You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/exchange-online/connect-to-exchange-online-powershell/connect-to-exchange-online-powershell.md
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,7 @@ localization_priority: Priority
11
11
ms.collection: Strat_EX_Admin
12
12
ms.custom:
13
13
ms.assetid: c8bea338-6c1a-4bdf-8de0-7895d427ee5b
14
+
search.appverid: MET150
14
15
description: "Learn how to use remote PowerShell to connect to Exchange Online."
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/exchange-online/connect-to-exchange-online-powershell/mfa-connect-to-exchange-online-powershell.md
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,7 @@ ms.topic: article
8
8
ms.service: exchange-online
9
9
localization_priority: Normal
10
10
ms.assetid: 04dae4ce-34a7-49c5-bf75-11e72452e04a
11
+
search.appverid: MET150
11
12
description: "Learn how to connect to Exchange Online PowerShell by using multi-factor authentication (MFA)."
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/advanced-threat-protection/Get-PhishFilterPolicy.md
-2Lines changed: 0 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -13,8 +13,6 @@ This cmdlet is available only in the cloud-based service.
13
13
14
14
Use the Get-PhishFilterPolicy cmdlet to view the phish filter policy and detected spoofed sending activities in your cloud-based organization.
15
15
16
-
This cmdlet is only available in Office 365 Enterprise E5, or with Advanced Threat Protection licenses.
17
-
18
16
For information about the parameter sets in the Syntax section below, see Exchange cmdlet syntax (https://technet.microsoft.com/library/bb123552.aspx).
The EnableOrganizationDomainsProtection parameter specifies whether to enable domain impersonation protection for all registered domains in the Office 365 organization. Valid values are:
The EnableTargetedDomainsProtection parameter specifies whether to enable domain impersonation protection for a list of specified domains. Valid values are:
The PhishThresholdLevel parameter specifies the tolerance level that's used by machine learning in the handling of phishing messages. Valid values are:
The TargetedDomainsToProtect parameter specifies the domains that are included in domain impersonaton protection when the EnableTargetedDomainsProtection parameter is set to $true.
553
+
The TargetedDomainsToProtect parameter specifies the domains that are included in domain impersonation protection when the EnableTargetedDomainsProtection parameter is set to $true.
417
554
418
555
You can specify multiple domains separated by commas.
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/advanced-threat-protection/Set-PhishFilterPolicy.md
-2Lines changed: 0 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -13,8 +13,6 @@ This cmdlet is available only in the cloud-based service.
13
13
14
14
Use the Set-PhishFilterPolicy cmdlet to configure the phish filter policy in your cloud-based organization.
15
15
16
-
This cmdlet is only available in Office 365 Enterprise E5, or with Advanced Threat Protection licenses.
17
-
18
16
For information about the parameter sets in the Syntax section below, see Exchange cmdlet syntax (https://technet.microsoft.com/library/bb123552.aspx).
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/client-access-servers/Set-OwaVirtualDirectory.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1651,7 +1651,7 @@ The LogonPageLightSelectionEnabled parameter specifies whether the Outlook on th
1651
1651
1652
1652
- $true: The option to use the light version of Outlook on the web is available on the sign-in page. This is the default value.
1653
1653
1654
-
- $fase: The option to use the light version of Outlook on the web is available on the sign-in page.
1654
+
- $false: The option to use the light version of Outlook on the web is available on the sign-in page.
1655
1655
1656
1656
This parameter is meaninful only for browsers that support the full version of Outlook on the web; unsupported browsers are always required to use the light version of Outlook on the web.
1657
1657
@@ -1672,7 +1672,7 @@ The LogonPagePublicPrivateSelectionEnabled parameter specifies whether the Outlo
1672
1672
1673
1673
- $true: The public/private computer session selection is available on the Outlook on the web sign-in page.
1674
1674
1675
-
- $fase: The public/private computer session selection isn't available on the Outlook on the web sign-in page. All sessions are considered to be on private computers. This is the default value.
1675
+
- $false: The public/private computer session selection isn't available on the Outlook on the web sign-in page. All sessions are considered to be on private computers. This is the default value.
1676
1676
1677
1677
By default in Exchange 2013 or later, all Outlook on the web sessions are considered to be on private computers. Users can only specify public computer sessions if you've set this parameter value to $false.
The LogLocation parameter specifies the location of the exported calendar items that you want to analyze. You can specify a local path, or a UNC path (\\\\\<Server\>\\\<Share\>\\\<User\>). If the value contains spaces, enclose the value in quotation marks (").
122
122
123
-
You export the calender items to .msg files by using the Get-CalendarDiagnosticLog cmdlet with the LogLocation parameter. If the path contains multiple .msg files, all of those files are analyzed when you run Get-CalendarDiagnosticAnalysis.
123
+
You export the calendar items to .msg files by using the Get-CalendarDiagnosticLog cmdlet with the LogLocation parameter. If the path contains multiple .msg files, all of those files are analyzed when you run Get-CalendarDiagnosticAnalysis.
124
124
125
125
You can't use this parameter with the CalendarLogs parameter.
You can pipeline the Get-MailboxExportRequestStatistics cmdlet from the Get-MailboxExportRequest cmdlet.
43
43
44
-
The RequestQueue parameter syntax set is for debugging purposes only.
45
-
46
44
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see Find the permissions required to run any Exchange cmdlet (https://technet.microsoft.com/library/mt432940.aspx).
The RequestQueue parameter identifies the request based on the mailbox database where the request is being run. You can use any value that uniquely identifies the database. For example:
0 commit comments