You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/app-only-auth-powershell-v2.md
+11-8Lines changed: 11 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,10 +14,10 @@ ms.custom:
14
14
ms.assetid:
15
15
search.appverid: MET150
16
16
ROBOTS: NOINDEX, NOFOLLOW
17
-
description: "Learn about using the Exchange Online V2 module in scripts and other long-running tasks with Modern Authentication and app-only authentication."
17
+
description: "Learn about using the Exchange Online V2 module in scripts and other long-running tasks with modern authentication and app-only authentication."
18
18
---
19
19
20
-
# App-only authentication in the EXO V2 module
20
+
# App-only authentication for unattended scripts in the EXO V2 module
21
21
22
22
> [!NOTE]
23
23
> This feature is currently in Public Preview, and is available in the Preview release of Exchange Online PowerShell V2 Module.
Auditing and reporting scenarios in Exchange Online often involve scripts that run unattended. In most cases, these unattended scripts access Exchange Online PowerShell using Basic authentication (a username and password). Even when the connection to Exchange Online PowerShell uses Modern authentication, the credentials are stored in a local file or a secret vault that's access at run-time.
37
+
Auditing and reporting scenarios in Exchange Online often involve scripts that run unattended. In most cases, these unattended scripts access Exchange Online PowerShell using Basic authentication (a username and password). Even when the connection to Exchange Online PowerShell uses modern authentication, the credentials are stored in a local file or a secret vault that's access at run-time.
38
38
39
39
Because storing user credentials locally is not a safe practice, we're releasing this feature to support authentication for unattended scripts (automation) scenarios using AzureAD applications and self-signed certificates.
40
40
@@ -43,13 +43,13 @@ The following examples show how to use the Exchange Online PowerShell V2 module
When you use the _CertificateThumbPrint_ parameter, the certificate needs to be installed on the computer where you are running the command. The certificate should be installed in the user certificate store.
@@ -92,7 +92,10 @@ For a detailed visual flow bout creating applications in Azure AD, see <https://
92
92
93
93
- Create and configure a self-signed X.509 certificate, which will be used to authenticate your Application against Azure AD, while requesting the app-only access token.
94
94
95
-
- This is similar to generating a password for user accounts. The certificate can be self-signed as well. See the [Appendix](#appendix) section later in this topic for instructions for generating certificates in PowerShell.
95
+
- This is similar to generating a password for user accounts. The certificate can be self-signed as well. See the [Appendix](#step-3-generate-a-self-signed-certificate) section later in this topic for instructions for generating certificates in PowerShell.
96
+
97
+
> [!NOTE]
98
+
> Cryptography: Next Generation (CNG) certificates are not supported for app-only authentication with Exchange. CNG certificates are created by default in modern Windows versions. You must use a certificate from a CSP key provider. The [Appendix](#step-3-generate-a-self-signed-certificate) section covers two supported methods to create a CSP certificate.
96
99
97
100
4. Assign RBAC roles
98
101
@@ -103,7 +106,7 @@ For a detailed visual flow bout creating applications in Azure AD, see <https://
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/connect-to-exchange-online-powershell.md
+4-7Lines changed: 4 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: "Connect to Exchange Online PowerShell"
2
+
title: "Connect to Exchange Online PowerShell with Basic authentication"
3
3
ms.author: chrisda
4
4
author: chrisda
5
5
manager: dansimp
@@ -12,19 +12,16 @@ ms.collection: Strat_EX_Admin
12
12
ms.custom:
13
13
ms.assetid: c8bea338-6c1a-4bdf-8de0-7895d427ee5b
14
14
search.appverid: MET150
15
-
description: "Learn how to use remote PowerShell to connect to Exchange Online."
15
+
description: "Learn how to use remote PowerShell to connect to Exchange Online with Basic authentication."
16
16
---
17
17
18
-
# Connect to Exchange Online PowerShell
19
-
20
-
> [!NOTE]
21
-
> Since Basic Auth Deprecation has been announced and this method uses Basic Authentication on Server Side,
18
+
# Connect to Exchange Online PowerShell with Basic authentication
22
19
23
20
Exchange Online PowerShell allows you to manage your Exchange Online settings from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to Exchange Online. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the Exchange Online cmdlets into your local Windows PowerShell session so that you can use them.
24
21
25
22
> [!NOTE]
26
23
>
27
-
> - We're eventually going to [disable Basic authentication in Exchange Online](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-april-2020-update/ba-p/1275508), and the connection method described in this topic uses Basic authentication. We recommend that you use the [Exchange Online PowerShell V2 module](exchange-online-powershell-v2.md) to connect to Exchange Online PowerShell, because it uses Modern authentication in all scenarios.
24
+
> - We're eventually going to [disable Basic authentication in Exchange Online](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-april-2020-update/ba-p/1275508), and the connection method described in this topic uses Basic authentication. We recommend that you use the [Exchange Online PowerShell V2 module](exchange-online-powershell-v2.md) to connect to Exchange Online PowerShell, because it uses modern authentication in all scenarios.
28
25
>
29
26
> - The Exchange Online PowerShell V2 module works with multi-factor authentication (MFA). For MFA connection instructions using the older Exchange Online Remote PowerShell Module, see [Connect to Exchange Online PowerShell using multi-factor authentication](mfa-connect-to-exchange-online-powershell.md).
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/exchange-online-powershell-v2.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Exchange Online PowerShell V2
2
+
title: Exchange Online PowerShell with modern authentication using V2 Module
3
3
ms.author: chrisda
4
4
author: chrisda
5
5
manager: dansimp
@@ -13,10 +13,10 @@ ms.collection: Strat_EX_Admin
13
13
ms.custom:
14
14
ms.assetid:
15
15
search.appverid: MET150
16
-
description: "Learn how to download and use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell."
16
+
description: "Learn how to install and use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell with modern authentication."
17
17
---
18
18
19
-
# Use the Exchange Online PowerShell V2 module
19
+
# Use the Exchange Online PowerShell with modern authentication using V2 module
20
20
21
21
The Exchange Online PowerShell V2 module (abbreviated as the EXO V2 module) enables admins to connect to their Exchange Online environment in Microsoft 365 to retrieve data, create new objects, update existing objects, remove objects as well as configure Exchange Online and its features.
22
22
@@ -32,7 +32,7 @@ Connect-ExchangeOnline -EnableErrorReporting -LogDirectoryPath <Path to store lo
32
32
33
33
The Exchange Online PowerShell V2 module contains a small set of new cmdlets that are optimized for bulk data retrieval scenarios (think: thousands and thousands of objects). Until you create a session to connect to your Exchange Online organization, you'll only see these new cmdlets in the module. After you connect to your Exchange Online organization, you'll see all of the older remote PowerShell cmdlets.
34
34
35
-
The EXO V2 module use Modern authentication for all cmdlets. You can't use Basic authentication in the EXO V2 module; however, you still need to configure the Basic authentication setting in WinRM as described later in this topic.
35
+
The EXO V2 module use modern authentication for all cmdlets. You can't use Basic authentication in the EXO V2 module; however, you still need to configure the Basic authentication setting in WinRM as described later in this topic.
36
36
37
37
The new cmdlets in the EXO V2 module are meant to replace their older, less efficient equivalents. However, the original cmdlets are still available in the EXO V2 module for backwards compatibility **after** you create a session to connect to your Exchange Online organization.
This cmdlet is available in on-premises Exchange and in the cloud-based service. Some parameters and settings may be exclusive to one environment or the other.
17
17
18
-
Use the Get-MailboxAuditBypassAssociation cmdlet to retrieve user or computer accounts configured to bypass mailbox audit logging.
18
+
Use the Get-MailboxAuditBypassAssociation cmdlet to retrieve information about the AuditBypassEnabled property value for user accounts (on-premises Exchange and the cloud) and computer accounts (on-premises Exchange only). You use the [Set-MailboxAuditBypassAssociation](https://docs.microsoft.com/powershell/module/exchange/set-mailboxauditbypassassociation) cmdlet to enable this property to bypass mailbox audit logging.
19
19
20
20
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
When you configure a user or computer account to bypass mailbox audit logging, access or actions taken by the user or computer account to any mailbox isn't logged. By bypassing trusted user or computer accounts that need to access mailboxes frequently, you can reduce the noise in mailbox audit logs.
30
+
When you configure a user or computer account to bypass mailbox audit logging, access or actions taken by the user account or computer account to any mailbox isn't logged. By bypassing trusted user accounts or computer accounts that need to access mailboxes frequently, you can reduce the noise in mailbox audit logs.
31
31
32
32
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
$MBX | where {$_.AuditBypassEnabled -eq $true} | Format-Table Name,AuditBypassEnabled
54
+
```
51
55
52
-
### -DomainController
53
-
This parameter is available only in on-premises Exchange.
56
+
This example returns all accounts that are configured for mailbox audit logging bypass.
54
57
55
-
The DomainController parameter specifies the ___domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the ___domain controller by its fully qualified ___domain name (FQDN). For example, dc01.contoso.com.
58
+
## PARAMETERS
59
+
60
+
### -Identity
61
+
The Identity parameter specifies the user account or computer account where you want to view the value of the AuditBypassEnabled property.
56
62
57
63
```yaml
58
-
Type: Fqdn
64
+
Type: MailboxAuditBypassAssociationIdParameter
59
65
Parameter Sets: (All)
60
66
Aliases:
61
-
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
67
+
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
62
68
63
69
Required: False
64
-
Position: Named
70
+
Position: 1
65
71
Default value: None
66
-
Accept pipeline input: False
72
+
Accept pipeline input: True
67
73
Accept wildcard characters: False
68
74
```
69
75
70
-
### -Identity
71
-
The Identity parameter specifies a user or computer account to retrieve audit logging bypass association for.
76
+
### -DomainController
77
+
This parameter is available only in on-premises Exchange.
78
+
79
+
The DomainController parameter specifies the ___domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the ___domain controller by its fully qualified ___domain name (FQDN). For example, dc01.contoso.com.
72
80
73
81
```yaml
74
-
Type: MailboxAuditBypassAssociationIdParameter
82
+
Type: Fqdn
75
83
Parameter Sets: (All)
76
84
Aliases:
77
-
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
85
+
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
The DecisionSetBy parameter filters the results by who allowed or blocked the spoofed sender. Valid values are:
140
118
141
-
-Admin
142
-
-SpoofProtection
119
+
-Admin
120
+
-SpoofProtection
143
121
144
122
```yaml
145
123
Type: DecisionSetBy
@@ -159,8 +137,8 @@ The Detailed switch specifies whether to return detailed information in the resu
159
137
160
138
Specifically, this switch returns the following additional properties:
161
139
162
-
- ConfidenceLevel
163
-
- DomainPairsCountInCategory
140
+
- ConfidenceLevel: Level of signals indicated by spoof intelligence that these domains may be suspicious, based on historical sending patterns and the reputation score of the domains.
141
+
- DomainPairsCountInCategory: The spoofed domains displayed are separated into two categories: suspicious ___domain pairs and non-suspicious ___domain pairs. For more information, see [this topic](https://docs.microsoft.com/microsoft-365/security/office-365-security/walkthrough-spoof-intelligence-insight).
This example returns all of the available recoverable deleted messages with the specified subject in the mailbox [email protected] for the specified date/time range.
The CSVData parameter specifies the .csv file you want to import. Use the following syntax for this parameter: ([System.IO.File]::ReadAllBytes("\<file name and path\>")). For example, ([System.IO.File]::ReadAllBytes("C:\\My Documents\\Contacts.csv")).
75
+
The CSVData parameter specifies the .csv file you want to import. Use the following syntax for this parameter: `([System.IO.File]::ReadAllBytes("<file name and path>"))`. For example, `([System.IO.File]::ReadAllBytes("C:\My Documents\Contacts.csv"))`.
0 commit comments