Skip to content

Commit 8bcacb9

Browse files
authored
Merge pull request MicrosoftDocs#6231 from MicrosoftDocs/chrisda
Chrisda to Master
2 parents e7cda32 + d75be81 commit 8bcacb9

8 files changed

+36
-15
lines changed

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Exchange Online PowerShell allows you to manage your Exchange Online settings fr
6464
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt**:
6565

6666
> [!NOTE]
67-
> You must temporarily enable WinRM to run the following commands. You can enable it by running "winrm quickconfig".
67+
> You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
6868
6969
```dos
7070
winrm get winrm/config/client/auth

exchange/docs-conceptual/connect-to-exchange-online-protection-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ In standalone Exchange Online Protection (EOP) organizations without Exchange On
5555
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt**:
5656

5757
> [!NOTE]
58-
> You must temporarily enable WinRM to run the following commands. You can enable it by running "winrm quickconfig".
58+
> You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
5959
6060
```dos
6161
winrm get winrm/config/client/auth

exchange/docs-conceptual/connect-to-scc-powershell.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Security & Compliance Center PowerShell allows you to manage your Security & Com
6969
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt**:
7070

7171
> [!NOTE]
72-
> You must temporarily enable WinRM to run the following commands. You can enable it by running "winrm quickconfig".
72+
> You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
7373
7474
```dos
7575
winrm get winrm/config/client/auth
@@ -105,7 +105,9 @@ Security & Compliance Center PowerShell allows you to manage your Security & Com
105105

106106
- For Office 365 Germany, use the _ConnectionUri_ value: `https://ps.compliance.protection.outlook.de/powershell-liveid/`.
107107

108-
- For Microsoft 365 GCC High or Microsoft 365 DoD, use the _ConnectionUri_ value: `https://ps.compliance.protection.office365.us/powershell-liveid/`.
108+
- For Microsoft 365 GCC High, use the _ConnectionUri_ value: `https://ps.compliance.protection.office365.us/powershell-liveid/`.
109+
110+
- For Microsoft 365 DoD, use the _ConnectionUri_ value: `https://l5.ps.compliance.protection.office365.us/powershell-liveid/`.
109111

110112
3. Run the following command:
111113

exchange/docs-conceptual/exchange-online-powershell-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ You can download the EXO V2 module from the PowerShell gallery [here](https://ww
8181
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt**:
8282

8383
> [!NOTE]
84-
> You must temporarily enable WinRM to run the following commands. You can enable it by running "winrm quickconfig".
84+
> You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
8585
8686
```dos
8787
winrm get winrm/config/client/auth

exchange/docs-conceptual/mfa-connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ If you want to use multi-factor authentication (MFA) to connect to Exchange Onli
4747
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt**:
4848

4949
> [!NOTE]
50-
> You must temporarily enable WinRM to run the following commands. You can enable it by running "winrm quickconfig".
50+
> You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
5151
5252
```dos
5353
winrm get winrm/config/client/auth

exchange/docs-conceptual/mfa-connect-to-scc-powershell.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ If your account uses multi-factor authentication (MFA) or federated authenticati
5050
To verify that Basic authentication is enabled for WinRM, run this command **in a Command Prompt**:
5151

5252
> [!NOTE]
53-
> You must temporarily enable WinRM to run the following commands. You can enable it by running "winrm quickconfig".
53+
> You must temporarily enable WinRM to run the following commands. You can enable it by running the command: `winrm quickconfig`.
5454
5555
```dos
5656
winrm get winrm/config/client/auth
@@ -69,7 +69,10 @@ If your account uses multi-factor authentication (MFA) or federated authenticati
6969
## Install the Exchange Online Remote PowerShell Module
7070

7171
> [!NOTE]
72-
> The Exchange Online Remote PowerShell Module is not supported in PowerShell Core (macOS, Linux, or Windows Nano Server). As a workaround, you can install the module on a computer that's running a supported version of Windows (physical or virtual), and use remote desktop software to connect. <br/><br/> If your installed version of the Exchange Online Remote PowerShell Module doesn't have the **Connect-IPPSSession** cmdlet, you need to install the latest version of the module.
72+
>
73+
> - The Exchange Online Remote PowerShell Module is not supported in PowerShell Core (macOS, Linux, or Windows Nano Server). As a workaround, you can install the module on a computer that's running a supported version of Windows (physical or virtual), and use remote desktop software to connect.
74+
>
75+
> - If your installed version of the Exchange Online Remote PowerShell Module doesn't have the **Connect-IPPSSession** cmdlet, you need to install the latest version of the module.
7376
7477
You need to do the following steps in a browser that supports ClickOnce (for example, Internet Explorer or Edge):
7578

@@ -100,9 +103,11 @@ You need to do the following steps in a browser that supports ClickOnce (for exa
100103
- The _\<ConnectionUri\>_ and _\<AzureADUri\>_ values depend on the ___location of your Microsoft 365 organization as described in the following table:
101104

102105
|**Microsoft 365 offering**|**_ConnectionUri_ parameter value**|**_AzureADAuthorizationEndPointUri_ parameter value**|
103-
|:-----|:-----|:-----|
106+
|---|---|---|
104107
|Microsoft 365|Not used |Not used|
105108
|Office 365 Germany|`https://ps.compliance.protection.outlook.de/PowerShell-LiveID`|`https://login.microsoftonline.de/common`|
109+
|Microsoft 365 GCC High|`https://ps.compliance.protection.office365.us/powershell-liveid/`|`https://login.microsoftonline.us/common`|
110+
|Microsoft 365 DoD|`https://l5.ps.compliance.protection.office365.us/powershell-liveid/`|`https://login.microsoftonline.us/common`|
106111

107112
This example connects to Security & Compliance Center PowerShell in Microsoft 365 using the account [email protected].
108113

exchange/exchange-ps/exchange/Connect-ExchangeOnline.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,12 @@ After the Connect-ExchangeOnline command is successful, you can run ExO V2 modul
7575
### -AzureADAuthorizationEndpointUri
7676
The AzureADAuthorizationEndpointUri parameter specifies the Azure AD Authorization endpoint Uri that can issue OAuth2 access tokens.
7777

78+
- For Exchange Online PowerShell in Office 365 Germany, use the value <https://login.microsoftonline.de/common> for this parameter.
79+
80+
- For Exchange Online PowerShell in Microsoft 365 GCC High and Microsoft 365 DoD, use the value <https://login.microsoftonline.us/common> for this parameter.
81+
82+
To connect to other Exchange PowerShell environments (for example, Security & Compliance Center PowerShell or standalone Exchange Online Protection PowerShell), use this parameter with the [Connect-IPPSSession](https://docs.microsoft.com/powershell/module/exchange/connect-ippssession) cmdlet.
83+
7884
```yaml
7985
Type: String
8086
Parameter Sets: (All)
@@ -107,6 +113,14 @@ Accept wildcard characters: False
107113
### -ConnectionUri
108114
The ConnectionUri parameter specifies the connection endpoint for the remote PowerShell session.
109115
116+
- For Exchange Online PowerShell in Office 365 Germany, use the value <https://outlook.office.de/PowerShell-LiveID> for this parameter.
117+
118+
- For Exchange Online PowerShell in Microsoft 365 GCC High, use the value <https://outlook.office365.us/powershell-liveid> for this parameter.
119+
120+
- For Exchange Online PowerShell in Microsoft 365 DoD, use the value <https://webmail.apps.mil/powershell-liveid> for this parameter.
121+
122+
To connect to other Exchange PowerShell environments (for example, Security & Compliance Center PowerShell or standalone Exchange Online Protection PowerShell), use this parameter with the [Connect-IPPSSession](https://docs.microsoft.com/powershell/module/exchange/connect-ippssession) cmdlet.
123+
110124
```yaml
111125
Type: String
112126
Parameter Sets: (All)

exchange/exchange-ps/exchange/Connect-IPPSSession.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -64,9 +64,9 @@ This example connects to standalone Exchange Online Protection PowerShell in an
6464
### -AzureADAuthorizationEndpointUri
6565
The AzureADAuthorizationEndpointUri parameter specifies the Azure AD Authorization endpoint Uri that can issue OAuth2 access tokens.
6666

67-
In Office 365 Germany for Security & Compliance Center PowerShell, use the value <https://login.microsoftonline.de/common> for this parameter.
67+
- For Security & Compliance Center PowerShell in Office 365 Germany, use the value <https://login.microsoftonline.de/common> for this parameter.
6868

69-
In Microsoft 365 GCC High and Microsoft 365 DoD for Security & Compliance Center PowerShell, use the value <https://login.microsoftonline.us/common> for this parameter.
69+
- For Security & Compliance Center PowerShell in Microsoft 365 GCC High and Microsoft 365 DoD, use the value <https://login.microsoftonline.us/common> for this parameter.
7070

7171
```yaml
7272
Type: String
@@ -99,13 +99,13 @@ Accept wildcard characters: False
9999
### -ConnectionUri
100100
The ConnectionUri parameter specifies the connection endpoint for the remote PowerShell session.
101101
102-
In standalone Exchange Online Protection organizations without Exchange Online mailboxes, use the value <https://ps.protection.outlook.com/powershell-liveid/> for this parameter.
102+
- For Exchange Online Protection PowerShell in standalone EOP organizations without Exchange Online mailboxes, use the value <https://ps.protection.outlook.com/powershell-liveid/> for this parameter.
103103
104-
In Office 365 Germany for Security & Compliance Center PowerShell, use the value <https://ps.compliance.protection.outlook.de/PowerShell-LiveID> for this parameter.
104+
- For Security & Compliance Center PowerShell in Office 365 Germany, use the value <https://ps.compliance.protection.outlook.de/PowerShell-LiveID> for this parameter.
105105
106-
In Microsoft 365 GCC High for Security & Compliance Center PowerShell, use the value <https://outlook.office365.us/powershell-liveid> for this parameter.
106+
- For Security & Compliance Center PowerShell in Microsoft 365 GCC High, use the value <https://outlook.office365.us/powershell-liveid> for this parameter.
107107
108-
In Microsoft 365 DoD for Security & Compliance Center PowerShell, use the value <https://webmail.apps.mil/powershell-liveid> for this parameter.
108+
- For Security & Compliance Center PowerShell in Microsoft 365 DoD, use the value <https://l5.ps.compliance.protection.office365.us/powershell-liveid/> for this parameter.
109109
110110
```yaml
111111
Type: String

0 commit comments

Comments
 (0)