Skip to content

Commit 80e1c05

Browse files
authored
Merge pull request MicrosoftDocs#8389 from MicrosoftDocs/PhishSim-chrisda
PhishSim-chrisda to Master
2 parents 1b2daa8 + b81526b commit 80e1c05

File tree

2 files changed

+86
-25
lines changed

2 files changed

+86
-25
lines changed

exchange/exchange-ps/exchange/New-PhishSimOverrideRule.md

Lines changed: 45 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,11 @@ For information about the parameter sets in the Syntax section below, see [Excha
2121
## SYNTAX
2222

2323
```
24-
New-PhishSimOverrideRule [-Name] <String> -Policy <PolicyIdParameter> -SenderDomainIs <MultiValuedProperty> -SenderIpRanges <MultiValuedProperty>
24+
New-PhishSimOverrideRule [-Name] <String> -Policy <PolicyIdParameter> -SenderIpRanges <MultiValuedProperty>
2525
[-Comment <String>]
2626
[-Confirm]
27+
[-Domains <MultiValuedProperty>]
28+
[-SenderDomainIs <MultiValuedProperty>]
2729
[-WhatIf]
2830
[<CommonParameters>]
2931
```
@@ -35,7 +37,7 @@ You need to be assigned permissions in the Security & Compliance Center before y
3537

3638
### Example 1
3739
```powershell
38-
New-PhishSimOverrideRule -Name PhishSimOverrideRule -Policy PhishSimOverridePolicy -SenderDomainIs fabrikam.com,wingtiptoys.com -SenderIpRanges 192.168.1.55
40+
New-PhishSimOverrideRule -Name PhishSimOverrideRule -Policy PhishSimOverridePolicy -Domains fabrikam.com,wingtiptoys.com -SenderIpRanges 192.168.1.55
3941
```
4042

4143
This example creates a new phishing simulation override rule with the specified settings.
@@ -79,24 +81,6 @@ Accept pipeline input: False
7981
Accept wildcard characters: False
8082
```
8183
82-
### -SenderDomainIs
83-
The SenderDomainIs parameter specifies the email ___domain that's used by the third-party phishing simulation.
84-
85-
You can specify up to 10 values separated by commas.
86-
87-
```yaml
88-
Type: MultiValuedProperty
89-
Parameter Sets: (All)
90-
Aliases:
91-
Applicable: Security & Compliance Center
92-
93-
Required: True
94-
Position: Named
95-
Default value: None
96-
Accept pipeline input: False
97-
Accept wildcard characters: False
98-
```
99-
10084
### -SenderIpRanges
10185
The SenderIpRanges parameter specifies the source IP address that's used by the third-party phishing simulation. Valid values are:
10286
@@ -106,6 +90,8 @@ The SenderIpRanges parameter specifies the source IP address that's used by the
10690
10791
You can specify up to 10 entries separated by commas.
10892
93+
A phishing simulation entry requires at least one IP address in this parameter and at least one ___domain in the Domains parameter.
94+
10995
```yaml
11096
Type: MultiValuedProperty
11197
Parameter Sets: (All)
@@ -154,6 +140,45 @@ Accept pipeline input: False
154140
Accept wildcard characters: False
155141
```
156142

143+
### -Domains
144+
The Domains parameter specifies the email ___domain that's used by the third-party phishing simulation. You can use either of the following values:
145+
146+
- The `5321.MailFrom` address (also known as the MAIL FROM address, P1 sender, or envelope sender).
147+
- The DKIM ___domain.
148+
149+
You can specify up to 10 values separated by commas.
150+
151+
A phishing simulation requires at least one ___domain from this parameter and at least one IP address in the SenderIPRanges parameter.
152+
153+
```yaml
154+
Type: MultiValuedProperty
155+
Parameter Sets: (All)
156+
Aliases:
157+
Applicable: Security & Compliance Center
158+
159+
Required: False
160+
Position: Named
161+
Default value: None
162+
Accept pipeline input: False
163+
Accept wildcard characters: False
164+
```
165+
166+
### -SenderDomainIs
167+
This parameter has been replaced by the Domains parameter.
168+
169+
```yaml
170+
Type: MultiValuedProperty
171+
Parameter Sets: (All)
172+
Aliases:
173+
Applicable: Security & Compliance Center
174+
175+
Required: False
176+
Position: Named
177+
Default value: None
178+
Accept pipeline input: False
179+
Accept wildcard characters: False
180+
```
181+
157182
### -WhatIf
158183
The WhatIf switch doesn't work in Security & Compliance Center PowerShell.
159184

exchange/exchange-ps/exchange/Set-PhishSimOverrideRule.md

Lines changed: 41 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -22,24 +22,28 @@ For information about the parameter sets in the Syntax section below, see [Excha
2222

2323
```
2424
Set-PhishSimOverrideRule [-Identity] <ComplianceRuleIdParameter>
25+
[-AddDomains <MultiValuedProperty>]
2526
[-AddSenderDomainIs <MultiValuedProperty>]
2627
[-AddSenderIpRanges <MultiValuedProperty>]
2728
[-Comment <String>]
2829
[-Confirm]
30+
[-RemoveDomains <MultiValuedProperty>]
2931
[-RemoveSenderDomainIs <MultiValuedProperty>]
3032
[-RemoveSenderIpRanges <MultiValuedProperty>]
3133
[-WhatIf]
3234
[<CommonParameters>]
3335
```
3436

3537
## DESCRIPTION
38+
A phishing simulation requires at least one ___domain and at least one IP address.
39+
3640
You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center).
3741

3842
## EXAMPLES
3943

4044
### Example 1
4145
```powershell
42-
Set-PhishSimOverrideRule -Identity PhishSimOverrideRulea0eae53e-d755-4a42-9320-b9c6b55c5011 -AddSenderDomainIs blueyonderairlines.com -RemoveSenderIpRanges 192.168.1.55
46+
Set-PhishSimOverrideRule -Identity PhishSimOverrideRulea0eae53e-d755-4a42-9320-b9c6b55c5011 -AddDomains blueyonderairlines.com -RemoveSenderIpRanges 192.168.1.55
4347
```
4448

4549
This example modifies the phishing simulation override rule with the specified settings.
@@ -67,8 +71,8 @@ Accept pipeline input: True (ByPropertyName, ByValue)
6771
Accept wildcard characters: False
6872
```
6973
70-
### -AddSenderDomainIs
71-
The AddSenderDomainIs parameter specifies an existing entry to add to the list of email domains that are used by the third-party phishing simulation.
74+
### -AddDomains
75+
The AddDomains parameter specifies an existing entry to add to the list of email domains that are used by the third-party phishing simulation.
7276
7377
You can specify multiple values separated by commas. A maximum of 10 entries are allowed in the list.
7478
@@ -85,6 +89,22 @@ Accept pipeline input: False
8589
Accept wildcard characters: False
8690
```
8791
92+
### -AddSenderDomainIs
93+
This parameter has been replaced by the AddDomains parameter.
94+
95+
```yaml
96+
Type: MultiValuedProperty
97+
Parameter Sets: (All)
98+
Aliases:
99+
Applicable: Security & Compliance Center
100+
101+
Required: False
102+
Position: Named
103+
Default value: None
104+
Accept pipeline input: False
105+
Accept wildcard characters: False
106+
```
107+
88108
### -AddSenderIpRanges
89109
The AddSenderIpRanges parameter specifies an existing entry to add to the list of source IP addresses that are used by the third-party phishing simulation. Valid values are:
90110
@@ -144,8 +164,8 @@ Accept pipeline input: False
144164
Accept wildcard characters: False
145165
```
146166

147-
### -RemoveSenderDomainIs
148-
The RemoveSenderDomainIs parameter specifies an existing entry to remove from the list of email domains that are used by the third-party phishing simulation.
167+
### -RemoveDomains
168+
The RemoveDomains parameter specifies an existing entry to remove from the list of email domains that are used by the third-party phishing simulation.
149169

150170
You can specify multiple values separated by commas.
151171

@@ -162,6 +182,22 @@ Accept pipeline input: False
162182
Accept wildcard characters: False
163183
```
164184

185+
### -RemoveSenderDomainIs
186+
This parameter has been replaced by the RemoveDomains parameter.
187+
188+
```yaml
189+
Type: MultiValuedProperty
190+
Parameter Sets: (All)
191+
Aliases:
192+
Applicable: Security & Compliance Center
193+
194+
Required: False
195+
Position: Named
196+
Default value: None
197+
Accept pipeline input: False
198+
Accept wildcard characters: False
199+
```
200+
165201
### -RemoveSenderIpRanges
166202
The RemoveSenderIpRanges parameter specifies an existing entry to remove from the list of source IP addresses that are used by the third-party phishing simulation. Valid values are:
167203

0 commit comments

Comments
 (0)