From e3e30486af747f609faa55effc5769aa67b00006 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Fri, 28 Mar 2025 07:22:13 -0700 Subject: [PATCH 01/18] Update set-csteamsmessagingconfiguration.md --- .../set-csteamsmessagingconfiguration.md | 48 +++++++++++++++++++ 1 file changed, 48 insertions(+) diff --git a/teams/teams-ps/teams/set-csteamsmessagingconfiguration.md b/teams/teams-ps/teams/set-csteamsmessagingconfiguration.md index dd01cdb45b..79f4c96eb3 100644 --- a/teams/teams-ps/teams/set-csteamsmessagingconfiguration.md +++ b/teams/teams-ps/teams/set-csteamsmessagingconfiguration.md @@ -24,6 +24,8 @@ Set-CsTeamsMessagingConfiguration [-Identity] [-Force] [-MessagingNotes ] [-UrlReputationCheck ] + [-ContentBasedPhishingCheck ] + [-ReportIncorrectSecurityDetections] [-WhatIf] [] ``` @@ -205,6 +207,52 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ContentBasedPhishingCheck + +>[!NOTE] +>This feature has not been released yet and will have no changes if it is enabled or disabled. + +This setting determines if Content Based Phishing Check in teams messaging across the whole tenant + +Possible Values: +- Enabled +- Disabled + +```yaml +Type: String +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: Enabled +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ReportIncorrectSecurityDetections + +>[!NOTE] +>This feature has not been released yet and will have no changes if it is enabled or disabled. + +This setting determines if Report Incorrect Security Detections is enabled in teams messaging across the whole tenant + +Possible Values: +- Enabled +- Disabled + +```yaml +Type: String +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: Enabled +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -WhatIf Shows what would happen if the cmdlet runs. From ebd0d29c7e5fa0181ce9dd91b872dc48cf329964 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 28 Apr 2025 09:59:33 -0700 Subject: [PATCH 02/18] Update New-CsTeamsChannelsPolicy.md --- .../teams/New-CsTeamsChannelsPolicy.md | 21 ++++++++++++++++++- 1 file changed, 20 insertions(+), 1 deletion(-) diff --git a/teams/teams-ps/teams/New-CsTeamsChannelsPolicy.md b/teams/teams-ps/teams/New-CsTeamsChannelsPolicy.md index e58f07ad06..b57ebf0394 100644 --- a/teams/teams-ps/teams/New-CsTeamsChannelsPolicy.md +++ b/teams/teams-ps/teams/New-CsTeamsChannelsPolicy.md @@ -16,7 +16,7 @@ The CsTeamsChannelsPolicy allows you to manage features related to the Teams & C ``` New-CsTeamsChannelsPolicy [-Tenant ] [-AllowOrgWideTeamCreation ] [-EnablePrivateTeamDiscovery ] [-AllowPrivateChannelCreation ] - [-AllowUserToParticipateInExternalSharedChannel ] [-AllowChannelSharingToExternalUser ] [-AllowSharedChannelCreation ] + [-AllowUserToParticipateInExternalSharedChannel ] [-AllowChannelSharingToExternalUser ] [-AllowSharedChannelCreation ] [-ThreadedChannelCreation ] [-Identity] [-InMemory] [-Force] [-WhatIf] [-Confirm] [-Description ] [] ``` @@ -200,6 +200,25 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ThreadedChannelCreation +This setting enables/disables Threaded Channel creation and editing. + +Possible Values: +- Enabled: Users are allowed to create and edit Threaded Channels. +- Disabled: Users are not allowed to create and edit Threaded Channels. + +```yaml +Type: String +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Description Specifies the description of the policy. From d8dc84ed8e0a1e9bee6cea96b2e0feae7ae657b1 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 28 Apr 2025 10:01:07 -0700 Subject: [PATCH 03/18] Update Set-CsTeamsChannelsPolicy.md --- .../teams/Set-CsTeamsChannelsPolicy.md | 21 ++++++++++++++++++- 1 file changed, 20 insertions(+), 1 deletion(-) diff --git a/teams/teams-ps/teams/Set-CsTeamsChannelsPolicy.md b/teams/teams-ps/teams/Set-CsTeamsChannelsPolicy.md index bdd2663355..d802a0e9be 100644 --- a/teams/teams-ps/teams/Set-CsTeamsChannelsPolicy.md +++ b/teams/teams-ps/teams/Set-CsTeamsChannelsPolicy.md @@ -22,7 +22,7 @@ The CsTeamsChannelsPolicy allows you to manage features related to the Teams and ``` Set-CsTeamsChannelsPolicy [-Tenant ] [-AllowOrgWideTeamCreation ] [-EnablePrivateTeamDiscovery ] [-AllowPrivateChannelCreation ] - [-AllowUserToParticipateInExternalSharedChannel ] [-AllowChannelSharingToExternalUser ] [-AllowSharedChannelCreation ] + [-AllowUserToParticipateInExternalSharedChannel ] [-AllowChannelSharingToExternalUser ] [-AllowSharedChannelCreation ] [-ThreadedChannelCreation ] [[-Identity] ] [-Force] [-WhatIf] [-Confirm] [] ``` @@ -227,6 +227,25 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ThreadedChannelCreation +This setting enables/disables Threaded Channel creation and editing. + +Possible Values: +- Enabled: Users are allowed to create and edit Threaded Channels. +- Disabled: Users are not allowed to create and edit Threaded Channels. + +```yaml +Type: String +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216). From 8b9d318add37f384321e96868dad1cf31daf6ddc Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 28 Apr 2025 10:04:01 -0700 Subject: [PATCH 04/18] Update New-CsTeamsEventsPolicy.md --- .../teams-ps/teams/New-CsTeamsEventsPolicy.md | 22 ++++++++++++++++++- 1 file changed, 21 insertions(+), 1 deletion(-) diff --git a/teams/teams-ps/teams/New-CsTeamsEventsPolicy.md b/teams/teams-ps/teams/New-CsTeamsEventsPolicy.md index 47c5db1a1d..9dc0c1e268 100644 --- a/teams/teams-ps/teams/New-CsTeamsEventsPolicy.md +++ b/teams/teams-ps/teams/New-CsTeamsEventsPolicy.md @@ -18,7 +18,8 @@ This cmdlet allows you to create a new TeamsEventsPolicy instance and set its pr New-CsTeamsEventsPolicy [-Identity] [-AllowWebinars ] [-AllowTownhalls ] [-AllowEmailEditing ] [-Description ] [-TownhallEventAttendeeAccess ] [-RecordingForTownhall ] [-RecordingForWebinar ] [-TranscriptionForTownhall ] [-TranscriptionForWebinar ] [-AllowEventIntegrations ] [-TownhallChatExperience ] -[-UseMicrosoftECDN ] [-EventAccessType ] [-ParticipantSlideControl ] [-WhatIf] [-Confirm] [] +[-UseMicrosoftECDN ] [-EventAccessType ] [-ParticipantSlideControl ] [-BroadcastPremiumApps ] +[-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -316,6 +317,25 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -BroadcastPremiumApps +This setting will enable Tenant Admins to specify if an organizer of a Teams Premium town hall may add an app that is accessible by everyone, including attendees, in a broadcast style Event including a Town hall. This does not include control over apps (such as AI Producer and Custom Streaming Apps) that are only accessible by the Event group. + +Possible values are: +- **Enabled**: An organizer of a Premium town hall can add a Premium App such as Polls to the Town hall +- **Disabled**: An organizer of a Premium town hall CANNOT add a Premium App such as Polls to the Town hall + +```yaml +Type: String +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: Enabled +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm The Confirm switch does not work with this cmdlet. From ee439d187b113d3deae190378987943ee4277425 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 28 Apr 2025 10:04:05 -0700 Subject: [PATCH 05/18] Update Set-CsTeamsEventsPolicy.md --- .../teams-ps/teams/Set-CsTeamsEventsPolicy.md | 20 +++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/teams/teams-ps/teams/Set-CsTeamsEventsPolicy.md b/teams/teams-ps/teams/Set-CsTeamsEventsPolicy.md index 9d2bc56c43..409399d602 100644 --- a/teams/teams-ps/teams/Set-CsTeamsEventsPolicy.md +++ b/teams/teams-ps/teams/Set-CsTeamsEventsPolicy.md @@ -22,6 +22,7 @@ Set-CsTeamsEventsPolicy [-AllowWebinars ] [-EventAccessType ] [- [-RecordingForTownhall ] [-RecordingForWebinar ] [-TranscriptionForTownhall ] [-TranscriptionForWebinar ] [-UseMicrosoftECDN ] [-ParticipantSlideControl ] + [-BroadcastPremiumApps ] [-Identity] [-Force] [-WhatIf] [-Confirm] [] ``` @@ -409,6 +410,25 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -BroadcastPremiumApps +This setting will enable Tenant Admins to specify if an organizer of a Teams Premium town hall may add an app that is accessible by everyone, including attendees, in a broadcast style Event including a Town hall. This does not include control over apps (such as AI Producer and Custom Streaming Apps) that are only accessible by the Event group. + +Possible values are: +- **Enabled**: An organizer of a Premium town hall can add a Premium App such as Polls to the Town hall +- **Disabled**: An organizer of a Premium town hall CANNOT add a Premium App such as Polls to the Town hall + +```yaml +Type: String +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: Enabled +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm The Confirm switch does not work with this cmdlet. From d88f1b743574b91ceb55fd8e353fcb6051910834 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 28 Apr 2025 10:04:56 -0700 Subject: [PATCH 06/18] Update Set-CsTeamsChannelsPolicy.md --- teams/teams-ps/teams/Set-CsTeamsChannelsPolicy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/teams/teams-ps/teams/Set-CsTeamsChannelsPolicy.md b/teams/teams-ps/teams/Set-CsTeamsChannelsPolicy.md index d802a0e9be..a6e29ca6ed 100644 --- a/teams/teams-ps/teams/Set-CsTeamsChannelsPolicy.md +++ b/teams/teams-ps/teams/Set-CsTeamsChannelsPolicy.md @@ -241,7 +241,7 @@ Aliases: Required: False Position: Named -Default value: None +Default value: Enabled Accept pipeline input: False Accept wildcard characters: False ``` From e477e5f05ef2baa62714b228273e62beb3ee5f47 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 28 Apr 2025 10:05:17 -0700 Subject: [PATCH 07/18] Update New-CsTeamsChannelsPolicy.md --- teams/teams-ps/teams/New-CsTeamsChannelsPolicy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/teams/teams-ps/teams/New-CsTeamsChannelsPolicy.md b/teams/teams-ps/teams/New-CsTeamsChannelsPolicy.md index b57ebf0394..fd19f2ca12 100644 --- a/teams/teams-ps/teams/New-CsTeamsChannelsPolicy.md +++ b/teams/teams-ps/teams/New-CsTeamsChannelsPolicy.md @@ -214,7 +214,7 @@ Aliases: Required: False Position: Named -Default value: None +Default value: Enabled Accept pipeline input: False Accept wildcard characters: False ``` From d3ab7dcfa29aa0c2a90bb6a1c9bc0ce15dc8e894 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 12 May 2025 10:18:46 -0700 Subject: [PATCH 08/18] Update Set-CsTenantFederationConfiguration.md --- .../Set-CsTenantFederationConfiguration.md | 27 ++----------------- 1 file changed, 2 insertions(+), 25 deletions(-) diff --git a/teams/teams-ps/teams/Set-CsTenantFederationConfiguration.md b/teams/teams-ps/teams/Set-CsTenantFederationConfiguration.md index 64e74b9abd..1fa4575265 100644 --- a/teams/teams-ps/teams/Set-CsTenantFederationConfiguration.md +++ b/teams/teams-ps/teams/Set-CsTenantFederationConfiguration.md @@ -23,7 +23,7 @@ These settings are used to determine which domains (if any) your users are allow ``` Set-CsTenantFederationConfiguration [-Tenant ] [-AllowedDomains ] [-BlockedDomains ] [-BlockAllSubdomains ] - [-AllowFederatedUsers ] [-AllowPublicUsers ] [-AllowTeamsConsumer ] [-AllowTeamsConsumerInbound ] + [-AllowFederatedUsers ] [-AllowTeamsConsumer ] [-AllowTeamsConsumerInbound ] [-TreatDiscoveredPartnersAsUnverified ] [-SharedSipAddressSpace ] [-RestrictTeamsConsumerToExternalUserProfiles ] [-AllowedDomainsAsAList ] [-ExternalAccessWithTrialTenants ] [-AllowedTrialTenantDomains ] @@ -33,7 +33,7 @@ Set-CsTenantFederationConfiguration [-Tenant ] ### Instance ``` Set-CsTenantFederationConfiguration [-Tenant ] [-AllowedDomains ] - [-BlockedDomains ] [-BlockAllSubdomains ] [-AllowFederatedUsers ] [-AllowPublicUsers ] + [-BlockedDomains ] [-BlockAllSubdomains ] [-AllowFederatedUsers ] [-TreatDiscoveredPartnersAsUnverified ] [-SharedSipAddressSpace ] [-RestrictTeamsConsumerToExternalUserProfiles ] [-AllowedDomainsAsAList ] [-Instance ] [-Force] [-WhatIf] [-Confirm] [] ``` @@ -54,13 +54,6 @@ However, administrators must use the `Set-CsTenantPublicProvider` cmdlet in orde ### -------------------------- Example 1 -------------------------- ``` -Set-CsTenantFederationConfiguration -AllowPublicUsers $False -``` - -The command shown in Example 1 disables communication with public providers for the current tenant. - -### -------------------------- Example 2 -------------------------- -``` $x = New-CsEdgeDomainPattern -Domain "fabrikam.com" Set-CsTenantFederationConfiguration -BlockedDomains @{Replace=$x} @@ -260,22 +253,6 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -AllowPublicUsers -When set to True (the default value) users will be potentially allowed to communicate with users who have accounts on public IM and presence providers such as Windows Live, Yahoo, and AOL. -The collection of public providers that users can actually communicate with is managed by using the `Set-CsTenantPublicProvider` cmdlet. - -```yaml -Type: Boolean -Parameter Sets: (All) -Aliases: -applicable: Microsoft Teams - -Required: False -Position: Named -Default value: None -Accept pipeline input: False -Accept wildcard characters: False -``` ### -AllowTeamsConsumer Allows federation with people using Teams with an account that's not managed by an organization. From b63dd1b6e640d24b8c75d245c42181b198dc3821 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 12 May 2025 10:19:19 -0700 Subject: [PATCH 09/18] Update Set-CsTeamsEventsPolicy.md --- .../teams-ps/teams/Set-CsTeamsEventsPolicy.md | 24 +------------------ 1 file changed, 1 insertion(+), 23 deletions(-) diff --git a/teams/teams-ps/teams/Set-CsTeamsEventsPolicy.md b/teams/teams-ps/teams/Set-CsTeamsEventsPolicy.md index fd1918792c..bf14cb6cb1 100644 --- a/teams/teams-ps/teams/Set-CsTeamsEventsPolicy.md +++ b/teams/teams-ps/teams/Set-CsTeamsEventsPolicy.md @@ -21,8 +21,7 @@ Set-CsTeamsEventsPolicy [-AllowWebinars ] [-EventAccessType ] [- [-AllowedTownhallTypesForRecordingPublish ] [-TownhallChatExperience ] [-Description ] [-RecordingForTownhall ] [-RecordingForWebinar ] [-TranscriptionForTownhall ] [-TranscriptionForWebinar ] - [-UseMicrosoftECDN ] [-ParticipantSlideControl ] - [-BroadcastPremiumApps ] + [-UseMicrosoftECDN ] [-BroadcastPremiumApps ] ``` ## DESCRIPTION @@ -388,27 +387,6 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -ParticipantSlideControl -This setting governs whether participants can give control of presentation slides during meetings scheduled by this user. Set the type of users you want to be able to give control and be given control of presentation slides in meetings. Users excluded from the selected group will be prohibited from giving control, or being given control, in a meeting. - -Possible values are: - - **Everyone**: Anyone with the join link may enter the event. - - **EveryoneInOrganization**: Only internal AAD users and Multi-Tenant Organization (MTO) users can give or take control. - - **EveryoneInOrganizationAndGuests**: Only those who are Guests to the tenant, MTO users, and internal AAD users may enter the event. - - **None**: No one in the meeting can give or take control. - -```yaml -Type: String -Parameter Sets: (All) -Aliases: - -Required: False -Position: Named -Default value: EveryoneInOrganization -Accept pipeline input: False -Accept wildcard characters: False -``` - ### -BroadcastPremiumApps This setting will enable Tenant Admins to specify if an organizer of a Teams Premium town hall may add an app that is accessible by everyone, including attendees, in a broadcast style Event including a Town hall. This does not include control over apps (such as AI Producer and Custom Streaming Apps) that are only accessible by the Event group. From 013307316a1e3c8b406172dbe61dc05f2507840c Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 12 May 2025 10:20:38 -0700 Subject: [PATCH 10/18] Update New-CsTeamsEventsPolicy.md --- .../teams-ps/teams/New-CsTeamsEventsPolicy.md | 23 +------------------ 1 file changed, 1 insertion(+), 22 deletions(-) diff --git a/teams/teams-ps/teams/New-CsTeamsEventsPolicy.md b/teams/teams-ps/teams/New-CsTeamsEventsPolicy.md index 7382fa22c7..778df29878 100644 --- a/teams/teams-ps/teams/New-CsTeamsEventsPolicy.md +++ b/teams/teams-ps/teams/New-CsTeamsEventsPolicy.md @@ -18,7 +18,7 @@ This cmdlet allows you to create a new TeamsEventsPolicy instance and set its pr New-CsTeamsEventsPolicy [-Identity] [-AllowWebinars ] [-AllowTownhalls ] [-AllowEmailEditing ] [-Description ] [-TownhallEventAttendeeAccess ] [-RecordingForTownhall ] [-RecordingForWebinar ] [-TranscriptionForTownhall ] [-TranscriptionForWebinar ] [-AllowEventIntegrations ] [-TownhallChatExperience ] -[-UseMicrosoftECDN ] [-EventAccessType ] [-ParticipantSlideControl ] [-BroadcastPremiumApps ] [-WhatIf] [-Confirm] [] +[-UseMicrosoftECDN ] [-EventAccessType ] [-BroadcastPremiumApps ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -295,27 +295,6 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -ParticipantSlideControl -This setting governs whether participants can give control of presentation slides during meetings scheduled by this user. Set the type of users you want to be able to give control and be given control of presentation slides in meetings. Users excluded from the selected group will be prohibited from giving control, or being given control, in a meeting. - -Possible values are: - - **Everyone**: Anyone with the join link may enter the event. - - **EveryoneInOrganization**: Only internal AAD users and Multi-Tenant Organization (MTO) users can give or take control. - - **EveryoneInOrganizationAndGuests**: Only those who are Guests to the tenant, MTO users, and internal AAD users may enter the event. - - **None**: No one in the meeting can give or take control. - -```yaml -Type: String -Parameter Sets: (All) -Aliases: - -Required: False -Position: Named -Default value: EveryoneInOrganization -Accept pipeline input: False -Accept wildcard characters: False -``` - ### -BroadcastPremiumApps This setting will enable Tenant Admins to specify if an organizer of a Teams Premium town hall may add an app that is accessible by everyone, including attendees, in a broadcast style Event including a Town hall. This does not include control over apps (such as AI Producer and Custom Streaming Apps) that are only accessible by the Event group. From 61a8b290954e00ae72ed83d2b6d21e8c5addb566 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 12 May 2025 11:15:15 -0700 Subject: [PATCH 11/18] Update New-CsExternalAccessPolicy.md --- .../skype/New-CsExternalAccessPolicy.md | 25 ++----------------- 1 file changed, 2 insertions(+), 23 deletions(-) diff --git a/skype/skype-ps/skype/New-CsExternalAccessPolicy.md b/skype/skype-ps/skype/New-CsExternalAccessPolicy.md index cee7711844..ebd44e7c8d 100644 --- a/skype/skype-ps/skype/New-CsExternalAccessPolicy.md +++ b/skype/skype-ps/skype/New-CsExternalAccessPolicy.md @@ -25,8 +25,7 @@ For information about external access in Microsoft Teams, see [Manage external a ```powershell New-CsExternalAccessPolicy [-Tenant ] [-Description ] [-EnableFederationAccess ] [-EnableAcsFederationAccess ] - [-EnableXmppAccess ] [-EnablePublicCloudAccess ] - [-EnablePublicCloudAudioVideoAccess ] [-EnableTeamsConsumerAccess ] [-EnableTeamsConsumerInbound ] [-EnableOutsideAccess ] [-Identity] + [-EnableXmppAccess ] [-EnablePublicCloudAudioVideoAccess ] [-EnableTeamsConsumerAccess ] [-EnableTeamsConsumerInbound ] [-EnableOutsideAccess ] [-Identity] [-InMemory] [-Force] [-WhatIf] [-Confirm] [] ``` @@ -97,8 +96,6 @@ $x = New-CsExternalAccessPolicy -Identity RedmondAccessPolicy -InMemory $x.EnableFederationAccess = $True -$x.EnablePublicCloudAccess = $True - $x.EnableOutsideAccess = $True Set-CsExternalAccessPolicy -Instance $x @@ -108,7 +105,7 @@ Example 4 demonstrates the use of the InMemory parameter; this parameter enables After it has been created, you can modify the in-memory-only instance, then use the Set-CsExternalAccessPolicy cmdlet to transform the virtual policy into a real external access policy. To do this, the first command in the example uses the New-CsExternalAccessPolicy cmdlet and the InMemory parameter to create a virtual policy with the Identity RedmondAccessPolicy; this virtual policy is stored in a variable named $x. -The next three commands are used to modify three properties of the virtual policy: EnableFederationAccess, EnablePublicCloudAccess, and the EnableOutsideAccess. +The next three commands are used to modify two properties of the virtual policy: EnableFederationAccess and the EnableOutsideAccess. Finally, the last command uses the Set-CsExternalAccessPolicy cmdlet to create an actual per-user external access policy with the Identity RedmondAccessPolicy. If you do not call the Set-CsExternalAccessPolicy cmdlet, then the virtual policy will disappear as soon as you end your Windows PowerShell session or delete the variable $x. Should that happen, an external access policy with the Identity RedmondAccessPolicy will never be created. @@ -250,24 +247,6 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -EnablePublicCloudAccess -Indicates whether the user is allowed to communicate with people who have SIP accounts with a public Internet connectivity provider such as MSN. -Read [Manage external access in Microsoft Teams](/microsoftteams/manage-external-access) to get more information about the effect of this parameter in Microsoft Teams. -The default value is False. - -```yaml -Type: Boolean -Parameter Sets: (All) -Aliases: -Applicable: Lync Server 2010, Lync Server 2013, Skype for Business Online, Skype for Business Server 2015, Skype for Business Server 2019 - -Required: False -Position: Named -Default value: None -Accept pipeline input: False -Accept wildcard characters: False -``` - ### -EnablePublicCloudAudioVideoAccess Indicates whether the user is allowed to conduct audio/video conversations with people who have SIP accounts with a public Internet connectivity provider such as MSN. When set to False, audio and video options in Skype for Business Server will be disabled any time a user is communicating with a public Internet connectivity contact. From 8fb18424cd212eb128fc54b3ce6fb970f49e45b1 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 12 May 2025 11:16:02 -0700 Subject: [PATCH 12/18] Update Set-CsExternalAccessPolicy.md --- .../skype/Set-CsExternalAccessPolicy.md | 26 +++---------------- 1 file changed, 3 insertions(+), 23 deletions(-) diff --git a/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md b/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md index 6c3a7aa2de..887edaf102 100644 --- a/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md +++ b/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md @@ -22,15 +22,14 @@ This cmdlet was introduced in Lync Server 2010. ### Identity (Default) ``` Set-CsExternalAccessPolicy [-Tenant ] [-Description ] [-EnableFederationAccess ] [-EnableAcsFederationAccess ] - [-EnableXmppAccess ] [-EnablePublicCloudAccess ] - [-EnablePublicCloudAudioVideoAccess ] [-EnableTeamsConsumerAccess ] [-EnableTeamsConsumerInbound ] [-EnableOutsideAccess ] [[-Identity] ] + [-EnableXmppAccess ] [-EnablePublicCloudAudioVideoAccess ] [-EnableTeamsConsumerAccess ] [-EnableTeamsConsumerInbound ] [-EnableOutsideAccess ] [[-Identity] ] [-Force] [-WhatIf] [-Confirm] [] ``` ### Instance ``` Set-CsExternalAccessPolicy [-Tenant ] [-Description ] [-EnableFederationAccess ] [-EnableAcsFederationAccess ] - [-EnableXmppAccess ] [-EnablePublicCloudAccess ] + [-EnableXmppAccess ] [-EnablePublicCloudAudioVideoAccess ] [-EnableTeamsConsumerAccess ] [-EnableTeamsConsumerInbound ] [-EnableOutsideAccess ] [-Instance ] [-Force] [-WhatIf] [-Confirm] [] ``` @@ -93,12 +92,11 @@ Any policy with an Identity that begins with "tag:" has been configured at the p ### -------------------------- Example 4 ------------------------ ``` -Get-CsExternalAccessPolicy | Where-Object {$_.EnablePublicCloudAccess -eq $True} | Set-CsExternalAccessPolicy -EnableFederationAccess $True +Set-CsExternalAccessPolicy -EnableFederationAccess $True ``` In Example 4, federation access is enabled for all the external access policies that allow public cloud access. To do this, the command first uses the `Get-CsExternalAccessPolicy` cmdlet to return a collection of all the external access policies currently configured for use in the organization. -This collection is piped to the `Where-Object` cmdlet, which picks out only those policies where the EnablePublicCloudAccess property is equal to True. The filtered collection is then piped to the `Set-CsExternalAccessPolicy` cmdlet, which takes each policy and sets the EnableFederationAccess property to True. The net result: all external access policies that allow public cloud access will also allow federation access. @@ -215,24 +213,6 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -EnablePublicCloudAccess -Indicates whether the user is allowed to communicate with people who have SIP accounts with a public Internet connectivity provider such as MSN. -Read [Manage external access in Microsoft Teams](/microsoftteams/manage-external-access) to get more information about the effect of this parameter in Microsoft Teams. -The default value is False. - -```yaml -Type: Boolean -Parameter Sets: (All) -Aliases: -Applicable: Lync Server 2010, Lync Server 2013, Skype for Business Online, Skype for Business Server 2015, Skype for Business Server 2019 - -Required: False -Position: Named -Default value: None -Accept pipeline input: False -Accept wildcard characters: False -``` - ### -EnablePublicCloudAudioVideoAccess Indicates whether the user is allowed to conduct audio/video conversations with people who have SIP accounts with a public Internet connectivity provider such as MSN. When set to False, audio and video options in Skype for Business will be disabled any time a user is communicating with a public Internet connectivity contact. From 6b39eaf7522c4ae5f7dbf7766043389ea34ff658 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 12 May 2025 11:16:51 -0700 Subject: [PATCH 13/18] Update New-CsExternalAccessPolicy.md --- .../teams/New-CsExternalAccessPolicy.md | 22 +------------------ 1 file changed, 1 insertion(+), 21 deletions(-) diff --git a/teams/teams-ps/teams/New-CsExternalAccessPolicy.md b/teams/teams-ps/teams/New-CsExternalAccessPolicy.md index 482fe6882c..39a83567f8 100644 --- a/teams/teams-ps/teams/New-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/New-CsExternalAccessPolicy.md @@ -33,7 +33,6 @@ New-CsExternalAccessPolicy [-Identity] [-EnableAcsFederationAccess ] [-EnableFederationAccess ] [-EnableOutsideAccess ] - [-EnablePublicCloudAccess ] [-EnablePublicCloudAudioVideoAccess ] [-EnableTeamsConsumerAccess ] [-EnableTeamsConsumerInbound ] @@ -114,8 +113,6 @@ $x = New-CsExternalAccessPolicy -Identity RedmondAccessPolicy -InMemory $x.EnableFederationAccess = $True -$x.EnablePublicCloudAccess = $True - $x.EnableOutsideAccess = $True Set-CsExternalAccessPolicy -Instance $x @@ -125,7 +122,7 @@ Example 4 demonstrates the use of the InMemory parameter; this parameter enables After it has been created, you can modify the in-memory-only instance, then use the Set-CsExternalAccessPolicy cmdlet to transform the virtual policy into a real external access policy. To do this, the first command in the example uses the New-CsExternalAccessPolicy cmdlet and the InMemory parameter to create a virtual policy with the Identity RedmondAccessPolicy; this virtual policy is stored in a variable named $x. -The next three commands are used to modify three properties of the virtual policy: EnableFederationAccess, EnablePublicCloudAccess, and the EnableOutsideAccess. +The next three commands are used to modify two properties of the virtual policy: EnableFederationAccess and the EnableOutsideAccess. Finally, the last command uses the Set-CsExternalAccessPolicy cmdlet to create an actual per-user external access policy with the Identity RedmondAccessPolicy. If you do not call the Set-CsExternalAccessPolicy cmdlet, then the virtual policy will disappear as soon as you end your Windows PowerShell session or delete the variable $x. Should that happen, an external access policy with the Identity RedmondAccessPolicy will never be created. @@ -299,23 +296,6 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -EnablePublicCloudAccess -Indicates whether the user is allowed to communicate with people who have SIP accounts with a public Internet connectivity provider such as MSN. -Read [Manage external access in Microsoft Teams](https://learn.microsoft.com/microsoftteams/manage-external-access) to get more information about the effect of this parameter in Microsoft Teams. -The default value is False. - -```yaml -Type: Boolean -Parameter Sets: (All) -Aliases: - -Required: False -Position: Named -Default value: None -Accept pipeline input: False -Accept wildcard characters: False -``` - ### -EnablePublicCloudAudioVideoAccess Indicates whether the user is allowed to conduct audio/video conversations with people who have SIP accounts with a public Internet connectivity provider such as MSN. When set to False, audio and video options in Skype for Business Server will be disabled any time a user is communicating with a public Internet connectivity contact. From 977f02ff9ab16c1602b37e9b6654053dd926c342 Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 12 May 2025 11:19:23 -0700 Subject: [PATCH 14/18] Update Set-CsExternalAccessPolicy.md --- .../teams/Set-CsExternalAccessPolicy.md | 31 ------------------- 1 file changed, 31 deletions(-) diff --git a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md index cc47d65e5b..5924645255 100644 --- a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md @@ -28,7 +28,6 @@ Set-CsExternalAccessPolicy [[-Identity] ] [-EnableAcsFederationAccess ] [-EnableFederationAccess ] [-EnableOutsideAccess ] - [-EnablePublicCloudAccess ] [-EnablePublicCloudAudioVideoAccess ] [-EnableTeamsConsumerAccess ] [-EnableTeamsConsumerInbound ] @@ -53,7 +52,6 @@ Set-CsExternalAccessPolicy [-Instance ] [-EnableAcsFederationAccess ] [-EnableFederationAccess ] [-EnableOutsideAccess ] - [-EnablePublicCloudAccess ] [-EnablePublicCloudAudioVideoAccess ] [-EnableTeamsConsumerAccess ] [-EnableTeamsConsumerInbound ] @@ -125,17 +123,6 @@ Any policy with an Identity that begins with "tag:" has been configured at the p ### -------------------------- Example 4 ------------------------ ``` -Get-CsExternalAccessPolicy | Where-Object {$_.EnablePublicCloudAccess -eq $True} | Set-CsExternalAccessPolicy -EnableFederationAccess $True -``` - -In Example 4, federation access is enabled for all the external access policies that allow public cloud access. -To do this, the command first uses the `Get-CsExternalAccessPolicy` cmdlet to return a collection of all the external access policies currently configured for use in the organization. -This collection is piped to the `Where-Object` cmdlet, which picks out only those policies where the EnablePublicCloudAccess property is equal to True. -The filtered collection is then piped to the `Set-CsExternalAccessPolicy` cmdlet, which takes each policy and sets the EnableFederationAccess property to True. -The net result: all external access policies that allow public cloud access will also allow federation access. - -### -------------------------- Example 5 ------------------------ -``` Set-CsExternalAccessPolicy -Identity Global -EnableAcsFederationAccess $false New-CsExternalAccessPolicy -Identity AcsFederationAllowed -EnableAcsFederationAccess $true ``` @@ -340,24 +327,6 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -EnablePublicCloudAccess -Indicates whether the user is allowed to communicate with people who have SIP accounts with a public Internet connectivity provider such as MSN. -Read [Manage external access in Microsoft Teams](https://learn.microsoft.com/microsoftteams/manage-external-access) to get more information about the effect of this parameter in Microsoft Teams. -The default value is False. - -```yaml -Type: Boolean -Parameter Sets: (All) -Aliases: -Applicable: Lync Server 2010, Lync Server 2013, Skype for Business Online, Skype for Business Server 2015, Skype for Business Server 2019 - -Required: False -Position: Named -Default value: None -Accept pipeline input: False -Accept wildcard characters: False -``` - ### -EnablePublicCloudAudioVideoAccess Indicates whether the user is allowed to conduct audio/video conversations with people who have SIP accounts with a public Internet connectivity provider such as MSN. When set to False, audio and video options in Skype for Business will be disabled any time a user is communicating with a public Internet connectivity contact. From 3f54cfefd40dd8144a841997287d04c1850c236c Mon Sep 17 00:00:00 2001 From: alejandramunozv <163162817+alejandramunozv@users.noreply.github.com> Date: Mon, 12 May 2025 11:22:05 -0700 Subject: [PATCH 15/18] Update Set-CsExternalAccessPolicy.md --- skype/skype-ps/skype/Set-CsExternalAccessPolicy.md | 10 ---------- 1 file changed, 10 deletions(-) diff --git a/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md b/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md index 887edaf102..de908890a9 100644 --- a/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md +++ b/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md @@ -92,16 +92,6 @@ Any policy with an Identity that begins with "tag:" has been configured at the p ### -------------------------- Example 4 ------------------------ ``` -Set-CsExternalAccessPolicy -EnableFederationAccess $True -``` - -In Example 4, federation access is enabled for all the external access policies that allow public cloud access. -To do this, the command first uses the `Get-CsExternalAccessPolicy` cmdlet to return a collection of all the external access policies currently configured for use in the organization. -The filtered collection is then piped to the `Set-CsExternalAccessPolicy` cmdlet, which takes each policy and sets the EnableFederationAccess property to True. -The net result: all external access policies that allow public cloud access will also allow federation access. - -### -------------------------- Example 5 ------------------------ -``` Set-CsExternalAccessPolicy -Identity Global -EnableAcsFederationAccess $false New-CsExternalAccessPolicy -Identity AcsFederationAllowed -EnableAcsFederationAccess $true ``` From 2cf9182e049394645e7aa88c99cc50686314ca8c Mon Sep 17 00:00:00 2001 From: Ruchika Mittal Date: Tue, 13 May 2025 01:27:33 +0530 Subject: [PATCH 16/18] typo fix --- skype/skype-ps/skype/New-CsExternalAccessPolicy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/skype/skype-ps/skype/New-CsExternalAccessPolicy.md b/skype/skype-ps/skype/New-CsExternalAccessPolicy.md index ebd44e7c8d..b52bde48d6 100644 --- a/skype/skype-ps/skype/New-CsExternalAccessPolicy.md +++ b/skype/skype-ps/skype/New-CsExternalAccessPolicy.md @@ -192,7 +192,7 @@ Accept wildcard characters: False ``` ### -EnableTeamsConsumerInbound -(Microsoft Teams Only) Indicates whether the user is allowed to be discoverable by people who are using Teams with an account that's not managed by an organization. It also controls if people who have who are using Teams with an account that's not managed by an organization can start the communication with the user. +(Microsoft Teams Only) Indicates whether the user is allowed to be discoverable by people who are using Teams with an account that's not managed by an organization. It also controls if people who are using Teams with an account that's not managed by an organization can start the communication with the user. To enable just for a selected set of users, use the Set-CsExternalAccessPolicy cmdlet to update the global policy, setting the value to False. Then assign selected users a policy with federation enabled. From 7e5e1a6eb1e4142dd1c62b1281df57fb9c3d85aa Mon Sep 17 00:00:00 2001 From: Ruchika Mittal Date: Tue, 13 May 2025 01:29:01 +0530 Subject: [PATCH 17/18] typo fix --- skype/skype-ps/skype/Set-CsExternalAccessPolicy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md b/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md index de908890a9..503f7ca5c3 100644 --- a/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md +++ b/skype/skype-ps/skype/Set-CsExternalAccessPolicy.md @@ -86,7 +86,7 @@ Get-CsExternalAccessPolicy -Filter tag:* | Set-CsExternalAccessPolicy -EnableFed ``` Example 3 enables federation access for all the external access policies that have been configured at the per-user scope. -To carry out this task, the first thing the command does is use the `Get-CsExternalAcessPolicy` cmdlet and the Filter parameter to return a collection of all the policies that have been configured at the per-user scope. +To carry out this task, the first thing the command does is use the `Get-CsExternalAccessPolicy` cmdlet and the Filter parameter to return a collection of all the policies that have been configured at the per-user scope. (The filter value "tag:*" limits returned data to policies that have an Identity that begins with the string value "tag:". Any policy with an Identity that begins with "tag:" has been configured at the per-user scope.) The filtered collection is then piped to the `Set-CsExternalAccessPolicy` cmdlet, which modifies the EnableFederationAccess property for each policy in the collection. From 9295271d75cfcaed0bf5ba8722209f7e18d76396 Mon Sep 17 00:00:00 2001 From: Chris Davis Date: Mon, 12 May 2025 13:42:57 -0700 Subject: [PATCH 18/18] Update Get-QuarantineMessage.md Domain parameter to reserved. --- exchange/exchange-ps/exchange/Get-QuarantineMessage.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exchange/exchange-ps/exchange/Get-QuarantineMessage.md b/exchange/exchange-ps/exchange/Get-QuarantineMessage.md index 43a8059632..7e98a8ee18 100644 --- a/exchange/exchange-ps/exchange/Get-QuarantineMessage.md +++ b/exchange/exchange-ps/exchange/Get-QuarantineMessage.md @@ -141,7 +141,7 @@ Accept wildcard characters: False ``` ### -Domain -The Domain parameter filters the results by sender or recipient domain. You can specify multiple domain values separated by commas. +This parameter is reserved for internal Microsoft use. ```yaml Type: String[]