Skip to content

Commit 74c4a9b

Browse files
authored
Merge branch 'master' into patch-2
2 parents 20f7c52 + 3fa7b05 commit 74c4a9b

File tree

1,299 files changed

+12070
-22065
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,299 files changed

+12070
-22065
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -149,13 +149,13 @@ Create a self-signed x.509 certificate using one of the following methods:
149149

150150
```powershell
151151
# Create certificate
152-
New-SelfSignedCertificate -DnsName "example.com" -CertStoreLocation "cert:\LocalMachine\My" -NotAfter (Get-Date).AddYears(1)
152+
$mycert = New-SelfSignedCertificate -DnsName "example.com" -CertStoreLocation "cert:\LocalMachine\My" -NotAfter (Get-Date).AddYears(1)
153153
154154
# Export certificate to .pfx file
155-
Get-ChildItem -Path Cert:\localMachine\my\1DC696D8BE9E656D1F9ED576931B44EC650CF0F8 | Export-PfxCertificate -FilePath mycert.pfx -Password $(ConvertTo-SecureString -String "1234" -Force -AsPlainText)
155+
$mycert | Export-PfxCertificate -FilePath mycert.pfx -Password $(ConvertTo-SecureString -String "1234" -Force -AsPlainText)
156156
157157
# Export certificate to .cer file
158-
Get-ChildItem -Path Cert:\localMachine\my\1DC696D8BE9E656D1F9ED576931B44EC650CF0F8 | Export-Certificate -FilePath mycert.cer
158+
$mycert | Export-Certificate -FilePath mycert.cer
159159
```
160160

161161
- Use the [Create-SelfSignedCertificate script](https://github.com/SharePoint/PnP-Partner-Pack/blob/master/scripts/Create-SelfSignedCertificate.ps1). Note that this script generates SHA1 certificates.

exchange/docs-conceptual/basic-auth-connect-to-eop-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ If you receive errors, check the following requirements:
124124

125125
- A common problem is an incorrect password. Run the three steps again and pay close attention to the user name and password you enter in Step 1.
126126

127-
- To help prevent denial-of-service (DoS) attacks, you're limited to three open remote PowerShell connections to your Exchange Online Protection organization.
127+
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to Exchange Online Protection.
128128

129129
- TCP port 80 traffic needs to be open between your local computer and Microsoft 365. It's probably open, but it's something to consider if your organization has a restrictive Internet access policy.
130130

exchange/docs-conceptual/basic-auth-connect-to-exo-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,7 +134,7 @@ If you receive errors, check the following requirements:
134134

135135
- A common problem is an incorrect password. Run the three steps again and pay close attention to the user name and password you enter in Step 1.
136136

137-
- To help prevent denial-of-service (DoS) attacks, you're limited to three open remote PowerShell connections to your Exchange Online organization.
137+
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to Exchange Online.
138138

139139
- The account you use to connect to Exchange Online must be enabled for remote PowerShell. For more information, see [Enable or disable access to Exchange Online PowerShell](disable-access-to-exchange-online-powershell.md).
140140

exchange/docs-conceptual/basic-auth-connect-to-scc-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ If you receive errors, check the following requirements:
133133

134134
- Verify that your account has permission to access the Security & Compliance Center. For details, see [Give users access to the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/grant-access-to-the-security-and-compliance-center).
135135

136-
- To help prevent denial-of-service (DoS) attacks, you're limited to three open remote PowerShell connections to the Security & Compliance Center.
136+
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to the Security & Compliance Center.
137137

138138
- TCP port 80 traffic needs to be open between your local computer and Microsoft 365. It's probably open, but it's something to consider if your organization has a restrictive Internet access policy.
139139

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ If you receive errors, check the following requirements:
173173

174174
- A common problem is an incorrect password. Run the three steps again and pay close attention to the user name and password you enter in Step 1.
175175

176-
- To help prevent denial-of-service (DoS) attacks, you're limited to three open remote PowerShell connections to your Exchange Online organization.
176+
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to Exchange Online.
177177

178178
- The account you use to connect to must be enabled for remote PowerShell. For more information, see [Enable or disable access to Exchange Online PowerShell](disable-access-to-exchange-online-powershell.md).
179179

exchange/docs-conceptual/connect-to-exchange-online-protection-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ If you receive errors, check the following requirements:
135135

136136
- A common problem is an incorrect password. Run the three steps again and pay close attention to the user name and password you enter in Step 1.
137137

138-
- To help prevent denial-of-service (DoS) attacks, you're limited to three open remote PowerShell connections to your Exchange Online Protection organization.
138+
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to Exchange Online Protection.
139139

140140
- TCP port 80 traffic needs to be open between your local computer and Microsoft 365. It's probably open, but it's something to consider if your organization has a restrictive Internet access policy.
141141

exchange/docs-conceptual/connect-to-scc-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ If you receive errors, check the following requirements:
155155

156156
- A common problem is an incorrect password. Run the three steps again and pay close attention to the user name and password you enter in Step 1.
157157

158-
- To help prevent denial-of-service (DoS) attacks, you're limited to three open remote PowerShell connections to your Exchange Online organization.
158+
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to the Security & Compliance Center.
159159

160160
- The account you use to connect must be enabled for remote PowerShell. For more information, see [Enable or disable access to Exchange Online PowerShell](disable-access-to-exchange-online-powershell.md).
161161

exchange/docs-conceptual/v1-module-mfa-connect-to-exo-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ After Step 4, the Exchange Online cmdlets are imported into your Exchange Online
158158

159159
If you receive errors, check the following requirements:
160160

161-
- To help prevent denial-of-service (DoS) attacks, you're limited to three open remote PowerShell connections to your Exchange Online organization.
161+
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to Exchange Online.
162162

163163
- The account you use to connect to Exchange Online must be enabled for remote PowerShell. For more information, see [Enable or disable access to Exchange Online PowerShell](disable-access-to-exchange-online-powershell.md).
164164

exchange/docs-conceptual/v1-module-mfa-connect-to-scc-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ After you sign in, the Security & Compliance Center cmdlets are imported into yo
151151

152152
If you receive errors, check the following requirements:
153153

154-
- To help prevent denial-of-service (DoS) attacks, you're limited to three open remote PowerShell connections to the Security & Compliance Center.
154+
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to the Security & Compliance Center.
155155

156156
- The account you use to connect to the Security & Compliance Center must be enabled for remote PowerShell. For more information, see [Enable or disable access to Exchange Online PowerShell](disable-access-to-exchange-online-powershell.md).
157157

exchange/exchange-ps/exchange/Add-ADPermission.md

Lines changed: 9 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -32,32 +32,34 @@ Add-ADPermission [-Identity] <ADRawEntryIdParameter> -User <SecurityPrincipalIdP
3232
[-InheritanceType <ActiveDirectorySecurityInheritance>]
3333
[-InheritedObjectType <ADSchemaObjectIdParameter>]
3434
[-Properties <ADSchemaObjectIdParameter[]>]
35-
[-WhatIf] [<CommonParameters>]
35+
[-WhatIf]
36+
[<CommonParameters>]
3637
```
3738

3839
### Owner
3940
```
4041
Add-ADPermission [-Identity] <ADRawEntryIdParameter> -Owner <SecurityPrincipalIdParameter>
4142
[-Confirm]
4243
[-DomainController <Fqdn>]
43-
[-WhatIf] [<CommonParameters>]
44+
[-WhatIf]
45+
[<CommonParameters>]
4446
```
4547

4648
### Instance
4749
```
48-
Add-ADPermission -Instance <ADAcePresentationObject>
50+
Add-ADPermission [[-Identity] <ADRawEntryIdParameter>] -Instance <ADAcePresentationObject>
4951
[-AccessRights <ActiveDirectoryRights[]>]
5052
[-ChildObjectTypes <ADSchemaObjectIdParameter[]>]
5153
[-Confirm]
5254
[-Deny]
5355
[-DomainController <Fqdn>]
5456
[-ExtendedRights <ExtendedRightIdParameter[]>]
55-
[[-Identity] <ADRawEntryIdParameter>]
5657
[-InheritanceType <ActiveDirectorySecurityInheritance>]
5758
[-InheritedObjectType <ADSchemaObjectIdParameter>]
5859
[-Properties <ADSchemaObjectIdParameter[]>]
5960
[-User <SecurityPrincipalIdParameter>]
60-
[-WhatIf] [<CommonParameters>]
61+
[-WhatIf]
62+
[<CommonParameters>]
6163
```
6264

6365
## DESCRIPTION
@@ -181,41 +183,23 @@ Accept wildcard characters: False
181183
The AccessRights parameter specifies the rights needed to perform the operation. Valid values include:
182184
183185
- AccessSystemSecurity
184-
185186
- CreateChild
186-
187187
- DeleteChild
188-
189188
- ListChildren
190-
191189
- Self
192-
193190
- ReadProperty
194-
195191
- WriteProperty
196-
197192
- DeleteTree
198-
199193
- ListObject
200-
201194
- ExtendedRight
202-
203195
- Delete
204-
205196
- ReadControl
206-
207197
- GenericExecute
208-
209198
- GenericWrite
210-
211199
- GenericRead
212-
213200
- WriteDacl
214-
215201
- WriteOwner
216-
217202
- GenericAll
218-
219203
- Synchronize
220204
221205
```yaml
@@ -252,9 +236,8 @@ Accept wildcard characters: False
252236
### -Confirm
253237
The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding.
254238
255-
- Destructive cmdlets (for example, Remove-* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false.
256-
257-
- Most other cmdlets (for example, New-* and Set-* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding.
239+
- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: `-Confirm:$false`.
240+
- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding.
258241

259242
```yaml
260243
Type: SwitchParameter

exchange/exchange-ps/exchange/Add-AttachmentFilterEntry.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,8 @@ For information about the parameter sets in the Syntax section below, see [Excha
2424
Add-AttachmentFilterEntry -Name <String> -Type <AttachmentType>
2525
[-Confirm]
2626
[-DomainController <Fqdn>]
27-
[-WhatIf] [<CommonParameters>]
27+
[-WhatIf]
28+
[<CommonParameters>]
2829
```
2930

3031
## DESCRIPTION
@@ -54,7 +55,6 @@ This example adds an attachment filter entry based on the MIME content type imag
5455
The Name parameter specifies the files that you want to block. Valid values are:
5556

5657
- A exact file name (for example, BadFile.exe) or file name extension (for example, \*.exe). You need to use the value Filename for the Type parameter.
57-
5858
- A valid MIME content type (for example, application/javascript or text/scriplet). You need to use the value ContentType for the Type parameter.
5959

6060
```yaml
@@ -74,7 +74,6 @@ Accept wildcard characters: False
7474
The Type parameter specifies what type of attachment the attachment filter entry blocks. Valid values are:
7575
7676
- ContentType: This value matches the attachment filter entry against the MIME content type that's specified in the Name parameter.
77-
7877
- FileName: This value matches the attachment filter entry against the simple file name that's specified in the Name parameter.
7978
8079
```yaml
@@ -93,8 +92,7 @@ Accept wildcard characters: False
9392
### -Confirm
9493
The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding.
9594
96-
- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false.
97-
95+
- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: `-Confirm:$false`.
9896
- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding.
9997

10098
```yaml

exchange/exchange-ps/exchange/Add-AvailabilityAddressSpace.md

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,15 @@ For information about the parameter sets in the Syntax section below, see [Excha
2323
## SYNTAX
2424

2525
```
26-
Add-AvailabilityAddressSpace -AccessMethod <AvailabilityAccessMethod>
27-
-ForestName <String> [-Confirm] [-Credentials <PSCredential>] [-DomainController <Fqdn>] [-ProxyUrl <Uri>]
28-
[-UseServiceAccount <Boolean>] [-WhatIf] [-TargetAutodiscoverEpr <Uri>] [<CommonParameters>]
26+
Add-AvailabilityAddressSpace -AccessMethod <AvailabilityAccessMethod> -ForestName <String>
27+
[-Confirm]
28+
[-Credentials <PSCredential>]
29+
[-DomainController <Fqdn>]
30+
[-ProxyUrl <Uri>]
31+
[-TargetAutodiscoverEpr <Uri>]
32+
[-UseServiceAccount <Boolean>]
33+
[-WhatIf]
34+
[<CommonParameters>]
2935
```
3036

3137
## DESCRIPTION
@@ -62,13 +68,9 @@ This example is useful with a trusted cross-forest Availability service. The con
6268
The AccessMethod parameter specifies how the free/busy data is accessed. Valid values are:
6369

6470
- PerUserFB: Per-user free/busy information can be requested. The free/busy data is accessed in the defined per-user free/busy proxy account or group, or in the All Exchange Servers group. This value requires a trust between the two forests, and requires you to use either the UseServiceAccount parameter or Credentials parameter.
65-
6671
- OrgWideFB: Only default free/busy for each user can be requested. The free/busy data is accessed in the per-user free/busy proxy account or group in the target forest. This value requires you to use either the UseServiceAccount parameter or Credentials parameter.
67-
6872
- OrgWideFBBasic: This value is reserved for internal Microsoft use.
69-
7073
- InternalProxy: The request is proxied to an Exchange in the site that has a later version of Exchange.
71-
7274
- PublicFolder: This value was used to access free/busy data on Exchange Server 2003 servers.
7375

7476
```yaml
@@ -103,8 +105,7 @@ Accept wildcard characters: False
103105
### -Confirm
104106
The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding.
105107
106-
- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false.
107-
108+
- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: `-Confirm:$false`.
108109
- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding.
109110

110111
```yaml
@@ -176,13 +177,28 @@ Accept pipeline input: False
176177
Accept wildcard characters: False
177178
```
178179

180+
### -TargetAutodiscoverEpr
181+
The TargetAutodiscoverEpr parameter specifies the Autodiscover URL of Exchange Web Services for the external organization, for example, `https://contoso.com/autodiscover/autodiscover.xml`. Exchange uses Autodiscover to automatically detect the correct server endpoint for external requests.
182+
183+
```yaml
184+
Type: Uri
185+
Parameter Sets: (All)
186+
Aliases:
187+
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
188+
189+
Required: False
190+
Position: Named
191+
Default value: None
192+
Accept pipeline input: False
193+
Accept wildcard characters: False
194+
```
195+
179196
### -UseServiceAccount
180197
This parameter is available only in on-premises Exchange.
181198

182199
The UseServiceAccount parameter specifies whether to use the local Availability service account for authorization. Valid values
183200

184201
- $true: The local Availability service account is used for authorization.
185-
186202
- $false: The local Availability service account isn't used for authorization. You need to use the Credentials parameter.
187203

188204
```yaml
@@ -214,22 +230,6 @@ Accept pipeline input: False
214230
Accept wildcard characters: False
215231
```
216232

217-
### -TargetAutodiscoverEpr
218-
The TargetAutodiscoverEpr parameter specifies the Autodiscover URL of Exchange Web Services for the external organization, for example, `https://contoso.com/autodiscover/autodiscover.xml`. Exchange uses Autodiscover to automatically detect the correct server endpoint for external requests.
219-
220-
```yaml
221-
Type: Uri
222-
Parameter Sets: (All)
223-
Aliases:
224-
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
225-
226-
Required: False
227-
Position: Named
228-
Default value: None
229-
Accept pipeline input: False
230-
Accept wildcard characters: False
231-
```
232-
233233
### CommonParameters
234234
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216).
235235

exchange/exchange-ps/exchange/Add-ComplianceCaseMember.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,10 @@ For information about the parameter sets in the Syntax section below, see [Excha
2121
## SYNTAX
2222

2323
```
24-
Add-ComplianceCaseMember [-Case] <String> -Member <String> [-Confirm] [-WhatIf] [<CommonParameters>]
24+
Add-ComplianceCaseMember [-Case] <String> -Member <String>
25+
[-Confirm]
26+
[-WhatIf]
27+
[<CommonParameters>]
2528
```
2629

2730
## DESCRIPTION
@@ -30,9 +33,7 @@ You use eDiscovery cases to control who can create, access, and manage complianc
3033
To add a member of an eDiscovery case, the user needs to be a member of the Reviewer or eDiscovery Manager role groups. When a member of the eDiscovery Manager role group is a member of an eDiscovery case, the user can:
3134

3235
- Add and remove case members.
33-
3436
- Create and edit compliance searches associated with a case.
35-
3637
- Perform compliance actions (for example, export) on the results of a compliance search.
3738

3839
You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center).
@@ -70,11 +71,8 @@ Accept wildcard characters: False
7071
The Member parameter specifies the user that you want to add to the eDiscovery case. You can use any value that uniquely identifies the user. For example:
7172
7273
- Name
73-
7474
- Distinguished name (DN)
75-
7675
- Canonical DN
77-
7876
- GUID
7977
8078
```yaml
@@ -93,8 +91,7 @@ Accept wildcard characters: False
9391
### -Confirm
9492
The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding.
9593
96-
- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false.
97-
94+
- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: `-Confirm:$false`.
9895
- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding.
9996

10097
```yaml

0 commit comments

Comments
 (0)