You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- cron: "25 5,11,17,22 * * *"# Times are UTC based on Daylight Saving Time. Need to be adjusted for Standard Time. Scheduling at :25 to account for queuing lag.
Copy file name to clipboardExpand all lines: .github/workflows/StaleBranch.yml
+8-3Lines changed: 8 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -2,10 +2,15 @@ name: (Scheduled) Stale branch removal
2
2
3
3
permissions:
4
4
contents: write
5
-
5
+
6
+
# This workflow is designed to be run in the days up to, and including, a "deletion day", specified by 'DeleteOnDayOfMonth' in env: in https://github.com/MicrosoftDocs/microsoft-365-docs/blob/workflows-prod/.github/workflows/Shared-StaleBranch.yml.
7
+
# On the days leading up to "deletion day", the workflow will report the branches to be deleted. This lets users see which branches will be deleted. On "deletion day", those branches are deleted.
8
+
# The workflow should not be configured to run after "deletion day" so that users can review the branches were deleted.
9
+
# Recommendation: configure cron to run on days 1,15-31 where 1 is what's configured in 'DeleteOnDayOfMonth'. If 'DeleteOnDayOfMonth' is set to something else, update cron to run the two weeks leading up to it.
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/Add-UnifiedGroupLinks.md
+12-7Lines changed: 12 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,10 @@ This cmdlet is available only in the cloud-based service.
16
16
17
17
Use the Add-UnifiedGroupLinks cmdlet to add members, owners and subscribers to Microsoft 365 Groups in your cloud-based organization. To remove members, owners, and subscribers, use the Remove-UnifiedGroupLinks cmdlet. To modify other properties of Microsoft 365 Groups, use the Set-UnifiedGroup cmdlet.
18
18
19
-
**Note**: You can't use this cmdlet to modify Microsoft 365 Group members, owners, or subscribers if you connect using certificate based authentication (also known as CBA or app-only authentication for unattended scripts) or Azure managed identity. You can use Microsoft Graph instead. For more information, see [Group resource type](https://learn.microsoft.com/graph/api/resources/group).
19
+
> [!NOTE]
20
+
> You can't use this cmdlet to modify Microsoft 365 Group members, owners, or subscribers if you connect using certificate based authentication (also known as CBA or app-only authentication for unattended scripts) or Azure managed identity. You can use Microsoft Graph instead. For more information, see [Group resource type](https://learn.microsoft.com/graph/api/resources/group).
21
+
>
22
+
> Using this cmdlet, only group members can be owners of the group. Add users as members before you add them as owners. This limitation doesn't apply in web management portals where you can add non-members as group owners. Guest users can never be group owners.
20
23
21
24
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
22
25
@@ -43,7 +46,7 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
43
46
Add-UnifiedGroupLinks -Identity "Legal Department" -LinkType Members -Links chris@contoso.com,michelle@contoso.com
44
47
```
45
48
46
-
This example adds members chris@contoso.com and michelle@contoso.com to the Microsoft 365 Group named Legal Department.
49
+
This example adds members `chris@contoso.com` and `michelle@contoso.com` to the Microsoft 365 Group named Legal Department.
The Links parameter specifies the recipients to add to the Microsoft 365 Group. You specify whether these recipients are members, owners or subscribers by using the LinkType parameter.
86
+
The Links parameter specifies the recipients to add to the Microsoft 365 Group. You specify whether these recipients are members, owners, or subscribers by using the LinkType parameter.
84
87
85
88
You can use any value that uniquely identifies the recipient. For example:
86
89
@@ -93,7 +96,9 @@ You can use any value that uniquely identifies the recipient. For example:
93
96
94
97
You can enter multiple values separated by commas. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"Value1","Value2",..."ValueN"`.
95
98
96
-
You must use this parameter with the LinkType parameter, which means the specified recipients will all receive the same role in the Microsoft 365 Group (you can't add recipients with different roles in the same command).
99
+
You must use this parameter with the LinkType parameter, which means the specified recipients receive the same role in the Microsoft 365 Group (you can't add recipients with different roles in the same command).
100
+
101
+
**Note**: Using this cmdlet, only group members can be owners of the group. Add users as members before you add them as owners. This limitation doesn't apply in web management portals where you can add non-members as group owners. Guest users can never be group owners.
97
102
98
103
```yaml
99
104
Type: RecipientIdParameter[]
@@ -113,11 +118,11 @@ The LinkType parameter specifies the recipient's role in the Microsoft 365 Group
113
118
114
119
- Members: Participate in conversations, create Teams channels, collaborate on files, and edit the connected SharePoint site.
115
120
- Owners: Add or remove members, delete conversations, changes Team settings, delete the Team, and full control of the connected SharePoint site. A group must have at least one owner.
116
-
- Subscribers: Members who receive conversation and calendar event notifications from the group. All subscribers are members of the group, but all members aren't necessarily subscribers (depending on the AutoSubscribeNewMembers property value of the group and when the member was added).
121
+
- Subscribers: Existing group members who receive conversation and calendar event notifications from the group. All subscribers are members of the group, but all members aren't necessarily subscribers (depending on the AutoSubscribeNewMembers property value of the group and when the member was added).
117
122
118
-
In PowerShell, any owner or subscriber that you want to add to the group must also be a member.
123
+
You must use this parameter with the Links parameter.
119
124
120
-
You must use this parameter with the LinkType parameter.
125
+
**Note**: Using this cmdlet, only group members can be owners of the group. Add users as members before you add them as owners. This limitation doesn't apply in web management portals where you can add non-members as group owners. Guest users can never be group owners.
This cmdlet is available only in the Exchange Online PowerShell module v3.2.0 or later. For more information, see [About the Exchange Online PowerShell module](https://aka.ms/exov3-module).
17
17
18
-
**Note**: Support for categories is available in version 3.5.0-Preview2 or later of the module, but no categories are currently available in Viva. We'll update the documentation when categories are available.
18
+
Use the Add-VivaModuleFeaturePolicy cmdlet to add a new access policy for a specific feature in Viva. The attributes of the policy are defined using the cmdlet parameters. Policies are used to restrict or grant access to the specified feature for specific users, groups, or the entire tenant.
19
19
20
-
Use the Add-VivaModuleFeaturePolicy cmdlet to add a new access policy for a specific feature or a category in Viva. The attributes of the policy are defined using the cmdlet parameters. Policies are used to restrict or grant access to the specified feature or category for specific users, groups, or the entire tenant.
21
-
22
-
- You can assign up to 10 policies per feature/category. An additional one policy per feature/category can be assigned to the entire tenant.
23
-
- Policies assigned to a specific user or group take priority over the policy assigned to the entire tenant when determining whether a feature/category is enabled. If a user has multiple policies assigned for a feature/category (directly as a user or member of a group), the most restrictive policy applies.
24
-
- If a category is disabled by category policies, all features under the category are disabled regardless of the policies set at the feature level.
25
-
- You can only update user controls at the feature policy level, not the category policy level.
20
+
- You can assign up to 10 policies per feature. An additional one policy per feature can be assigned to the entire tenant.
21
+
- Policies assigned to a specific user or group take priority over the policy assigned to the entire tenant when determining whether a feature is enabled. If a user has multiple policies assigned for a feature (directly as a user or member of a group), the most restrictive policy applies.
26
22
- Some features only support policies that apply to the entire tenant, not specific users or groups. You can refer to supported policy scopes for a feature using the [Get-VivaModuleFeature](https://learn.microsoft.com/powershell/module/exchange/get-vivamodulefeature) cmdlet.
27
23
28
24
Some features include the option for user controls (user opt out). Refer to the feature documentation to see if user controls are available for the feature that you intend to set a policy for.
29
25
30
26
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
This example adds a policy for the `<category_id>` category in Viva. The policy disables the category (effectively all features under the category) for all users in the organization.
This example adds a policy for the `<category_id>` category in Viva. The policy disables the category (effectively all features under the category) for all users in the specified groups.
This example adds a policy for the `<category_id>` category in Viva. The policy disables the category (effectively all features under the category) for the specified users.
This example adds a policy for the `<category_id>` category in Viva. The policy disables the category (effectively all features under the category) for the specified users and group members.
This example adds a policy for the `<category_id>` category in Viva where the policy name is with spaces. The policy disables the category (effectively all features under the category) for all users in the organization.
93
+
This example adds a policy for the ShowAISkills feature in Viva Skills. The policy enables the feature for the specified users, allows user controls, and opted out users by default (Soft Disable policy).
141
94
142
95
## PARAMETERS
143
96
144
-
### -CategoryId
145
-
This parameter is available in version 3.5.0-Preview2 or later of the module.
146
-
147
-
**Note**: Currently, no categories are available in Viva. We'll update the documentation when categories are available.
148
-
149
-
The CategoryId parameter specifies the Viva category that you want to add the policy for.
150
-
151
-
```yaml
152
-
Type: String
153
-
Parameter Sets: CategoryPolicy
154
-
Aliases:
155
-
Applicable: Exchange Online
156
-
157
-
Required: True
158
-
Position: Named
159
-
Default value: None
160
-
Accept pipeline input: False
161
-
Accept wildcard characters: False
162
-
```
163
-
164
97
### -FeatureId
165
98
The FeatureId parameter specifies the feature in the Viva module that you want to add the policy for.
166
99
167
100
To view details about the features in a Viva module that support feature access controls, use the Get-VivaModuleFeature cmdlet. The FeatureId value is returned in the output of the cmdlet.
168
101
169
102
```yaml
170
103
Type: String
171
-
Parameter Sets: FeaturePolicy
172
-
Aliases:
173
-
Applicable: Exchange Online
174
-
175
-
Required: True
176
-
Position: Named
177
-
Default value: None
178
-
Accept pipeline input: False
179
-
Accept wildcard characters: False
180
-
```
181
-
182
-
### -IsCategoryEnabled
183
-
This parameter is available in version 3.5.0-Preview2 or later of the module.
184
-
185
-
**Note**: Currently, no categories are available in Viva. We'll update the documentation when categories are available.
186
-
187
-
The IsCategoryEnabled parameter specifies whether or not the category is enabled by the policy. Valid values are:
188
-
189
-
- $true: The category is enabled by the policy.
190
-
- $false: The category is not enabled by the policy.
191
-
192
-
```yaml
193
-
Type: Boolean
194
-
Parameter Sets: CategoryPolicy
104
+
Parameter Sets: (All)
195
105
Aliases:
196
106
Applicable: Exchange Online
197
107
@@ -210,7 +120,7 @@ The IsFeatureEnabled parameter specifies whether or not the feature is enabled b
210
120
211
121
```yaml
212
122
Type: Boolean
213
-
Parameter Sets: FeaturePolicy
123
+
Parameter Sets: (All)
214
124
Aliases:
215
125
Applicable: Exchange Online
216
126
@@ -226,7 +136,7 @@ The ModuleId parameter specifies the Viva module that you want to add the featur
226
136
227
137
```yaml
228
138
Type: String
229
-
Parameter Sets: FeaturePolicy
139
+
Parameter Sets: (All)
230
140
Aliases:
231
141
Applicable: Exchange Online
232
142
@@ -328,7 +238,32 @@ Only features that allow admins to enable and disable user controls by policy ca
328
238
329
239
```yaml
330
240
Type: Boolean
331
-
Parameter Sets: FeaturePolicy
241
+
Parameter Sets: (All)
242
+
Aliases:
243
+
Applicable: Exchange Online
244
+
245
+
Required: False
246
+
Position: Named
247
+
Default value: None
248
+
Accept pipeline input: False
249
+
Accept wildcard characters: False
250
+
```
251
+
252
+
### -IsUserOptedInByDefault
253
+
This parameter is available in version 3.8.0-Preview2 or later of the module.
254
+
255
+
The IsUserOptedInByDefault parameter specifies whether users are opted in by default by the policy. Valid values are:
256
+
257
+
- $true: By default, users are opted in by the policy if the user hasn't set a preference.
258
+
- $false: By default, users are opted out by the policy if the user hasn't set a preference.
259
+
260
+
This parameter is optional and can be used to override the default user opt-in value set in the feature metadata.
261
+
262
+
This parameter can be set only when the IsUserControlEnabled parameter is set to $true.
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/Connect-IPPSSession.md
+21Lines changed: 21 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,7 @@ Connect-IPPSSession
32
32
[[-Prefix] <String>]
33
33
[[-CommandName] <String[]>]
34
34
[[-FormatTypeName] <String[]>]
35
+
[-AccessToken <String>]
35
36
[-AppId <String>]
36
37
[-BypassMailboxAnchoring]
37
38
[-Certificate <X509Certificate2>]
@@ -218,6 +219,26 @@ Accept pipeline input: False
218
219
Accept wildcard characters: False
219
220
```
220
221
222
+
### -AccessToken
223
+
**Note**: This parameter is available in version 3.8.0-Preview1 or later of the module.
224
+
225
+
The AccessToken parameter specifies the OAuth JSON Web Token (JWT) that's used to connect to Security and Compliance PowerShell.
226
+
227
+
Depending on the type of access token, you need to use this parameter with the Organization, DelegatedOrganization, or UserPrincipalName parameters.
228
+
229
+
```yaml
230
+
Type: String
231
+
Parameter Sets: (All)
232
+
Aliases:
233
+
Applicable: Exchange Online
234
+
235
+
Required: False
236
+
Position: Named
237
+
Default value: None
238
+
Accept pipeline input: False
239
+
Accept wildcard characters: False
240
+
```
241
+
221
242
### -AppId
222
243
The AppId parameter specifies the application ID of the service principal that's used in certificate based authentication (CBA). A valid value is the GUID of the application ID (service principal). For example, `36ee4c6c-0812-40a2-b820-b22ebd02bce3`.
0 commit comments