Skip to content

Commit c640067

Browse files
authored
Merge branch 'master' into master
2 parents ef1667c + 00bb3a3 commit c640067

File tree

7 files changed

+42
-37
lines changed

7 files changed

+42
-37
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,14 @@ description: "Learn about using the Exchange Online V2 module in scripts and oth
1919

2020
# App-only authentication in the EXO V2 module
2121

22+
**Note**:
23+
24+
This feature is currently in Public Preview, and is available in the Preview release of Exchange Online PowerShell V2 Module. To install the Preview release of the EXO V2 module, run the following command:
25+
26+
```powershell
27+
Install-Module -Name ExchangeOnlineManagement -RequiredVersion 2.0.3-Preview -AllowPrerelease
28+
```
29+
2230
Auditing and reporting scenarios in Exchange Online often involve scripts that run unattended. In most cases, these unattended scripts access Exchange Online PowerShell using Basic authentication (a username and password). Even when the connection to Exchange Online PowerShell uses Modern authentication, the credentials are stored in a local file or a secret vault that's access at run-time.
2331

2432
Because storing user credentials locally is not a safe practice, we're releasing this feature to support authentication for unattended scripts (automation) scenarios using AzureAD applications and self-signed certificates.
@@ -177,11 +185,13 @@ After you register the certificate with your application, you can use the public
177185

178186
Azure AD has more than 50 admin roles available. For app-only authentication in Exchange Online, we currently support the previously mentioned roles:
179187

180-
- Global administrator
181-
- Compliance administrator
182-
- Security reader
183-
- Security administrator
184-
- Helpdesk administrator
188+
- Global administrator
189+
- Compliance administrator
190+
- Security reader
191+
- Security administrator
192+
- Helpdesk administrator
193+
- Exchange Service administrator
194+
- Global Reader
185195

186196
1. In the Azure AD portal under **Manage Azure Active Directory**, click **View**.
187197

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,17 @@ description: "Learn how to use remote PowerShell to connect to Exchange Online."
1818
# Connect to Exchange Online PowerShell
1919

2020
> [!NOTE]
21-
> We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Use the Exchange Online PowerShell V2 module](exchange-online-powershell-v2.md).
21+
> Since Basic Auth Deprecation has been announced and this method uses Basic Authentication on Server Side,
2222
2323
Exchange Online PowerShell allows you to manage your Exchange Online settings from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to Exchange Online. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the Exchange Online cmdlets into your local Windows PowerShell session so that you can use them.
2424

25-
> [!IMPORTANT]
26-
> If you want to use multi-factor authentication (MFA) to connect to Exchange Online PowerShell, you need to download and use the Exchange Online Remote PowerShell Module. For more information, see [Connect to Exchange Online PowerShell using multi-factor authentication](mfa-connect-to-exchange-online-powershell.md). <br/><br/> If you're a standalone Exchange Online Protection (EOP) customer (for example, you're using EOP to protect your on-premises email environment), use the connection instructions in [Connect to Exchange Online Protection PowerShell](connect-to-exchange-online-protection-powershell.md). If your on-premises Exchange organization has Exchange Enterprise CAL with Services licenses, EOP is one of the included services, and the connection instructions in this topic will work for you.
25+
> [!NOTE]
26+
>
27+
> - We're eventually going to [disable Basic authentication in Exchange Online](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-april-2020-update/ba-p/1275508), and the connection method described in this topic uses Basic authentication. We recommend that you use the [Exchange Online PowerShell V2 module](exchange-online-powershell-v2.md) to connect to Exchange Online PowerShell, because it uses Modern authentication in all scenarios.
28+
>
29+
> - The Exchange Online PowerShell V2 module works with multi-factor authentication (MFA). For MFA connection instructions using the older Exchange Online Remote PowerShell Module, see [Connect to Exchange Online PowerShell using multi-factor authentication](mfa-connect-to-exchange-online-powershell.md).
30+
>
31+
> - If you're a standalone Exchange Online Protection (EOP) customer (for example, you're using EOP to protect your on-premises email environment), use the connection instructions in [Connect to Exchange Online Protection PowerShell](connect-to-exchange-online-protection-powershell.md). If your on-premises Exchange organization has Exchange Enterprise CAL with Services licenses, EOP is one of the included services, and the connection instructions in this topic will work for you.
2732
2833
## What do you need to know before you begin?
2934

exchange/exchange-ps/exchange/Get-ComplianceSearch.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,11 @@ For information about the parameter sets in the Syntax section below, see [Excha
2222
## SYNTAX
2323

2424
```
25-
Get-ComplianceSearch [[-Identity] <ComplianceSearchIdParameter>] [-Case <String>] [-DomainController <Fqdn>]
26-
[-ResultSize <Unlimited>] [<CommonParameters>]
25+
Get-ComplianceSearch [[-Identity] <ComplianceSearchIdParameter>]
26+
[-Case <String>]
27+
[-DomainController <Fqdn>]
28+
[-ResultSize <Unlimited>]
29+
[<CommonParameters>]
2730
```
2831

2932
## DESCRIPTION
@@ -52,7 +55,9 @@ This examples show details of the compliance search named Case 1234.
5255
## PARAMETERS
5356

5457
### -Case
55-
This parameter is reserved for internal Microsoft use.
58+
The Case parameter filters the results by the name of a Core eDiscovery case that the compliance search is associated with. If the value contains spaces, enclose the value in quotation marks.
59+
60+
You can't use this parameter to view compliance searches associated with Advanced eDiscovery cases.
5661

5762
```yaml
5863
Type: String

exchange/exchange-ps/exchange/New-ComplianceSearch.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,9 @@ Accept wildcard characters: False
132132
```
133133
134134
### -Case
135-
The Case parameter specifies the name of an eDiscovery case that the new compliance search will be associated with. If the value contains spaces, enclose the value in quotation marks.
135+
The Case parameter specifies the name of a Core eDiscovery case to associate the new compliance search with. If the value contains spaces, enclose the value in quotation marks.
136+
137+
You can't use this parameter to create compliance searches associated with Advanced eDiscovery cases.
136138
137139
If the Name parameter contains spaces, the value of the ExchangeLocation parameter is cleared when you use the Case parameter.
138140

exchange/exchange-ps/exchange/Set-AtpPolicyForO365.md

Lines changed: 0 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,6 @@ Set-AtpPolicyForO365 [[-Identity] <AtpPolicyForO365IdParameter>]
3838
[-EnableATPForSPOTeamsODB <Boolean>]
3939
[-EnableSafeDocs <Boolean>]
4040
[-EnableSafeLinksForO365Clients <Boolean>]
41-
[-EnableSafeLinksForWebAccessCompanion <Boolean>]
4241
[-TrackClicks <Boolean>]
4342
[-WhatIf] [<CommonParameters>]
4443
```
@@ -214,26 +213,6 @@ Accept pipeline input: False
214213
Accept wildcard characters: False
215214
```
216215
217-
### -EnableSafeLinksForWebAccessCompanion
218-
The EnableSafeLinksForWebAccessCompanion parameter specifies whether Safe Links is enabled for Microsoft 365 apps on the web. Valid values are:
219-
220-
- $true: Safe Links are enabled for Microsoft 365 web apps. This is the default value.
221-
222-
- $false: Safe Links are disabled for Microsoft 365 web apps.
223-
224-
```yaml
225-
Type: Boolean
226-
Parameter Sets: (All)
227-
Aliases:
228-
Applicable: Exchange Online, Exchange Online Protection
229-
230-
Required: False
231-
Position: Named
232-
Default value: None
233-
Accept pipeline input: False
234-
Accept wildcard characters: False
235-
```
236-
237216
### -TrackClicks
238217
The TrackClicks parameter specifies whether to track user clicks related to blocked URLs. Valid values are:
239218

exchange/exchange-ps/exchange/Set-IRMConfiguration.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -271,11 +271,13 @@ Accept wildcard characters: False
271271
### -ExternalLicensingEnabled
272272
This parameter is available only in on-premises Exchange.
273273
274-
The ExternalLicensingEnabled parameter specifies whether to enable IRM features for messages that are sent to external recipients. Valid values are:
274+
The ExternalLicensingEnabled parameter specifies whether Exchange will try to acquire licenses from clusters other than the one it is configured to use. Without this setting, if Exchange receives many messages protected with a random key, the server will devote excessive resources to validating signatures and decrypting messages, even if the keys aren't valid.
275275
276-
- $true: IRM features are enabled for external messages.
276+
Valid values are:
277277
278-
- $false: IRM features are disabled for external messages. This is the default value.
278+
- $true: Exchange will try to acquire licenses from clusters other than the one it is configured to use. This value can help prevent denial of service (DoS) attacks.
279+
280+
- $false: Exchange will try to acquire licenses only from clusters that it is configured to use. This is the default value. The *LicensingLocation* parameter specifies the list of allowed clusters.
279281
280282
```yaml
281283
Type: Boolean

exchange/exchange-ps/exchange/Set-Mailbox.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5021,7 +5021,9 @@ A valid value is a number from 32 to 256 kilobytes (32768 to 262144 bytes). When
50215021

50225022
Unqualified values are typically treated as bytes, but small values may be rounded up to the nearest kilobyte.
50235023

5024-
The default value is 64 kilobytes (65536 bytes).
5024+
In Exchange Online, Exchange 2019, Exchange 2016, and Exchange 2013, the default value is 256 kilobytes (262,144 bytes).
5025+
5026+
In Exchange 2010, the default value is 64 kilobytes (65,536 bytes).
50255027

50265028
The quota for Inbox rules applies only to enabled rules. There is no restriction on the number of disabled rules a mailbox can have. However, the total size of rules that are enabled or active can't exceed the value specified for this parameter.
50275029

0 commit comments

Comments
 (0)