You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/advanced-threat-protection/Set-AtpPolicyForO365.md
+45Lines changed: 45 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,8 @@ Use the Set-AtpPolicyForO365 cmdlet to modify the Advanced Threat Protection (AT
19
19
20
20
- Safe Links for Office 365 ProPlus desktop clients and Office Mobile apps.
21
21
22
+
- Safe Documents: Before a user is allowed to trust a file open in Office 365 ProPlus, the file will be verified by Microsoft Defender ATP.
23
+
22
24
- ATP to protect files in SharePoint Online, OneDrive for Business and Microsoft Teams.
23
25
24
26
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-server/exchange-cmdlet-syntax).
@@ -28,9 +30,11 @@ For information about the parameter sets in the Syntax section below, see [Excha
The AllowSafeDocsOpen parameter specifies whether users can click through and bypass the Protected View container even when Safe Documents in Microsoft Defender Advanced Threat Protection (MDATP) identifies a file as malicious. Valid values are:
99
+
100
+
- $true: Users are allowed to exit the Protected View container even if the document has been identified as malicious.
101
+
102
+
- $false: Users aren't allowed to exit Protected View in case of a malicious detection.
103
+
104
+
105
+
```yaml
106
+
Type: Boolean
107
+
Parameter Sets: (All)
108
+
Aliases:
109
+
Applicable: Exchange Online
110
+
111
+
Required: False
112
+
Position: Named
113
+
Default value: None
114
+
Accept pipeline input: False
115
+
Accept wildcard characters: False
116
+
```
117
+
93
118
### -BlockUrls
94
119
The BlockUrls parameter specifies the URLs that are always blocked by Safe Links scanning. You can specify multiple values separated by commas.
95
120
@@ -146,6 +171,26 @@ Accept pipeline input: False
146
171
Accept wildcard characters: False
147
172
```
148
173
174
+
### -EnableSafeDocs
175
+
The EnableSafeDocs parameter specifies whether to enable the Safe Documents feature in the organization. Valid values are:
176
+
177
+
- $true: Safe Documents is enabled and will upload user files to Microsoft Defender Advanced Threat Protection (MDATP) for scanning and verification.
178
+
179
+
- $false: Safe Documents is disabled. This is the default value.
180
+
181
+
```yaml
182
+
Type: Boolean
183
+
Parameter Sets: (All)
184
+
Aliases:
185
+
Applicable: Exchange Online
186
+
187
+
Required: False
188
+
Position: Named
189
+
Default value: None
190
+
Accept pipeline input: False
191
+
Accept wildcard characters: False
192
+
```
193
+
149
194
### -EnableSafeLinksForClients
150
195
The EnableSafeLinksForClients parameter specifies whether Safe Links is enabled for Office 365 apps on desktop clients and on the web. Valid values are:
This example retrieves details about the connection filter policy named Default.
45
+
This example returns detailed information about the connection filter policy named Default.
46
46
47
47
## PARAMETERS
48
48
49
49
### -Identity
50
-
The Identity parameter specifies the connection filter policy that you want to view. You can use any value that uniquely identifies the policy. For example, you can specify the name, GUID or distinguished name (DN) of the connection filter policy.
50
+
The Identity parameter specifies the connection filter policy that you want to view. You can use any value that uniquely identifies the policy. For example:
51
+
52
+
- Name
53
+
54
+
- Distinguished name (DN)
55
+
56
+
- GUID
57
+
58
+
Typically, you only have one connection filter policy: the default policy named Default.
This example modifies the connection filter policy named Contoso Connection Filter Policy with the following settings:
56
+
This example modifies the connection filter policy named Default with the following settings:
53
57
54
58
- The following IP addresses are added to the existing values in the IP allow list: 192.168.2.10, 192.169.3.0/24 and 192.168.4.1-192.168.4.5.
55
59
@@ -58,7 +62,15 @@ This example modifies the connection filter policy named Contoso Connection Filt
58
62
## PARAMETERS
59
63
60
64
### -Identity
61
-
The Identity parameter specifies the connection filter policy you want to modify. You can use any value that uniquely identifies the policy. For example, you can use the name, GUID or distinguished name (DN) of the hosted connection filter policy.
65
+
The Identity parameter specifies the connection filter policy that you want to modify. You can use any value that uniquely identifies the policy. For example:
66
+
67
+
- Name
68
+
69
+
- Distinguished name (DN)
70
+
71
+
- GUID
72
+
73
+
Typically, you only have one connection filter policy: the default policy named Default.
The AdminDisplayName parameter specifies a description for the policy. If the value contains spaces, enclose the value in quotation marks (").
89
+
The AdminDisplayName parameter specifies a description for the policy. If the value contains spaces, enclose the value in quotation marks ("). The maximum length is 255 characters.
The EnableSafeList parameter enables or disables use of the safe list. The safe list is a dynamic allow list in the Microsoft datacenter that requires no customer configuration. Valid input for this parameter is $true or $false. The default value is $false.
141
+
The EnableSafeList parameter enables or disables use of the safe list. The safe list is a dynamic allow list in the Microsoft datacenter that requires no customer configuration. Valid values are:
142
+
143
+
$true: Use the safe list to skip spam filtering on messages from trusted senders that are identified by various third-party sources that Microsoft subscribes to.
144
+
145
+
$false: Don't use the safe list. This is the default value.
0 commit comments