Skip to content

Commit 969cc80

Browse files
authored
Merge branch 'main' into main
2 parents c906444 + 9883014 commit 969cc80

28 files changed

+372
-31
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -412,20 +412,22 @@ The supported Microsoft Entra roles are described in the following table:
412412
|Role|Exchange Online<br>PowerShell|Security & Compliance<br>PowerShell|
413413
|---|:---:|:---:|
414414
|[Compliance Administrator](/entra/identity/role-based-access-control/permissions-reference#compliance-administrator)|||
415-
|[Exchange Administrator](/entra/identity/role-based-access-control/permissions-reference#exchange-administrator)<sup>\*</sup>|||
415+
|[Exchange Administrator](/entra/identity/role-based-access-control/permissions-reference#exchange-administrator)¹|||
416416
|[Exchange Recipient Administrator](/entra/identity/role-based-access-control/permissions-reference#exchange-recipient-administrator)|||
417-
|[Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator)<sup>\*</sup>|||
417+
|[Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator)¹ ²|||
418418
|[Global Reader](/entra/identity/role-based-access-control/permissions-reference#global-reader)|||
419419
|[Helpdesk Administrator](/entra/identity/role-based-access-control/permissions-reference#helpdesk-administrator)|||
420-
|[Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator)<sup>\*</sup>|||
420+
|[Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator)¹|||
421421
|[Security Reader](/entra/identity/role-based-access-control/permissions-reference#security-reader)|||
422422

423-
> <sup>\*</sup> The Global Administrator and Exchange Administrator roles provide the required permissions for any task in Exchange Online PowerShell. For example:
424-
>
425-
> - Recipient management.
426-
> - Security and protection features. For example, anti-spam, anti-malware, anti-phishing, and the associated reports.
427-
>
428-
> The Security Administrator role does not have the necessary permissions for those same tasks.
423+
¹ The Global Administrator and Exchange Administrator roles provide the required permissions for any task in Exchange Online PowerShell. For example:
424+
425+
- Recipient management.
426+
- Security and protection features. For example, anti-spam, anti-malware, anti-phishing, and the associated reports.
427+
428+
The Security Administrator role does not have the necessary permissions for those same tasks.
429+
430+
² Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
429431

430432
For general instructions about assigning roles in Microsoft Entra ID, see [Assign Microsoft Entra roles to users](/entra/identity/role-based-access-control/manage-roles-portal).
431433

exchange/docs-conceptual/connect-exo-powershell-managed-identity.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -361,20 +361,22 @@ Now that the Office 365 Exchange Online resource is available, return to Step 4.
361361
The supported Microsoft Entra roles are described in the following list:
362362

363363
- [Compliance Administrator](/entra/identity/role-based-access-control/permissions-reference#compliance-administrator)
364-
- [Exchange Administrator](/entra/identity/role-based-access-control/permissions-reference#exchange-administrator)<sup>\*</sup>
364+
- [Exchange Administrator](/entra/identity/role-based-access-control/permissions-reference#exchange-administrator)¹
365365
- [Exchange Recipient Administrator](/entra/identity/role-based-access-control/permissions-reference#exchange-recipient-administrator)
366-
- [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator)<sup>\*</sup>
366+
- [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator)¹ ²
367367
- [Global Reader](/entra/identity/role-based-access-control/permissions-reference#global-reader)
368368
- [Helpdesk Administrator](/entra/identity/role-based-access-control/permissions-reference#helpdesk-administrator)
369-
- [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator)<sup>\*</sup>
369+
- [Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator)¹
370370
- [Security Reader](/entra/identity/role-based-access-control/permissions-reference#security-reader)
371371

372-
> <sup>\*</sup> The Global Administrator and Exchange Administrator roles provide the required permissions for any task in Exchange Online PowerShell. For example:
373-
>
374-
> - Recipient management.
375-
> - Security and protection features. For example, anti-spam, anti-malware, anti-phishing, and the associated reports.
376-
>
377-
> The Security Administrator role does not have the necessary permissions for those same tasks.
372+
¹ The Global Administrator and Exchange Administrator roles provide the required permissions for any task in Exchange Online PowerShell. For example:
373+
374+
- Recipient management.
375+
- Security and protection features. For example, anti-spam, anti-malware, anti-phishing, and the associated reports.
376+
377+
The Security Administrator role does not have the necessary permissions for those same tasks.
378+
379+
² Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
378380

379381
For general instructions about assigning roles in Microsoft Entra ID, see [Assign Microsoft Entra roles to users](/entra/identity/role-based-access-control/manage-roles-portal).
380382

exchange/docs-conceptual/disable-access-to-exchange-online-powershell.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,12 +30,14 @@ Admins can use the procedures in this article to disable or enable a user's abil
3030

3131
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
3232
- [Exchange Online RBAC](/exchange/permissions-exo/permissions-exo): Membership in the **Organization Management** or **Recipient Management** role groups.
33-
- [Microsoft Entra RBAC](/microsoft-365/admin/add-users/about-admin-roles): Membership in the **Global Administrator** role gives users the required permissions *and* permissions for other features in Microsoft 365.
33+
- [Microsoft Entra RBAC](/microsoft-365/admin/add-users/about-admin-roles): Membership in the **Exchange Administrator** or **Global Administrator**<sup>\*</sup> roles gives users the required permissions *and* permissions for other features in Microsoft 365.
3434

3535
> [!IMPORTANT]
3636
> In your haste to quickly and globally disable PowerShell access in your cloud-based organization, beware of commands like `Get-User | Set-User -EXOModuleEnabled $false` without considering admin accounts. Use the procedures in this article to selectively remove PowerShell access, or preserve access for those who need it by using the following syntax in your global removal command: `Get-User | Where-Object {$_.UserPrincipalName -ne '[email protected]' -and $_.UserPrincipalName -ne '[email protected]'...} | Set-User -EXOModuleEnabled $false`.
3737
>
3838
> If you accidentally lock yourself out of PowerShell access, create a new admin account in the Microsoft 365 admin center, and then use that account to give yourself PowerShell access using the procedures in this article.
39+
>
40+
> <sup>\*</sup> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
3941
4042
- For detailed information about OPATH filter syntax in Exchange Online, see [Additional OPATH syntax information](recipient-filters.md#additional-opath-syntax-information).
4143

exchange/docs-conceptual/find-exchange-cmdlet-permissions.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,10 @@ You can use PowerShell to find the permissions required to run any Exchange or E
4242
- **Hygiene Management**
4343
- **Organization Management**
4444
- **View-Only Organization Management**
45-
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** or **Global Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
45+
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator**<sup>\*</sup> or **Global Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
46+
47+
> [!IMPORTANT]
48+
> <sup>\*</sup> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
4649
4750
## Use PowerShell to find the permissions required to run a cmdlet
4851

exchange/exchange-ps/exchange/Add-VivaModuleFeaturePolicy.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,9 @@ To learn more about assigned roles at the feature level, see [Features Available
7070

7171
To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids).
7272

73+
> [!IMPORTANT]
74+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
75+
7376
## EXAMPLES
7477

7578
### Example 1

exchange/exchange-ps/exchange/Get-DefaultTenantBriefingConfig.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,9 @@ To run this cmdlet, you need to be a member of one of the following directory ro
4040

4141
For more information, see [Microsoft Entra built-in roles](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference).
4242

43+
> [!IMPORTANT]
44+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
45+
4346
## EXAMPLES
4447

4548
### Example 1

exchange/exchange-ps/exchange/Get-DefaultTenantMyAnalyticsFeatureConfig.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,9 @@ To run this cmdlet, you need to be a member of one of the following directory ro
3636

3737
For more information, see [Microsoft Entra built-in roles](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference).
3838

39+
> [!IMPORTANT]
40+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
41+
3942
## EXAMPLES
4043

4144
### Example 1

exchange/exchange-ps/exchange/Get-DnssecStatusForVerifiedDomain.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
4141

4242
### Example 1
4343
```powershell
44-
PS C:\> Get-Get-DnssecStatusForVerifiedDomain -DomainName contoso.com
44+
PS C:\> Get-DnssecStatusForVerifiedDomain -DomainName contoso.com
4545
4646
DnssecFeatureStatus : Enabled
4747
ExpectedMxRecord : Microsoft.Exchange.Management.ProvisioningTasks.ExpectedMxRecordInfo

exchange/exchange-ps/exchange/Get-MyAnalyticsFeatureConfig.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,9 @@ To run this cmdlet, you need to be a member of one of the following directory ro
3939

4040
To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids).
4141

42+
> [!IMPORTANT]
43+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
44+
4245
## EXAMPLES
4346

4447
### Example 1

exchange/exchange-ps/exchange/Get-UserBriefingConfig.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,9 @@ To run this cmdlet, you need to be a member of one of the following directory ro
3636

3737
To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids).
3838

39+
> [!IMPORTANT]
40+
> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
41+
3942
## EXAMPLES
4043

4144
### Example 1

0 commit comments

Comments
 (0)