Skip to content

Commit 2ccc149

Browse files
committed
Third-party to non-Microsoft 3
1 parent e8f6df6 commit 2ccc149

16 files changed

+48
-48
lines changed

exchange/exchange-ps/exchange/Set-ExoPhishSimOverrideRule.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17-
Use the Set-ExoPhishSimOverrideRule cmdlet to modify third-party phishing simulation override rules that bypass filtering. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/defender-office-365/advanced-delivery-policy-configure).
17+
Use the Set-ExoPhishSimOverrideRule cmdlet to modify non-Microsoft phishing simulation override rules that bypass filtering. For more information, see [Configure the advanced delivery policy for non-Microsoft phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/defender-office-365/advanced-delivery-policy-configure).
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
```
8181
8282
### -AddDomains
83-
The AddDomains parameter specifies an existing entry to add to the list of email domains that are used by the third-party phishing simulation.
83+
The AddDomains parameter specifies an existing entry to add to the list of email domains that are used by the non-Microsoft phishing simulation.
8484
8585
You can specify multiple values separated by commas. A maximum of 20 entries are allowed in the list.
8686
@@ -98,7 +98,7 @@ Accept wildcard characters: False
9898
```
9999
100100
### -AddSenderIpRanges
101-
The AddSenderIpRanges parameter specifies an existing entry to add to the list of source IP addresses that are used by the third-party phishing simulation. Valid values are:
101+
The AddSenderIpRanges parameter specifies an existing entry to add to the list of source IP addresses that are used by the non-Microsoft phishing simulation. Valid values are:
102102
103103
- Single IP address: For example, 192.168.1.1.
104104
- IP address range: For example, 192.168.0.1-192.168.0.254.
@@ -173,7 +173,7 @@ Accept wildcard characters: False
173173
```
174174

175175
### -RemoveDomains
176-
The RemoveDomains parameter specifies an existing entry to remove from the list of email domains that are used by the third-party phishing simulation.
176+
The RemoveDomains parameter specifies an existing entry to remove from the list of email domains that are used by the non-Microsoft phishing simulation.
177177

178178
You can specify multiple values separated by commas.
179179

@@ -191,7 +191,7 @@ Accept wildcard characters: False
191191
```
192192

193193
### -RemoveSenderIpRanges
194-
The RemoveSenderIpRanges parameter specifies an existing entry to remove from the list of source IP addresses that are used by the third-party phishing simulation. Valid values are:
194+
The RemoveSenderIpRanges parameter specifies an existing entry to remove from the list of source IP addresses that are used by the non-Microsoft phishing simulation. Valid values are:
195195

196196
- Single IP address: For example, 192.168.1.1.
197197
- IP address range: For example, 192.168.0.1-192.168.0.254.

exchange/exchange-ps/exchange/Set-ExoSecOpsOverrideRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17-
Use the Set-ExoSecOpsOverrideRule cmdlet to modify SecOps mailbox override rules that bypass filtering. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/defender-office-365/advanced-delivery-policy-configure).
17+
Use the Set-ExoSecOpsOverrideRule cmdlet to modify SecOps mailbox override rules that bypass filtering. For more information, see [Configure the advanced delivery policy for non-Microsoft phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/defender-office-365/advanced-delivery-policy-configure).
1818

1919
**Tip**: This cmdlet doesn't modify email addresses in the SecOps override rule. To modify the email addresses in the SecOps override rule, use the Set-SecOpsOverridePolicy cmdlet.
2020

exchange/exchange-ps/exchange/Set-ForeignConnector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Set-ForeignConnector [-Identity] <ForeignConnectorIdParameter>
4040
```
4141

4242
## DESCRIPTION
43-
A Foreign connector uses a Drop directory in the Transport service of a Mailbox server to send messages to a local messaging server that doesn't use SMTP as its primary transport mechanism. These messaging servers are known as foreign gateway servers. Third-party fax gateway servers are examples of foreign gateway servers. The address spaces assigned to a Foreign connector can be SMTP or non-SMTP.
43+
A Foreign connector uses a Drop directory in the Transport service of a Mailbox server to send messages to a local messaging server that doesn't use SMTP as its primary transport mechanism. These messaging servers are known as foreign gateway servers. Non-Microsoft fax gateway servers are examples of foreign gateway servers. The address spaces assigned to a Foreign connector can be SMTP or non-SMTP.
4444

4545
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
4646

exchange/exchange-ps/exchange/Set-MobileDeviceMailboxPolicy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ Accept wildcard characters: False
182182
```
183183
184184
### -AllowBrowser
185-
The AllowBrowser parameter specifies whether Microsoft Pocket Internet Explorer is allowed on the mobile device. Valid input for this parameter is $true or $false. The default value is $true. This parameter doesn't affect third-party browsers.
185+
The AllowBrowser parameter specifies whether Microsoft Pocket Internet Explorer is allowed on the mobile device. Valid input for this parameter is $true or $false. The default value is $true. This parameter doesn't affect non-Microsoft browsers.
186186
187187
```yaml
188188
Type: Boolean
@@ -214,7 +214,7 @@ Accept wildcard characters: False
214214
```
215215
216216
### -AllowConsumerEmail
217-
The AllowConsumerEmail parameter specifies whether the user can configure a personal email account on the mobile device. Valid input for this parameter is $true or $false. The default value is $true. This parameter doesn't control access to email accounts using third-party mobile device email programs.
217+
The AllowConsumerEmail parameter specifies whether the user can configure a personal email account on the mobile device. Valid input for this parameter is $true or $false. The default value is $true. This parameter doesn't control access to email accounts using non-Microsoft mobile device email programs.
218218
219219
```yaml
220220
Type: Boolean
@@ -380,7 +380,7 @@ Accept wildcard characters: False
380380
```
381381
382382
### -AllowPOPIMAPEmail
383-
The AllowPOPIMAPEmail parameter specifies whether the user can configure a POP3 or IMAP4 email account on the mobile device. Valid input for this parameter is $true or $false. The default value is $true. This parameter doesn't control access by third-party email programs.
383+
The AllowPOPIMAPEmail parameter specifies whether the user can configure a POP3 or IMAP4 email account on the mobile device. Valid input for this parameter is $true or $false. The default value is $true. This parameter doesn't control access by non-Microsoft email programs.
384384
385385
```yaml
386386
Type: Boolean

exchange/exchange-ps/exchange/Set-OrganizationConfig.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2407,7 +2407,7 @@ This parameter is available only in the cloud-based service.
24072407

24082408
The FindTimeOnlineMeetingOptionDisabled parameter controls the availability of the **Online meeting** checkbox for Teams or Skype in meeting polls using the FindTime Outlook add-in. Valid values are:
24092409

2410-
- $true: The **Online meeting** checkbox is not available in the meeting poll in FindTime, and the meeting organizer can't change this setting. If your organization uses a third-party online meeting provider, the meeting organizer can make the meeting online using the third-party provider while creating the meeting based on the FindTime poll results.
2410+
- $true: The **Online meeting** checkbox is not available in the meeting poll in FindTime, and the meeting organizer can't change this setting. If your organization uses a non-Microsoft online meeting provider, the meeting organizer can make the meeting online using the non-Microsoft provider while creating the meeting based on the FindTime poll results.
24112411
- $false: The **Online meeting** checkbox is available in the meeting poll in FindTime, so the meeting organizer can choose to select or not select this setting.
24122412

24132413
This setting overrides individual user settings.
@@ -3199,7 +3199,7 @@ The OAuth2ClientProfileEnabled parameter enables or disables modern authenticati
31993199
- $true: modern authentication is enabled.
32003200
- $false: modern authentication is disabled.
32013201

3202-
modern authentication is based on the Active Directory Authentication Library (ADAL) and OAuth 2.0, and enables authentication features like multi-factor authentication (MFA), certificate-based authentication (CBA), and third-party SAML identity providers.
3202+
modern authentication is based on the Active Directory Authentication Library (ADAL) and OAuth 2.0, and enables authentication features like multi-factor authentication (MFA), certificate-based authentication (CBA), and non-Microsoft SAML identity providers.
32033203

32043204
When you enable modern authentication in Exchange Online, we recommend that you also enable it in Skype for Business Online. For more information, see [Skype for Business Online: Enable your tenant for modern authentication](https://aka.ms/SkypeModernAuth).
32053205

@@ -3290,7 +3290,7 @@ The OutlookMobileGCCRestrictionsEnabled parameter specifies whether to enable or
32903290
The Outlook for iOS and Android feature and services that are not FedRAMP compliant for Microsoft 365 US Government customers include:
32913291

32923292
- Multi-account support
3293-
- Third-party services
3293+
- Non-Microsoft services
32943294
- HelpShift and in-app support
32953295
- Any Microsoft services that are outside the Microsoft 365 US Government Community Cloud (for example, Bing and Cortana).
32963296

exchange/exchange-ps/exchange/Set-PhishSimOverridePolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17-
Use the Set-PhishSimOverridePolicy cmdlet to modify third-party phishing simulation override policies that bypass filtering. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/defender-office-365/advanced-delivery-policy-configure).
17+
Use the Set-PhishSimOverridePolicy cmdlet to modify non-Microsoft phishing simulation override policies that bypass filtering. For more information, see [Configure the advanced delivery policy for non-Microsoft phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/defender-office-365/advanced-delivery-policy-configure).
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

0 commit comments

Comments
 (0)