Skip to content

Commit f521bc0

Browse files
authored
Merge branch 'main' into update-set-cmdlet-wording
2 parents 44b02cc + 32b45e3 commit f521bc0

25 files changed

+1141
-46
lines changed

exchange/docs-conceptual/recipientfilter-properties.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ The recipient properties that have been *confirmed* to work with the _RecipientF
120120
|_ExchangeUserAccountControl_|_msExchUserAccountControl_|For valid values, see [ADS_USER_FLAG_ENUM enumeration](/windows/win32/api/iads/ne-iads-ads_user_flag_enum). The integer values will work as described. Most of the text values won't work as described (even if you remove `ADS_UF` and all underscores).||
121121
|_ExchangeVersion_|_msExchVersion_|Dynamic distribution groups: String (wildcards accepted). <br> Others: `ExchangeObjectVersion` values.||
122122
|_ExpansionServer_|_msExchExpansionServerName_|String (wildcards accepted).||
123-
|_ExtensionCustomAttribute1_ to _ExtensionCustomAttribute5_|_msExchExtensionCustomAttribute1_ to _msExchExtensionCustomAttribute5_|String (wildcards accepted).||
123+
|_ExtensionCustomAttribute1_ to _ExtensionCustomAttribute5_|_msExchExtensionCustomAttribute1_ to _msExchExtensionCustomAttribute5_|String (wildcards accepted).|Currently, these attributes aren't useable as filters in Exchange Online. For more information, see [Microsoft Entra Connect Sync: Attributes synchronized to Microsoft Entra ID](/entra/identity/hybrid/connect/reference-connect-sync-attributes-synchronized).|
124124
|_ExternalDirectoryObjectId_|_msExchExternalDirectoryObjectId_|String (wildcards accepted).||
125125
|_ExternalEmailAddress_|_targetAddress_|String (wildcards accepted).|This property contains the external email address for mail contacts and mail users.|
126126
|_ExternalOofOptions_|_msExchExternalOOFOptions_|`External` (0) or `InternalOnly` (1).||

exchange/exchange-ps/exchange/Export-ActivityExplorerData.md

Lines changed: 130 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,135 @@ Export-ActivityExplorerData -EndTime <DateTime> -OutputFormat <String> -StartTim
3333
```
3434

3535
## DESCRIPTION
36+
This cmdlet supports following filters:
37+
38+
- Activity
39+
- Application
40+
- ArtifactType
41+
- ClientIP
42+
- ColdScanPolicyId
43+
- CopilotAppHost
44+
- CopilotThreadId
45+
- CopilotType
46+
- CreationTime
47+
- DataState
48+
- DestinationFilePath
49+
- DestinationLocationType
50+
- DeviceName
51+
- DLPPolicyId
52+
- DLPPolicyRuleId
53+
- EmailReceiver
54+
- EmailSender
55+
- EndpointOperation
56+
- EnforcementMode
57+
- FalsePositive
58+
- FileExtension
59+
- GeneralPurposeComparison
60+
- HowApplied
61+
- HowAppliedDetail
62+
- IrmUrlCategory
63+
- IsProtected
64+
- IsProtectedBefore
65+
- ItemName
66+
- LabelEventType
67+
- Location
68+
- MDATPDeviceId
69+
- OriginatingDomain
70+
- PageSize
71+
- ParentArchiveHash
72+
- Platform
73+
- PolicyId
74+
- PolicyMode
75+
- PolicyName
76+
- PolicyRuleAction
77+
- PolicyRuleId
78+
- PolicyRuleName
79+
- PreviousFileName
80+
- PreviousProtectionOwner
81+
- ProtectionEventType
82+
- ProtectionOwner
83+
- RemovableMediaDeviceManufacturer
84+
- RemovableMediaDeviceModel
85+
- RemovableMediaDeviceSerialNumber
86+
- RetentionLabel
87+
- RMSEncrypted
88+
- SensitiveInfoTypeClassifierType
89+
- SensitiveInfoTypeConfidence
90+
- SensitiveInfoTypeCount
91+
- SensitiveInfoTypeId
92+
- SensitivityLabel
93+
- SensitivityLabelPolicy
94+
- Sha1
95+
- Sha256
96+
- SourceLocationType
97+
- TargetDomain
98+
- TargetPrinterName
99+
- User
100+
- UsersPerDay
101+
- Workload
102+
103+
Valid workload filters include the following values:
104+
105+
- Copilot
106+
- Endpoint
107+
- Exchange
108+
- OnPremisesFileShareScanner
109+
- OnPremisesSharePointScanner
110+
- OneDrive
111+
- PowerBI
112+
- PurviewDataMap
113+
- SharePoint
114+
115+
Valid activity filters include the following values:
116+
117+
- AIAppInteraction
118+
- ArchiveCreated
119+
- AutoLabelingSimulation
120+
- BrowseToUrl
121+
- ChangeProtection
122+
- ClassificationAdded
123+
- ClassificationDeleted
124+
- ClassificationUpdated
125+
- CopilotInteraction
126+
- DLPInfo
127+
- DLPRuleEnforce
128+
- DLPRuleMatch
129+
- DLPRuleUndo
130+
- DlpClassification
131+
- DownloadFile
132+
- DownloadText
133+
- FileAccessedByUnallowedApp
134+
- FileArchived
135+
- FileCopiedToClipboard
136+
- FileCopiedToNetworkShare
137+
- FileCopiedToRemoteDesktopSession
138+
- FileCopiedToRemovableMedia
139+
- FileCreated
140+
- FileCreatedOnNetworkShare
141+
- FileCreatedOnRemovableMedia
142+
- FileDeleted
143+
- FileDiscovered
144+
- FileModified
145+
- FilePrinted
146+
- FileRead
147+
- FileRenamed
148+
- FileTransferredByBluetooth
149+
- FileUploadedToCloud
150+
- LabelApplied
151+
- LabelChanged
152+
- LabelRecommended
153+
- LabelRecommendedAndDismissed
154+
- LabelRemoved
155+
- NewProtection
156+
- PastedToBrowser
157+
- RemoveProtection
158+
- ScreenCapture
159+
- UploadFile
160+
- UploadText
161+
- WebpageCopiedToClipboard
162+
- WebpagePrinted
163+
- WebpageSavedToLocal
164+
36165
To use this cmdlet in Security & Compliance PowerShell, you need to be assigned permissions. For more information, see [Permissions in the Microsoft Purview compliance portal](https://learn.microsoft.com/purview/microsoft-365-compliance-center-permissions).
37166

38167
## EXAMPLES
@@ -55,7 +184,7 @@ This example exports up to 100 records for the specified date range in Json form
55184
```powershell
56185
$res = Export-ActivityExplorerData -StartTime "07/08/2022 07:15 AM" -EndTime "07/08/2022 11:08 AM" -PageSize 5000 -OutputFormat Json
57186
58-
#Run the below steps in loop until all results are fetched
187+
#Run the following steps in loop until all results are fetched
59188
60189
while ($res.LastPage -ne $true)
61190
{

exchange/exchange-ps/exchange/Get-IPv6StatusForAcceptedDomain.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,11 @@ If IPv6 is enabled for an accepted domain in Exchange Online, IPv4 and IPv6 addr
3434

3535
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3636

37+
> [!NOTE]
38+
> When you use the Enable-IPv6ForAcceptedDomain or Disable-IPv6ForAcceptedDomain cmdlets to update the IPv6 setting for an accepted domain, the updated status can take up to an hour to be visible using Get-IPv6StatusForAcceptedDomain due to caching.
39+
>
40+
> For example, Get-IPv6StatusForAcceptedDomain shows the status value Enabled for a domain. You run Disable-IPv6ForAcceptedDomain to disable IPv6 for the domain, you immediately run Get-IPv6StatusForAcceptedDomain to check the staus of the domain, and the command erroneously returns the value Enabled. It might take up to an hour before Get-IPv6StatusForAcceptedDomain shows the correct value Disabled for the domain.
41+
3742
## EXAMPLES
3843

3944
### Example 1
@@ -96,10 +101,7 @@ Accept wildcard characters: False
96101
### CommonParameters
97102
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216).
98103
99-
## INPUTS
100104
101-
## OUTPUTS
102105
103-
## NOTES
104106
105-
## RELATED LINKS
107+

exchange/exchange-ps/exchange/Get-RecipientPermission.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,9 @@ Get-RecipientPermission [[-Identity] <RecipientIdParameter>]
3434
## DESCRIPTION
3535
When a user is given SendAs permission to another user or group, the user can send messages that appear to come from the other user or group.
3636

37+
> [!NOTE]
38+
> This cmdlet doesn't return expected results when the recipient specified by the Trustee parameter has multiple `SecurityPrincipalIdParameter` (Sid) values. When you use the Trustee parameter, the command compares the Sid of the specified Trustee with the recipient's access control list (ACL) record. If some of the recipient's Sid values have changed, there's a mismatch. The workaround is to not to use the user principal name (UPN) value, to use all Sids including the one for history.
39+
3740
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3841

3942
## EXAMPLES

exchange/exchange-ps/exchange/Get-SpoofIntelligenceInsight.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17-
Use the Get-SpoofIntelligenceInsight cmdlet to view spoofed senders that were allowed or blocked by spoof intelligence during the last 7 days.
17+
Use the Get-SpoofIntelligenceInsight cmdlet to view spoofed senders that were allowed or blocked by spoof intelligence during the last 30 days.
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

exchange/exchange-ps/exchange/Get-TenantAllowBlockListItems.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,7 @@ The ListType parameter specifies the list to view. Valid values are:
7676
- FileHash
7777
- Sender
7878
- Url
79+
- IP
7980

8081
```yaml
8182
Type: ListType
@@ -96,6 +97,7 @@ The Entry parameter filters the results based on the ListType parameter value. V
9697
- FileHash: The exact SHA256 file hash value.
9798
- Sender: The exact domain or email address value.
9899
- Url: The exact URL value.
100+
- IP: IPv6 addresses only. Single IPv6 addresses in colon-hexadecimal or zero-compression format or CIDR IPv6 ranges from 1 to 128.
99101
100102
This value is shown in the Value property of the entry in the output of the Get-TenantAllowBlockListItems cmdlet.
101103

exchange/exchange-ps/exchange/New-SafeAttachmentPolicy.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ New-SafeAttachmentPolicy [-Name] <String>
3838
## DESCRIPTION
3939
Safe Attachments is a feature in Microsoft Defender for Office 365 that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Defender for Office 365](https://learn.microsoft.com/defender-office-365/safe-attachments-about).
4040

41-
New safe attachment policies that you create using this cmdlet aren't applied to users and aren't visible in the admin center. You need to use the SafeAttachmentPolicy parameter on the New-SafeAttachmentRule or Set-SafeAttachmentRule cmdlets to associate the policy with a rule to create a complete Safe Attachments policy that's visible in the admin center.
41+
New safe attachment policies that you create using this cmdlet aren't applied to users and aren't visible in the Microsoft Defender portal. You need to use the SafeAttachmentPolicy parameter on the New-SafeAttachmentRule or Set-SafeAttachmentRule cmdlets to associate the policy with a rule to create a complete Safe Attachments policy that's visible in the Defender portal.
4242

4343
A safe attachment policy can be assigned to only one safe attachment rule.
4444

@@ -79,13 +79,13 @@ Accept wildcard characters: False
7979
### -Action
8080
The Action parameter specifies the action for the safe attachment policy. Valid values are:
8181
82-
- Allow: Deliver the message if malware is detected in the attachment and track scanning results. This value corresponds to **Monitor** for the **Safe Attachments unknown malware response** property of the policy in the admin center.
82+
- Allow: Deliver the message if malware is detected in the attachment and track scanning results. This value corresponds to **Monitor** for the **Safe Attachments unknown malware response** property of the policy in the Microsoft Defender portal.
8383
- Block: Block the email message that contains the malware attachment. This is the default value.
8484
- DynamicDelivery: Deliver the email message with a placeholder for each email attachment. The placeholder remains until a copy of the attachment is scanned and determined to be safe. For more information, see [Dynamic Delivery in Safe Attachments policies](https://learn.microsoft.com/defender-office-365/safe-attachments-about#dynamic-delivery-in-safe-attachments-policies).
8585
8686
The value of this parameter is meaningful only when the value of the Enable parameter is $true (the default value is $false).
8787
88-
To specify no action for the safe attachment policy (corresponds to the value **Off** for the **Safe Attachments unknown malware response** policy setting in the admin center), use the value $false for the Enable parameter.
88+
To specify no action for the safe attachment policy (corresponds to the value **Off** for the **Safe Attachments unknown malware response** policy setting in the Defender portal), use the value $false for the Enable parameter.
8989
9090
The results of all actions are available in message trace.
9191
@@ -219,11 +219,9 @@ Accept wildcard characters: False
219219
### -Redirect
220220
The Redirect parameter specifies whether to deliver messages to an alternate email address if malware is detected in an attachment. Valid values are:
221221

222-
- $true: Messages that contain malware attachments are delivered to the email address specified by the RedirectAddress parameter.
222+
- $true: Messages that contain malware attachments are delivered to the email address specified by the RedirectAddress parameter. This value is meaningful only when the value of the Action parameter is Allow.
223223
- $false: Messages that contain malware attachments aren't delivered to another email address. This is the default value.
224224

225-
**Note**: Redirection will soon be available only for the Allow action. For more information, see [MC424899](https://admin.microsoft.com/AdminPortal/Home?#/MessageCenter/:/messages/MC424899).
226-
227225
```yaml
228226
Type: Boolean
229227
Parameter Sets: (All)
@@ -240,9 +238,7 @@ Accept wildcard characters: False
240238
### -RedirectAddress
241239
The RedirectAddress parameter specifies the destination email address to deliver messages if malware is detected in an attachment.
242240

243-
The value of this parameter is meaningful only when when value of the Redirect parameter is $true and the value of the Action parameter is Allow.
244-
245-
**Note**: Redirection will soon be available only for the Allow action. For more information, see [MC424899](https://admin.microsoft.com/AdminPortal/Home?#/MessageCenter/:/messages/MC424899).
241+
The value of this parameter is meaningful only when value of the Redirect parameter is $true and the value of the Action parameter is Allow.
246242

247243
```yaml
248244
Type: SmtpAddress

exchange/exchange-ps/exchange/New-TenantAllowBlockListItems.md

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -82,16 +82,27 @@ The Entries parameter specifies the values that you want to add to the Tenant Al
8282
- FileHash: Use the SHA256 hash value of the file. In Windows, you can find the SHA256 hash value by running the following command in a Command Prompt: `certutil.exe -hashfile "<Path>\<Filename>" SHA256`. An example value is `768a813668695ef2483b2bde7cf5d1b2db0423a0d3e63e498f3ab6f2eb13ea3`.
8383
- Sender: A domain or email address value. For example, `contoso.com` or `michelle@contoso.com`.
8484
- URL: Use IPv4 or IPv6 addresses or hostnames. Wildcards (* and ~) are supported in hostnames. Protocols, TCP/UDP ports, or user credentials are not supported. For details, see [URL syntax for the Tenant Allow/Block List](https://learn.microsoft.com/defender-office-365/tenant-allow-block-list-urls-configure#url-syntax-for-the-tenant-allowblock-list).
85+
- IP: IPv6 addresses only:
86+
87+
• Single IPv6 addresses in colon-hexadecimal format (for example, 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
88+
89+
• Single IPv6 addresses in zero-compression format (for example, 2001:db8::1 for 2001:0db8:0000:0000:0000:0000:0000:0001).
90+
91+
• CIDR IPv6 ranges from 1 to 128 (for example, 2001:0db8::/32).
8592

8693
To enter multiple values, use the following syntax: `"Value1","Value2",..."ValueN"`.
8794

88-
For senders, files, and URLs the maximum number of allow entries for each type is 500, and the maximum number of block entries for each type is 500 (1000 entries total for each type).
95+
Entry limits for each list subtype (sender, URL, file, or IP address):
96+
97+
- **Exchange Online Protection**: The maximum number of allow entries is 500, and the maximum number of block entries is 500.
98+
- **Defender for Office 365 Plan 1**: The maximum number of allow entries is 1000, and the maximum number of block entries is 1000.
99+
- **Defender for Office 365 Plan 2**: The maximum number of allow entries is 5000, and the maximum number of block entries is 10000.
89100

90101
The maximum number of characters in a file entry is 64 and the maximum number of characters in a URL entry is 250.
91102

92-
You can't mix value types (file, sender, or URL) or allow and block actions in the same command.
103+
You can't mix value types (sender, URL, file, or IP address) or allow and block actions in the same command.
93104

94-
In most cases, you can't modify the URL, file, or sender values after you create the entry. The only exception is allow URL entries for phishing simulations (ListType = URL, ListSubType = AdvancedDelivery).
105+
In most cases, you can't modify the sender, URL, file, or IP address values after you create the entry. The only exception is URL allow entries for phishing simulations (ListType = URL, ListSubType = AdvancedDelivery).
95106

96107
```yaml
97108
Type: String[]
@@ -135,6 +146,7 @@ The ListType parameter specifies the type of entry to add. Valid values are:
135146
- FileHash
136147
- Sender
137148
- Url
149+
- IP
138150

139151
```yaml
140152
Type: ListType
@@ -156,6 +168,7 @@ This switch is available to use in the following scenarios:
156168

157169
- With the Block switch.
158170
- With the Allow switch where the ListType parameter value is URL and the ListSubType parameter value is AdvancedDelivery.
171+
- With the Allow switch where the ListType parameter value is IP.
159172

160173
You can't use this switch with the ExpirationDate or RemoveAfter parameter.
161174

exchange/exchange-ps/exchange/Remove-TenantAllowBlockListItems.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,10 +63,11 @@ The Entries parameter specifies the entries that you want to remove based on the
6363
- FileHash: The exact SHA256 file hash value.
6464
- Sender domains and email addresses: The exact domain or email address value.
6565
- Url: The exact URL value.
66+
- IP: IPv6 addresses only. Single IPv6 addresses in colon-hexadecimal or zero-compression format or CIDR IPv6 ranges from 1 to 128.
6667

6768
This value is shown in the Value property of the entry in the output of the Get-TenantAllowBlockListItems cmdlet.
6869

69-
You can't mix value types (file, sender, or URL) or allow and block actions in the same command.
70+
You can't mix value types (sender, URL, file, or IP address) or allow and block actions in the same command.
7071

7172
You can't use this parameter with the Ids parameter.
7273

@@ -109,6 +110,7 @@ The ListType parameter specifies the type of entry that you want to remove. Vali
109110
- FileHash
110111
- Sender
111112
- Url
113+
- IP
112114

113115
```yaml
114116
Type: ListType

exchange/exchange-ps/exchange/Set-ComplianceSecurityFilter.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ $filterusers = Get-ComplianceSecurityFilter -FilterName "Ottawa Users Filter"
4343
4444
$filterusers.users.add("pilarp@contoso.com")
4545
46-
Set-ComplianceSecurityFilter -FilterName OttawaUsersFilter -Users $filterusers.users
46+
Set-ComplianceSecurityFilter -FilterName "Ottawa Users Filter" -Users $filterusers.users
4747
```
4848

4949
This example adds user pilarp@contoso.com to the compliance security filter named Ottawa Users Filter without affecting other users assigned to the filter.
@@ -54,7 +54,7 @@ $filterusers = Get-ComplianceSecurityFilter -FilterName "Ottawa Users Filter"
5454
5555
$filterusers.users.remove("annb@contoso.com")
5656
57-
Set-ComplianceSecurityFilter -FilterName OttawaUsersFilter -Users $filterusers.users
57+
Set-ComplianceSecurityFilter -FilterName "Ottawa Users Filter" -Users $filterusers.users
5858
```
5959

6060
This example removes user annb@contoso.com to the compliance security filter named Ottawa Users Filter without affecting other users assigned to the filter.

exchange/exchange-ps/exchange/Set-DlpCompliancePolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1129,7 +1129,7 @@ Accept wildcard characters: False
11291129
```
11301130

11311131
### -RemoveTeamsLocation
1132-
The AddTeamsLocation parameter specifies the accounts, distribution groups, or mail-enabled security groups to remove from the list of included Teams chat and channel messages if you used the value All for the TeamsLocation parameter. You specify the entries by the email address or name of the account, distribution group, or mail-enabled security group.
1132+
The RemoveTeamsLocation parameter specifies the accounts, distribution groups, or mail-enabled security groups to remove from the list of included Teams chat and channel messages if you used the value All for the TeamsLocation parameter. You specify the entries by the email address or name of the account, distribution group, or mail-enabled security group.
11331133

11341134
To enter multiple values, use the following syntax: `<value1>,<value2>,...<valueX>`. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"<value1>","<value2>",..."<valueX>"`.
11351135

0 commit comments

Comments
 (0)