Skip to content

Commit 60307f9

Browse files
authored
Merge branch 'master' into patch-1
2 parents 224c15b + aff2375 commit 60307f9

30 files changed

+511
-571
lines changed

.openpublishing.publish.config.json

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,6 @@
265265
"template_folder": "_themes.pdf"
266266
}
267267
},
268-
"need_generate_pdf": false,
269268
"need_generate_intellisense": false,
270269
"enable_incremental_build": false,
271270
"dependent_packages": [

exchange/docs-conceptual/exchange-online/connect-to-exchange-online-powershell/connect-to-exchange-online-powershell.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ description: "Learn how to use remote PowerShell to connect to Exchange Online."
1919
Exchange Online PowerShell allows you to manage your Exchange Online settings from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to Exchange Online. It's a simple three-step process where you enter your Office 365 credentials, provide the required connection settings, and then import the Exchange Online cmdlets into your local Windows PowerShell session so that you can use them.
2020

2121
> [!IMPORTANT]
22-
> If you want to use multi-factor authentication (MFA) to connect to Exchange Online PowerShell, you need to download and use the Exchange Online Remote PowerShell Module. For more information, see [Connect to Exchange Online PowerShell using multi-factor authentication](mfa-connect-to-exchange-online-powershell.md). If you're an Exchange Online Protection (EOP) standalone customer, and you're using the service to protect on-premises mailboxes, use the connection instructions in the topic [Connect to Exchange Online Protection PowerShell](../../exchange-eop/connect-to-exchange-online-protection-powershell.md). If your EOP subscription is Exchange Enterprise CAL with Services (includes data loss prevention (DLP) and reporting using web services), the connection instructions in this topic will work for you.
22+
> If you want to use multi-factor authentication (MFA) to connect to Exchange Online PowerShell, you need to download and use the Exchange Online Remote PowerShell Module. For more information, see [Connect to Exchange Online PowerShell using multi-factor authentication](mfa-connect-to-exchange-online-powershell.md). <br/><br/> If you're an Exchange Online Protection (EOP) standalone customer, and you're using the service to protect on-premises mailboxes, use the connection instructions in the topic [Connect to Exchange Online Protection PowerShell](../../exchange-eop/connect-to-exchange-online-protection-powershell.md). If your EOP subscription is Exchange Enterprise CAL with Services (includes data loss prevention (DLP) and reporting using web services), the connection instructions in this topic will work for you.
2323
2424
## What do you need to know before you begin?
2525

@@ -54,7 +54,7 @@ Exchange Online PowerShell allows you to manage your Exchange Online settings fr
5454
You need to configure this setting only once on your computer, not every time you connect.
5555

5656
> [!TIP]
57-
> Having problems? Ask for help in the Exchange forums. Visit the forums at: [Exchange Online](https://go.microsoft.com/fwlink/p/?linkId=267542), or [Exchange Online Protection](https://go.microsoft.com/fwlink/p/?linkId=285351).
57+
> Having problems? Ask for help in the Exchange forums. Visit the forums at: [Exchange Online](https://go.microsoft.com/fwlink/p/?linkId=267542), or [Exchange Online Protection](https://go.microsoft.com/fwlink/p/?linkId=285351).
5858
5959
## Connect to Exchange Online PowerShell
6060

@@ -77,13 +77,13 @@ Exchange Online PowerShell allows you to manage your Exchange Online settings fr
7777
- For Office 365 operated by 21Vianet, use the _ConnectionUri_ value: `https://partner.outlook.cn/PowerShell`
7878

7979
- For Office 365 Germany, use the _ConnectionUri_ value: `https://outlook.office.de/powershell-liveid/`
80-
80+
8181
- For Office 365 Government Community Cloud High (GCC High), use the _ConnectionUri_ value: `https://outlook.office365.us/powershell-liveid/`
8282

8383
- If you're behind a proxy server, run this command first: `$ProxyOptions = New-PSSessionOption -ProxyAccessType <Value>`, where the _ProxyAccessType_ value is `IEConfig`, `WinHttpConfig`, or `AutoDetect`.
84-
84+
8585
Then, add the following parameter and value to the end of the $Session = ... command: `-SessionOption $ProxyOptions`.
86-
86+
8787
For more information, see [New-PSSessionOption](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/new-pssessionoption).
8888

8989
3. Run the following command.

exchange/exchange-ps/exchange/advanced-threat-protection/New-AntiPhishPolicy.md

Lines changed: 132 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,34 @@ For information about the parameter sets in the Syntax section below, see Exchan
2121
## SYNTAX
2222

2323
```
24-
New-AntiPhishPolicy -Name <String> [-AdminDisplayName <String>] [-AuthenticationFailAction <MoveToJmf | Quarantine>] [-Confirm] [-EnableAntispoofEnforcement <$true | $false>] [-EnableAuthenticationSafetyTip <$true | $false>] [-EnableAuthenticationSoftPassSafetyTip <$true | $false>] [-Enabled <$true | $false>] [-EnableMailboxIntelligence <$true | $false>] [-EnableOrganizationDomainsProtection <$true | $false>] [-EnableSimilarDomainsSafetyTips <$true | $false>] [-EnableSimilarUsersSafetyTips <$true | $false>] [-EnableTargetedDomainsProtection <$true | $false>] [-EnableTargetedUserProtection <$true | $false>] [-EnableUnusualCharactersSafetyTips <$true | $false>] [-ExcludedDomains <MultiValuedProperty>] [-ExcludedSenders <MultiValuedProperty>] [-PhishThresholdLevel <Int32>] [-TargetedDomainActionRecipients <MultiValuedProperty>] [-TargetedDomainProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>] [-TargetedDomainsToProtect <MultiValuedProperty>] [-TargetedUserActionRecipients <MultiValuedProperty>] [-TargetedUserProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>] [-TargetedUsersToProtect <MultiValuedProperty>] [-TreatSoftPassAsAuthenticated <$true | $false>] [-WhatIf] [<CommonParameters>]
24+
New-AntiPhishPolicy -Name <String>
25+
[-AdminDisplayName <String>]
26+
[-AuthenticationFailAction <MoveToJmf | Quarantine>]
27+
[-Confirm]
28+
[-EnableAntiSpoofEnforcement <$true | $false>]
29+
[-EnableAuthenticationSafetyTip <$true | $false>]
30+
[-EnableAuthenticationSoftPassSafetyTip <$true | $false>]
31+
[-Enabled <$true | $false>]
32+
[-EnableMailboxIntelligence <$true | $false>]
33+
[-EnableMailboxIntelligenceProtection <$true | $false>]
34+
[-EnableOrganizationDomainsProtection <$true | $false>]
35+
[-EnableSimilarDomainsSafetyTips <$true | $false>]
36+
[-EnableSimilarUsersSafetyTips <$true | $false>]
37+
[-EnableTargetedDomainsProtection <$true | $false>]
38+
[-EnableTargetedUserProtection <$true | $false>]
39+
[-EnableUnauthenticatedSender <$true | $false>]
40+
[-EnableUnusualCharactersSafetyTips <$true | $false>]
41+
[-ExcludedDomains <MultiValuedProperty>]
42+
[-ExcludedSenders <MultiValuedProperty>]
43+
[-PhishThresholdLevel <Int32>]
44+
[-TargetedDomainActionRecipients <MultiValuedProperty>]
45+
[-TargetedDomainProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>]
46+
[-TargetedDomainsToProtect <MultiValuedProperty>]
47+
[-TargetedUserActionRecipients <MultiValuedProperty>]
48+
[-TargetedUserProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>]
49+
[-TargetedUsersToProtect <MultiValuedProperty>]
50+
[-TreatSoftPassAsAuthenticated <$true | $false>]
51+
[-WhatIf] [<CommonParameters>]
2552
```
2653

2754
## DESCRIPTION
@@ -231,6 +258,25 @@ Accept pipeline input: False
231258
Accept wildcard characters: False
232259
```
233260
261+
### -EnableMailboxIntelligenceProtection
262+
The EnableMailboxIntelligenceProtection specifies whether to enable or disable intelligence based impersonation protection. Valid values are:
263+
264+
- $true: Enable intelligence based impersonation protection.
265+
266+
- $false: Don't enable intelligence based impersonation protection. This is the default value.
267+
268+
```yaml
269+
Type: $true | $false
270+
Parameter Sets: (All)
271+
Aliases:
272+
Applicable: Exchange Online, Exchange Online Protection
273+
Required: False
274+
Position: Named
275+
Default value: None
276+
Accept pipeline input: False
277+
Accept wildcard characters: False
278+
```
279+
234280
### -EnableOrganizationDomainsProtection
235281
The EnableOrganizationDomainsProtection parameter specifies whether to enable domain impersonation protection for all registered domains in the Office 365 organization. Valid values are:
236282
@@ -326,6 +372,25 @@ Accept pipeline input: False
326372
Accept wildcard characters: False
327373
```
328374
375+
### -EnableUnauthenticatedSender
376+
The EnableUnauthenticatedSender parameter specifies whether to apply a "?" symbol in Outlook's sender card if the sender fails authentication checks. Valid values are:
377+
378+
- $true: Apply the "?" symbol.
379+
380+
- $false: Do not apply the "?" symbol.
381+
382+
```yaml
383+
Type: $true | $false
384+
Parameter Sets: (All)
385+
Aliases:
386+
Applicable: Exchange Online, Exchange Online Protection
387+
Required: False
388+
Position: Named
389+
Default value: True
390+
Accept pipeline input: False
391+
Accept wildcard characters: False
392+
```
393+
329394
### -EnableUnusualCharactersSafetyTips
330395
The EnableUnusualCharactersSafetyTips parameter specifies whether to enable safety tips that are shown to recipients in messages for unusual characters in domain and user impersonation detections. Valid values are:
331396
@@ -375,6 +440,71 @@ Accept pipeline input: False
375440
Accept wildcard characters: False
376441
```
377442
443+
### -ImpersonationProtectionState
444+
The ImpersonationProtectionState parameter specifies the configuration of impersonation protection. Valid values are:
445+
446+
- Automatic
447+
448+
- Manual (This is the default value)
449+
450+
- Off
451+
452+
```yaml
453+
Type: ImpersonationProtectionState
454+
Parameter Sets: (All)
455+
Aliases:
456+
Applicable: Exchange Online, Exchange Online Protection
457+
Required: False
458+
Position: Named
459+
Default value: None
460+
Accept pipeline input: False
461+
Accept wildcard characters: False
462+
```
463+
464+
### -MailboxIntelligenceProtectionAction
465+
The MailboxIntelligenceProtectionAction parameter specifies what to do with messages that fail mailbox intelligence protection. Valid values are:
466+
467+
- NoAction (This is the default value)
468+
469+
- BccMessage: Add the recipients specified by the MailboxIntelligenceProtectionActionRecipients parameter to the Bcc field of the message.
470+
471+
- Delete: Delete the message during filtering. Use caution when selecting this value, because you can't recover the deleted message.
472+
473+
- MoveToJmf: Move the message to the user's Junk Email folder.
474+
475+
- Quarantine: Move the message to the phishing quarantine.
476+
477+
- Redirect: Redirect the message to the recipients specified by the MailboxIntelligenceProtectionActionRecipients parameter.
478+
479+
```yaml
480+
Type: ImpersonationAction
481+
Parameter Sets: (All)
482+
Aliases:
483+
Applicable: Exchange Online, Exchange Online Protection
484+
Required: False
485+
Position: Named
486+
Default value: None
487+
Accept pipeline input: False
488+
Accept wildcard characters: False
489+
```
490+
491+
### -MailboxIntelligenceProtectionActionRecipients
492+
The MailboxIntelligenceProtectionActionRecipients parameter specifies the recipients to add to detected messages when the MailboxIntelligenceProtectionAction parameter is set to the value Redirect or BccMessage.
493+
494+
A valid value for this parameter is an email address. You can specify multiple email addresses separated by commas.
495+
496+
```yaml
497+
Type: MultiValuedProperty
498+
Parameter Sets: (All)
499+
Aliases:
500+
Applicable: Exchange Online, Exchange Online Protection
501+
Required: False
502+
Position: Named
503+
Default value: None
504+
Accept pipeline input: False
505+
Accept wildcard characters: False
506+
```
507+
378508
### -PhishThresholdLevel
379509
The PhishThresholdLevel parameter specifies the tolerance level that's used by machine learning in the handling of phishing messages. Valid values are:
380510
@@ -477,7 +607,7 @@ Accept wildcard characters: False
477607
```
478608
479609
### -TargetedUserProtectionAction
480-
The TargetedUserProtectionAction parameter specifies the action to take on detected user impersonation messages for the users specified by the TargetedUsersToProtect parameter. Valid values are:
610+
The TargetedUserProtectionAction parameter specifies the action to take on detected messages for the users specified by the TargetedUsersToProtect parameter. Valid values are:
481611
482612
- NoAction (This is the default value)
483613

exchange/exchange-ps/exchange/advanced-threat-protection/Set-AntiPhishPolicy.md

Lines changed: 96 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ Set-AntiPhishPolicy -Identity <AntiPhishPolicyIdParameter>
3030
[-EnableAuthenticationSoftPassSafetyTip <$true | $false>]
3131
[-Enabled <$true | $false>]
3232
[-EnableMailboxIntelligence <$true | $false>]
33+
[-EnableMailboxIntelligenceProtection <$true | $false>]
3334
[-EnableOrganizationDomainsProtection <$true | $false>]
3435
[-EnableSimilarDomainsSafetyTips <$true | $false>]
3536
[-EnableSimilarUsersSafetyTips <$true | $false>]
@@ -39,6 +40,9 @@ Set-AntiPhishPolicy -Identity <AntiPhishPolicyIdParameter>
3940
[-EnableUnusualCharactersSafetyTips <$true | $false>]
4041
[-ExcludedDomains <MultiValuedProperty>]
4142
[-ExcludedSenders <MultiValuedProperty>]
43+
[-ImpersonationProtectionState <ImpersonationProtectionState>]
44+
[-MailboxIntelligenceProtectionAction <ImpersonationAction>]
45+
[-MailboxIntelligenceProtectionActionRecipients <MultiValuedProperty>]
4246
[-MakeDefault]
4347
[-PhishThresholdLevel <Int32>]
4448
[-TargetedDomainActionRecipients <MultiValuedProperty>]
@@ -199,8 +203,14 @@ Accept wildcard characters: False
199203
```
200204
201205
### -Enabled
206+
The Enabled parameter specifies whether the antiphish policy is enabled or disabled. Valid values are:
207+
208+
$true: The policy is enabled.
209+
210+
$false: The policy is disabled.
211+
202212
```yaml
203-
Type:
213+
Type: $true | $false
204214
Parameter Sets: (All)
205215
Aliases:
206216
Applicable: Exchange Online, Exchange Online Protection
@@ -230,6 +240,25 @@ Accept pipeline input: False
230240
Accept wildcard characters: False
231241
```
232242
243+
### -EnableMailboxIntelligenceProtection
244+
The EnableMailboxIntelligenceProtection specifies whether to enable or disable intelligence based impersonation protection. Valid values are:
245+
246+
- $true: Enable intelligence based impersonation protection.
247+
248+
- $false: Don't enable intelligence based impersonation protection. This is the default value.
249+
250+
```yaml
251+
Type: $true | $false
252+
Parameter Sets: (All)
253+
Aliases:
254+
Applicable: Exchange Online, Exchange Online Protection
255+
Required: False
256+
Position: Named
257+
Default value: None
258+
Accept pipeline input: False
259+
Accept wildcard characters: False
260+
```
261+
233262
### -EnableOrganizationDomainsProtection
234263
The EnableOrganizationDomainsProtection parameter specifies whether to enable domain impersonation protection for all registered domains in the Office 365 organization. Valid values are:
235264
@@ -393,6 +422,71 @@ Accept pipeline input: False
393422
Accept wildcard characters: False
394423
```
395424
425+
### -ImpersonationProtectionState
426+
The ImpersonationProtectionState parameter specifies the configuration of impersonation protection. Valid values are:
427+
428+
- Automatic
429+
430+
- Manual (This is the default value)
431+
432+
- Off
433+
434+
```yaml
435+
Type: ImpersonationProtectionState
436+
Parameter Sets: (All)
437+
Aliases:
438+
Applicable: Exchange Online, Exchange Online Protection
439+
Required: False
440+
Position: Named
441+
Default value: None
442+
Accept pipeline input: False
443+
Accept wildcard characters: False
444+
```
445+
446+
### -MailboxIntelligenceProtectionAction
447+
The MailboxIntelligenceProtectionAction parameter specifies what to do with messages that fail mailbox intelligence protection. Valid values are:
448+
449+
- NoAction (This is the default value)
450+
451+
- BccMessage: Add the recipients specified by the MailboxIntelligenceProtectionActionRecipients parameter to the Bcc field of the message.
452+
453+
- Delete: Delete the message during filtering. Use caution when selecting this value, because you can't recover the deleted message.
454+
455+
- MoveToJmf: Move the message to the user's Junk Email folder.
456+
457+
- Quarantine: Move the message to the phishing quarantine.
458+
459+
- Redirect: Redirect the message to the recipients specified by the MailboxIntelligenceProtectionActionRecipients parameter.
460+
461+
```yaml
462+
Type: ImpersonationAction
463+
Parameter Sets: (All)
464+
Aliases:
465+
Applicable: Exchange Online, Exchange Online Protection
466+
Required: False
467+
Position: Named
468+
Default value: None
469+
Accept pipeline input: False
470+
Accept wildcard characters: False
471+
```
472+
473+
### -MailboxIntelligenceProtectionActionRecipients
474+
The MailboxIntelligenceProtectionActionRecipients parameter specifies the recipients to add to detected messages when the MailboxIntelligenceProtectionAction parameter is set to the value Redirect or BccMessage.
475+
476+
A valid value for this parameter is an email address. You can specify multiple email addresses separated by commas.
477+
478+
```yaml
479+
Type: MultiValuedProperty
480+
Parameter Sets: (All)
481+
Aliases:
482+
Applicable: Exchange Online, Exchange Online Protection
483+
Required: False
484+
Position: Named
485+
Default value: None
486+
Accept pipeline input: False
487+
Accept wildcard characters: False
488+
```
489+
396490
### -MakeDefault
397491
{{Fill MakeDefault Description}}
398492
@@ -493,7 +587,7 @@ Accept wildcard characters: False
493587
```
494588
495589
### -TargetedUserActionRecipients
496-
The TargetedUserActionRecipients parameter specifies the replacement or additional recipients for detected user impersonation messages when the TargetedUserProtectionAction parameter is set to the value Redirect or BccMessage.
590+
The TargetedUserActionRecipients parameter specifies the replacement or additional recipients for detected messages when the TargetedUserProtectionAction parameter is set to the value Redirect or BccMessage.
497591
498592
A valid value for this parameter is an email address. You can specify multiple email addresses separated by commas.
499593

exchange/exchange-ps/exchange/devices/Clear-MobileDevice.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,8 @@ Accept wildcard characters: False
156156
### -AccountOnly
157157
The AccountOnly switch specifies whether to perform an account-only remote device wipe where only Exchange mailbox data is removed from the device. You don't need to specify a value with this switch.
158158
159+
You don't need to use this switch for the DeviceType value Outlook, because an account-only remote devices wipe is the only type of wipe that's used on Outlook devices.
160+
159161
```yaml
160162
Type: SwitchParameter
161163
Parameter Sets: (All)

exchange/exchange-ps/exchange/mail-flow/Get-MessageTraceDetail.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,26 @@ monikerRange: "exchonline-ps"
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17-
Use the Get-MessageTraceDetail cmdlet to view the message trace event details for a specific message.
17+
Use the Get-MessageTraceDetail cmdlet to view the message trace event details for a specific message. Note that these detailed results are returned less quickly than the Get-MessageTrace cmdlets.
1818

1919
For information about the parameter sets in the Syntax section below, see Exchange cmdlet syntax (https://technet.microsoft.com/library/bb123552.aspx).
2020

2121
## SYNTAX
2222

2323
```
24-
Get-MessageTraceDetail [-Action <MultiValuedProperty>] [-EndDate <DateTime>] [-Event <MultiValuedProperty>]
25-
[-Expression <Expression>] [-MessageId <String>] [-MessageTraceId <Guid>] [-Page <Int32>] [-PageSize <Int32>]
26-
[-ProbeTag <String>] [-RecipientAddress <String>] [-SenderAddress <String>] [-StartDate <DateTime>]
27-
[<CommonParameters>]
24+
Get-MessageTraceDetail
25+
[-Action <MultiValuedProperty>]
26+
[-EndDate <DateTime>]
27+
[-Event <MultiValuedProperty>]
28+
[-Expression <Expression>]
29+
[-MessageId <String>]
30+
[-MessageTraceId <Guid>]
31+
[-Page <Int32>]
32+
[-PageSize <Int32>]
33+
[-ProbeTag <String>]
34+
[-RecipientAddress <String>]
35+
[-SenderAddress <String>]
36+
[-StartDate <DateTime>] [<CommonParameters>]
2837
```
2938

3039
## DESCRIPTION

0 commit comments

Comments
 (0)