Skip to content

Commit 6e831eb

Browse files
authored
Merge pull request MicrosoftDocs#6426 from MicrosoftDocs/chrisda
Chrisda to Master
2 parents 7f47c9b + 35639fb commit 6e831eb

16 files changed

+75
-84
lines changed

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ If your account doesn't use multi-factor authentication, use the steps in this s
114114
3. The command that you need to run uses the following syntax:
115115

116116
```powershell
117-
Connect-ExchangeOnline -Credential $UserCredential = Get-Credential -ShowProgress $true [-ConnectionUri <URL>] [-DelegatedOrganization <String>]
117+
Connect-ExchangeOnline -Credential $UserCredential -ShowProgress $true [-ConnectionUri <URL>] [-DelegatedOrganization <String>]
118118
```
119119

120120
- The required _ConnectionUri_ value depends on the nature of your Microsoft 365 organization. For more information, see the parameter description in [Connect-ExchangeOnline](https://docs.microsoft.com/powershell/module/exchange/connect-exchangeonline).

exchange/exchange-ps/exchange/Disable-SafeAttachmentRule.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps || eop-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the Disable-SafeAttachmentRule cmdlet to disable enabled Safe Attachments rules in your cloud-based organization.
18+
Use the Disable-SafeAttachmentRule cmdlet to disable safe attachment rules in your cloud-based organization.
1919

2020
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2121

@@ -28,7 +28,7 @@ Disable-SafeAttachmentRule [-Identity] <RuleIdParameter> [-Confirm] [-WhatIf] [<
2828
```
2929

3030
## DESCRIPTION
31-
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity.
31+
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Office 365 ATP](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-attachments).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

@@ -39,12 +39,12 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3939
Disable-SafeAttachmentRule -Identity "Engineering Department Attachment Rule"
4040
```
4141

42-
This example disables the Safe Attachments rule named Engineering Department Attachment Rule.
42+
This example disables the safe attachment rule named Engineering Department Attachment Rule.
4343

4444
## PARAMETERS
4545

4646
### -Identity
47-
The Identity parameter specifies the enabled Safe Attachments rule that you want to disable.
47+
The Identity parameter specifies the enabled safe attachment rule that you want to disable.
4848

4949
You can use any value that uniquely identifies the rule. For example:
5050

exchange/exchange-ps/exchange/Enable-SafeAttachmentRule.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps || eop-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the Enable-SafeAttachmentRule cmdlet to enable disabled Safe Attachments rules in your cloud-based organization.
18+
Use the Enable-SafeAttachmentRule cmdlet to enable safe attachment rules in your cloud-based organization.
1919

2020
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2121

@@ -28,7 +28,7 @@ Enable-SafeAttachmentRule [-Identity] <RuleIdParameter> [-Confirm] [-WhatIf] [<C
2828
```
2929

3030
## DESCRIPTION
31-
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity.
31+
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Office 365 ATP](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-attachments).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

@@ -39,12 +39,12 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3939
Enable-SafeAttachmentRule -Identity "Marketing Department Attachment Rule"
4040
```
4141

42-
This example enables the disabled Safe Attachments rule named Marketing Department Attachment Rule.
42+
This example enables the disabled safe attachment rule named Marketing Department Attachment Rule.
4343

4444
## PARAMETERS
4545

4646
### -Identity
47-
The Identity parameter specifies the disabled Safe Attachments rule that you want to enable.
47+
The Identity parameter specifies the disabled safe attachment rule that you want to enable.
4848

4949
You can use any value that uniquely identifies the rule. For example:
5050

exchange/exchange-ps/exchange/Get-SafeAttachmentPolicy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps || eop-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the Get-SafeAttachmentPolicy cmdlet to view Safe Attachments policies in your cloud-based organization.
18+
Use the Get-SafeAttachmentPolicy cmdlet to view safe attachment policies in your cloud-based organization.
1919

2020
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2121

@@ -28,7 +28,7 @@ Get-SafeAttachmentPolicy [[-Identity] <SafeAttachmentPolicyIdParameter>] [<Commo
2828
```
2929

3030
## DESCRIPTION
31-
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity.
31+
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Office 365 ATP](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-attachments).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

@@ -39,19 +39,19 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3939
Get-SafeAttachmentPolicy
4040
```
4141

42-
This example shows a summary list of all Safe Attachments policies.
42+
This example shows a summary list of all safe attachment policies.
4343

4444
### Example 2
4545
```powershell
4646
Get-SafeAttachmentPolicy -Identity Default | Format-List
4747
```
4848

49-
This example shows detailed information about the Safe Attachments policy named Default.
49+
This example shows detailed information about the safe attachment policy named Default.
5050

5151
## PARAMETERS
5252

5353
### -Identity
54-
The Identity parameter specifies the Safe Attachments policy that you want to view.
54+
The Identity parameter specifies the safe attachment policy that you want to view.
5555

5656
You can use any value that uniquely identifies the policy. For example:
5757

exchange/exchange-ps/exchange/Get-SafeAttachmentRule.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps || eop-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the Get-SafeAttachmentRule cmdlet to view Safe Attachments rules in your cloud-based organization.
18+
Use the Get-SafeAttachmentRule cmdlet to view safe attachment rules in your cloud-based organization.
1919

2020
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2121

@@ -28,7 +28,7 @@ Get-SafeAttachmentRule [[-Identity] <RuleIdParameter>] [-State <RuleState>] [<Co
2828
```
2929

3030
## DESCRIPTION
31-
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity.
31+
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Office 365 ATP](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-attachments).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

@@ -39,19 +39,19 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3939
Get-SafeAttachmentRule
4040
```
4141

42-
This example returns a summary list of all Safe Attachments rules in your organization.
42+
This example returns a summary list of all safe attachment rules in your organization.
4343

4444
### Example 2
4545
```powershell
4646
Get-SafeAttachmentRule -Identity "Research Department Attachment Rule" | Format-List
4747
```
4848

49-
This example returns detailed information about the Safe Attachments rule named Research Department Attachment Rule.
49+
This example returns detailed information about the safe attachment rule named Research Department Attachment Rule.
5050

5151
## PARAMETERS
5252

5353
### -Identity
54-
The Identity parameter specifies the Safe Attachments rule that you want to view.
54+
The Identity parameter specifies the safe attachment rule that you want to view.
5555

5656
You can use any value that uniquely identifies the rule. For example:
5757

exchange/exchange-ps/exchange/New-AntiPhishPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ New-AntiPhishPolicy [-Name] <String>
6060
## DESCRIPTION
6161
Phishing messages contain fraudulent links or spoofed domains in an effort to get personal information from the recipients.
6262

63-
New antiphish policies aren't valid and aren't applied until you add an antiphish rule to the policy by using the New-AntiPhishRule cmdlet.
63+
New policies that you create using this cmdlet aren't applied to users and aren't visible in admin centers. You need to use the AntiPhishPolicy parameter on the New-AntiPhishRule or Set-AntiPhishRule cmdlets to associate the policy with a rule.
6464

6565
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
6666

exchange/exchange-ps/exchange/New-HostedOutboundSpamFilterPolicy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,8 @@ New-HostedOutboundSpamFilterPolicy [-Name] <String>
3939
```
4040

4141
## DESCRIPTION
42+
New policies that you create using this cmdlet aren't applied to users and aren't visible in admin centers. You need to use the HostedOutboundSpamFilterPolicy parameter on the New-HostedOutboundSpamFilterRule or Set-HostedOutboundSpamFilterRule cmdlets to associate the policy with a rule.
43+
4244
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
4345

4446
## EXAMPLES

exchange/exchange-ps/exchange/New-MalwareFilterPolicy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -51,6 +51,8 @@ New-MalwareFilterPolicy [-Name] <String>
5151
```
5252

5353
## DESCRIPTION
54+
New policies that you create using this cmdlet aren't applied to users and aren't visible in admin centers. You need to use the MalwareFilterPolicy parameter on the New-MalwareFilterRule or Set-MalwareFilterRule cmdlets to associate the policy with a rule.
55+
5456
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
5557

5658
## EXAMPLES

exchange/exchange-ps/exchange/New-SafeAttachmentPolicy.md

Lines changed: 10 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps || eop-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the New-SafeAttachmentPolicy cmdlet to create Safe Attachments policies in your cloud-based organization.
18+
Use the New-SafeAttachmentPolicy cmdlet to create safe attachment policies in your cloud-based organization.
1919

2020
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2121

@@ -37,28 +37,26 @@ New-SafeAttachmentPolicy [-Name] <String>
3737
```
3838

3939
## DESCRIPTION
40-
New Safe Attachments policies aren't valid and aren't applied until you add a Safe Attachments rule to the policy by using the New-SafeAttachmentRule cmdlet.
40+
Safe Attachments is a feature in Office 365 Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Office 365 ATP](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-attachments).
4141

42-
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity.
42+
New policies that you create using this cmdlet aren't applied to users and aren't visible in admin centers. You need to use the SafeAttachmentPolicy parameter on the New-SafeAttachmentRule or Set-SafeAttachmentRule cmdlets to associate the policy with a rule.
4343

4444
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
4545

4646
## EXAMPLES
4747

4848
### Example 1
4949
```powershell
50-
New-SafeAttachmentPolicy -Name "Marketing Block Attachments" -Enable $true -Redirect $true -RedirectAddress [email protected]
50+
New-SafeAttachmentPolicy -Name "Marketing Block Attachments" -Redirect $true -RedirectAddress [email protected]
5151
```
5252

5353
This example creates a new Safe Attachments policy named Marketing Block Attachments with the following options:
5454

55-
- The policy is enabled.
56-
5755
- The action is Block. This is the default value of the Action parameter, so you don't need to specify it.
5856

59-
- If Safe Attachments scanning isn't available or encounters errors, deliver the message as normal. The default value of the ActionOnError parameter is $false, so you don't need to specify it.
57+
- Enable redirection for detected malware attachments and send the messages to [email protected].
6058

61-
- Redirect detected malware messages to [email protected].
59+
- If Safe Attachments scanning isn't available or encounters errors, don't deliver the message as normal. The default value of the ActionOnError parameter is $true, so you don't need to specify it.
6260

6361
## PARAMETERS
6462

@@ -81,7 +79,7 @@ Accept wildcard characters: False
8179
### -Action
8280
The Action parameter specifies the action for the Safe Attachments policy. Valid values are:
8381
84-
- Allow: Deliver the email message, including the malware attachment.
82+
- Allow: Attachments aren't scanned by Safe Attachments policies.
8583
8684
- Block: Block the email message that contains the malware attachment. This is the default value.
8785
@@ -107,9 +105,9 @@ Accept wildcard characters: False
107105
### -ActionOnError
108106
The ActionOnError parameter specifies the error handling option for Safe Attachments scanning (what to do if scanning times out or an error occurs). Valid values are:
109107
110-
- $true: The action specified by the Action parameter is applied to messages even when the attachments aren't successfully scanned.
108+
- $true: The action specified by the Action parameter is applied to messages even when the attachments aren't successfully scanned. This is the default value.
111109
112-
- $false: The action specified by the Action parameter isn't applied to messages when the attachments aren't successfully scanned. This is the default value.
110+
- $false: The action specified by the Action parameter isn't applied to messages when the attachments aren't successfully scanned.
113111
114112
```yaml
115113
Type: Boolean
@@ -161,11 +159,7 @@ Accept wildcard characters: False
161159
```
162160
163161
### -Enable
164-
The Enable parameter specifies whether policy is enabled. Valid values are:
165-
166-
- $true: The rule or policy is enabled.
167-
168-
- $false: The rule or policy is disabled. This is the default value.
162+
This parameter isn't used. To enable or disable a safe attachment policy, use the Enabled parameter on the New-SafeAttachmentRule or Set-SafeAttachmentRule cmdlets.
169163
170164
```yaml
171165
Type: Boolean

0 commit comments

Comments
 (0)