Skip to content

Commit cc1b002

Browse files
authored
Merge pull request MicrosoftDocs#4876 from MicrosoftDocs/SafeDocs-chrisda
SafeDocs-chrisda to Master
2 parents 816e2c7 + a413ce9 commit cc1b002

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed

exchange/exchange-ps/exchange/advanced-threat-protection/Set-AtpPolicyForO365.md

Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ Use the Set-AtpPolicyForO365 cmdlet to modify the Advanced Threat Protection (AT
1919

2020
- Safe Links for Office 365 ProPlus desktop clients and Office Mobile apps.
2121

22+
- Safe Documents: Before a user is allowed to trust a file open in Office 365 ProPlus, the file will be verified by Microsoft Defender ATP.
23+
2224
- ATP to protect files in SharePoint Online, OneDrive for Business and Microsoft Teams.
2325

2426
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-server/exchange-cmdlet-syntax).
@@ -28,9 +30,11 @@ For information about the parameter sets in the Syntax section below, see [Excha
2830
```
2931
Set-AtpPolicyForO365 [[-Identity] <AtpPolicyForO365IdParameter>]
3032
[-AllowClickThrough <Boolean>]
33+
[-AllowSafeDocsOpen <Boolean>]
3134
[-BlockUrls <MultiValuedProperty>]
3235
[-Confirm]
3336
[-EnableATPForSPOTeamsODB <Boolean>]
37+
[-EnableSafeDocs <Boolean>]
3438
[-EnableSafeLinksForClients <Boolean>]
3539
[-TrackClicks <Boolean>]
3640
[-WhatIf] [<CommonParameters>]
@@ -90,6 +94,27 @@ Accept pipeline input: False
9094
Accept wildcard characters: False
9195
```
9296
97+
### -AllowSafeDocsOpen
98+
The AllowSafeDocsOpen parameter specifies whether users can click through and bypass the Protected View container even when Safe Documents in Microsoft Defender Advanced Threat Protection (MDATP) identifies a file as malicious. Valid values are:
99+
100+
- $true: Users are allowed to exit the Protected View container even if the document has been identified as malicious.
101+
102+
- $false: Users aren't allowed to exit Protected View in case of a malicious detection.
103+
104+
105+
```yaml
106+
Type: Boolean
107+
Parameter Sets: (All)
108+
Aliases:
109+
Applicable: Exchange Online
110+
111+
Required: False
112+
Position: Named
113+
Default value: None
114+
Accept pipeline input: False
115+
Accept wildcard characters: False
116+
```
117+
93118
### -BlockUrls
94119
The BlockUrls parameter specifies the URLs that are always blocked by Safe Links scanning. You can specify multiple values separated by commas.
95120
@@ -146,6 +171,26 @@ Accept pipeline input: False
146171
Accept wildcard characters: False
147172
```
148173
174+
### -EnableSafeDocs
175+
The EnableSafeDocs parameter specifies whether to enable the Safe Documents feature in the organization. Valid values are:
176+
177+
- $true: Safe Documents is enabled and will upload user files to Microsoft Defender Advanced Threat Protection (MDATP) for scanning and verification.
178+
179+
- $false: Safe Documents is disabled. This is the default value.
180+
181+
```yaml
182+
Type: Boolean
183+
Parameter Sets: (All)
184+
Aliases:
185+
Applicable: Exchange Online
186+
187+
Required: False
188+
Position: Named
189+
Default value: None
190+
Accept pipeline input: False
191+
Accept wildcard characters: False
192+
```
193+
149194
### -EnableSafeLinksForClients
150195
The EnableSafeLinksForClients parameter specifies whether Safe Links is enabled for Office 365 apps on desktop clients and on the web. Valid values are:
151196

0 commit comments

Comments
 (0)