From 2dfc1bcb495c620f60a0f64618d1d531551324c8 Mon Sep 17 00:00:00 2001 From: Krammer Liu <99905184+krammerliu@users.noreply.github.com> Date: Mon, 5 May 2025 13:35:39 -0700 Subject: [PATCH 1/9] Update Set-CsExternalAccessPolicy.md --- teams/teams-ps/teams/Set-CsExternalAccessPolicy.md | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md index cc47d65e5b..5d64789544 100644 --- a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md @@ -156,7 +156,7 @@ New-CsExternalAccessPolicy -Identity GranularFederationExample -CommunicationWit Set-CsTenantFederationConfiguration -CustomizeFederation $true ``` -In this example, we create an ExternalAccessPolicy named "GranularFederationExample" that allows communication with specific external domains, namely `example1.com` and `example2.com`. The federation policy is set to restrict communication to only these allowed domains. After that, we still have to enable the `CustomizeFederation` setting in the TenantFederationConfiguration to allow the federation settings as defined in the ExternalAccessPolicy to work. +[Private Preview] In this example, we create an ExternalAccessPolicy named "GranularFederationExample" that allows communication with specific external domains, namely `example1.com` and `example2.com`. The federation policy is set to restrict communication to only these allowed domains. ## PARAMETERS @@ -200,7 +200,7 @@ Accept wildcard characters: False ``` ### -AllowedExternalDomains -Indicates the domains that are allowed to communicate with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `AllowSpecificExternalDomains` +[Private Preview] Indicates the domains that are allowed to communicate with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `AllowSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. ```yaml Type: List Parameter Sets: (All) @@ -215,7 +215,7 @@ Accept wildcard characters: False ``` ### -BlockedExternalDomains -Indicates the domains that are blocked from communicating with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `BlockSpecificExternalDomains` +[Private Preview] Indicates the domains that are blocked from communicating with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `BlockSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. ```yaml Type: List Parameter Sets: (All) @@ -230,7 +230,7 @@ Accept wildcard characters: False ``` ### -CommunicationWithExternalOrgs -Indicates how the users get assigned by this policy can communicate with the external orgs. There are 5 options: +[Private Preview] Indicates how the users get assigned by this policy can communicate with the external orgs. There are 5 options: - OrganizationDefault: the users of this policy will follow the federation settings defined in TenantFederationConfiguration. - AllowAllExternalDomains: the users are open to communicate with all domains. @@ -238,6 +238,7 @@ Indicates how the users get assigned by this policy can communicate with the ext - BlockSpecificExternalDomains: only users from the domains defined in `BlockedExternalDomains` are blocked from communicating with the users of this policy. - BlockAllExternalDomains: the users are not able to communicate with any external domains. +The setting only applies if `EnableAcsFederationAccess` is true. Simiar to `AllowedExternalDomains` and `BlockedExternalDomains`, only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. ```yaml Type: String Parameter Sets: (All) From d717c46574a68b24c706b86428d46b3a8ba98615 Mon Sep 17 00:00:00 2001 From: Krammer Liu <99905184+krammerliu@users.noreply.github.com> Date: Mon, 5 May 2025 13:42:20 -0700 Subject: [PATCH 2/9] Update Set-CsExternalAccessPolicy.md --- teams/teams-ps/teams/Set-CsExternalAccessPolicy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md index 5d64789544..0189ed21a4 100644 --- a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md @@ -238,7 +238,7 @@ Accept wildcard characters: False - BlockSpecificExternalDomains: only users from the domains defined in `BlockedExternalDomains` are blocked from communicating with the users of this policy. - BlockAllExternalDomains: the users are not able to communicate with any external domains. -The setting only applies if `EnableAcsFederationAccess` is true. Simiar to `AllowedExternalDomains` and `BlockedExternalDomains`, only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. +The setting only applies if `EnableFederationAccess` is true. Simiar to `AllowedExternalDomains` and `BlockedExternalDomains`, only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. ```yaml Type: String Parameter Sets: (All) From 6ff62010e81a08d3b17b5175ba733295379911d5 Mon Sep 17 00:00:00 2001 From: Krammer Liu <99905184+krammerliu@users.noreply.github.com> Date: Thu, 8 May 2025 14:31:45 -0700 Subject: [PATCH 3/9] Update Set-CsExternalAccessPolicy.md --- .../teams/Set-CsExternalAccessPolicy.md | 18 +++++++++++++----- 1 file changed, 13 insertions(+), 5 deletions(-) diff --git a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md index 0189ed21a4..3130072982 100644 --- a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md @@ -155,8 +155,7 @@ In this example, the Global policy is updated to allow Teams-ACS federation for New-CsExternalAccessPolicy -Identity GranularFederationExample -CommunicationWithExternalOrgs "AllowSpecificExternalDomains" -AllowedExternalDomains @("example1.com", "example2.com") Set-CsTenantFederationConfiguration -CustomizeFederation $true ``` - -[Private Preview] In this example, we create an ExternalAccessPolicy named "GranularFederationExample" that allows communication with specific external domains, namely `example1.com` and `example2.com`. The federation policy is set to restrict communication to only these allowed domains. +In this example, we create an ExternalAccessPolicy named "GranularFederationExample" that allows communication with specific external domains, namely `example1.com` and `example2.com`. The federation policy is set to restrict communication to only these allowed domains. ## PARAMETERS @@ -200,7 +199,10 @@ Accept wildcard characters: False ``` ### -AllowedExternalDomains -[Private Preview] Indicates the domains that are allowed to communicate with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `AllowSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. +> [!NOTE] +> Please note that this parameter is in Private Preview. + +Indicates the domains that are allowed to communicate with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `AllowSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. ```yaml Type: List Parameter Sets: (All) @@ -215,7 +217,10 @@ Accept wildcard characters: False ``` ### -BlockedExternalDomains -[Private Preview] Indicates the domains that are blocked from communicating with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `BlockSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. +> [!NOTE] +> Please note that this parameter is in Private Preview. + +Indicates the domains that are blocked from communicating with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `BlockSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. ```yaml Type: List Parameter Sets: (All) @@ -230,7 +235,10 @@ Accept wildcard characters: False ``` ### -CommunicationWithExternalOrgs -[Private Preview] Indicates how the users get assigned by this policy can communicate with the external orgs. There are 5 options: +> [!NOTE] +> Please note that this parameter is in Private Preview. + +Indicates how the users get assigned by this policy can communicate with the external orgs. There are 5 options: - OrganizationDefault: the users of this policy will follow the federation settings defined in TenantFederationConfiguration. - AllowAllExternalDomains: the users are open to communicate with all domains. From 91d96c41987441caf608e63ae399e731a2bdd008 Mon Sep 17 00:00:00 2001 From: Krammer Liu <99905184+krammerliu@users.noreply.github.com> Date: Thu, 8 May 2025 14:35:13 -0700 Subject: [PATCH 4/9] Update New-CsExternalAccessPolicy.md --- .../teams/New-CsExternalAccessPolicy.md | 26 +++++++++++++------ 1 file changed, 18 insertions(+), 8 deletions(-) diff --git a/teams/teams-ps/teams/New-CsExternalAccessPolicy.md b/teams/teams-ps/teams/New-CsExternalAccessPolicy.md index 482fe6882c..8498361f65 100644 --- a/teams/teams-ps/teams/New-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/New-CsExternalAccessPolicy.md @@ -136,7 +136,7 @@ New-CsExternalAccessPolicy -Identity GranularFederationExample -CommunicationWit Set-CsTenantFederationConfiguration -CustomizeFederation $true ``` -In this example, we create an ExternalAccessPolicy named "GranularFederationExample" that allows communication with specific external domains, namely `example1.com` and `example2.com`. The federation policy is set to restrict communication to only these allowed domains. After that, we still have to enable the `CustomizeFederation` setting in the TenantFederationConfiguration to allow the federation settings as defined in the ExternalAccessPolicy to work. +In this example, we create an ExternalAccessPolicy named "GranularFederationExample" that allows communication with specific external domains, namely `example1.com` and `example2.com`. The federation policy is set to restrict communication to only these allowed domains. ## PARAMETERS @@ -166,7 +166,10 @@ Accept wildcard characters: False ``` ### -AllowedExternalDomains -Indicates the domains that are allowed to communicate with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `AllowSpecificExternalDomains`. +> [!NOTE] +> Please note that this parameter is in Private Preview. + +Indicates the domains that are allowed to communicate with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `AllowSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. ```yaml Type: List @@ -181,7 +184,10 @@ Accept wildcard characters: False ``` ### -BlockedExternalDomains -Indicates the domains that are blocked from communicating with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `BlockSpecificExternalDomains`. +> [!NOTE] +> Please note that this parameter is in Private Preview. + +Indicates the domains that are blocked from communicating with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `BlockSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. ```yaml Type: List @@ -196,14 +202,18 @@ Accept wildcard characters: False ``` ### -CommunicationWithExternalOrgs +> [!NOTE] +> Please note that this parameter is in Private Preview. + Indicates how the users get assigned by this policy can communicate with the external orgs. There are 5 options: -- OrganizationDefault: the users of this policy will follow the federation settings defined in TenantFederationConfiguration -- AllowAllExternalDomains: the users are open to communicate with all domains -- AllowSpecificExternalDomains: the users can only communicate with the users of the domains defined in `AllowedExternalDomains` -- BlockSpecificExternalDomains: only users from the domains defined in `BlockedExternalDomains` are blocked from communicating with the users of this policy -- BlockAllExternalDomains: the users are not able to communicate with any external domains +- OrganizationDefault: the users of this policy will follow the federation settings defined in TenantFederationConfiguration. +- AllowAllExternalDomains: the users are open to communicate with all domains. +- AllowSpecificExternalDomains: the users can only communicate with the users of the domains defined in `AllowedExternalDomains`. +- BlockSpecificExternalDomains: only users from the domains defined in `BlockedExternalDomains` are blocked from communicating with the users of this policy. +- BlockAllExternalDomains: the users are not able to communicate with any external domains. +The setting only applies if `EnableFederationAccess` is true. Simiar to `AllowedExternalDomains` and `BlockedExternalDomains`, only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. ```yaml Type: String Parameter Sets: (All) From 6c01f101c8d0cdd1b3558c2cbffc71c898505ab0 Mon Sep 17 00:00:00 2001 From: Krammer Liu <99905184+krammerliu@users.noreply.github.com> Date: Wed, 14 May 2025 11:29:00 -0700 Subject: [PATCH 5/9] Update New-CsExternalAccessPolicy.md --- .../teams/New-CsExternalAccessPolicy.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/teams/teams-ps/teams/New-CsExternalAccessPolicy.md b/teams/teams-ps/teams/New-CsExternalAccessPolicy.md index 8498361f65..921120a28c 100644 --- a/teams/teams-ps/teams/New-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/New-CsExternalAccessPolicy.md @@ -169,7 +169,7 @@ Accept wildcard characters: False > [!NOTE] > Please note that this parameter is in Private Preview. -Indicates the domains that are allowed to communicate with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `AllowSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. +Specifies the external domains allowed to communicate with users assigned to this policy. This setting is applicable only when `CommunicationWithExternalOrgs` is configured to `AllowSpecificExternalDomains`. This setting can be modified only in custom policy. In Global (default) policy `CommunicationWithExternalOrgs` can only be set to `OrganizationDefault` and cannot be changed. ```yaml Type: List @@ -187,7 +187,7 @@ Accept wildcard characters: False > [!NOTE] > Please note that this parameter is in Private Preview. -Indicates the domains that are blocked from communicating with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `BlockSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. +Specifies the external domains blocked from communicating with users assigned to this policy. This setting is applicable only when `CommunicationWithExternalOrgs` is configured to `BlockSpecificExternalDomains`. This setting can be modified only in custom policy. In Global (default) policy `CommunicationWithExternalOrgs` can only be set to `OrganizationDefault` and cannot be changed. ```yaml Type: List @@ -205,15 +205,15 @@ Accept wildcard characters: False > [!NOTE] > Please note that this parameter is in Private Preview. -Indicates how the users get assigned by this policy can communicate with the external orgs. There are 5 options: +Indicates how users assigned to the policy can communicate with external organizations (domains). This setting has 5 possible values: -- OrganizationDefault: the users of this policy will follow the federation settings defined in TenantFederationConfiguration. -- AllowAllExternalDomains: the users are open to communicate with all domains. -- AllowSpecificExternalDomains: the users can only communicate with the users of the domains defined in `AllowedExternalDomains`. -- BlockSpecificExternalDomains: only users from the domains defined in `BlockedExternalDomains` are blocked from communicating with the users of this policy. -- BlockAllExternalDomains: the users are not able to communicate with any external domains. +- OrganizationDefault: users follow the federation settings specified in `TenantFederationConfiguration`. This is the default value. +- AllowAllExternalDomains: users are allowed to communicate with all domains. +- AllowSpecificExternalDomains: users the users can communicate with external domains listed in `AllowedExternalDomains`. +- BlockSpecificExternalDomains: users are blocked from communicating with domains listed in `BlockedExternalDomains`. +- BlockAllExternalDomains: users cannot communicate with any external domains. -The setting only applies if `EnableFederationAccess` is true. Simiar to `AllowedExternalDomains` and `BlockedExternalDomains`, only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. +The setting is only applicable when `EnableFederationAccess` is set to true. This setting can only be modified in custom policies. In the Global (default) policy, it is fixed to `OrganizationDefault` and cannot be changed. ```yaml Type: String Parameter Sets: (All) From 46edee9ddcbbd1f4eba254ea7dd6ff8257604e20 Mon Sep 17 00:00:00 2001 From: Krammer Liu <99905184+krammerliu@users.noreply.github.com> Date: Wed, 14 May 2025 11:32:54 -0700 Subject: [PATCH 6/9] Update Set-CsExternalAccessPolicy.md --- .../teams-ps/teams/Set-CsExternalAccessPolicy.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md index 3130072982..e62968430d 100644 --- a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md @@ -202,7 +202,7 @@ Accept wildcard characters: False > [!NOTE] > Please note that this parameter is in Private Preview. -Indicates the domains that are allowed to communicate with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `AllowSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. +Specifies the external domains allowed to communicate with users assigned to this policy. This setting is applicable only when `CommunicationWithExternalOrgs` is configured to `AllowSpecificExternalDomains`. This setting can be modified only in custom policy. In Global (default) policy `CommunicationWithExternalOrgs` can only be set to `OrganizationDefault` and cannot be changed. ```yaml Type: List Parameter Sets: (All) @@ -220,7 +220,7 @@ Accept wildcard characters: False > [!NOTE] > Please note that this parameter is in Private Preview. -Indicates the domains that are blocked from communicating with the users of this policy. This is referenced only when `CommunicationWithExternalOrgs` is set to be `BlockSpecificExternalDomains`. Only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. +Specifies the external domains blocked from communicating with users assigned to this policy. This setting is applicable only when `CommunicationWithExternalOrgs` is configured to `BlockSpecificExternalDomains`. This setting can be modified only in custom policy. In Global (default) policy `CommunicationWithExternalOrgs` can only be set to `OrganizationDefault` and cannot be changed. ```yaml Type: List Parameter Sets: (All) @@ -240,13 +240,13 @@ Accept wildcard characters: False Indicates how the users get assigned by this policy can communicate with the external orgs. There are 5 options: -- OrganizationDefault: the users of this policy will follow the federation settings defined in TenantFederationConfiguration. -- AllowAllExternalDomains: the users are open to communicate with all domains. -- AllowSpecificExternalDomains: the users can only communicate with the users of the domains defined in `AllowedExternalDomains`. -- BlockSpecificExternalDomains: only users from the domains defined in `BlockedExternalDomains` are blocked from communicating with the users of this policy. -- BlockAllExternalDomains: the users are not able to communicate with any external domains. +- OrganizationDefault: users follow the federation settings specified in `TenantFederationConfiguration`. This is the default value. +- AllowAllExternalDomains: users are allowed to communicate with all domains. +- AllowSpecificExternalDomains: users the users can communicate with external domains listed in `AllowedExternalDomains`. +- BlockSpecificExternalDomains: users are blocked from communicating with domains listed in `BlockedExternalDomains`. +- BlockAllExternalDomains: users cannot communicate with any external domains. -The setting only applies if `EnableFederationAccess` is true. Simiar to `AllowedExternalDomains` and `BlockedExternalDomains`, only custom policies can change this setting. In Global (default) policy this setting should be default value always and is not allowed to be changed. +The setting is only applicable when `EnableFederationAccess` is set to true. This setting can only be modified in custom policies. In the Global (default) policy, it is fixed to `OrganizationDefault` and cannot be changed. ```yaml Type: String Parameter Sets: (All) From 887b81d02a9cc615a5fcd723e7dff49ddd5a95c8 Mon Sep 17 00:00:00 2001 From: Maxime Delarue <61271832+MaximeDelarue@users.noreply.github.com> Date: Thu, 15 May 2025 18:11:37 +0700 Subject: [PATCH 7/9] Update Add-MailboxPermission.md Updated -InheritanceType yaml: Default Value: All @chrisda --- exchange/exchange-ps/exchange/Add-MailboxPermission.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/exchange/exchange-ps/exchange/Add-MailboxPermission.md b/exchange/exchange-ps/exchange/Add-MailboxPermission.md index 47a39e1221..07ab0e946e 100644 --- a/exchange/exchange-ps/exchange/Add-MailboxPermission.md +++ b/exchange/exchange-ps/exchange/Add-MailboxPermission.md @@ -420,7 +420,7 @@ Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Ex Required: False Position: Named -Default value: None +Default value: All Accept pipeline input: False Accept wildcard characters: False ``` From cc68787facc475ee4a5cc490df7c3d8ade5aafa2 Mon Sep 17 00:00:00 2001 From: Krammer Liu <99905184+krammerliu@users.noreply.github.com> Date: Thu, 15 May 2025 08:57:26 -0700 Subject: [PATCH 8/9] Update New-CsExternalAccessPolicy.md --- teams/teams-ps/teams/New-CsExternalAccessPolicy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/teams/teams-ps/teams/New-CsExternalAccessPolicy.md b/teams/teams-ps/teams/New-CsExternalAccessPolicy.md index 921120a28c..e854559d81 100644 --- a/teams/teams-ps/teams/New-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/New-CsExternalAccessPolicy.md @@ -209,7 +209,7 @@ Indicates how users assigned to the policy can communicate with external organiz - OrganizationDefault: users follow the federation settings specified in `TenantFederationConfiguration`. This is the default value. - AllowAllExternalDomains: users are allowed to communicate with all domains. -- AllowSpecificExternalDomains: users the users can communicate with external domains listed in `AllowedExternalDomains`. +- AllowSpecificExternalDomains: users can communicate with external domains listed in `AllowedExternalDomains`. - BlockSpecificExternalDomains: users are blocked from communicating with domains listed in `BlockedExternalDomains`. - BlockAllExternalDomains: users cannot communicate with any external domains. From bf8c65774f0825655b7e07e39a13364a6e42be5b Mon Sep 17 00:00:00 2001 From: Krammer Liu <99905184+krammerliu@users.noreply.github.com> Date: Thu, 15 May 2025 08:58:19 -0700 Subject: [PATCH 9/9] Update Set-CsExternalAccessPolicy.md --- teams/teams-ps/teams/Set-CsExternalAccessPolicy.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md index e62968430d..2e2b49bdcf 100644 --- a/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md +++ b/teams/teams-ps/teams/Set-CsExternalAccessPolicy.md @@ -242,7 +242,7 @@ Indicates how the users get assigned by this policy can communicate with the ext - OrganizationDefault: users follow the federation settings specified in `TenantFederationConfiguration`. This is the default value. - AllowAllExternalDomains: users are allowed to communicate with all domains. -- AllowSpecificExternalDomains: users the users can communicate with external domains listed in `AllowedExternalDomains`. +- AllowSpecificExternalDomains: users can communicate with external domains listed in `AllowedExternalDomains`. - BlockSpecificExternalDomains: users are blocked from communicating with domains listed in `BlockedExternalDomains`. - BlockAllExternalDomains: users cannot communicate with any external domains.