Skip to content

Commit 82c5a23

Browse files
authored
Merge branch 'master' into get-teamChannel-int-note
2 parents 80cd416 + 768faf5 commit 82c5a23

File tree

3 files changed

+85
-16
lines changed

3 files changed

+85
-16
lines changed

exchange/exchange-ps/exchange/advanced-threat-protection/Set-AtpPolicyForO365.md

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ Use the Set-AtpPolicyForO365 cmdlet to modify the Advanced Threat Protection (AT
1919

2020
- Safe Links for Office 365 ProPlus desktop clients and Office Mobile apps.
2121

22+
- Safe Documents: Before a user is allowed to trust a file open in Office 365 ProPlus, the file will be verified by Microsoft Defender ATP.
23+
2224
- ATP to protect files in SharePoint Online, OneDrive for Business and Microsoft Teams.
2325

2426
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-server/exchange-cmdlet-syntax).
@@ -28,9 +30,11 @@ For information about the parameter sets in the Syntax section below, see [Excha
2830
```
2931
Set-AtpPolicyForO365 [[-Identity] <AtpPolicyForO365IdParameter>]
3032
[-AllowClickThrough <Boolean>]
33+
[-AllowSafeDocsOpen <Boolean>]
3134
[-BlockUrls <MultiValuedProperty>]
3235
[-Confirm]
3336
[-EnableATPForSPOTeamsODB <Boolean>]
37+
[-EnableSafeDocs <Boolean>]
3438
[-EnableSafeLinksForClients <Boolean>]
3539
[-TrackClicks <Boolean>]
3640
[-WhatIf] [<CommonParameters>]
@@ -90,6 +94,27 @@ Accept pipeline input: False
9094
Accept wildcard characters: False
9195
```
9296
97+
### -AllowSafeDocsOpen
98+
The AllowSafeDocsOpen parameter specifies whether users can click through and bypass the Protected View container even when Safe Documents in Microsoft Defender Advanced Threat Protection (MDATP) identifies a file as malicious. Valid values are:
99+
100+
- $true: Users are allowed to exit the Protected View container even if the document has been identified as malicious.
101+
102+
- $false: Users aren't allowed to exit Protected View in case of a malicious detection.
103+
104+
105+
```yaml
106+
Type: Boolean
107+
Parameter Sets: (All)
108+
Aliases:
109+
Applicable: Exchange Online
110+
111+
Required: False
112+
Position: Named
113+
Default value: None
114+
Accept pipeline input: False
115+
Accept wildcard characters: False
116+
```
117+
93118
### -BlockUrls
94119
The BlockUrls parameter specifies the URLs that are always blocked by Safe Links scanning. You can specify multiple values separated by commas.
95120
@@ -146,6 +171,26 @@ Accept pipeline input: False
146171
Accept wildcard characters: False
147172
```
148173
174+
### -EnableSafeDocs
175+
The EnableSafeDocs parameter specifies whether to enable the Safe Documents feature in the organization. Valid values are:
176+
177+
- $true: Safe Documents is enabled and will upload user files to Microsoft Defender Advanced Threat Protection (MDATP) for scanning and verification.
178+
179+
- $false: Safe Documents is disabled. This is the default value.
180+
181+
```yaml
182+
Type: Boolean
183+
Parameter Sets: (All)
184+
Aliases:
185+
Applicable: Exchange Online
186+
187+
Required: False
188+
Position: Named
189+
Default value: None
190+
Accept pipeline input: False
191+
Accept wildcard characters: False
192+
```
193+
149194
### -EnableSafeLinksForClients
150195
The EnableSafeLinksForClients parameter specifies whether Safe Links is enabled for Office 365 apps on desktop clients and on the web. Valid values are:
151196

exchange/exchange-ps/exchange/antispam-antimalware/Get-HostedConnectionFilterPolicy.md

Lines changed: 13 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,22 +32,30 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3232

3333
### Example 1
3434
```powershell
35-
Get-HostedConnectionFilterPolicy
35+
Get-HostedConnectionFilterPolicy | Format-List Name,IPBlockList,IPAllowList,EnableSafeList
3636
```
3737

38-
This example shows a summary list of all the connection filter policies in your cloud-based organization.
38+
This example returns a summary list of all connection filter policies in your organization.
3939

4040
### Example 2
4141
```powershell
42-
Get-HostedConnectionFilterPolicy Default | Format-List
42+
Get-HostedConnectionFilterPolicy -Identity Default
4343
```
4444

45-
This example retrieves details about the connection filter policy named Default.
45+
This example returns detailed information about the connection filter policy named Default.
4646

4747
## PARAMETERS
4848

4949
### -Identity
50-
The Identity parameter specifies the connection filter policy that you want to view. You can use any value that uniquely identifies the policy. For example, you can specify the name, GUID or distinguished name (DN) of the connection filter policy.
50+
The Identity parameter specifies the connection filter policy that you want to view. You can use any value that uniquely identifies the policy. For example:
51+
52+
- Name
53+
54+
- Distinguished name (DN)
55+
56+
- GUID
57+
58+
Typically, you only have one connection filter policy: the default policy named Default.
5159

5260
```yaml
5361
Type: HostedConnectionFilterPolicyIdParameter

exchange/exchange-ps/exchange/antispam-antimalware/Set-HostedConnectionFilterPolicy.md

Lines changed: 27 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,13 @@ For information about the parameter sets in the Syntax section below, see [Excha
2323

2424
```
2525
Set-HostedConnectionFilterPolicy [-Identity] <HostedConnectionFilterPolicyIdParameter>
26-
[-AdminDisplayName <String>] [-ConfigurationXmlRaw <String>] [-Confirm] [-EnableSafeList <Boolean>]
27-
[-IPAllowList <MultiValuedProperty>] [-IPBlockList <MultiValuedProperty>] [-MakeDefault] [-WhatIf]
28-
[<CommonParameters>]
26+
[-AdminDisplayName <String>]
27+
[-ConfigurationXmlRaw <String>]
28+
[-Confirm] [-EnableSafeList <Boolean>]
29+
[-IPAllowList <MultiValuedProperty>]
30+
[-IPBlockList <MultiValuedProperty>]
31+
[-MakeDefault]
32+
[-WhatIf] [<CommonParameters>]
2933
```
3034

3135
## DESCRIPTION
@@ -35,21 +39,21 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3539

3640
### Example 1
3741
```powershell
38-
Set-HostedConnectionFilterPolicy "Contoso Connection Filter Policy" -IPAllowList 192.168.1.10,192.168.1.23 -IPBlockList 10.10.10.0/25,172.17.17.0/24
42+
Set-HostedConnectionFilterPolicy "Default" -IPAllowList 192.168.1.10,192.168.1.23 -IPBlockList 10.10.10.0/25,172.17.17.0/24
3943
```
4044

41-
This example modifies the connection filter policy named Contoso Connection Filter Policy with the following settings:
45+
This example modifies the connection filter policy named Default with the following settings:
4246

4347
- Messages from 192.168.1.10 and 192.168.1.23 are never identified as spam.
4448

4549
- Messages from 10.10.10.0/25 and 172.17.17.0/24 are always identified as spam.
4650

4751
### Example 2
4852
```powershell
49-
Set-HostedConnectionFilterPolicy "Contoso Connection Filter Policy" -IPAllowList @{Add="192.168.2.10","192.169.3.0/24","192.168.4.1-192.168.4.5";Remove="192.168.1.10"}
53+
Set-HostedConnectionFilterPolicy "Default" -IPAllowList @{Add="192.168.2.10","192.169.3.0/24","192.168.4.1-192.168.4.5";Remove="192.168.1.10"}
5054
```
5155

52-
This example modifies the connection filter policy named Contoso Connection Filter Policy with the following settings:
56+
This example modifies the connection filter policy named Default with the following settings:
5357

5458
- The following IP addresses are added to the existing values in the IP allow list: 192.168.2.10, 192.169.3.0/24 and 192.168.4.1-192.168.4.5.
5559

@@ -58,7 +62,15 @@ This example modifies the connection filter policy named Contoso Connection Filt
5862
## PARAMETERS
5963

6064
### -Identity
61-
The Identity parameter specifies the connection filter policy you want to modify. You can use any value that uniquely identifies the policy. For example, you can use the name, GUID or distinguished name (DN) of the hosted connection filter policy.
65+
The Identity parameter specifies the connection filter policy that you want to modify. You can use any value that uniquely identifies the policy. For example:
66+
67+
- Name
68+
69+
- Distinguished name (DN)
70+
71+
- GUID
72+
73+
Typically, you only have one connection filter policy: the default policy named Default.
6274

6375
```yaml
6476
Type: HostedConnectionFilterPolicyIdParameter
@@ -74,7 +86,7 @@ Accept wildcard characters: False
7486
```
7587
7688
### -AdminDisplayName
77-
The AdminDisplayName parameter specifies a description for the policy. If the value contains spaces, enclose the value in quotation marks (").
89+
The AdminDisplayName parameter specifies a description for the policy. If the value contains spaces, enclose the value in quotation marks ("). The maximum length is 255 characters.
7890
7991
```yaml
8092
Type: String
@@ -126,7 +138,11 @@ Accept wildcard characters: False
126138
```
127139
128140
### -EnableSafeList
129-
The EnableSafeList parameter enables or disables use of the safe list. The safe list is a dynamic allow list in the Microsoft datacenter that requires no customer configuration. Valid input for this parameter is $true or $false. The default value is $false.
141+
The EnableSafeList parameter enables or disables use of the safe list. The safe list is a dynamic allow list in the Microsoft datacenter that requires no customer configuration. Valid values are:
142+
143+
$true: Use the safe list to skip spam filtering on messages from trusted senders that are identified by various third-party sources that Microsoft subscribes to.
144+
145+
$false: Don't use the safe list. This is the default value.
130146
131147
```yaml
132148
Type: Boolean
@@ -194,7 +210,7 @@ Accept wildcard characters: False
194210
```
195211
196212
### -MakeDefault
197-
The MakeDefault switch makes the specified policy the default connection filter policy. You don't have to specify a value with this switch.
213+
This parameter is reserved for internal Microsoft use.
198214
199215
```yaml
200216
Type: SwitchParameter

0 commit comments

Comments
 (0)