You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+8-8Lines changed: 8 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@
4
4
5
5
This repository holds reference content of Office PowerShell cmdlets for help purpose. The expert knowledge around Office PowerShell is distributed among customers, MVPs, partners, product teams, support, and other community members. Consumers have various preferences when consuming knowledge such as a website, PowerShell Get-Help, Windows app, iOS app, Android app, and others. The following diagram illustrates the point.
6
6
7
-

7
+

8
8
9
9
## Learn How To Contribute
10
10
@@ -19,19 +19,19 @@ Contributors who only make infrequent or small updates can edit the file directl
19
19
20
20
This brief video also covers how to contribute:
21
21
22
-
[](https://support.office.com/article/edit-powershell-cmdlet-in-github-dcd20227-3764-48ce-ad6e-763af8b48daf)
22
+
[](https://support.office.com/article/edit-powershell-cmdlet-in-github-dcd20227-3764-48ce-ad6e-763af8b48daf)
23
23
24
24
### Quickly update an article using GitHub.com
25
25
26
26
1. Make sure you're signed in to GitHub.com with your GitHub account.
27
27
2. Go to the page you want to edit on docs.microsoft.com.
28
28
3. On the right-hand side of the page, click **Edit** (pencil icon).
29
29
30
-

30
+

31
31
32
32
4. The corresponding topic file on GitHub opens, where you need to click the **Edit this file** pencil icon.
33
33
34
-

34
+

35
35
36
36
5. The topic opens in a line-numbered editing page where you can make changes to the file.
37
37
@@ -45,7 +45,7 @@ This brief video also covers how to contribute:
45
45
46
46
- Since you are likely not a maintainer of the Git repository, GitHub will automatically 'Fork' the project into your personal GitHub account. A fork is a copy of the repository in your git account. By forking, you can freely make edits without affecting the original repository. You can always find it again by looking at your GitHub Repositories in your GitHub Profile (drop-down from your name in the top right).
47
47
48
-

48
+

49
49
50
50
6. You can click the **Preview changes** tab to see what the changes will look like.
51
51
@@ -56,15 +56,15 @@ This brief video also covers how to contribute:
56
56
57
57
When you're ready, click the green **Propose file change** button.
9. On the **Open a pull request** page that appears, click the green **Create pull request** button.
66
66
67
-

67
+

68
68
69
69
> [!NOTE]
70
70
> Your permissions in the repo determine what you see in the last several steps. People with no special privileges will see the **Propose file change** section and subsequent confirmation pages as described. People with permissions to create and approve their own pull requests will see a similar **Commit changes** section with extra options for creating a new branch and fewer confirmation pages.<br/><br/>The point is: click any green buttons that are presented to you until there are no more.
4. On the **App registrations** page that opens, click **New registration**.
120
120
121
-

121
+

122
122
123
123
On the **Register an application** page that opens, configure the following settings:
124
124
@@ -130,7 +130,7 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
130
130
131
131
Note that you can't create credentials for [native applications](/azure/active-directory/manage-apps/application-proxy-configure-native-client-application), because you can't use that type for automated applications.
132
132
133
-

133
+

134
134
135
135
When you're finished, click **Register**.
136
136
@@ -143,7 +143,7 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
143
143
144
144
1. On the app page under **Management**, select **Manifest**.
145
145
146
-

146
+

147
147
148
148
2. On the **Manifest** page that opens, find the `requiredResourceAccess` entry (on or about line 44).
149
149
@@ -167,21 +167,21 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
167
167
168
168
3. Still on the **Manifest** page, under **Management**, select **API permissions**.
169
169
170
-

170
+

171
171
172
172
On the **API permissions** page that opens, do the following steps:
173
173
174
174
-**API / Permissions name**: Verify the value **Exchange.ManageAsApp** is shown.
175
175
176
176
-**Status**: The current incorrect value is **Not granted for \<Organization\>**, and this value needs to be changed.
177
177
178
-

178
+

179
179
180
180
Select **Grant admin consent for \<Organization\>**, read the confirmation dialog that opens, and then click **Yes**.
181
181
182
182
The **Status** value should now be **Granted for \<Organization\>**.
@@ -220,25 +220,25 @@ After you register the certificate with your application, you can use the privat
220
220
2. Under **Manage Azure Active Directory**, click **View**.
221
221
3. Under **Manage**, select **App registrations**.
222
222
223
-

223
+

224
224
225
225
2. On the application page that opens, under **Manage**, select **Certificates & secrets**.
226
226
227
-

227
+

228
228
229
229
3. On the **Certificates & secrets** page that opens, click **Upload certificate**.
230
230
231
-

231
+

232
232
233
233
In the dialog that opens, browse to the self-signed certificate (`.cer` file) that you created in [Step 3](#step-3-generate-a-self-signed-certificate).
234
234
235
-

235
+

236
236
237
237
When you're finished, click **Add**.
238
238
239
239
The certificate is now shown in the **Certificates** section.
240
240
241
-

241
+

242
242
243
243
4. Close the current **Certificates & secrets** page, and then the **App registrations** page to return to the main <https://portal.azure.com/> page. You'll use it in the next step.
244
244
@@ -258,26 +258,26 @@ For general instructions about assigning roles in Azure AD, see [View and assign
258
258
259
259
1. On the Azure AD portal at <https://portal.azure.com/>, under **Manage Azure Active Directory**, click **View**.
260
260
261
-

261
+

262
262
263
263
2. On the **Overview** page that opens, under **Manage**, select **Roles and administrators**.
264
264
265
-

265
+

266
266
267
267
3. On the **Roles and administrators** page that opens, find and select one of the supported roles by _clicking on the name of the role_ (not the check box) in the results.
268
268
269
-

269
+

270
270
271
271
4. On the **Assignments** page that opens, click **Add assignments**.
272
272
273
-

273
+

274
274
275
275
5. In the **Add assignments** flyout that opens, find and select the app that you created in [Step 1](#step-1-register-the-application-in-azure-ad).
276
276
277
-

277
+

278
278
279
279
When you're finished, click **Add**.
280
280
281
281
6. Back on the **Assignments** page, verify that the app has been assigned to the role.
282
282
283
-

283
+

Copy file name to clipboardExpand all lines: exchange/docs-conceptual/connect-to-exchange-online-powershell.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -104,13 +104,13 @@ For other sign in methods that are available in PowerShell 7, see the [PowerShel
104
104
105
105
3. In the sign-in window that opens, enter your password, and then click **Sign in**.
106
106
107
-

107
+

108
108
109
109
4.**MFA only**: A verification code is generated and delivered based on the response option that's configured for your account (for example, a text message or the Microsoft Authenticator app on your device).
110
110
111
111
In the verification window that opens, enter the verification code, and then click **Verify**.
112
112
113
-

113
+

114
114
115
115
For detailed syntax and parameter information, see [Connect-ExchangeOnline](/powershell/module/exchange/connect-exchangeonline).
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/exchange-online-powershell-v2.md
+15-3Lines changed: 15 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -37,6 +37,9 @@ When you report an issue at `exocmdletpreview[at]service[dot]microsoft[dot]com`,
37
37
Connect-ExchangeOnline -EnableErrorReporting -LogDirectoryPath <Path to store log file> -LogLevel All
38
38
```
39
39
40
+
> [!NOTE]
41
+
> The latest version of EXO V2 module and frequent use of the **Connect-ExchangeOnline** and **Disconnect-ExchangeOnline** cmdlets in a single PowerShell session or script might lead to a memory leak. The best way to avoid this issue is to use the _CommandName_ parameter on the **Connect-ExchangeOnline** cmdlet to limit the cmdlets that are used in the session.
42
+
40
43
## How the EXO V2 module works
41
44
42
45
The module contains a small set of exclusive Exchange Online PowerShell cmdlets that are optimized for bulk data retrieval scenarios (think: thousands and thousands of objects). When you first open the module, you'll only see these exclusive cmdlets. After you [connect to your Exchange Online organization](connect-to-exchange-online-powershell.md), you'll see all of the familiar cmdlets that are available in Exchange Online PowerShell.
@@ -383,7 +386,18 @@ For more information about filtering in the EXO V2 module, see [Filters in the E
383
386
384
387
Unless otherwise noted, the current release of the EXO V2 module contains all features of previous releases.
385
388
386
-
### Current release: Version 2.0.4
389
+
### Current release: Version 2.0.5
390
+
391
+
- New **Get-OwnerlessGroupPolicy** and **Set-OwnerlessGroupPolicy** cmdlet to manage ownerless Microsoft 365 groups.
392
+
393
+
> [!NOTE]
394
+
> Although the _cmdlets_ are available in the module, the _feature_ is only available to members of a Private Preview.
395
+
396
+
- New **Get-VivaInsightsSettings** and **Set-VivaInsightsSettings** cmdlets to control user access to Headspace features in Viva Insights.
397
+
398
+
### Previous releases
399
+
400
+
#### Version 2.0.4
387
401
388
402
- PowerShell 7 is officially supported in Windows, Linux, and Apple macOS as described in the [Prerequisites for the EXO V2 module](#prerequisites-for-the-exo-v2-module) section in this article.
389
403
@@ -397,8 +411,6 @@ Unless otherwise noted, the current release of the EXO V2 module contains all fe
397
411
398
412
- The interactive sign-in process now uses a more secure method to fetch access tokens using safe reply URLs.
399
413
400
-
### Previous releases
401
-
402
414
#### Version 2.0.3
403
415
404
416
- General availability of certificate based authentication (CBA), which enables using modern authentication in unattended scripting or background automation scenarios. The available certificate storage locations are:
|_RawCanonicalName_|_canonicalName_|String (wildcards accepted).|This property is based on a constructed Active Directory attribute, and does not correctly resolve all members when used in `Get-Recipient -RecipientPreviewFilter`.|
|_RecipientContainer_|_msExchDynamicDLBaseDN_|String (wildcards accepted).|The Active Directory container or organizational unit (OU) that holds the recipient object.|
0 commit comments