaduser?view=azureadps-2.0) cmdlet to obtain this value.)
158156
159157
To enter multiple values, use the following syntax: \<value1\>,\<value2\>,...\<valueX\>. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\<value1\>","\<value2\>",..."\<valueX\>".
160158

0 commit comments

Comments
 (0)