Skip to content

Commit 7ca3947

Browse files
committed
Merge branch 'main' into CloudAttach-chrisda
2 parents 4a8ee5c + cd78dfb commit 7ca3947

File tree

1,358 files changed

+15219
-8863
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,358 files changed

+15219
-8863
lines changed

cabgen-bootstrap.yml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
trigger:
2+
- live
3+
4+
pr: none # Disable pull request triggers.
5+
6+
resources:
7+
repositories:
8+
- repository: templates
9+
type: git
10+
name: Content CI/ReferenceAutomation
11+
ref: refs/heads/master
12+
13+
extends:
14+
template: PowerShell/cabgen.yml@templates

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 17 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,13 @@ description: "Learn about using the Exchange Online V2 module in scripts and oth
2323
> The features and procedures described in this article require the following versions of the EXO V2 module:
2424
>
2525
> - **Exchange Online PowerShell (Connect-ExchangeOnline)**: Version 2.0.3 or later.
26-
> - **Security & Compliance Center PowerShell (Connect-IPPSSession)**: Version 2.0.6 Preview5 or later.
26+
> - **Security & Compliance PowerShell (Connect-IPPSSession)**: Version 2.0.6 Preview5 or later.
2727
>
2828
> For instructions on how to install or update the module, see [Install and maintain the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module).
2929
>
3030
> You can't use the procedures in this article to modify Microsoft 365 Groups ([Set-UnifiedGroup](/powershell/module/exchange/set-unifiedgroup)). To use Microsoft Graph instead, see [Update group](/graph/api/group-update).
3131
32-
Auditing and reporting scenarios in Microsoft 365 often involve unattended scripts in Exchange Online PowerShell and Security & Compliance Center PowerShell. In the past, unattended sign in required you to store the username and password in a local file or in a secret vault that's accessed at run-time. But, as we all know, storing user credentials locally is not a good security practice.
32+
Auditing and reporting scenarios in Microsoft 365 often involve unattended scripts in Exchange Online PowerShell and Security & Compliance PowerShell. In the past, unattended sign in required you to store the username and password in a local file or in a secret vault that's accessed at run-time. But, as we all know, storing user credentials locally is not a good security practice.
3333

3434
Certificate based authentication (CBA) or app-only authentication as described in this article supports unattended script and automation scenarios by using Azure AD apps and self-signed certificates.
3535

@@ -46,7 +46,7 @@ The following examples show how to use the Exchange Online PowerShell V2 module
4646
Connect-ExchangeOnline -CertificateFilePath "C:\Users\johndoe\Desktop\automation-cert.pfx" -CertificatePassword (ConvertTo-SecureString -String "<MyPassword>" -AsPlainText -Force) -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
4747
```
4848
49-
- **Security & Compliance Center PowerShell**:
49+
- **Security & Compliance PowerShell**:
5050
5151
```powershell
5252
Connect-IPPSSession -CertificateFilePath "C:\Users\johndoe\Desktop\automation-cert.pfx" -CertificatePassword (ConvertTo-SecureString -String "<MyPassword>" -AsPlainText -Force) -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
@@ -60,7 +60,7 @@ The following examples show how to use the Exchange Online PowerShell V2 module
6060
Connect-ExchangeOnline -CertificateThumbPrint "012THISISADEMOTHUMBPRINT" -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
6161
```
6262
63-
- **Security & Compliance Center PowerShell**:
63+
- **Security & Compliance PowerShell**:
6464
6565
```powershell
6666
Connect-IPPSSession -CertificateThumbPrint "012THISISADEMOTHUMBPRINT" -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
@@ -76,7 +76,7 @@ The following examples show how to use the Exchange Online PowerShell V2 module
7676
Connect-ExchangeOnline -Certificate <%X509Certificate2 Object%> -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
7777
```
7878
79-
- **Security & Compliance Center PowerShell**:
79+
- **Security & Compliance PowerShell**:
8080
8181
```powershell
8282
Connect-IPPSSession -Certificate <%X509Certificate2 Object%> -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
@@ -166,7 +166,7 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
166166
167167
![Select Manifest on the application properties page.](media/exo-app-only-auth-select-manifest.png)
168168
169-
2. On the **Manifest** page that opens, find the `requiredResourceAccess` entry (on or about line 44).
169+
2. On the **Manifest** page that opens, find the `requiredResourceAccess` entry (on or about line 47).
170170
171171
Modify the `resourceAppId`, `resourceAccess`, `id`, and `type` values as shown in the following code snippet:
172172
@@ -194,6 +194,9 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
194194

195195
- **API / Permissions name**: Verify the value **Exchange.ManageAsApp** is shown.
196196

197+
> [!NOTE]
198+
> If necessary, search for **Office 365 Exchange** under **APIs my organization uses** on the **Request API Permissions** page.
199+
197200
- **Status**: The current incorrect value is **Not granted for \<Organization\>**, and this value needs to be changed.
198201

199202
![Original incorrect API permissions.](media/exo-app-only-auth-original-permissions.png)
@@ -267,7 +270,7 @@ After you register the certificate with your application, you can use the privat
267270

268271
Azure AD has more than 50 admin roles available. The supported roles are described in the following table:
269272

270-
|Role|Exchange Online PowerShell|Security & Compliance Center PowerShell|
273+
|Role|Exchange Online PowerShell|Security & Compliance PowerShell|
271274
|---|:---:|:---:|
272275
|Compliance Administrator|![Check mark.](media/checkmark.png)|![Check mark.](media/checkmark.png)|
273276
|Exchange Administrator<sup>\*</sup>|![Check mark.](media/checkmark.png)||
@@ -287,7 +290,7 @@ The Security Administrator role does not have the necessary permissions for thos
287290
For general instructions about assigning roles in Azure AD, see [View and assign administrator roles in Azure Active Directory](/azure/active-directory/roles/manage-roles-portal).
288291

289292
> [!NOTE]
290-
> The following steps are slightly different for Exchange Online PowerShell vs. Security & Compliance Center PowerShell. The steps for both environments are shown. To configure roles for both environments, repeat the steps in this section.
293+
> The following steps are slightly different for Exchange Online PowerShell vs. Security & Compliance PowerShell. The steps for both environments are shown. To configure roles for both environments, repeat the steps in this section.
291294
292295
1. On the Azure AD portal at <https://portal.azure.com/>, under **Manage Azure Active Directory**, click **View**.
293296

@@ -303,19 +306,19 @@ For general instructions about assigning roles in Azure AD, see [View and assign
303306

304307
![Find and select a supported Exchange Online PowerShell role by clicking on the role name.](media/exo-app-only-auth-find-and-select-supported-role.png)
305308

306-
- **Security & Compliance Center PowerShell**:
309+
- **Security & Compliance PowerShell**:
307310

308-
![Find and select a supported Security & Compliance Center PowerShell role by clicking on the role name.](media/exo-app-only-auth-find-and-select-supported-role-scc.png)
311+
![Find and select a supported Security & Compliance PowerShell role by clicking on the role name.](media/exo-app-only-auth-find-and-select-supported-role-scc.png)
309312

310313
4. On the **Assignments** page that opens, click **Add assignments**.
311314

312315
- **Exchange Online PowerShell**:
313316

314317
![Select Add assignments on the role assignments page for Exchange Online PowerShell.](media/exo-app-only-auth-role-assignments-click-add-assignments.png)
315318

316-
- **Security & Compliance Center PowerShell**:
319+
- **Security & Compliance PowerShell**:
317320

318-
![Select Add assignments on the role assignments page for Security & Compliance Center PowerShell.](media/exo-app-only-auth-role-assignments-click-add-assignments-scc.png)
321+
![Select Add assignments on the role assignments page for Security & Compliance PowerShell.](media/exo-app-only-auth-role-assignments-click-add-assignments-scc.png)
319322

320323
5. In the **Add assignments** flyout that opens, find and select the app that you created in [Step 1](#step-1-register-the-application-in-azure-ad).
321324

@@ -329,6 +332,6 @@ For general instructions about assigning roles in Azure AD, see [View and assign
329332

330333
![The role assignments page after to added the app to the role for Exchange Online PowerShell.](media/exo-app-only-auth-app-assigned-to-role.png)
331334

332-
- **Security & Compliance Center PowerShell**:
335+
- **Security & Compliance PowerShell**:
333336

334-
![The role assignments page after to added the app to the role for Security & Compliance Center PowerShell.](media/exo-app-only-auth-app-assigned-to-role-scc.png)
337+
![The role assignments page after to added the app to the role for Security & Compliance PowerShell.](media/exo-app-only-auth-app-assigned-to-role-scc.png)

exchange/docs-conceptual/basic-auth-connect-to-eop-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ description: "Use remote PowerShell to connect to a standalone Exchange Online P
1717
# Bssic auth - Connect to Exchange Online Protection PowerShell
1818

1919
> [!NOTE]
20-
> The connection instructions in this article [will eventually be deprecated](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-july-update/ba-p/1530163) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online Protection PowerShell. For instructions, see [Connect to Exchange Online Protection PowerShell](connect-to-exchange-online-protection-powershell.md).
20+
> The connection instructions in this article [will be deprecated starting on October 1, 2022](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-deprecation-in-exchange-online-may-2022/ba-p/3301866) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online Protection PowerShell. For instructions, see [Connect to Exchange Online Protection PowerShell](connect-to-exchange-online-protection-powershell.md).
2121
2222
In standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, standalone EOP PowerShell allows you to manage your EOP organization from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to EOP. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the EOP cmdlets into your local Windows PowerShell session so that you can use them.
2323

@@ -61,7 +61,7 @@ The following introductory video shows you how to connect to and use Exchange On
6161

6262
- WinRM needs to allow Basic authentication (it's enabled by default). We don't send the username and password combination, but the Basic authentication header is required to send the session's OAuth token, since the client-side WinRM implementation has no support for OAuth.
6363

64-
**Note**: You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
64+
**Note**: The following commands require that WinRM is enabled. To enable WinRM, run the following command: `winrm quickconfig`.
6565

6666
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt** (not in Windows PowerShell):
6767

exchange/docs-conceptual/basic-auth-connect-to-exo-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ description: "Learn how to use remote PowerShell to connect to Exchange Online w
2020
# Basic auth - Connect to Exchange Online PowerShell
2121

2222
> [!NOTE]
23-
> The connection instructions in this article [will eventually be deprecated](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-july-update/ba-p/1530163) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md).
23+
> The connection instructions in this article [will be deprecated starting on October 1, 2022](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-deprecation-in-exchange-online-may-2022/ba-p/3301866) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md).
2424
2525
Exchange Online PowerShell allows you to manage your Exchange Online settings from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to Exchange Online. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the Exchange Online cmdlets into your local Windows PowerShell session so that you can use them.
2626

@@ -64,7 +64,7 @@ The following introductory video shows you how to connect to and use Exchange On
6464

6565
- WinRM needs to allow Basic authentication (it's enabled by default). We don't send the username and password combination, but the Basic authentication header is required to send the session's OAuth token, since the client-side WinRM implementation has no support for OAuth.
6666

67-
**Note**: You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
67+
**Note**: You The following commands require that WinRM is enabled. To enable WinRM, run the following command: `winrm quickconfig`.
6868

6969
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt** (not in Windows PowerShell):
7070

0 commit comments

Comments
 (0)