Skip to content

Commit a656e07

Browse files
authored
Merge branch 'master' into sharepoint-fix
2 parents a18c113 + 88ab62c commit a656e07

File tree

47 files changed

+3155
-190
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

47 files changed

+3155
-190
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -137,14 +137,14 @@ You need to assign the API permission `Exchange.ManageAsApp` so the application
137137

138138
Create a self-signed x.509 certificate using one of the following methods:
139139

140-
- Use the [Create-SelfSignedCertificate script](https://github.com/SharePoint/PnP-Partner-Pack/blob/master/scripts/Create-SelfSignedCertificate.ps1):
140+
- (Recommended) Use the [New-SelfSignedCertificate](https://docs.microsoft.com/powershell/module/pkiclient/new-selfsignedcertificate) and [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) cmdlets to request a self-signed certificate and export it to PFX.
141+
142+
- Use the [Create-SelfSignedCertificate script](https://github.com/SharePoint/PnP-Partner-Pack/blob/master/scripts/Create-SelfSignedCertificate.ps1). Note that this script generates SHA1 certificates.
141143

142144
```powershell
143145
.\Create-SelfSignedCertificate.ps1 -CommonName "MyCompanyName" -StartDate 2020-04-01 -EndDate 2022-04-01
144146
```
145147

146-
- Use the **makecert.exe** tool from the Windows SDK.
147-
148148
## Step 4: Attach the certificate to the Azure AD application
149149

150150
After you register the certificate with your application, you can use the public key (.pfx file) or the thumbprint for authentication.

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ If your account doesn't use multi-factor authentication, use the steps in this s
114114
3. The command that you need to run uses the following syntax:
115115

116116
```powershell
117-
Connect-ExchangeOnline -Credential $UserCredential = Get-Credential -ShowProgress $true [-ConnectionUri <URL>] [-DelegatedOrganization <String>]
117+
Connect-ExchangeOnline -Credential $UserCredential -ShowProgress $true [-ConnectionUri <URL>] [-DelegatedOrganization <String>]
118118
```
119119

120120
- The required _ConnectionUri_ value depends on the nature of your Microsoft 365 organization. For more information, see the parameter description in [Connect-ExchangeOnline](https://docs.microsoft.com/powershell/module/exchange/connect-exchangeonline).

exchange/docs-conceptual/connect-to-scc-powershell.md

Lines changed: 3 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,9 @@ To use the older, less secure remote PowerShell connection instructions that [wi
2525

2626
To use the older Exchange Online Remote PowerShell Module to connect to Security & Compliance Center PowerShell using MFA, see [V1 module - Connect to Security & Compliance Center PowerShell using MFA](v1-module-mfa-connect-to-scc-powershell.md). Note that this older version of the module will eventually be retired.
2727

28+
> [!NOTE]
29+
> Currently, you can't use the EXO V2 module to connect to Security & Compliance Center PowerShell in GCC High or DoD environments. Instead, use the older instructions at [Basic auth - Connect to Security & Compliance Center PowerShell](basic-auth-connect-to-scc-powershell.md) or [V1 module - Connect to Security & Compliance Center PowerShell using MFA](v1-module-mfa-connect-to-scc-powershell.md).
30+
2831
## What do you need to know before you begin?
2932

3033
- The requirements for installing and using the EXO V2 module are described in [Install and maintain the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module).
@@ -60,18 +63,6 @@ If you account uses multi-factor authentication, use the steps in this section.
6063
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://ps.compliance.protection.outlook.de/PowerShell-LiveID -AzureADAuthorizationEndPointUri https://login.microsoftonline.de/common
6164
```
6265

63-
**This example connects to Security & Compliance Center PowerShell in a Microsoft GCC High organization**.
64-
65-
```powershell
66-
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://ps.compliance.protection.office365.us/powershell-liveid/ -AzureADAuthorizationEndPointUri https://login.microsoftonline.us/common
67-
```
68-
69-
**This example connects to Security & Compliance Center PowerShell in a Microsoft 365 DoD organization**.
70-
71-
```powershell
72-
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/ -AzureADAuthorizationEndPointUri https://login.microsoftonline.us/common
73-
```
74-
7566
For detailed syntax and parameter information, see [Connect-IPPSSession](https://docs.microsoft.com/powershell/module/exchange/connect-exchangeonline).
7667

7768
> [!NOTE]
@@ -119,18 +110,6 @@ If your account doesn't use multi-factor authentication, use the steps in this s
119110
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.compliance.protection.outlook.de/
120111
```
121112

122-
**This example connects to Security & Compliance Center PowerShell in a Microsoft GCC High organization**.
123-
124-
```powershell
125-
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.compliance.protection.office365.us/powershell-liveid/
126-
```
127-
128-
**This example connects to Security & Compliance Center PowerShell in a Microsoft 365 DoD organization**.
129-
130-
```powershell
131-
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/
132-
```
133-
134113
For detailed syntax and parameter information, see [Connect-IPPSSession](https://docs.microsoft.com/powershell/module/exchange/connect-exchangeonline).
135114

136115
> [!NOTE]

exchange/docs-conceptual/exchange-online-powershell-v2.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -73,9 +73,9 @@ The connection-related cmdlets that are available in the EXO V2 module are liste
7373

7474
|EXO V2 module cmdlet|Older related cmdlet|
7575
|---|---|
76-
|[Connect-ExchangeOnline]((https://docs.microsoft.com/powershell/module/exchange/connect-exchangeonline)|[Connect-EXOPSSession](v1-module-mfa-connect-to-exo-powershell.md) <br/> or <br/> [New-PSSession](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/new-pssession)|
77-
|[Connect-IPPSSession]((https://docs.microsoft.com/powershell/module/exchange/connect-ippssession)|[Connect-IPPSSession](v1-module-mfa-connect-to-scc-powershell.md)|
78-
|[Disconnect-ExchangeOnline]((https://docs.microsoft.com/powershell/module/exchange/disconnect-exchangeonline)|[Remove-PSSession](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/remove-pssession)|
76+
|[Connect-ExchangeOnline](https://docs.microsoft.com/powershell/module/exchange/connect-exchangeonline)|[Connect-EXOPSSession](v1-module-mfa-connect-to-exo-powershell.md) <br/> or <br/> [New-PSSession](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/new-pssession)|
77+
|[Connect-IPPSSession](https://docs.microsoft.com/powershell/module/exchange/connect-ippssession)|[Connect-IPPSSession](v1-module-mfa-connect-to-scc-powershell.md)|
78+
|[Disconnect-ExchangeOnline](https://docs.microsoft.com/powershell/module/exchange/disconnect-exchangeonline)|[Remove-PSSession](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/remove-pssession)|
7979
|
8080

8181
## Install and maintain the EXO V2 module

exchange/exchange-ps/exchange/Connect-IPPSSession.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,6 @@ The AzureADAuthorizationEndpointUri parameter specifies the Azure AD Authorizati
6868

6969
- For Security & Compliance Center PowerShell in Microsoft 365 or Microsoft 365 GCC, don't use this parameter.
7070
- For Security & Compliance Center PowerShell in Office 365 Germany, use the value <https://login.microsoftonline.de/common> for this parameter.
71-
- For Security & Compliance Center PowerShell in Microsoft 365 GCC High and Microsoft 365 DoD, use the value <https://login.microsoftonline.us/common> for this parameter.
7271

7372
```yaml
7473
Type: String
@@ -103,8 +102,6 @@ The ConnectionUri parameter specifies the connection endpoint for the remote Pow
103102
104103
- For Security & Compliance Center PowerShell in Microsoft 365 or Microsoft 365 GCC, don't use this parameter.
105104
- For Security & Compliance Center PowerShell in Office 365 Germany, use the value <https://ps.compliance.protection.outlook.de/PowerShell-LiveID> for this parameter.
106-
- For Security & Compliance Center PowerShell in Microsoft 365 GCC High, use the value <https://ps.compliance.protection.office365.us/powershell-liveid/> for this parameter.
107-
- For Security & Compliance Center PowerShell in Microsoft 365 DoD, use the value <https://l5.ps.compliance.protection.office365.us/powershell-liveid/> for this parameter.
108105
- For Exchange Online Protection PowerShell in standalone EOP organizations without Exchange Online mailboxes, use the value <https://ps.protection.outlook.com/powershell-liveid/> for this parameter.
109106
110107
```yaml

exchange/exchange-ps/exchange/Disable-SafeAttachmentRule.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps || eop-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the Disable-SafeAttachmentRule cmdlet to disable enabled Safe Attachments rules in your cloud-based organization.
18+
Use the Disable-SafeAttachmentRule cmdlet to disable safe attachment rules in your cloud-based organization.
1919

2020
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2121

@@ -28,7 +28,7 @@ Disable-SafeAttachmentRule [-Identity] <RuleIdParameter> [-Confirm] [-WhatIf] [<
2828
```
2929

3030
## DESCRIPTION
31-
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity.
31+
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Office 365 ATP](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-attachments).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

@@ -39,12 +39,12 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3939
Disable-SafeAttachmentRule -Identity "Engineering Department Attachment Rule"
4040
```
4141

42-
This example disables the Safe Attachments rule named Engineering Department Attachment Rule.
42+
This example disables the safe attachment rule named Engineering Department Attachment Rule.
4343

4444
## PARAMETERS
4545

4646
### -Identity
47-
The Identity parameter specifies the enabled Safe Attachments rule that you want to disable.
47+
The Identity parameter specifies the enabled safe attachment rule that you want to disable.
4848

4949
You can use any value that uniquely identifies the rule. For example:
5050

exchange/exchange-ps/exchange/Enable-SafeAttachmentRule.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps || eop-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the Enable-SafeAttachmentRule cmdlet to enable disabled Safe Attachments rules in your cloud-based organization.
18+
Use the Enable-SafeAttachmentRule cmdlet to enable safe attachment rules in your cloud-based organization.
1919

2020
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2121

@@ -28,7 +28,7 @@ Enable-SafeAttachmentRule [-Identity] <RuleIdParameter> [-Confirm] [-WhatIf] [<C
2828
```
2929

3030
## DESCRIPTION
31-
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity.
31+
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Office 365 ATP](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-attachments).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

@@ -39,12 +39,12 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3939
Enable-SafeAttachmentRule -Identity "Marketing Department Attachment Rule"
4040
```
4141

42-
This example enables the disabled Safe Attachments rule named Marketing Department Attachment Rule.
42+
This example enables the disabled safe attachment rule named Marketing Department Attachment Rule.
4343

4444
## PARAMETERS
4545

4646
### -Identity
47-
The Identity parameter specifies the disabled Safe Attachments rule that you want to enable.
47+
The Identity parameter specifies the disabled safe attachment rule that you want to enable.
4848

4949
You can use any value that uniquely identifies the rule. For example:
5050

Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
external help file: Microsoft.Exchange.TransportMailflow-Help.xml
3+
online version: https://docs.microsoft.com/powershell/module/exchange/get-autosensitivitylabelpolicy
4+
applicable: Office 365 Security & Compliance Center
5+
title: Get-AutoSensitivityLabelPolicy
6+
schema: 2.0.0
7+
author: chrisda
8+
ms.author: chrisda
9+
ms.reviewer:
10+
monikerRange: "o365scc-ps"
11+
---
12+
13+
# Get-AutoSensitivityLabelPolicy
14+
15+
## SYNOPSIS
16+
This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell).
17+
18+
Use the Get-AutoSensitivityLabelPolicy cmdlet to view auto-labeling policies in your organization.
19+
20+
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
21+
22+
## SYNTAX
23+
24+
```
25+
Get-AutoSensitivityLabelPolicy [[-Identity] <PolicyIdParameter>]
26+
[-DistributionDetail]
27+
[-IncludeTestModeResults <Boolean>]
28+
[<CommonParameters>]
29+
```
30+
31+
## DESCRIPTION
32+
You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center).
33+
34+
## EXAMPLES
35+
36+
### Example 1
37+
```powershell
38+
Get-AutoSensitivityLabelPolicy -Identity "Employee Numbers" -IncludeTestModeResults $true
39+
```
40+
41+
This example returns detailed information about the autosensitivity label policy named Employee Numbers. The IncludeTestModeResults parameter and value allows you to see the status of test mode.
42+
43+
## PARAMETERS
44+
45+
### -Identity
46+
The Identity parameter specifies the auto-labeling policy that you want to view. You can use any value that uniquely identifies the policy. For example:
47+
48+
- Name
49+
50+
- Distinguished name (DN)
51+
52+
- GUID
53+
54+
```yaml
55+
Type: PolicyIdParameter
56+
Parameter Sets: (All)
57+
Aliases:
58+
Applicable: Office 365 Security & Compliance Center
59+
60+
Required: False
61+
Position: 0
62+
Default value: None
63+
Accept pipeline input: True (ByPropertyName, ByValue)
64+
Accept wildcard characters: False
65+
```
66+
67+
### -DistributionDetail
68+
The DistributionDetail switch returns detailed policy distribution information in the DistributionResults property. You don't need to specify a value with this switch.
69+
70+
```yaml
71+
Type: SwitchParameter
72+
Parameter Sets: (All)
73+
Aliases:
74+
Applicable: Office 365 Security & Compliance Center
75+
76+
Required: False
77+
Position: Named
78+
Default value: None
79+
Accept pipeline input: False
80+
Accept wildcard characters: False
81+
```
82+
83+
### -IncludeTestModeResults
84+
The IncludeTestModeResults parameter specifies whether to include the status of test mode in the policy details. Valid values are:
85+
86+
- $true: Include the status of test mode in the policy details.
87+
88+
- $false: Don't include the status of test mode in the policy details.
89+
90+
```yaml
91+
Type: Boolean
92+
Parameter Sets: (All)
93+
Aliases:
94+
Applicable: Office 365 Security & Compliance Center
95+
96+
Required: False
97+
Position: Named
98+
Default value: None
99+
Accept pipeline input: False
100+
Accept wildcard characters: False
101+
```
102+
103+
### CommonParameters
104+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216).
105+
106+
## INPUTS
107+
108+
###
109+
110+
## OUTPUTS
111+
112+
###
113+
114+
## NOTES
115+
116+
## RELATED LINKS

0 commit comments

Comments
 (0)