Skip to content

Commit 63ea4ce

Browse files
authored
Merge branch 'master' into patch-3
2 parents f925dc0 + 91a6bc2 commit 63ea4ce

File tree

55 files changed

+682
-479
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+682
-479
lines changed

exchange/docs-conceptual/exchange-online/connect-to-exchange-online-powershell/connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ localization_priority: Priority
1111
ms.collection: Strat_EX_Admin
1212
ms.custom:
1313
ms.assetid: c8bea338-6c1a-4bdf-8de0-7895d427ee5b
14+
search.appverid: MET150
1415
description: "Learn how to use remote PowerShell to connect to Exchange Online."
1516
---
1617

exchange/docs-conceptual/exchange-online/connect-to-exchange-online-powershell/mfa-connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ ms.topic: article
88
ms.service: exchange-online
99
localization_priority: Normal
1010
ms.assetid: 04dae4ce-34a7-49c5-bf75-11e72452e04a
11+
search.appverid: MET150
1112
description: "Learn how to connect to Exchange Online PowerShell by using multi-factor authentication (MFA)."
1213
---
1314

exchange/docs-conceptual/exchange-online/disable-access-to-exchange-online-powershell.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ ms.topic: article
99
ms.service: exchange-online
1010
localization_priority: Normal
1111
ms.assetid: f969816a-2607-4655-9d47-9e8767fb5633
12+
search.appverid: MET150
1213
description: "Admins can learn how to enable or disable access to Exchange Online PowerShell for users in their organization"
1314
---
1415

exchange/docs-conceptual/exchange-online/exchange-online-powershell.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ ms.topic: article
99
ms.service: exchange-online
1010
localization_priority: Normal
1111
ms.assetid: 1cb603b0-2961-4afe-b879-b048fe0f64a2
12+
search.appverid: MET150
1213
description: "Learn about using PowerShell in Exchange Online"
1314
---
1415

exchange/docs-conceptual/office-365-scc/connect-to-scc-powershell/connect-to-scc-powershell.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ ms.topic: article
99
ms.service: o365-security-and-compliance
1010
localization_priority: Normal
1111
ms.assetid: 45a5242d-95b7-4a6a-9794-095bb6d8d9d0
12+
search.appverid: MET150
1213
description: "Learn how to connect to Security & Compliance Center PowerShell."
1314
---
1415

exchange/docs-conceptual/office-365-scc/connect-to-scc-powershell/mfa-connect-to-scc-powershell.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ ms.topic: article
88
ms.service: o365-security-and-compliance
99
localization_priority: Normal
1010
ms.assetid: 8e11c808-e734-4874-ac94-e5251ea85c19
11+
search.appverid: MET150
1112
description: "Learn how to connect to Security & Compliance Center PowerShell by using multi-factor authentication (MFA) or federated authentication."
1213
---
1314

exchange/docs-conceptual/office-365-scc/office-365-scc-powershell.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ ms.topic: article
99
ms.service: o365-security-and-compliance
1010
localization_priority: Normal
1111
ms.assetid: 2f33bb84-cede-46f6-9d39-d246e8ce3543
12+
search.appverid: MET150
1213
description: "Learn about using PowerShell in the Office 365 Security & Compliance Center."
1314
---
1415

exchange/exchange-ps/exchange/advanced-threat-protection/Get-PhishFilterPolicy.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ This cmdlet is available only in the cloud-based service.
1313

1414
Use the Get-PhishFilterPolicy cmdlet to view the phish filter policy and detected spoofed sending activities in your cloud-based organization.
1515

16-
This cmdlet is only available in Office 365 Enterprise E5, or with Advanced Threat Protection licenses.
17-
1816
For information about the parameter sets in the Syntax section below, see Exchange cmdlet syntax (https://technet.microsoft.com/library/bb123552.aspx).
1917

2018
## SYNTAX

exchange/exchange-ps/exchange/advanced-threat-protection/New-AntiPhishPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -379,7 +379,7 @@ The PhishThresholdLevel parameter specifies the tolerance level that's used by m
379379
380380
- 2: Aggressive
381381
382-
- 3: More agressive
382+
- 3: More aggressive
383383
384384
- 4: Most aggressive
385385

exchange/exchange-ps/exchange/advanced-threat-protection/Set-AntiPhishPolicy.md

Lines changed: 140 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,39 @@ For information about the parameter sets in the Syntax section below, see Exchan
1818
## SYNTAX
1919

2020
```
21-
Set-AntiPhishPolicy -Identity <AntiPhishPolicyIdParameter> [-AdminDisplayName <String>] [-AuthenticationFailAction <MoveToJmf | Quarantine>] [-Confirm] [-EnableAntispoofEnforcement <$true | $false>] [-EnableAuthenticationSafetyTip <$true | $false>] [-EnableAuthenticationSoftPassSafetyTip <$true | $false>] [-Enabled <$true | $false>] [-EnableMailboxIntelligence <$true | $false>] [-EnableOrganizationDomainsProtection <$true | $false>] [-EnableSimilarDomainsSafetyTips <$true | $false>] [-EnableSimilarUsersSafetyTips <$true | $false>] [-EnableSuspiciousSafetyTip <$true | $false>] [-EnableTargetedDomainsProtection <$true | $false>] [-EnableTargetedUserProtection <$true | $false>] [-EnableUnusualCharactersSafetyTips <$true | $false>] [-ExcludedDomains <MultiValuedProperty>] [-ExcludedSenders <MultiValuedProperty>] [-PhishThresholdLevel <Int32>] [-TargetedDomainActionRecipients <MultiValuedProperty>] [-TargetedDomainProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>] [-TargetedDomainsToProtect <MultiValuedProperty>] [-TargetedUserActionRecipients <MultiValuedProperty>] [-TargetedUserProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>] [-TargetedUsersToProtect <MultiValuedProperty>] [-TreatSoftPassAsAuthenticated <$true | $false>] [-WhatIf] [<CommonParameters>]
21+
Set-AntiPhishPolicy -Identity <AntiPhishPolicyIdParameter>
22+
[-AdminDisplayName <Basic | High>]
23+
[-AntiSpoofEnforcementType <AntiSpoofEnforcementType>]
24+
[-AuthenticationFailAction <MoveToJmf | Quarantine>]
25+
[-Confirm]
26+
[-EnableAntispoofEnforcement <$true | $false>]
27+
[-EnableAuthenticationSafetyTip <$true | $false>]
28+
[-EnableAuthenticationSoftPassSafetyTip <$true | $false>]
29+
[-Enabled <$true | $false>]
30+
[-EnableMailboxIntelligence <$true | $false>]
31+
[-EnableMailboxIntelligenceProtection <$true | $false>]
32+
[-EnableOrganizationDomainsProtection <$true | $false>]
33+
[-EnableSimilarDomainsSafetyTips <$true | $false>]
34+
[-EnableSimilarUsersSafetyTips <$true | $false>]
35+
[-EnableSuspiciousSafetyTip <$true | $false>]
36+
[-EnableTargetedDomainsProtection <$true | $false>]
37+
[-EnableTargetedUserProtection <$true | $false>]
38+
[-EnableUnusualCharactersSafetyTips <$true | $false>]
39+
[-ExcludedDomains <MultiValuedProperty>]
40+
[-ExcludedSenders <MultiValuedProperty>]
41+
[-ImpersonationProtectionState <Default | Automatic | Manual | Off>]
42+
[-MailboxIntelligenceProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>]
43+
[-MailboxIntelligenceProtectionActionRecipients <MultiValuedProperty>]
44+
[-MakeDefault]
45+
[-PhishThresholdLevel <Int32>]
46+
[-TargetedDomainActionRecipients <MultiValuedProperty>]
47+
[-TargetedDomainProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>]
48+
[-TargetedDomainsToProtect <MultiValuedProperty>]
49+
[-TargetedUserActionRecipients <MultiValuedProperty>]
50+
[-TargetedUserProtectionAction <NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage>]
51+
[-TargetedUsersToProtect <MultiValuedProperty>]
52+
[-TreatSoftPassAsAuthenticated <$true | $false>]
53+
[-WhatIf] [<CommonParameters>]
2254
```
2355

2456
## DESCRIPTION
@@ -71,6 +103,21 @@ Accept pipeline input: False
71103
Accept wildcard characters: False
72104
```
73105
106+
### -AntiSpoofEnforcementType
107+
{{Fill AntiSpoofEnforcementType Description}}
108+
109+
```yaml
110+
Type: Basic | High
111+
Parameter Sets: (All)
112+
Aliases:
113+
Applicable: Exchange Online, Exchange Online Protection
114+
Required: False
115+
Position: Named
116+
Default value: None
117+
Accept pipeline input: False
118+
Accept wildcard characters: False
119+
```
120+
74121
### -AuthenticationFailAction
75122
The AuthenticationFailAction parameter specifies the action to take when the message fails composite authentication. Valid values are:
76123
@@ -200,6 +247,21 @@ Accept pipeline input: False
200247
Accept wildcard characters: False
201248
```
202249
250+
### -EnableMailboxIntelligenceProtection
251+
{{Fill EnableMailboxIntelligenceProtection Description}}
252+
253+
```yaml
254+
Type: $true | $false
255+
Parameter Sets: (All)
256+
Aliases:
257+
Applicable: Exchange Online, Exchange Online Protection
258+
Required: False
259+
Position: Named
260+
Default value: None
261+
Accept pipeline input: False
262+
Accept wildcard characters: False
263+
```
264+
203265
### -EnableOrganizationDomainsProtection
204266
The EnableOrganizationDomainsProtection parameter specifies whether to enable domain impersonation protection for all registered domains in the Office 365 organization. Valid values are:
205267
@@ -257,6 +319,21 @@ Accept pipeline input: False
257319
Accept wildcard characters: False
258320
```
259321
322+
### -EnableSuspiciousSafetyTip
323+
{{Fill EnableSuspiciousSafetyTip Description}}
324+
325+
```yaml
326+
Type: $true | $false
327+
Parameter Sets: (All)
328+
Aliases:
329+
Applicable: Exchange Online, Exchange Online Protection
330+
Required: False
331+
Position: Named
332+
Default value: None
333+
Accept pipeline input: False
334+
Accept wildcard characters: False
335+
```
336+
260337
### -EnableTargetedDomainsProtection
261338
The EnableTargetedDomainsProtection parameter specifies whether to enable domain impersonation protection for a list of specified domains. Valid values are:
262339
@@ -344,14 +421,74 @@ Accept pipeline input: False
344421
Accept wildcard characters: False
345422
```
346423
424+
### -ImpersonationProtectionState
425+
{{Fill ImpersonationProtectionState Description}}
426+
427+
```yaml
428+
Type: Default | Automatic | Manual | Off
429+
Parameter Sets: (All)
430+
Aliases:
431+
Applicable: Exchange Online, Exchange Online Protection
432+
Required: False
433+
Position: Named
434+
Default value: None
435+
Accept pipeline input: False
436+
Accept wildcard characters: False
437+
```
438+
439+
### -MailboxIntelligenceProtectionAction
440+
{{Fill MailboxIntelligenceProtectionAction Description}}
441+
442+
```yaml
443+
Type: NoAction | MoveToJmf | Redirect | Quarantine | Delete | BccMessage
444+
Parameter Sets: (All)
445+
Aliases:
446+
Applicable: Exchange Online, Exchange Online Protection
447+
Required: False
448+
Position: Named
449+
Default value: None
450+
Accept pipeline input: False
451+
Accept wildcard characters: False
452+
```
453+
454+
### -MailboxIntelligenceProtectionActionRecipients
455+
{{Fill MailboxIntelligenceProtectionActionRecipients Description}}
456+
457+
```yaml
458+
Type: MultiValuedProperty
459+
Parameter Sets: (All)
460+
Aliases:
461+
Applicable: Exchange Online, Exchange Online Protection
462+
Required: False
463+
Position: Named
464+
Default value: None
465+
Accept pipeline input: False
466+
Accept wildcard characters: False
467+
```
468+
469+
### -MakeDefault
470+
{{Fill MakeDefault Description}}
471+
472+
```yaml
473+
Type: SwitchParameter
474+
Parameter Sets: (All)
475+
Aliases:
476+
Applicable: Exchange Online, Exchange Online Protection
477+
Required: False
478+
Position: Named
479+
Default value: None
480+
Accept pipeline input: False
481+
Accept wildcard characters: False
482+
```
483+
347484
### -PhishThresholdLevel
348485
The PhishThresholdLevel parameter specifies the tolerance level that's used by machine learning in the handling of phishing messages. Valid values are:
349486
350487
- 1: Standard (this is the default value)
351488
352489
- 2: Aggressive
353490
354-
- 3: More agressive
491+
- 3: More aggressive
355492
356493
- 4: Most aggressive
357494
@@ -413,7 +550,7 @@ Accept wildcard characters: False
413550
```
414551
415552
### -TargetedDomainsToProtect
416-
The TargetedDomainsToProtect parameter specifies the domains that are included in domain impersonaton protection when the EnableTargetedDomainsProtection parameter is set to $true.
553+
The TargetedDomainsToProtect parameter specifies the domains that are included in domain impersonation protection when the EnableTargetedDomainsProtection parameter is set to $true.
417554
418555
You can specify multiple domains separated by commas.
419556

exchange/exchange-ps/exchange/advanced-threat-protection/Set-PhishFilterPolicy.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ This cmdlet is available only in the cloud-based service.
1313

1414
Use the Set-PhishFilterPolicy cmdlet to configure the phish filter policy in your cloud-based organization.
1515

16-
This cmdlet is only available in Office 365 Enterprise E5, or with Advanced Threat Protection licenses.
17-
1816
For information about the parameter sets in the Syntax section below, see Exchange cmdlet syntax (https://technet.microsoft.com/library/bb123552.aspx).
1917

2018
## SYNTAX

exchange/exchange-ps/exchange/client-access-servers/Set-OwaVirtualDirectory.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1651,7 +1651,7 @@ The LogonPageLightSelectionEnabled parameter specifies whether the Outlook on th
16511651
16521652
- $true: The option to use the light version of Outlook on the web is available on the sign-in page. This is the default value.
16531653
1654-
- $fase: The option to use the light version of Outlook on the web is available on the sign-in page.
1654+
- $false: The option to use the light version of Outlook on the web is available on the sign-in page.
16551655
16561656
This parameter is meaninful only for browsers that support the full version of Outlook on the web; unsupported browsers are always required to use the light version of Outlook on the web.
16571657
@@ -1672,7 +1672,7 @@ The LogonPagePublicPrivateSelectionEnabled parameter specifies whether the Outlo
16721672
16731673
- $true: The public/private computer session selection is available on the Outlook on the web sign-in page.
16741674
1675-
- $fase: The public/private computer session selection isn't available on the Outlook on the web sign-in page. All sessions are considered to be on private computers. This is the default value.
1675+
- $false: The public/private computer session selection isn't available on the Outlook on the web sign-in page. All sessions are considered to be on private computers. This is the default value.
16761676
16771677
By default in Exchange 2013 or later, all Outlook on the web sessions are considered to be on private computers. Users can only specify public computer sessions if you've set this parameter value to $false.
16781678

exchange/exchange-ps/exchange/mailboxes/Get-CalendarDiagnosticAnalysis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ Accept wildcard characters: False
120120
### -LogLocation
121121
The LogLocation parameter specifies the location of the exported calendar items that you want to analyze. You can specify a local path, or a UNC path (\\\\\<Server\>\\\<Share\>\\\<User\>). If the value contains spaces, enclose the value in quotation marks (").
122122
123-
You export the calender items to .msg files by using the Get-CalendarDiagnosticLog cmdlet with the LogLocation parameter. If the path contains multiple .msg files, all of those files are analyzed when you run Get-CalendarDiagnosticAnalysis.
123+
You export the calendar items to .msg files by using the Get-CalendarDiagnosticLog cmdlet with the LogLocation parameter. If the path contains multiple .msg files, all of those files are analyzed when you run Get-CalendarDiagnosticAnalysis.
124124
125125
You can't use this parameter with the CalendarLogs parameter.
126126

exchange/exchange-ps/exchange/mailboxes/Get-MailboxExportRequestStatistics.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,8 +41,6 @@ Get-MailboxExportRequestStatistics -RequestQueue <DatabaseIdParameter> [-DomainC
4141
## DESCRIPTION
4242
You can pipeline the Get-MailboxExportRequestStatistics cmdlet from the Get-MailboxExportRequest cmdlet.
4343

44-
The RequestQueue parameter syntax set is for debugging purposes only.
45-
4644
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see Find the permissions required to run any Exchange cmdlet (https://technet.microsoft.com/library/mt432940.aspx).
4745

4846
## EXAMPLES
@@ -128,6 +126,8 @@ Accept wildcard characters: False
128126
```
129127
130128
### -RequestQueue
129+
This parameter is for debugging purposes only.
130+
131131
The RequestQueue parameter identifies the request based on the mailbox database where the request is being run. You can use any value that uniquely identifies the database. For example:
132132
133133
- Database GUID
@@ -226,7 +226,7 @@ Accept wildcard characters: False
226226
```
227227
228228
### -ReportOnly
229-
The ReportOnly switch returns the results as an array of report entries. You don't need to specify a value with this switch.
229+
The ReportOnly switch returns the results as an array of report entries (encoded strings). You don't need to specify a value with this switch.
230230
231231
```yaml
232232
Type: SwitchParameter

0 commit comments

Comments
 (0)