Skip to content

Commit b7e6ceb

Browse files
authored
Merge pull request MicrosoftDocs#11395 from alexbuckgit/alexbuckgit/docutune-autopr-20231019-211106-1448653-ignore-build
[BULK] - DocuTune - Rebranding of Azure Active Directory to Microsoft Entra terminology (part 3)
2 parents fea3e40 + de6a9db commit b7e6ceb

30 files changed

+50
-50
lines changed

exchange/exchange-ps/exchange/Set-DefaultTenantMyAnalyticsFeatureConfig.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro
3939
- Exchange Administrator
4040
- Insights Administrator
4141

42-
For more information, see [Azure AD built-in roles](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference).
42+
For more information, see [Microsoft Entra built-in roles](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference).
4343

4444
## EXAMPLES
4545

exchange/exchange-ps/exchange/Set-DistributionGroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -254,7 +254,7 @@ The Alias parameter specifies the Exchange alias (also known as the mail nicknam
254254
The Alias value can contain letters, numbers and the following characters:
255255

256256
- !, #, %, \*, +, -, /, =, ?, ^, \_, and ~.
257-
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Azure AD Connect synchronization.
257+
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Microsoft Entra Connect synchronization.
258258
- Periods (.) must be surrounded by other valid characters (for example, `help.desk`).
259259
- Unicode characters U+00A1 to U+00FF.
260260

exchange/exchange-ps/exchange/Set-DlpCompliancePolicy.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ Accept wildcard characters: False
150150
```
151151
152152
### -AddEndpointDlpLocation
153-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
153+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
154154
155155
The AddEndpointDLPLocation parameter specifies the user accounts to add to the list of included accounts for Endpoint DLP if you used the value All for the EndpointDLPLocation parameter. You identify the account by name or email address.
156156
@@ -172,7 +172,7 @@ Accept wildcard characters: False
172172
```
173173

174174
### -AddEndpointDlpLocationException
175-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
175+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
176176

177177
The AddEndpointDlpLocationException parameter specifies the user accounts to add to the list of excluded accounts for Endpoint DLP if you used the value All for the EndpointDLPLocation parameter. You identify the account by name or email address.
178178

@@ -430,7 +430,7 @@ Accept wildcard characters: False
430430
```
431431

432432
### -AddThirdPartyAppDlpLocation
433-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
433+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
434434

435435
The AddThirdPartyAppDlpLocation parameter specifies the non-Microsoft cloud apps to add to the list of included apps if you used the value All for the ThirdPartyAppDlpLocation parameter.
436436

@@ -452,7 +452,7 @@ Accept wildcard characters: False
452452
```
453453

454454
### -AddThirdPartyAppDlpLocationException
455-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
455+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
456456

457457
The AddThirdPartyAppDlpLocationException parameter specifies the non-Microsoft cloud apps to add to the list of excluded apps if you used the value All for the ThirdPartyAppDlpLocation parameter.
458458

@@ -706,9 +706,9 @@ Accept wildcard characters: False
706706
```
707707

708708
### -PolicyRBACScopes
709-
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Azure Active Directory ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
709+
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Microsoft Entra ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
710710

711-
Administrative units are available only in Azure Active Directory Premium. You create and manage administrative units in Microsoft Graph PowerShell.
711+
Administrative units are available only in Microsoft Entra ID P1 or P2. You create and manage administrative units in Microsoft Graph PowerShell.
712712

713713
```yaml
714714
Type: MultiValuedProperty
@@ -766,7 +766,7 @@ Accept wildcard characters: False
766766
```
767767

768768
### -RemoveEndpointDlpLocation
769-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
769+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
770770

771771
The RemoveEndpointDlpLocation parameter specifies the user accounts to remove from the list of included accounts for Endpoint DLP if you used the value All for the EndpointDLPLocation parameter. You specify the account by name or email address.
772772

@@ -788,7 +788,7 @@ Accept wildcard characters: False
788788
```
789789

790790
### -RemoveEndpointDlpLocationException
791-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
791+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
792792

793793
The RemoveEndpointDlpLocation parameter specifies the user accounts to remove from the list of excluded accounts for Endpoint DLP if you used the value All for the EndpointDLPLocation parameter. You specify the account by name or email address.
794794

@@ -1024,7 +1024,7 @@ Accept wildcard characters: False
10241024
```
10251025

10261026
### -RemoveThirdPartyAppDlpLocation
1027-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
1027+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
10281028

10291029
The RemoveThirdPartyAppDlpLocation parameter specifies the non-Microsoft cloud apps to remove from the list of included apps if you used the value All for the ThirdPartyAppDlpLocation parameter.
10301030

@@ -1046,7 +1046,7 @@ Accept wildcard characters: False
10461046
```
10471047

10481048
### -RemoveThirdPartyAppDlpLocationException
1049-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
1049+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
10501050

10511051
The RemoveThirdPartyAppDlpLocationException parameter specifies the non-Microsoft cloud apps tp remove from the list of excluded apps if you used the value All for the ThirdPartyAppDlpLocation parameter.
10521052

exchange/exchange-ps/exchange/Set-DlpComplianceRule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -869,7 +869,7 @@ Accept wildcard characters: False
869869
```
870870

871871
### -EndpointDlpRestrictions
872-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
872+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
873873

874874
The EndpointDlpRestrictions parameter specifies the restricted endpoints for Endpoint DLP. This parameter uses the following syntax: `@(@{"Setting"="<Setting>"; "Value"="<Value>}",@{"Setting"="<Setting>"; "Value"="<Value>"},...)`.
875875

@@ -2361,7 +2361,7 @@ Accept wildcard characters: False
23612361
```
23622362

23632363
### -NotifyEndpointUser
2364-
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Azure Active Directory.
2364+
**Note**: This parameter requires membership in the Compliance Administrator or Compliance Data Administrator roles in Microsoft Entra ID.
23652365

23662366
{{ Fill NotifyEndpointUser Description }}
23672367

exchange/exchange-ps/exchange/Set-DynamicDistributionGroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ The Alias parameter specifies the Exchange alias (also known as the mail nicknam
279279
The Alias value can contain letters, numbers and the following characters:
280280

281281
- !, #, %, \*, +, -, /, =, ?, ^, \_, and ~.
282-
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Azure AD Connect synchronization.
282+
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Microsoft Entra Connect synchronization.
283283
- Periods (.) must be surrounded by other valid characters (for example, `help.desk`).
284284
- Unicode characters U+00A1 to U+00FF.
285285

exchange/exchange-ps/exchange/Set-FederationTrust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ Before you configure a federation trust to use the next certificate as the curre
9090
### -Identity
9191
The Identity parameter specifies the name of the federation trust being modified.
9292

93-
**Note**: For Exchange Online organizations, use the value "Azure AD Authentication".
93+
**Note**: For Exchange Online organizations, use the value "Microsoft Entra authentication".
9494

9595
```yaml
9696
Type: FederationTrustIdParameter

exchange/exchange-ps/exchange/Set-LabelPolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -493,9 +493,9 @@ Accept wildcard characters: False
493493
```
494494

495495
### -PolicyRBACScopes
496-
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Azure Active Directory ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
496+
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Microsoft Entra ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
497497

498-
Administrative units are available only in Azure Active Directory Premium. You create and manage administrative units in Microsoft Graph PowerShell.
498+
Administrative units are available only in Microsoft Entra ID P1 or P2. You create and manage administrative units in Microsoft Graph PowerShell.
499499

500500
```yaml
501501
Type: MultiValuedProperty

exchange/exchange-ps/exchange/Set-MailContact.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ The Alias parameter specifies the Exchange alias (also known as the mail nicknam
233233
The Alias value can contain letters, numbers and the following characters:
234234

235235
- !, #, %, \*, +, -, /, =, ?, ^, \_, and ~.
236-
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Azure AD Connect synchronization.
236+
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Microsoft Entra Connect synchronization.
237237
- Periods (.) must be surrounded by other valid characters (for example, `help.desk`).
238238
- Unicode characters U+00A1 to U+00FF.
239239

exchange/exchange-ps/exchange/Set-MailPublicFolder.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,7 @@ The Alias parameter specifies the Exchange alias (also known as the mail nicknam
244244
The Alias value can contain letters, numbers and the following characters:
245245

246246
- !, #, %, \*, +, -, /, =, ?, ^, \_, and ~.
247-
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Azure AD Connect synchronization.
247+
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Microsoft Entra Connect synchronization.
248248
- Periods (.) must be surrounded by other valid characters (for example, `help.desk`).
249249
- Unicode characters U+00A1 to U+00FF.
250250

exchange/exchange-ps/exchange/Set-MailUser.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1001,7 +1001,7 @@ The Alias parameter specifies the Exchange alias (also known as the mail nicknam
10011001
The Alias value can contain letters, numbers and the following characters:
10021002

10031003
- !, #, %, \*, +, -, /, =, ?, ^, \_, and ~.
1004-
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Azure AD Connect synchronization.
1004+
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Microsoft Entra Connect synchronization.
10051005
- Periods (.) must be surrounded by other valid characters (for example, `help.desk`).
10061006
- Unicode characters U+00A1 to U+00FF.
10071007

exchange/exchange-ps/exchange/Set-Mailbox.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1366,7 +1366,7 @@ The Alias parameter specifies the Exchange alias (also known as the mail nicknam
13661366
The Alias value can contain letters, numbers and the following characters:
13671367

13681368
- !, #, %, \*, +, -, /, =, ?, ^, \_, and ~.
1369-
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Azure AD Connect synchronization.
1369+
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Microsoft Entra Connect synchronization.
13701370
- Periods (.) must be surrounded by other valid characters (for example, `help.desk`).
13711371
- Unicode characters U+00A1 to U+00FF.
13721372

exchange/exchange-ps/exchange/Set-ManagementRoleAssignment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -160,7 +160,7 @@ This parameter is functional only in the cloud-based service.
160160
161161
The RecipientAdministrativeUnitScope parameter specifies the administrative unit to scope the role assignment to.
162162
163-
Administrative units are Azure Active Directory containers of resources. You can view the available administrative units by using the Get-AdministrativeUnit cmdlet.
163+
Administrative units are Microsoft Entra containers of resources. You can view the available administrative units by using the Get-AdministrativeUnit cmdlet.
164164
165165
You can't use this parameter with any of the other scope parameters.
166166
@@ -267,7 +267,7 @@ The CustomResourceScope parameter specifies the custom management scope to assoc
267267

268268
If the value contains spaces, enclose the value in quotation marks (").
269269

270-
You use this parameter with the App parameter to assign permissions to service principals. For more information, see For more information about service principals, see [Application and service principal objects in Azure Active Directory](https://learn.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals).
270+
You use this parameter with the App parameter to assign permissions to service principals. For more information, see For more information about service principals, see [Application and service principal objects in Microsoft Entra ID](https://learn.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals).
271271

272272
```yaml
273273
Type: ManagementScopeIdParameter

exchange/exchange-ps/exchange/Set-MyAnalyticsFeatureConfig.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ This cmdlet requires the .NET Framework 4.7.2 or later. To run this cmdlet, you
3838
- Exchange Administrator
3939
- Insights Administrator
4040

41-
To learn more about administrator role permissions in Azure Active Directory, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
41+
To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
4242

4343
## EXAMPLES
4444

exchange/exchange-ps/exchange/Set-OrganizationSegment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Set-OrganizationSegment [-Identity] <PolicyIdParameter>
2727
```
2828

2929
## DESCRIPTION
30-
Segments are defined by using certain [attributes](https://learn.microsoft.com/purview/information-barriers-attributes) in Azure Active Directory.
30+
Segments are defined by using certain [attributes](https://learn.microsoft.com/purview/information-barriers-attributes) in Microsoft Entra ID.
3131

3232
To use this cmdlet in Security & Compliance PowerShell, you need to be assigned permissions. For more information, see [Permissions in the Microsoft Purview compliance portal](https://learn.microsoft.com/purview/microsoft-365-compliance-center-permissions).
3333

exchange/exchange-ps/exchange/Set-OwaMailboxPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -639,7 +639,7 @@ Accept wildcard characters: False
639639
### -ConditionalAccessPolicy
640640
This parameter is available only in the cloud-based service.
641641

642-
The ConditionalAccessPolicy parameter specifies the Outlook on the Web Policy for limited access. For this feature to work properly, you also need to configure a Conditional Access policy in the Azure Active Directory Portal.
642+
The ConditionalAccessPolicy parameter specifies the Outlook on the Web Policy for limited access. For this feature to work properly, you also need to configure a Conditional Access policy in the Microsoft Entra admin center.
643643

644644
**Note**: When you enable a Conditional Access policy, users will no longer be able to access the light version of Outlook on the web. An error message will direct them to use the default premium experience.
645645

exchange/exchange-ps/exchange/Set-RemoteMailbox.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -263,7 +263,7 @@ The Alias parameter specifies the Exchange alias (also known as the mail nicknam
263263
The Alias value can contain letters, numbers and the following characters:
264264

265265
- !, #, %, \*, +, -, /, =, ?, ^, \_, and ~.
266-
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Azure AD Connect synchronization.
266+
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Microsoft Entra Connect synchronization.
267267
- Periods (.) must be surrounded by other valid characters (for example, `help.desk`).
268268
- Unicode characters U+00A1 to U+00FF.
269269

exchange/exchange-ps/exchange/Set-RetentionCompliancePolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -633,9 +633,9 @@ Accept wildcard characters: False
633633
```
634634

635635
### -PolicyRBACScopes
636-
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Azure Active Directory ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
636+
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Microsoft Entra ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
637637

638-
Administrative units are available only in Azure Active Directory Premium. You create and manage administrative units in Microsoft Graph PowerShell.
638+
Administrative units are available only in Microsoft Entra ID P1 or P2. You create and manage administrative units in Microsoft Graph PowerShell.
639639

640640
```yaml
641641
Type: MultiValuedProperty

0 commit comments

Comments
 (0)