Skip to content

Commit 7c8bda8

Browse files
authored
Merge branch 'master' into patch-10
2 parents 90be88c + 7efa6e1 commit 7c8bda8

20 files changed

+570
-794
lines changed

.openpublishing.redirection.json

Lines changed: 28 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -282,7 +282,7 @@
282282
},
283283
{
284284
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Get-AdvancedThreatProtectionTrafficReport.md",
285-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-advancedthreatprotectiontrafficreport",
285+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
286286
"redirect_document_id": false
287287
},
288288
{
@@ -342,7 +342,7 @@
342342
},
343343
{
344344
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Get-UrlTrace.md",
345-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-urltrace",
345+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-safelinksaggregatereport",
346346
"redirect_document_id": false
347347
},
348348
{
@@ -5247,12 +5247,12 @@
52475247
},
52485248
{
52495249
"source_path": "exchange/virtual-folder/exchange/reporting/Get-MailDetailMalwareReport.md",
5250-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailmalwarereport",
5250+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
52515251
"redirect_document_id": false
52525252
},
52535253
{
52545254
"source_path": "exchange/virtual-folder/exchange/reporting/Get-MailDetailSpamReport.md",
5255-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailspamreport",
5255+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
52565256
"redirect_document_id": false
52575257
},
52585258
{
@@ -6626,24 +6626,44 @@
66266626
"redirect_document_id": false
66276627
},
66286628
{
6629-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Get-TenantAnalyticsConfig.md",
6629+
"source_path": "exchange/virtual-folder/exchange/Get-TenantAnalyticsConfig.md",
66306630
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
66316631
"redirect_document_id": false
66326632
},
66336633
{
6634-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Set-TenantAnalyticsConfig.md",
6634+
"source_path": "exchange/virtual-folder/exchange/Set-TenantAnalyticsConfig.md",
66356635
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-myanalyticsfeatureconfig",
66366636
"redirect_document_id": false
66376637
},
66386638
{
6639-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Get-UserAnalyticsConfig.md",
6639+
"source_path": "exchange/virtual-folder/exchange/Get-UserAnalyticsConfig.md",
66406640
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
66416641
"redirect_document_id": false
66426642
},
66436643
{
6644-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Set-UserAnalyticsConfig.md",
6644+
"source_path": "exchange/virtual-folder/exchange/Set-UserAnalyticsConfig.md",
66456645
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-myanalyticsfeatureconfig",
66466646
"redirect_document_id": false
6647+
},
6648+
{
6649+
"source_path": "exchange/virtual-folder/exchange/Get-MailDetailMalwareReport.md",
6650+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6651+
"redirect_document_id": false
6652+
},
6653+
{
6654+
"source_path": "exchange/virtual-folder/exchange/Get-MailDetailSpamReport.md",
6655+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6656+
"redirect_document_id": false
6657+
},
6658+
{
6659+
"source_path": "exchange/virtual-folder/exchange/Get-AdvancedThreatProtectionTrafficReport.md",
6660+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6661+
"redirect_document_id": false
6662+
},
6663+
{
6664+
"source_path": "exchange/virtual-folder/exchange/Get-UrlTrace.md",
6665+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-safelinksaggregatereport",
6666+
"redirect_document_id": false
66476667
}
66486668
]
66496669
}

exchange/docs-conceptual/exchange-online-powershell-v2.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,21 @@ Miscellaneous Exchange Online cmdlets that happen to be in the EXO V2 module are
9696
|[Set-VivaInsightsSettings](/powershell/module/exchange/set-vivainsightssettings)|Available in v2.0.5-Preview2 or later.|
9797
|
9898

99+
### Updates for version 2.0.6
100+
101+
Version 2.0.6-Preview3 of the EXO V2 module is now available. This Preview version improves upon the historical capabilities of the module with the following features:
102+
103+
- 250 additional remote PowerShell cmdlets that are backed by the REST API. These REST API cmdlets don't rely on the remote PowerShell session, so PowerShell on your client computer doesn't need [Basic authentication in WinRM](#prerequisites-for-the-exo-v2-module). These REST API cmdlets also work just like their old remote PowerShell equivalent cmdlets, so you don't need to update any of your scripts.
104+
- The new _RPSSession_ switch in **Connect-ExchangeOnline** grants access to all existing remote PowerShell cmdlets. The _RPSSession_ switch requires [Basic authentication in WinRM](#prerequisites-for-the-exo-v2-module) on your client computer.
105+
- A small number of existing mailbox remote PowerShell cmdlets have been updated with a new, experimental _UseCustomRoutingSwitch_ parameter. Using this switch routes the command directly to the required Mailbox server, and might improve overall performance.
106+
- When you use the _UseCustomRoutingSwitch_, you need to use the following values for identity of the mailbox:
107+
- User principal name (UPN)
108+
- Email address
109+
- Mailbox GUID
110+
- Initially, the _UseCustomRoutingSwitch_ is available on the following cmdlets: **Remove-CalendarEvents**, **Get-Clutter**, **Set-Clutter**, **Get-FocusedInbox**, **Set-FocusedInbox**, **Get-InboxRule**, **Get-MailboxAutoReplyConfiguration**, **Get-MailboxCalendarFolder**, **Get-MailboxFolderPermission**, **Get-MailboxFolderStatistics**, **Get-MailboxMessageConfiguration**, **Get-MailboxPermission**, **Get-MailboxRegionalConfiguration**, **Set-MailboxRegionalConfiguration**, **Get-MailboxStatistics**, **Get-MobileDeviceStatistics**, **Get-UserPhoto**, and **Set-UserPhoto**.
111+
112+
Use this parameter experimentally and [report any issues](#report-bugs-and-issues-for-the-exo-v2-module) that you encounter.
113+
99114
## Install and maintain the EXO V2 module
100115

101116
You can download the EXO V2 module from the PowerShell gallery at <https://www.powershellgallery.com/packages/ExchangeOnlineManagement/>.

exchange/exchange-ps/exchange/Connect-ExchangeOnline.md

Lines changed: 27 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,7 @@ Connect-ExchangeOnline
5252
[-TrackPerformance <Boolean>]
5353
[-UseMultithreading <Boolean>]
5454
[-UserPrincipalName <String>]
55+
[-UseRPSSession]
5556
[<CommonParameters>]
5657
```
5758

@@ -64,26 +65,17 @@ For details about the current and past public versions of the EXO V2 module, see
6465

6566
### Example 1
6667
```powershell
67-
$UserCredential = Get-Credential
68-
Connect-ExchangeOnline -Credential $UserCredential
68+
Connect-ExchangeOnline -UserPrincipalName [email protected]
6969
```
7070

71-
This example connects to Exchange Online PowerShell using modern authentication for an account that doesn't use multi-factor authentication (MFA).
72-
73-
The first command gets the username and password and stores them in the $UserCredential variable.
74-
75-
The second command connects the current PowerShell session using the credentials in $UserCredential.
76-
77-
After the Connect-ExchangeOnline command is complete, the password key in the $UserCredential variable is emptied, and you can run Exchange Online PowerShell cmdlets.
71+
This example connects to Exchange Online PowerShell using modern authentication, with or without multi-factor authentication (MFA). We aren't using the UseRPSSession parameter, so the connection uses REST and doesn't require Basic authentication to be enabled in WinROM on the local computer. But, only the subset of frequently used REST API parameters are available.
7872

7973
### Example 2
8074
```powershell
81-
Connect-ExchangeOnline -UserPrincipalName [email protected]
75+
Connect-ExchangeOnline -UserPrincipalName [email protected] -UseRPSSession
8276
```
8377

84-
This example connects to Exchange Online PowerShell using modern authentication for the account [email protected], which uses MFA.
85-
86-
After the command is successful, you can run ExO V2 module cmdlets and older remote PowerShell cmdlets.
78+
This example connects to Exchange Online PowerShell using modern authentication, with or without MFA. We're using the UseRPSSession parameter, so the connection requires Basic authentication to be enabled in WinRM on the local computer. But, all Exchange Online PowerShell cmdlets are available using traditional remote PowerShell access.
8779

8880
### Example 3
8981
```powershell
@@ -640,6 +632,28 @@ Accept pipeline input: False
640632
Accept wildcard characters: False
641633
```
642634

635+
### -UseRPSSession
636+
This parameter is available in version 2.0.6-Preview3 or later of the Exchange Online V2 module.
637+
638+
The UseRPSSession switch allows you to connect to Exchange Online PowerShell using traditional remote PowerShell access to all cmdlets. You don't need to specify a value with this switch.
639+
640+
This switch requires that Basic authentication is enabled in WinRM on the local computer. For more information, see [Prerequisites in the EXO V2 module](https://docs.microsoft.com/powershell/exchange/exchange-online-powershell-v2#prerequisites-for-the-exo-v2-module).
641+
642+
If you don't use this parameter, Basic authentication in WinRM is not required, but only the subset of frequently used REST API cmdlets are available.
643+
644+
```yaml
645+
Type: SwitchParameter
646+
Parameter Sets: (All)
647+
Aliases:
648+
Applicable: Exchange Online
649+
650+
Required: False
651+
Position: Named
652+
Default value: False
653+
Accept pipeline input: False
654+
Accept wildcard characters: False
655+
```
656+
643657
### CommonParameters
644658
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216).
645659

exchange/exchange-ps/exchange/Enable-OrganizationCustomization.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ Here are some examples of when you might see this:
3838
- Creating a new Outlook on the web mailbox policy or modifying a built-in Outlook on the web mailbox policy.
3939
- Creating a new sharing policy or modifying a built-in sharing policy.
4040
- Creating a new retention policy or modifying a built-in retention policy.
41+
- Enabling preset security policies in the Microsoft 365 Security Center.
4142

4243
Note that you are only required to run the Enable-OrganizationCustomization cmdlet once in your Exchange Online organization. If you attempt to run the cmdlet again, you'll get an error.
4344

0 commit comments

Comments
 (0)