Skip to content

Commit 9da3a17

Browse files
committed
Merge branch 'main' into TABLDKIM-chrisda
2 parents bb26326 + 16ace38 commit 9da3a17

File tree

1,092 files changed

+11114
-4742
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,092 files changed

+11114
-4742
lines changed

cabgen-bootstrap.yml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
trigger:
2+
- live
3+
4+
pr: none # Disable pull request triggers.
5+
6+
resources:
7+
repositories:
8+
- repository: templates
9+
type: git
10+
name: Content CI/ReferenceAutomation
11+
ref: refs/heads/master
12+
13+
extends:
14+
template: PowerShell/cabgen.yml@templates

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
166166
167167
![Select Manifest on the application properties page.](media/exo-app-only-auth-select-manifest.png)
168168
169-
2. On the **Manifest** page that opens, find the `requiredResourceAccess` entry (on or about line 44).
169+
2. On the **Manifest** page that opens, find the `requiredResourceAccess` entry (on or about line 47).
170170
171171
Modify the `resourceAppId`, `resourceAccess`, `id`, and `type` values as shown in the following code snippet:
172172
@@ -194,6 +194,9 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
194194

195195
- **API / Permissions name**: Verify the value **Exchange.ManageAsApp** is shown.
196196

197+
> [!NOTE]
198+
> If necessary, search for **Office 365 Exchange** under **APIs my organization uses** on the **Request API Permissions** page.
199+
197200
- **Status**: The current incorrect value is **Not granted for \<Organization\>**, and this value needs to be changed.
198201

199202
![Original incorrect API permissions.](media/exo-app-only-auth-original-permissions.png)

exchange/docs-conceptual/basic-auth-connect-to-eop-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ description: "Use remote PowerShell to connect to a standalone Exchange Online P
1717
# Bssic auth - Connect to Exchange Online Protection PowerShell
1818

1919
> [!NOTE]
20-
> The connection instructions in this article [will eventually be deprecated](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-july-update/ba-p/1530163) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online Protection PowerShell. For instructions, see [Connect to Exchange Online Protection PowerShell](connect-to-exchange-online-protection-powershell.md).
20+
> The connection instructions in this article [will be deprecated starting on October 1, 2022](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-deprecation-in-exchange-online-may-2022/ba-p/3301866) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online Protection PowerShell. For instructions, see [Connect to Exchange Online Protection PowerShell](connect-to-exchange-online-protection-powershell.md).
2121
2222
In standalone Exchange Online Protection (EOP) organizations without Exchange Online mailboxes, standalone EOP PowerShell allows you to manage your EOP organization from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to EOP. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the EOP cmdlets into your local Windows PowerShell session so that you can use them.
2323

@@ -61,7 +61,7 @@ The following introductory video shows you how to connect to and use Exchange On
6161

6262
- WinRM needs to allow Basic authentication (it's enabled by default). We don't send the username and password combination, but the Basic authentication header is required to send the session's OAuth token, since the client-side WinRM implementation has no support for OAuth.
6363

64-
**Note**: You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
64+
**Note**: The following commands require that WinRM is enabled. To enable WinRM, run the following command: `winrm quickconfig`.
6565

6666
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt** (not in Windows PowerShell):
6767

exchange/docs-conceptual/basic-auth-connect-to-exo-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ description: "Learn how to use remote PowerShell to connect to Exchange Online w
2020
# Basic auth - Connect to Exchange Online PowerShell
2121

2222
> [!NOTE]
23-
> The connection instructions in this article [will eventually be deprecated](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-july-update/ba-p/1530163) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md).
23+
> The connection instructions in this article [will be deprecated starting on October 1, 2022](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-deprecation-in-exchange-online-may-2022/ba-p/3301866) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md).
2424
2525
Exchange Online PowerShell allows you to manage your Exchange Online settings from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to Exchange Online. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the Exchange Online cmdlets into your local Windows PowerShell session so that you can use them.
2626

@@ -64,7 +64,7 @@ The following introductory video shows you how to connect to and use Exchange On
6464

6565
- WinRM needs to allow Basic authentication (it's enabled by default). We don't send the username and password combination, but the Basic authentication header is required to send the session's OAuth token, since the client-side WinRM implementation has no support for OAuth.
6666

67-
**Note**: You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
67+
**Note**: You The following commands require that WinRM is enabled. To enable WinRM, run the following command: `winrm quickconfig`.
6868

6969
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt** (not in Windows PowerShell):
7070

exchange/docs-conceptual/basic-auth-connect-to-scc-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ description: "Learn how to connect to Security & Compliance PowerShell."
1818
# Basic auth - Connect to Security & Compliance PowerShell
1919

2020
> [!NOTE]
21-
> The connection instructions in this article [will eventually be deprecated](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-july-update/ba-p/1530163) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Security & Compliance PowerShell. For instructions, see [Connect to Security & Compliance PowerShell](connect-to-scc-powershell.md).
21+
> The connection instructions in this article [will be deprecated starting on October 1, 2022](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-deprecation-in-exchange-online-may-2022/ba-p/3301866) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Security & Compliance PowerShell. For instructions, see [Connect to Security & Compliance PowerShell](connect-to-scc-powershell.md).
2222
2323
Security & Compliance PowerShell allows you to manage your Microsoft 365 Defender portal and Microsoft Purview compliance portal settings from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to Security & Compliance PowerShell. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the Security & Compliance PowerShell cmdlets into your local Windows PowerShell session so that you can use them.
2424

@@ -67,7 +67,7 @@ Security & Compliance PowerShell allows you to manage your Microsoft 365 Defende
6767

6868
- WinRM needs to allow Basic authentication (it's enabled by default). We don't send the username and password combination, but the Basic authentication header is required to send the session's OAuth token, since the client-side WinRM implementation has no support for OAuth.
6969

70-
**Note** You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
70+
**Note** The following commands require that WinRM is enabled. To enable WinRM, run the following command: `winrm quickconfig`.
7171

7272
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt** (not in Windows PowerShell):
7373

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To use the older Exchange Online Remote PowerShell Module to connect to Exchange
3333
> [!NOTE]
3434
> The rest of the instructions in the article assume that you've already installed the module.
3535
>
36-
> If you're using version 2.0.6 of the module, you must use the _UseRPSSession_ switch in the **Connect-ExchangeOnline** command for access to all cmdlets. Otherwise, you'll only get the 250 REST API backed cmdlets. For more information, see [Updates for version 2.0.6](exchange-online-powershell-v2.md#updates-for-version-206).
36+
> If you're using version 2.0.6 of the module, if you don't use the _UseRPSSession_ switch in the **Connect-ExchangeOnline** command, you'll have access only to the available REST API cmdlets. For more information, see [Updates for version 2.0.6](exchange-online-powershell-v2.md#updates-for-version-206).
3737
3838
- After you connect, the cmdlets and parameters that you have or don't have access to is controlled by role-based access control (RBAC). For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
3939

@@ -50,16 +50,15 @@ These connection instructions use modern authentication and work with or without
5050

5151
For other sign in methods that are available in PowerShell 7, see the [PowerShell 7 log in experiences](#powershell-7-log-in-experiences) section later in this topic.
5252

53-
1. In a PowerShell window, load the EXO V2 module by running the following command:
53+
1. In a PowerShell window, load the EXO V2 module by running the following command<sup>\*</sup>:
5454

5555
```powershell
5656
Import-Module ExchangeOnlineManagement
5757
```
5858

5959
**Notes**:
6060

61-
- If you've already [installed the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module), the previous command will work as written.
62-
- You might be able to skip this step and run **Connect-ExchangeOnline** without loading the module first.
61+
<sup>\*</sup> You might be able to skip this step and run **Connect-ExchangeOnline** without loading the module first.
6362

6463
2. The command that you need to run uses the following syntax:
6564

exchange/docs-conceptual/connect-to-scc-powershell.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,9 @@ To use the older Exchange Online Remote PowerShell Module to connect to Security
3030

3131
- The requirements for installing and using the EXO V2 module are described in [Install and maintain the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module). The rest of the instructions in the article assume that you've already installed the module.
3232

33+
> [!NOTE]
34+
> Security & Compliance PowerShell still requires Basic authentication in WinRM as described [Prerequisites for the EXO V2 module](exchange-online-powershell-v2.md#prerequisites-for-the-exo-v2-module). REST API cmdlets that allow you to turn off Basic authentication in WinRM are not yet available for the **Connect-IPPSSession** cmdlet. For more information, see [Updates for version 2.0.6](exchange-online-powershell-v2.md#updates-for-version-206).
35+
3336
- After you connect, the cmdlets and parameters that you have or don't have access to is controlled by role-based access control (RBAC). For more information, see [Permissions in the Microsoft 365 Defender portal](/microsoft-365/security/office-365-security/permissions-microsoft-365-security-center) and [Permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions).
3437

3538
## Connect to Exchange Online PowerShell using modern authentication with or without MFA

0 commit comments

Comments
 (0)