Skip to content

Commit 956188f

Browse files
authored
Merge branch 'master' into patch-1
2 parents 2c424e5 + c41efac commit 956188f

17 files changed

+511
-753
lines changed

.openpublishing.redirection.json

Lines changed: 28 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -282,7 +282,7 @@
282282
},
283283
{
284284
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Get-AdvancedThreatProtectionTrafficReport.md",
285-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-advancedthreatprotectiontrafficreport",
285+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
286286
"redirect_document_id": false
287287
},
288288
{
@@ -342,7 +342,7 @@
342342
},
343343
{
344344
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Get-UrlTrace.md",
345-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-urltrace",
345+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-safelinksaggregatereport",
346346
"redirect_document_id": false
347347
},
348348
{
@@ -5247,12 +5247,12 @@
52475247
},
52485248
{
52495249
"source_path": "exchange/virtual-folder/exchange/reporting/Get-MailDetailMalwareReport.md",
5250-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailmalwarereport",
5250+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
52515251
"redirect_document_id": false
52525252
},
52535253
{
52545254
"source_path": "exchange/virtual-folder/exchange/reporting/Get-MailDetailSpamReport.md",
5255-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailspamreport",
5255+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
52565256
"redirect_document_id": false
52575257
},
52585258
{
@@ -6626,24 +6626,44 @@
66266626
"redirect_document_id": false
66276627
},
66286628
{
6629-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Get-TenantAnalyticsConfig.md",
6629+
"source_path": "exchange/virtual-folder/exchange/Get-TenantAnalyticsConfig.md",
66306630
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
66316631
"redirect_document_id": false
66326632
},
66336633
{
6634-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Set-TenantAnalyticsConfig.md",
6634+
"source_path": "exchange/virtual-folder/exchange/Set-TenantAnalyticsConfig.md",
66356635
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-myanalyticsfeatureconfig",
66366636
"redirect_document_id": false
66376637
},
66386638
{
6639-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Get-UserAnalyticsConfig.md",
6639+
"source_path": "exchange/virtual-folder/exchange/Get-UserAnalyticsConfig.md",
66406640
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
66416641
"redirect_document_id": false
66426642
},
66436643
{
6644-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Set-UserAnalyticsConfig.md",
6644+
"source_path": "exchange/virtual-folder/exchange/Set-UserAnalyticsConfig.md",
66456645
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-myanalyticsfeatureconfig",
66466646
"redirect_document_id": false
6647+
},
6648+
{
6649+
"source_path": "exchange/virtual-folder/exchange/Get-MailDetailMalwareReport.md",
6650+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6651+
"redirect_document_id": false
6652+
},
6653+
{
6654+
"source_path": "exchange/virtual-folder/exchange/Get-MailDetailSpamReport.md",
6655+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6656+
"redirect_document_id": false
6657+
},
6658+
{
6659+
"source_path": "exchange/virtual-folder/exchange/Get-AdvancedThreatProtectionTrafficReport.md",
6660+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6661+
"redirect_document_id": false
6662+
},
6663+
{
6664+
"source_path": "exchange/virtual-folder/exchange/Get-UrlTrace.md",
6665+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-safelinksaggregatereport",
6666+
"redirect_document_id": false
66476667
}
66486668
]
66496669
}

exchange/exchange-ps/exchange/Enable-OrganizationCustomization.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,7 @@ Here are some examples of when you might see this:
3838
- Creating a new Outlook on the web mailbox policy or modifying a built-in Outlook on the web mailbox policy.
3939
- Creating a new sharing policy or modifying a built-in sharing policy.
4040
- Creating a new retention policy or modifying a built-in retention policy.
41+
- Enabling preset security policies in the Microsoft 365 Security Center.
4142

4243
Note that you are only required to run the Enable-OrganizationCustomization cmdlet once in your Exchange Online organization. If you attempt to run the cmdlet again, you'll get an error.
4344

exchange/exchange-ps/exchange/Get-MailDetailSpamReport.md renamed to exchange/exchange-ps/exchange/Get-MailDetailEncryptionReport.md

Lines changed: 53 additions & 87 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,20 @@
11
---
22
external help file: Microsoft.Exchange.ServerStatus-Help.xml
3-
online version: https://docs.microsoft.com/powershell/module/exchange/get-maildetailspamreport
4-
applicable: Exchange Online, Exchange Online Protection
5-
title: Get-MailDetailSpamReport
3+
online version: https://docs.microsoft.com/powershell/module/exchange/get-maildetailencryptionreport
4+
applicable: Exchange Online, Security & Compliance Center
5+
title: Get-MailDetailEncryptionReport
66
schema: 2.0.0
77
author: chrisda
88
ms.author: chrisda
99
ms.reviewer:
1010
---
1111

12-
# Get-MailDetailSpamReport
12+
# Get-MailDetailEncryptionReport
1313

1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17-
This cmdlet will be deprecated. Use the **Get-MailDetailATPReport** cmdlet instead.
18-
19-
Use the Get-MailDetailSpamReport cmdlet to view the details of spam messages for the last 10 days.
17+
Use the Get-MailDetailEncryptionReport cmdlet to view the details of encryption in your cloud-based organization for the last 10 days.
2018

2119
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2220

@@ -25,46 +23,59 @@ For information about the parameter sets in the Syntax section below, see [Excha
2523
## SYNTAX
2624

2725
```
28-
Get-MailDetailSpamReport [-Action <MultiValuedProperty>]
26+
Get-MailDetailEncryptionReport
27+
[-AggregateBy <String>]
2928
[-Direction <MultiValuedProperty>]
3029
[-Domain <MultiValuedProperty>]
31-
[-EndDate <DateTime>]
30+
[-EndDate <System.DateTime>]
3231
[-EventType <MultiValuedProperty>]
3332
[-MessageId <MultiValuedProperty>]
3433
[-MessageTraceId <MultiValuedProperty>]
3534
[-Page <Int32>]
3635
[-PageSize <Int32>]
3736
[-ProbeTag <String>]
38-
[-RecipientAddress <MultiValuedProperty>]
39-
[-SenderAddress <MultiValuedProperty>]
40-
[-StartDate <DateTime>]
37+
[-StartDate <System.DateTime>]
4138
[<CommonParameters>]
4239
```
4340

4441
## DESCRIPTION
42+
For the reporting period you specify, the cmdlet returns the following default information:
43+
44+
- DateTime
45+
- Message ID
46+
- Message Trace ID
47+
48+
If you append the command with ` | Format-List`, the following additional information is returned:
49+
50+
- Domain
51+
- Direction
52+
- Recipient Address
53+
- Sender IP
54+
- Sender Address
55+
- Message Size
56+
- Subject
57+
4558
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
4659

4760
## EXAMPLES
4861

4962
### Example 1
5063
```powershell
51-
Get-MailDetailSpamReport -StartDate 06/13/2015 -EndDate 06/15/2015 -SenderAddress [email protected]
64+
Get-MailDetailEncryptionReport -StartDate 12/13/2021 -EndDate 12/15/2021
5265
```
5366

54-
This example retrieves the details of spam messages sent by [email protected] between June 13, 2015 and June 15, 2015.
67+
This example retrieves encryption details for messages between December 13, 2021 and December 15, 2021.
5568

5669
## PARAMETERS
5770

58-
### -Action
59-
The Action parameter filters the report by the action taken on messages. To view the complete list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget Actions`. The action you specify must correspond to the report type. For example, you can only specify malware filter actions for malware reports.
60-
61-
You can specify multiple values separated by commas.
71+
### -AggregateBy
72+
The AggregateBy parameter specifies the reporting period. Valid values are Hour, Day, or Summary. The default value is Day.
6273

6374
```yaml
64-
Type: MultiValuedProperty
75+
Type: String
6576
Parameter Sets: (All)
6677
Aliases:
67-
Applicable: Exchange Online, Exchange Online Protection
78+
Applicable: Exchange Online, Security & Compliance Center
6879

6980
Required: False
7081
Position: Named
@@ -80,7 +91,7 @@ The Direction parameter filters the results by incoming or outgoing messages. Va
8091
Type: MultiValuedProperty
8192
Parameter Sets: (All)
8293
Aliases:
83-
Applicable: Exchange Online, Exchange Online Protection
94+
Applicable: Exchange Online, Security & Compliance Center
8495

8596
Required: False
8697
Position: Named
@@ -96,12 +107,12 @@ The Domain parameter filters the results by an accepted domain in the cloud-base
96107
Type: MultiValuedProperty
97108
Parameter Sets: (All)
98109
Aliases:
99-
Applicable: Exchange Online, Exchange Online Protection
110+
Applicable: Exchange Online, Security & Compliance Center
100111

101112
Required: False
102113
Position: Named
103114
Default value: None
104-
Accept pipeline input: True
115+
Accept pipeline input: True (ByPropertyName, ByValue)
105116
Accept wildcard characters: False
106117
```
107118
@@ -111,10 +122,10 @@ The EndDate parameter specifies the end date of the date range.
111122
Use the short date format that's defined in the Regional Options settings on the computer where you're running the command. For example, if the computer is configured to use the short date format mm/dd/yyyy, enter 09/01/2018 to specify September 1, 2018. You can enter the date only, or you can enter the date and time of day. If you enter the date and time of day, enclose the value in quotation marks ("), for example, "09/01/2018 5:00 PM".
112123
113124
```yaml
114-
Type: DateTime
125+
Type: System.DateTime
115126
Parameter Sets: (All)
116127
Aliases:
117-
Applicable: Exchange Online, Exchange Online Protection
128+
Applicable: Exchange Online, Security & Compliance Center
118129

119130
Required: False
120131
Position: Named
@@ -126,33 +137,18 @@ Accept wildcard characters: False
126137
### -EventType
127138
The EventType parameter filters the report by the event type. Valid values are:
128139
129-
- BCL0 to BCL9
130-
- NonSpam_AdditionalSpamFilterPassed
131-
- NonSpam_BulkPassed
132-
- NonSpam_ContentScanPassed
133-
- NonSpam_ETRPassed
134-
- NonSpam_IntraOrg
135-
- NonSpam_IPAllowed
136-
- NonSpam_SafeSender
137-
- Spam_AdditionalSpamFiltered
138-
- Spam_BulkFiltered
139-
- Spam_ContentScanFiltered
140-
- Spam_ETRFiltered
141-
- Spam_SenderBlocked
142-
- SpamContentFiltered
143-
- SpamDBEBFilter
144-
- SpamEnvelopeBlock
145-
- SpamIPBlock
146-
147-
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type you specify must correspond to the report. For example, you can only specify spam event types for spam reports.
140+
- EncryptionManual
141+
- EncryptionPolicy
142+
143+
To view the potential list of valid values for this parameter, run the command: `Get-MailFilterListReport -SelectionTarget EventTypes`. The event type must correspond to the report.
148144

149145
You can specify multiple values separated by commas.
150146

151147
```yaml
152148
Type: MultiValuedProperty
153149
Parameter Sets: (All)
154150
Aliases:
155-
Applicable: Exchange Online, Exchange Online Protection
151+
Applicable: Exchange Online, Security & Compliance Center
156152
157153
Required: False
158154
Position: Named
@@ -164,11 +160,13 @@ Accept wildcard characters: False
164160
### -MessageId
165161
The MessageId parameter filters the results by the Message-ID header field of the message. This value is also known as the Client ID. The format of the Message-ID depends on the messaging server that sent the message. The value should be unique for each message. However, not all messaging servers create values for the Message-ID in the same way. Be sure to include the full Message ID string (which may include angle brackets) and enclose the value in quotation marks (for example, "<d9683b4c-127b-413a-ae2e-fa7dfb32c69d@DM3NAM06BG401.Eop-nam06.prod.protection.outlook.com>").
166162

163+
You can specify multiple values separated by commas.
164+
167165
```yaml
168166
Type: MultiValuedProperty
169167
Parameter Sets: (All)
170168
Aliases:
171-
Applicable: Exchange Online, Exchange Online Protection
169+
Applicable: Exchange Online, Security & Compliance Center
172170
173171
Required: False
174172
Position: Named
@@ -178,13 +176,15 @@ Accept wildcard characters: False
178176
```
179177

180178
### -MessageTraceId
181-
The MessageTraceId parameter can be used with the recipient address to uniquely identify a message trace and obtain more details. A message trace ID is generated for every message that's processed by the system.
179+
The MessageId parameter filters the results by the Message-ID header field of the message. This value is also known as the Client ID. The format of the Message-ID depends on the messaging server that sent the message. The value should be unique for each message. However, not all messaging servers create values for the Message-ID in the same way. Be sure to include the full Message ID string (which may include angle brackets) and enclose the value in quotation marks (for example, "<d9683b4c-127b-413a-ae2e-fa7dfb32c69d@DM3NAM06BG401.Eop-nam06.prod.protection.outlook.com>").
180+
181+
You can specify ultiple values separate by commas.
182182

183183
```yaml
184184
Type: MultiValuedProperty
185185
Parameter Sets: (All)
186186
Aliases:
187-
Applicable: Exchange Online, Exchange Online Protection
187+
Applicable: Exchange Online, Security & Compliance Center
188188
189189
Required: False
190190
Position: Named
@@ -200,7 +200,7 @@ The Page parameter specifies the page number of the results you want to view. Va
200200
Type: Int32
201201
Parameter Sets: (All)
202202
Aliases:
203-
Applicable: Exchange Online, Exchange Online Protection
203+
Applicable: Exchange Online, Security & Compliance Center
204204
205205
Required: False
206206
Position: Named
@@ -216,7 +216,7 @@ The PageSize parameter specifies the maximum number of entries per page. Valid i
216216
Type: Int32
217217
Parameter Sets: (All)
218218
Aliases:
219-
Applicable: Exchange Online, Exchange Online Protection
219+
Applicable: Exchange Online, Security & Compliance Center
220220
221221
Required: False
222222
Position: Named
@@ -232,39 +232,7 @@ This parameter is reserved for internal Microsoft use.
232232
Type: String
233233
Parameter Sets: (All)
234234
Aliases:
235-
Applicable: Exchange Online, Exchange Online Protection
236-
237-
Required: False
238-
Position: Named
239-
Default value: None
240-
Accept pipeline input: False
241-
Accept wildcard characters: False
242-
```
243-
244-
### -RecipientAddress
245-
The RecipientAddress parameter filters the results by the recipient's email address. You can specify multiple values separated by commas.
246-
247-
```yaml
248-
Type: MultiValuedProperty
249-
Parameter Sets: (All)
250-
Aliases:
251-
Applicable: Exchange Online, Exchange Online Protection
252-
253-
Required: False
254-
Position: Named
255-
Default value: None
256-
Accept pipeline input: False
257-
Accept wildcard characters: False
258-
```
259-
260-
### -SenderAddress
261-
The SenderAddress parameter filters the results by the sender's email address. You can specify multiple values separated by commas.
262-
263-
```yaml
264-
Type: MultiValuedProperty
265-
Parameter Sets: (All)
266-
Aliases:
267-
Applicable: Exchange Online, Exchange Online Protection
235+
Applicable: Exchange Online, Security & Compliance Center
268236
269237
Required: False
270238
Position: Named
@@ -279,10 +247,10 @@ The StartDate parameter specifies the start date of the date range.
279247
Use the short date format that's defined in the Regional Options settings on the computer where you're running the command. For example, if the computer is configured to use the short date format mm/dd/yyyy, enter 09/01/2018 to specify September 1, 2018. You can enter the date only, or you can enter the date and time of day. If you enter the date and time of day, enclose the value in quotation marks ("), for example, "09/01/2018 5:00 PM".
280248

281249
```yaml
282-
Type: DateTime
250+
Type: System.DateTime
283251
Parameter Sets: (All)
284252
Aliases:
285-
Applicable: Exchange Online, Exchange Online Protection
253+
Applicable: Exchange Online, Security & Compliance Center
286254
287255
Required: False
288256
Position: Named
@@ -297,12 +265,10 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
297265
## INPUTS
298266

299267
###
300-
To see the input types that this cmdlet accepts, see [Cmdlet Input and Output Types](https://go.microsoft.com/fwlink/p/?linkId=616387). If the Input Type field for a cmdlet is blank, the cmdlet doesn't accept input data.
301268

302269
## OUTPUTS
303270

304271
###
305-
To see the return types, which are also known as output types, that this cmdlet accepts, see [Cmdlet Input and Output Types](https://go.microsoft.com/fwlink/p/?linkId=616387). If the Output Type field is blank, the cmdlet doesn't return data.
306272

307273
## NOTES
308274

0 commit comments

Comments
 (0)