You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This cmdlet is available in on-premises Exchange and in the cloud-based service. Some parameters and settings may be exclusive to one environment or the other.
17
17
18
-
Use the Get-MailboxAuditBypassAssociation cmdlet to retrieve user or computer accounts configured to bypass mailbox audit logging.
18
+
Use the Get-MailboxAuditBypassAssociation cmdlet to retrieve information about the AuditBypassEnabled property value for user accounts (on-premises Exchange and the cloud) and computer accounts (on-premises Exchange only). You use the [Set-MailboxAuditBypassAssociation](https://docs.microsoft.com/powershell/module/exchange/set-mailboxauditbypassassociation) cmdlet to enable this property to bypass mailbox audit logging.
19
19
20
20
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
When you configure a user or computer account to bypass mailbox audit logging, access or actions taken by the user or computer account to any mailbox isn't logged. By bypassing trusted user or computer accounts that need to access mailboxes frequently, you can reduce the noise in mailbox audit logs.
30
+
When you configure a user or computer account to bypass mailbox audit logging, access or actions taken by the user account or computer account to any mailbox isn't logged. By bypassing trusted user accounts or computer accounts that need to access mailboxes frequently, you can reduce the noise in mailbox audit logs.
31
31
32
32
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
$MBX | where {$_.AuditBypassEnabled -eq $true} | Format-Table Name,AuditBypassEnabled
54
+
```
51
55
52
-
### -DomainController
53
-
This parameter is available only in on-premises Exchange.
56
+
This example returns all accounts that are configured for mailbox audit logging bypass.
54
57
55
-
The DomainController parameter specifies the ___domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the ___domain controller by its fully qualified ___domain name (FQDN). For example, dc01.contoso.com.
58
+
## PARAMETERS
59
+
60
+
### -Identity
61
+
The Identity parameter specifies the user account or computer account where you want to view the value of the AuditBypassEnabled property.
56
62
57
63
```yaml
58
-
Type: Fqdn
64
+
Type: MailboxAuditBypassAssociationIdParameter
59
65
Parameter Sets: (All)
60
66
Aliases:
61
-
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
67
+
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
62
68
63
69
Required: False
64
-
Position: Named
70
+
Position: 1
65
71
Default value: None
66
-
Accept pipeline input: False
72
+
Accept pipeline input: True
67
73
Accept wildcard characters: False
68
74
```
69
75
70
-
### -Identity
71
-
The Identity parameter specifies a user or computer account to retrieve audit logging bypass association for.
76
+
### -DomainController
77
+
This parameter is available only in on-premises Exchange.
78
+
79
+
The DomainController parameter specifies the ___domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the ___domain controller by its fully qualified ___domain name (FQDN). For example, dc01.contoso.com.
72
80
73
81
```yaml
74
-
Type: MailboxAuditBypassAssociationIdParameter
82
+
Type: Fqdn
75
83
Parameter Sets: (All)
76
84
Aliases:
77
-
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
85
+
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
0 commit comments