Skip to content

Commit d58702c

Browse files
committed
Merge branch 'master' into NewMigBranch-chrisda
2 parents 1bdb359 + 8e79161 commit d58702c

26 files changed

+3039
-84
lines changed

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ If your account doesn't use multi-factor authentication, use the steps in this s
114114
3. The command that you need to run uses the following syntax:
115115

116116
```powershell
117-
Connect-ExchangeOnline -Credential $UserCredential = Get-Credential -ShowProgress $true [-ConnectionUri <URL>] [-DelegatedOrganization <String>]
117+
Connect-ExchangeOnline -Credential $UserCredential -ShowProgress $true [-ConnectionUri <URL>] [-DelegatedOrganization <String>]
118118
```
119119

120120
- The required _ConnectionUri_ value depends on the nature of your Microsoft 365 organization. For more information, see the parameter description in [Connect-ExchangeOnline](https://docs.microsoft.com/powershell/module/exchange/connect-exchangeonline).

exchange/exchange-ps/exchange/Disable-SafeAttachmentRule.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps || eop-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the Disable-SafeAttachmentRule cmdlet to disable enabled Safe Attachments rules in your cloud-based organization.
18+
Use the Disable-SafeAttachmentRule cmdlet to disable safe attachment rules in your cloud-based organization.
1919

2020
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2121

@@ -28,7 +28,7 @@ Disable-SafeAttachmentRule [-Identity] <RuleIdParameter> [-Confirm] [-WhatIf] [<
2828
```
2929

3030
## DESCRIPTION
31-
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity.
31+
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Office 365 ATP](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-attachments).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

@@ -39,12 +39,12 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3939
Disable-SafeAttachmentRule -Identity "Engineering Department Attachment Rule"
4040
```
4141

42-
This example disables the Safe Attachments rule named Engineering Department Attachment Rule.
42+
This example disables the safe attachment rule named Engineering Department Attachment Rule.
4343

4444
## PARAMETERS
4545

4646
### -Identity
47-
The Identity parameter specifies the enabled Safe Attachments rule that you want to disable.
47+
The Identity parameter specifies the enabled safe attachment rule that you want to disable.
4848

4949
You can use any value that uniquely identifies the rule. For example:
5050

exchange/exchange-ps/exchange/Enable-SafeAttachmentRule.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ monikerRange: "exchonline-ps || eop-ps"
1515
## SYNOPSIS
1616
This cmdlet is available only in the cloud-based service.
1717

18-
Use the Enable-SafeAttachmentRule cmdlet to enable disabled Safe Attachments rules in your cloud-based organization.
18+
Use the Enable-SafeAttachmentRule cmdlet to enable safe attachment rules in your cloud-based organization.
1919

2020
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2121

@@ -28,7 +28,7 @@ Enable-SafeAttachmentRule [-Identity] <RuleIdParameter> [-Confirm] [-WhatIf] [<C
2828
```
2929

3030
## DESCRIPTION
31-
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity.
31+
Safe Attachments is a feature in Advanced Threat Protection that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Office 365 ATP](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-attachments).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

@@ -39,12 +39,12 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3939
Enable-SafeAttachmentRule -Identity "Marketing Department Attachment Rule"
4040
```
4141

42-
This example enables the disabled Safe Attachments rule named Marketing Department Attachment Rule.
42+
This example enables the disabled safe attachment rule named Marketing Department Attachment Rule.
4343

4444
## PARAMETERS
4545

4646
### -Identity
47-
The Identity parameter specifies the disabled Safe Attachments rule that you want to enable.
47+
The Identity parameter specifies the disabled safe attachment rule that you want to enable.
4848

4949
You can use any value that uniquely identifies the rule. For example:
5050

Lines changed: 116 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,116 @@
1+
---
2+
external help file: Microsoft.Exchange.TransportMailflow-Help.xml
3+
online version: https://docs.microsoft.com/powershell/module/exchange/get-autosensitivitylabelpolicy
4+
applicable: Office 365 Security & Compliance Center
5+
title: Get-Label
6+
schema: 2.0.0
7+
author: chrisda
8+
ms.author: chrisda
9+
ms.reviewer:
10+
monikerRange: "o365scc-ps"
11+
---
12+
13+
# Get-AutoSensitivityLabelPolicy
14+
15+
## SYNOPSIS
16+
This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell).
17+
18+
Use the Get-AutoSensitivityLabelPolicy cmdlet to view auto-labeling policies in your organization.
19+
20+
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
21+
22+
## SYNTAX
23+
24+
```
25+
Get-AutoSensitivityLabelPolicy [[-Identity] <PolicyIdParameter>]
26+
[-DistributionDetail]
27+
[-IncludeTestModeResults <Boolean>]
28+
[<CommonParameters>]
29+
```
30+
31+
## DESCRIPTION
32+
You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center).
33+
34+
## EXAMPLES
35+
36+
### Example 1
37+
```powershell
38+
Get-AutoSensitivityLabelPolicy -Identity "Employee Numbers" -IncludeTestModeResults $true
39+
```
40+
41+
This example returns detailed information about the autosensitivity label policy named Employee Numbers. The IncludeTestModeResults parameter and value allows you to see the status of test mode.
42+
43+
## PARAMETERS
44+
45+
### -Identity
46+
The Identity parameter specifies the auto-labeling policy that you want to view. You can use any value that uniquely identifies the policy. For example:
47+
48+
- Name
49+
50+
- Distinguished name (DN)
51+
52+
- GUID
53+
54+
```yaml
55+
Type: PolicyIdParameter
56+
Parameter Sets: (All)
57+
Aliases:
58+
Applicable: Office 365 Security & Compliance Center
59+
60+
Required: False
61+
Position: 0
62+
Default value: None
63+
Accept pipeline input: True (ByPropertyName, ByValue)
64+
Accept wildcard characters: False
65+
```
66+
67+
### -DistributionDetail
68+
The DistributionDetail switch returns detailed policy distribution information in the DistributionResults property. You don't need to specify a value with this switch.
69+
70+
```yaml
71+
Type: SwitchParameter
72+
Parameter Sets: (All)
73+
Aliases:
74+
Applicable: Office 365 Security & Compliance Center
75+
76+
Required: False
77+
Position: Named
78+
Default value: None
79+
Accept pipeline input: False
80+
Accept wildcard characters: False
81+
```
82+
83+
### -IncludeTestModeResults
84+
The IncludeTestModeResults parameter specifies whether to include the status of test mode in the policy details. Valid values are:
85+
86+
- $true: Include the status of test mode in the policy details.
87+
88+
- $false: Don't include the status of test mode in the policy details.
89+
90+
```yaml
91+
Type: Boolean
92+
Parameter Sets: (All)
93+
Aliases:
94+
Applicable: Office 365 Security & Compliance Center
95+
96+
Required: False
97+
Position: Named
98+
Default value: None
99+
Accept pipeline input: False
100+
Accept wildcard characters: False
101+
```
102+
103+
### CommonParameters
104+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216).
105+
106+
## INPUTS
107+
108+
###
109+
110+
## OUTPUTS
111+
112+
###
113+
114+
## NOTES
115+
116+
## RELATED LINKS
Lines changed: 175 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,175 @@
1+
---
2+
external help file: Microsoft.Exchange.TransportMailflow-Help.xml
3+
online version: https://docs.microsoft.com/powershell/module/exchange/get-autosensitivitylabelrule
4+
applicable: Office 365 Security & Compliance Center
5+
title: Get-Label
6+
schema: 2.0.0
7+
author: chrisda
8+
ms.author: chrisda
9+
ms.reviewer:
10+
monikerRange: "o365scc-ps"
11+
---
12+
13+
# Get-AutoSensitivityLabelRule
14+
15+
## SYNOPSIS
16+
This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell).
17+
18+
Use the Get-AutoSensitivityLabelPolicy cmdlet to view auto-labeling policy rules in your organization.
19+
20+
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
21+
22+
## SYNTAX
23+
24+
```
25+
Get-AutoSensitivityLabelRule [[-Identity] <ComplianceRuleIdParameter>]
26+
[-Confirm]
27+
[-IncludeExecutionRuleGuids <Boolean>]
28+
[-IncludeExecutionRuleInformation <Boolean>]
29+
[-Policy <PolicyIdParameter>]
30+
[-WhatIf]
31+
[<CommonParameters>]
32+
```
33+
34+
## DESCRIPTION
35+
You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center).
36+
37+
## EXAMPLES
38+
39+
### Example 1
40+
```powershell
41+
Get-AutoSensitivityLabelRule
42+
```
43+
44+
This example displays summary information for all autolabeling rules in the Security & Compliance Center.
45+
46+
## PARAMETERS
47+
48+
### -Identity
49+
The Identity parameter specifies the auto-labeling policy rule that you want to view. You can use any value that uniquely identifies the rule. For example:
50+
51+
- Name
52+
53+
- Distinguished name (DN)
54+
55+
- GUID
56+
57+
```yaml
58+
Type: ComplianceRuleIdParameter
59+
Parameter Sets: (All)
60+
Aliases:
61+
Applicable: Office 365 Security & Compliance Center
62+
63+
Required: False
64+
Position: 0
65+
Default value: None
66+
Accept pipeline input: True (ByPropertyName, ByValue)
67+
Accept wildcard characters: False
68+
```
69+
70+
### -Confirm
71+
This parameter is reserved for internal Microsoft use.
72+
73+
```yaml
74+
Type: SwitchParameter
75+
Parameter Sets: (All)
76+
Aliases: cf
77+
Applicable: Office 365 Security & Compliance Center
78+
79+
Required: False
80+
Position: Named
81+
Default value: None
82+
Accept pipeline input: False
83+
Accept wildcard characters: False
84+
```
85+
86+
### -IncludeExecutionRuleGuids
87+
The IncludeExecutionRuleGuids parameter specifies whether to include the execution rule GUID in the rule details. Valid values are:
88+
89+
- $true: Include the execution rule GUID in the rule details.
90+
91+
- $false: Don't include the execution rule GUID in the rule details. This is the default value.
92+
93+
```yaml
94+
Type: Boolean
95+
Parameter Sets: (All)
96+
Aliases:
97+
Applicable: Office 365 Security & Compliance Center
98+
99+
Required: False
100+
Position: Named
101+
Default value: None
102+
Accept pipeline input: False
103+
Accept wildcard characters: False
104+
```
105+
106+
### -IncludeExecutionRuleInformation
107+
The IncludeExecutionRuleInformation parameter specifies whether to include the execution rule information in the rule details. Valid values are:
108+
109+
- $true: Include the execution rule information in the rule details.
110+
111+
- $false: Don't include the execution rule information in the rule details. This is the default value.
112+
113+
```yaml
114+
Type: Boolean
115+
Parameter Sets: (All)
116+
Aliases:
117+
Applicable: Office 365 Security & Compliance Center
118+
119+
Required: False
120+
Position: Named
121+
Default value: None
122+
Accept pipeline input: False
123+
Accept wildcard characters: False
124+
```
125+
126+
### -Policy
127+
The Policy parameter filters the auto-labeling policy rule results by the associated auto-labeling policy. You can use any value that uniquely identifies the policy. For example:
128+
129+
- Name
130+
- Distinguished name (DN)
131+
- GUID
132+
133+
```yaml
134+
Type: PolicyIdParameter
135+
Parameter Sets: (All)
136+
Aliases:
137+
Applicable: Office 365 Security & Compliance Center
138+
139+
Required: False
140+
Position: Named
141+
Default value: None
142+
Accept pipeline input: False
143+
Accept wildcard characters: False
144+
```
145+
146+
### -WhatIf
147+
This parameter is reserved for internal Microsoft use.
148+
149+
```yaml
150+
Type: SwitchParameter
151+
Parameter Sets: (All)
152+
Aliases: wi
153+
Applicable: Office 365 Security & Compliance Center
154+
155+
Required: False
156+
Position: Named
157+
Default value: None
158+
Accept pipeline input: False
159+
Accept wildcard characters: False
160+
```
161+
162+
### CommonParameters
163+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216).
164+
165+
## INPUTS
166+
167+
###
168+
169+
## OUTPUTS
170+
171+
###
172+
173+
## NOTES
174+
175+
## RELATED LINKS

0 commit comments

Comments
 (0)