You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You use the JunkEmailEnabled parameter on the Set-OwaMailboxPolicy or Set-OwaVirtualDirectory cmdlets to control the availability of the junk email settings in Outlook on the web.
The state of the junk email rule on the mailbox doesn't affect the client-side junk email settings that are available in the Outlook Junk Email Filter. Even when the junk email rule is disabled in the mailbox, Outlook can still move messages to the Junk Email folder. For example, if Outlook determines the message is spam, or the sender is defined in the Blocked Senders list, Outlook can move the message to the Junk Email folder. For more information, see [Use Junk Email Filters to control which messages you see](https://go.microsoft.com/fwlink/p/?LinkID=797542).
Set-FederationTrust -Identity "Azure AD Authentication" -Thumbprint AC00F35CBA8359953F4126E0984B5CCAFA2F4F17
67
67
```
68
68
69
69
This example configures the federation trust Microsoft Federation Gateway to use the certificate with the thumbprint AC00F35CBA8359953F4126E0984B5CCAFA2F4F17 as the next certificate.
Set-FederationTrust -Identity "Azure AD Authentication" -PublishFederationCertificate
74
74
```
75
75
76
76
This example configures the federation trust Microsoft Federation Gateway to use the next certificate as the current certificate.
77
77
78
+
### Example 3
79
+
```powershell
80
+
Set-FederationTrust -Identity "Azure AD Authentication" -MetadataUrl https://login.microsoftonline.us/FederationMetadata/2006-12/FederationMetadata.xml
81
+
```
82
+
83
+
This example updates the configuration if the tenant is hosted in Office 365 U.S. Government GCC High or DoD environment.
84
+
78
85
Before you configure a federation trust to use the next certificate as the current certificate, you need to use the Test-FederationTrust cmdlet to verify that the certificate is available on all Exchange servers.
79
86
80
87
## PARAMETERS
81
88
82
89
### -Identity
83
-
The Identity parameter specifies the name of the federation trust being modified.
90
+
The Identity parameter specifies the name of the federation trust being modified. <br/><br/>**Note**: For Exchange Online tenants, use the value "Azure AD Authentication".
The MetadataUrl parameter specifies the URL where WS-FederationMetadata is published by the Microsoft Federation Gateway.
178
+
The MetadataUrl parameter specifies the URL where WS-FederationMetadata is published by the Microsoft Federation Gateway. <br/><br/> **Note**: For GCC High or DoD tenants, use the value https://login.microsoftonline.us/FederationMetadata/2006-12/FederationMetadata.xml.
@@ -56,6 +56,22 @@ This example retrieves the Inbox rule ReceivedLastYear from the mailbox joe@cont
56
56
57
57
## PARAMETERS
58
58
59
+
### -BypassScopeCheck
60
+
The BypassScopeCheck switch specifies whether to bypass the scope check for the user that's running the command. You don't need to specify a value with this switch.
61
+
62
+
```yaml
63
+
Type: SwitchParameter
64
+
Parameter Sets: (All)
65
+
Aliases:
66
+
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online
67
+
68
+
Required: False
69
+
Position: Named
70
+
Default value: None
71
+
Accept pipeline input: False
72
+
Accept wildcard characters: False
73
+
```
74
+
59
75
### -DescriptionTimeFormat
60
76
The DescriptionTimeFormat parameter specifies the format for time values in the rule description. For example:
61
77
@@ -138,6 +154,24 @@ Accept pipeline input: True
138
154
Accept wildcard characters: False
139
155
```
140
156
157
+
### -IncludeHidden
158
+
This parameter works only in on-premises Exchange.
159
+
160
+
The IncludeHidden switch specifies whether to include hidden Inbox rules in the results. You don't need to specify a value with this switch.
161
+
162
+
```yaml
163
+
Type: SwitchParameter
164
+
Parameter Sets: (All)
165
+
Aliases:
166
+
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
167
+
168
+
Required: False
169
+
Position: Named
170
+
Default value: None
171
+
Accept pipeline input: False
172
+
Accept wildcard characters: False
173
+
```
174
+
141
175
### -Mailbox
142
176
The Mailbox parameter specifies the mailbox that contains the Inbox rule. You can use any value that uniquely identifies the mailbox. For example:
143
177
@@ -174,41 +208,9 @@ Accept pipeline input: False
174
208
Accept wildcard characters: False
175
209
```
176
210
177
-
### -IncludeHidden
211
+
### -SweepRules
178
212
This parameter is available only in on-premises Exchange.
179
213
180
-
The IncludeHidden switch specifies whether to include hidden Inbox rules in the results. You don't need to specify a value with this switch.
181
-
182
-
```yaml
183
-
Type: SwitchParameter
184
-
Parameter Sets: (All)
185
-
Aliases:
186
-
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
187
-
188
-
Required: False
189
-
Position: Named
190
-
Default value: None
191
-
Accept pipeline input: False
192
-
Accept wildcard characters: False
193
-
```
194
-
195
-
### -BypassScopeCheck
196
-
The BypassScopeCheck switch specifies whether to bypass the scope check for the user that's running the command. You don't need to specify a value with this switch.
197
-
198
-
```yaml
199
-
Type: SwitchParameter
200
-
Parameter Sets: (All)
201
-
Aliases:
202
-
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online
203
-
204
-
Required: False
205
-
Position: Named
206
-
Default value: None
207
-
Accept pipeline input: False
208
-
Accept wildcard characters: False
209
-
```
210
-
211
-
### -SweepRules
212
214
The SweepRules switch specifies whether to return only Sweep rules in the results. You don't need to specify a value with this switch.
213
215
214
216
Sweep rules run at regular intervals to help keep your Inbox clean.
@@ -217,7 +219,7 @@ Sweep rules run at regular intervals to help keep your Inbox clean.
217
219
Type: SwitchParameter
218
220
Parameter Sets: (All)
219
221
Aliases:
220
-
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online
222
+
Applicable: Exchange Server 2016, Exchange Server 2019
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/organization/New-ApplicationAccessPolicy.md
+2Lines changed: 2 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -164,6 +164,8 @@ This parameter only accepts recipients that are security principals (users or gr
164
164
165
165
To verify that a recipient is a security principal, use the syntax `Get-Recipient -Identity <RecipientIdentity> | Select-Object IsValidSecurityPrincipal`.
166
166
167
+
If you need to scope the policy to shared mailboxes, you can add them to a mail enabled security group.
0 commit comments