Skip to content

Commit d251155

Browse files
committed
Merge branch 'master' into SupRevAct-chrisda
2 parents 756414b + 7f07717 commit d251155

File tree

355 files changed

+1238
-1996
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

355 files changed

+1238
-1996
lines changed

exchange/docs-conceptual/exchange-online/connect-to-exchange-online-powershell/mfa-connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ If you want to use multi-factor authentication (MFA) to connect to Exchange Onli
4242

4343
1. In Internet Explorer or Edge, open the Exchange admin center (EAC) for your Exchange Online organization. For instructions, see [Exchange Admin Center in Exchange Online](http://technet.microsoft.com/library/ace44f6b-4084-4f9c-89b3-e0317962472b.aspx).
4444

45-
**Note**: Internet Explorer or Edge is required because the download in the next step uses ClickOnce, so Google Chrome or Mozilla Firefox won't work.
45+
**Note**: A browser that uses ClickOnce to download (like Internet Explorer or Edge) is needed to complete the next step.
4646

4747
2. In the EAC, go to **Hybrid** > **Setup** and click the appropriate **Configure** button to download the Exchange Online Remote PowerShell Module for multi-factor authentication.
4848

exchange/docs-conceptual/exchange-server/recipient-filters/filter-properties.md

Lines changed: 5 additions & 5 deletions
Large diffs are not rendered by default.

exchange/docs-conceptual/exchange-server/use-update-exchangehelp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -213,7 +213,7 @@ Now, when you run **Update-ExchangeHelp** in the Exchange Management Shell on yo
213213

214214
More interesting is the long-term maintenance of this customized configuration. Basically, you'll need to repeat Step 1 through Step 3 when you discover an update has been made available for Exchange cmdlet reference help, and you want to deploy that updated help to your Exchange servers.
215215

216-
An easy way to find new update packages is to periodically run **Update-ExchangeHelp** on an Internet-connected Exchange server, or computer that has the Exchange mangement tools installed.
216+
An easy way to find new update packages is to periodically run **Update-ExchangeHelp** on an Internet-connected Exchange server, or computer that has the Exchange management tools installed.
217217

218218
[Return to top](use-update-exchangehelp.md#RTT)
219219

exchange/exchange-ps/exchange/advanced-threat-protection/Disable-SafeAttachmentRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You can use any value that uniquely identifies the rule. For example:
4444

4545
- Name
4646

47-
- Distinguised name (DN)
47+
- Distinguished name (DN)
4848

4949
- GUID
5050

exchange/exchange-ps/exchange/advanced-threat-protection/Disable-SafeLinksRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You can use any value that uniquely identifies the rule. For example:
4444

4545
- Name
4646

47-
- Distinguised name (DN)
47+
- Distinguished name (DN)
4848

4949
- GUID
5050

exchange/exchange-ps/exchange/advanced-threat-protection/Enable-SafeAttachmentRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You can use any value that uniquely identifies the rule. For example:
4444

4545
- Name
4646

47-
- Distinguised name (DN)
47+
- Distinguished name (DN)
4848

4949
- GUID
5050

exchange/exchange-ps/exchange/advanced-threat-protection/Enable-SafeLinksRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ You can use any value that uniquely identifies the rule. For example:
4444

4545
- Name
4646

47-
- Distinguised name (DN)
47+
- Distinguished name (DN)
4848

4949
- GUID
5050

exchange/exchange-ps/exchange/advanced-threat-protection/Get-MailDetailATPReport.md

Lines changed: 26 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -94,35 +94,45 @@ Accept wildcard characters: False
9494
### -EventType
9595
The EventType parameter filters the report by the event type. Valid values are:
9696
97-
- Advanced phish filter\*
97+
Email phish EventTypes:
9898
99-
- Anti-malware engine
99+
- Advanced phish filter (Indicates a message caught by the Office 365 machine learning model.)
100100
101-
- ATP safe attachments\*
101+
- Anti-spoof: Intra-org (Indicates an internal message caught by anti-phish spoof protection.)
102102
103-
- ATP safe links\*
103+
- Anti-spoof: external ___domain (Indicates an external message caught by anti-phish spoof protection.)
104104
105-
- Anti-spoof: Intra-org
105+
- Domain impersonation\* (Indicates a message impersonating a ___domain protected by an anti-phish policy.)
106106
107-
- Anti-spoof: external ___domain\*
107+
- User impersonation\* (Indicates a message impersonating a user protected by an anti-phish policy.)
108108
109-
- Domain impersonation\*
109+
- Brand impersonation (Indicates a message caught by Office 365 phish filters as impersonating a known brand.)
110110
111-
- General phish filter
111+
- General phish filter (Indicates a message caught by basic Office 365 phish protection.)
112112
113-
- Malicious URL reputation
113+
- Malicious URL reputation (Indicates a message with a known malicious URL caught by Office 365 phish filters.)
114114
115-
- URL detonation\*
115+
- Phish ZAP (Indicates a phish or spam message detected and auto-purged after delivery.)
116116
117-
- Message passed
117+
Email malware EventTypes:
118118
119-
- Phish ZAP
119+
- Anti-malware engine (Indicates a message caught by the Office 365 anti-malware engine.)
120120
121-
- User impersonation\*
121+
- ATP safe attachments\* (Indicates a message with a malicious attachment blocked by ATP.)
122122
123-
- Brand impersonation
123+
- ATP safe links\* (Indicates when a malicious link is blocked by ATP.)
124124
125-
- ZAP
125+
- ZAP (Indicates a message with malware detected and auto-purged after delivery.)
126+
127+
- Office 365 file reputation (Indicates a message with a known malicious file blocked.)
128+
129+
- Anti-malware policy file type block (Indicates when the Common Attachment Types filter blocks a file.)
130+
131+
Content malware EventTypes:
132+
133+
- AtpDocumentMalware\* (Indicates malicious content detected by ATP Safe Attachments in the cloud.)
134+
135+
- AvDocumentMalware (Indicates malware found by the Office 365 anti-malware engine. Reporting requires ATP or E5.)
126136
127137
\* These features require a standalone Office 365 ATP or E5 subscription.
128138
@@ -187,7 +197,7 @@ Accept wildcard characters: False
187197
```
188198
189199
### -MessageId
190-
The MessageId parameter filters the results by the Message-ID header field of the message. This value is also known as the Client ID. The format of the Message-ID depends on the messaging server that sent the message. The value should be unique for each message. However, not all messaging servers create values for the Message-ID in the same way. Be sure to include the full Message ID string. This may include angle brackets.
200+
The MessageId parameter filters the results by the Message-ID header field of the message. This value is also known as the Client ID. The format of the Message-ID depends on the messaging server that sent the message. The value should be unique for each message. However, not all messaging servers create values for the Message-ID in the same way. Be sure to include the full Message ID string (which may include angle brackets) and enclose the value in quotation marks (for example, "<d9683b4c-127b-413a-ae2e-fa7dfb32c69d@DM3NAM06BG401.Eop-nam06.prod.protection.outlook.com>").
191201
192202
```yaml
193203
Type: MultiValuedProperty

exchange/exchange-ps/exchange/advanced-threat-protection/Get-MailTrafficATPReport.md

Lines changed: 27 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -152,35 +152,47 @@ Accept wildcard characters: False
152152
### -EventType
153153
The EventType parameter filters the report by the event type. Valid values are:
154154
155-
- Advanced phish filter\*
155+
- Message passed (Indicates a good message.)
156156
157-
- Anti-malware engine
157+
Email phish EventTypes:
158158
159-
- ATP safe attachments\*
159+
- Advanced phish filter (Indicates a message caught by the Office 365 machine learning model.)
160160
161-
- ATP safe links\*
161+
- Anti-spoof: Intra-org (Indicates an internal message caught by anti-phish spoof protection.)
162162
163-
- Anti-spoof: Intra-org
163+
- Anti-spoof: external ___domain (Indicates an external message caught by anti-phish spoof protection.)
164164
165-
- Anti-spoof: external ___domain\*
165+
- Domain impersonation\* (Indicates a message impersonating a ___domain protected by an anti-phish policy.)
166166
167-
- Domain impersonation\*
167+
- User impersonation\* (Indicates a message impersonating a user protected by an anti-phish policy.)
168168
169-
- General phish filter
169+
- Brand impersonation (Indicates a message caught by Office 365 phish filters as impersonating a known brand.)
170170
171-
- Malicious URL reputation
171+
- General phish filter (Indicates a message caught by basic Office 365 phish protection.)
172172
173-
- URL detonation\*
173+
- Malicious URL reputation (Indicates a message with a known malicious URL caught by Office 365 phish filters.)
174174
175-
- Message passed
175+
- Phish ZAP (Indicates a phish or spam message detected and auto-purged after delivery.)
176176
177-
- Phish ZAP
177+
Email malware EventTypes:
178178
179-
- User impersonation\*
179+
- Anti-malware engine (Indicates a message caught by the Office 365 anti-malware engine.)
180180
181-
- Brand impersonation
181+
- ATP safe attachments\* (Indicates a message with a malicious attachment blocked by ATP.)
182182
183-
- ZAP
183+
- ATP safe links\* (Indicates when a malicious link is blocked by ATP.)
184+
185+
- ZAP (Indicates a message with malware detected and auto-purged after delivery.)
186+
187+
- Office 365 file reputation (Indicates a message with a known malicious file blocked.)
188+
189+
- Anti-malware policy file type block (Indicates when the Common Attachment Types filter blocks a file.)
190+
191+
Content malware EventTypes:
192+
193+
- AtpDocumentMalware\* (Indicates malicious content detected by ATP Safe Attachments in the cloud.)
194+
195+
- AvDocumentMalware (Indicates malware found by the Office 365 anti-malware engine. Reporting requires ATP/E5.)
184196
185197
\* These features require a standalone Office 365 ATP or E5 subscription.
186198

exchange/exchange-ps/exchange/advanced-threat-protection/Get-SafeAttachmentRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ You can use any value that uniquely identifies the rule. For example:
5151

5252
- Name
5353

54-
- Distinguised name (DN)
54+
- Distinguished name (DN)
5555

5656
- GUID
5757

0 commit comments

Comments
 (0)