You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/advanced-threat-protection/Set-AtpPolicyForO365.md
+45Lines changed: 45 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -19,6 +19,8 @@ Use the Set-AtpPolicyForO365 cmdlet to modify the Advanced Threat Protection (AT
19
19
20
20
- Safe Links for Office 365 ProPlus desktop clients and Office Mobile apps.
21
21
22
+
- Safe Documents: Before a user is allowed to trust a file open in Office 365 ProPlus, the file will be verified by Microsoft Defender ATP.
23
+
22
24
- ATP to protect files in SharePoint Online, OneDrive for Business and Microsoft Teams.
23
25
24
26
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-server/exchange-cmdlet-syntax).
@@ -28,9 +30,11 @@ For information about the parameter sets in the Syntax section below, see [Excha
The AllowSafeDocsOpen parameter specifies whether users can click through and bypass the Protected View container even when Safe Documents in Microsoft Defender Advanced Threat Protection (MDATP) identifies a file as malicious. Valid values are:
99
+
100
+
- $true: Users are allowed to exit the Protected View container even if the document has been identified as malicious.
101
+
102
+
- $false: Users aren't allowed to exit Protected View in case of a malicious detection.
103
+
104
+
105
+
```yaml
106
+
Type: Boolean
107
+
Parameter Sets: (All)
108
+
Aliases:
109
+
Applicable: Exchange Online
110
+
111
+
Required: False
112
+
Position: Named
113
+
Default value: None
114
+
Accept pipeline input: False
115
+
Accept wildcard characters: False
116
+
```
117
+
93
118
### -BlockUrls
94
119
The BlockUrls parameter specifies the URLs that are always blocked by Safe Links scanning. You can specify multiple values separated by commas.
95
120
@@ -146,6 +171,26 @@ Accept pipeline input: False
146
171
Accept wildcard characters: False
147
172
```
148
173
174
+
### -EnableSafeDocs
175
+
The EnableSafeDocs parameter specifies whether to enable the Safe Documents feature in the organization. Valid values are:
176
+
177
+
- $true: Safe Documents is enabled and will upload user files to Microsoft Defender Advanced Threat Protection (MDATP) for scanning and verification.
178
+
179
+
- $false: Safe Documents is disabled. This is the default value.
180
+
181
+
```yaml
182
+
Type: Boolean
183
+
Parameter Sets: (All)
184
+
Aliases:
185
+
Applicable: Exchange Online
186
+
187
+
Required: False
188
+
Position: Named
189
+
Default value: None
190
+
Accept pipeline input: False
191
+
Accept wildcard characters: False
192
+
```
193
+
149
194
### -EnableSafeLinksForClients
150
195
The EnableSafeLinksForClients parameter specifies whether Safe Links is enabled for Office 365 apps on desktop clients and on the web. Valid values are:
0 commit comments