Skip to content

Commit 4fba977

Browse files
authored
Merge branch 'master' into patch-237
2 parents 6336fa3 + b52e537 commit 4fba977

24 files changed

+507
-51
lines changed

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,6 @@ If your account uses multi-factor authentication, use the steps in this section.
6666
- When you use the _ExchangeEnvironmentName_ parameter, you don't need use the _ConnectionUri_ or _AzureADAuthorizationEndPointUrl_ parameters. For more information, see the parameter descriptions in [Connect-ExchangeOnline](/powershell/module/exchange/connect-exchangeonline).
6767
- The _DelegatedOrganization_ parameter specifies the customer organization that you want to manage as an authorized Microsoft Partner. For more information, see [Partners](/office365/servicedescriptions/office-365-platform-service-description/partners).
6868
- If you're behind a proxy server, run this command first: `$ProxyOptions = New-PSSessionOption -ProxyAccessType <Value>`, where \<Value\> is `IEConfig`, `WinHttpConfig`, or `AutoDetect`. Then, use the _PSSessionOption_ parameter with the value `$ProxyOptions`. For more information, see [New-PSSessionOption](/powershell/module/microsoft.powershell.core/new-pssessionoption).
69-
- The progress bar is now shown by default, so `-ShowProgress $true` is no longer required. To hide the progress bar, use this exact syntax: `-ShowProgress:$false`.
7069

7170
**This example connects to Exchange Online PowerShell in a Microsoft 365 or Microsoft 365 GCC organization**:
7271

@@ -141,7 +140,6 @@ If your account doesn't use multi-factor authentication, use the steps in this s
141140
- When you use the _ExchangeEnvironmentName_ parameter, you don't need use the _ConnectionUri_ or _AzureADAuthorizationEndPointUrl_ parameters. For more information, see the parameter descriptions in [Connect-ExchangeOnline](/powershell/module/exchange/connect-exchangeonline).
142141
- The _DelegatedOrganization_ parameter specifies the customer organization that you want to manage as an authorized Microsoft Partner. For more information, see [Partners](/office365/servicedescriptions/office-365-platform-service-description/partners).
143142
- If you're behind a proxy server, store the output of the [New-PSSessionOption](/powershell/module/microsoft.powershell.core/new-pssessionoption) cmdlet in a variable (for example, `$ProxyOptions = New-PSSessionOption -ProxyAccessType <Value> [-ProxyAuthentication <Value>] [-ProxyCredential <Value>]`). Then, use the variable (`$ProxyOptions`) as the value for the _PSSessionOption_ parameter.
144-
- The progress bar is now shown by default, so `-ShowProgress $true` is no longer required. To hide the progress bar, use this exact syntax: `-ShowProgress:$false`.
145143

146144
**Connect to Exchange Online PowerShell in a Microsoft 365 or Microsoft 365 GCC organization**:
147145

exchange/exchange-ps/exchange/Connect-ExchangeOnline.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ After the Connect-ExchangeOnline command is complete, the password key in the $U
7878

7979
### Example 2
8080
```powershell
81-
Connect-ExchangeOnline -UserPrincipalName [email protected] -ShowProgress $true
81+
Connect-ExchangeOnline -UserPrincipalName [email protected]
8282
```
8383

8484
This example connects to Exchange Online PowerShell using modern authentication for the account [email protected], which uses MFA.
@@ -563,10 +563,10 @@ Accept wildcard characters: False
563563
```
564564

565565
### -ShowProgress
566-
The ShowProgress parameter shows a visual progress bar in the PowerShell client module. The progress bar shows number of objects received and total number of objects requested. Valid values are:
566+
The ShowProgress parameter specifies whether to show or hide the progress bar of imported cmdlets when you connect. Valid values are:
567567

568568
- $true: The progress bar is displayed. This is the default value.
569-
- $false: The progress bar isn't displayed.
569+
- $false: Currently, this value has no effect.
570570

571571
```yaml
572572
Type: Boolean

exchange/exchange-ps/exchange/Disable-AntiPhishRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17-
Use the Disable-AntiPhishRule cmdlet to disable antiphish rules in your cloud-based organization..
17+
Use the Disable-AntiPhishRule cmdlet to disable antiphish rules in your cloud-based organization.
1818

1919
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2020

exchange/exchange-ps/exchange/Disable-Mailbox.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
8787
Disable-Mailbox -Identity "John Woods"
8888
```
8989

90-
This example disables the mailbox of the user named John Woods and removes all mailbox attributes from John's user account..
90+
This example disables the mailbox of the user named John Woods and removes all mailbox attributes from John's user account.
9191

9292
### Example 2
9393
```powershell

exchange/exchange-ps/exchange/Get-ActiveSyncDeviceAutoblockThreshold.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in on-premises Exchange.
1616

17-
Use the Get-ActiveSyncDeviceAutoblockThreshold cmdlet to obtain the Autoblock settings for Microsoft Exchange ActiveSync mobile devices..
17+
Use the Get-ActiveSyncDeviceAutoblockThreshold cmdlet to obtain the Autoblock settings for Microsoft Exchange ActiveSync mobile devices.
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

exchange/exchange-ps/exchange/Get-MonitoringItemHelp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3535
Get-MonitoringItemHelp -Server Exch01 -Identity OutlookMapiHttp.Proxy\CrashEvent.msexchangemapifrontendapppoolEscalate\msexchangemapifrontendapppool | Format-List
3636
```
3737

38-
This example retrieves health set information for a monitoring item on the server named Exch01 and displays the output without truncating the results..
38+
This example retrieves health set information for a monitoring item on the server named Exch01 and displays the output without truncating the results.
3939

4040
## PARAMETERS
4141

exchange/exchange-ps/exchange/Get-OutboundConnector.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Accept wildcard characters: False
6969
The IncludeTestModeConnectors parameter filters the results by Outbound connectors that are in test mode. Valid values are:
7070
7171
- $true: Only Outbound connectors that are in test mode are returned in the results.
72-
- $false: All Outbound connectors that aren't in test mode are returned in the results.. This is the default value.
72+
- $false: All Outbound connectors that aren't in test mode are returned in the results. This is the default value.
7373
7474
You configure an Outbound connector in test mode by using the TestMode parameter on the New-OutboundConnector or Set-OutboundConnector cmdlets.
7575
@@ -90,7 +90,7 @@ Accept wildcard characters: False
9090
The IsTransportRuleScoped parameter filters the results by Outbound connectors that are scoped to transport rules (also known as mail flow rules). Valid values are:
9191
9292
- $true: Only Outbound connectors that are scoped to transport rules are returned in the results.
93-
- $false: All Outbound connectors that aren't scoped to transport rules are returned in the results.. This is the default value.
93+
- $false: All Outbound connectors that aren't scoped to transport rules are returned in the results. This is the default value.
9494
9595
You scope a transport rule to a specific Outbound connector by using the RouteMessageOutboundConnector parameter on the New-TransportRule or Set-TransportRule cmdlets.
9696

exchange/exchange-ps/exchange/New-AntiPhishPolicy.md

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
7070

7171
### Example 1
7272
```powershell
73-
New-AntiPhishPolicy -Name "Research Quarantine" -AdminDisplayName "Research department policy" -EnableOrganizationDomainsProtection $true -EnableTargetedDomainsProtection $true -TargetedDomainsToProtect fabrikam.com -TargetedDomainProtectionAction Quarantine -EnableTargetedUserProtection $true -TargetedUsersToProtect "Mai Fujito;[email protected]" -TargetedUserProtectionAction Quarantine -EnableMailboxIntelligenceProtection $true -MailboxIntelligenceProtectionAction Quarantine -EnableSimilarUsersSafetyTips $true -EnableSimilarDomainsSafetyTips $true -EnableUnusualCharactersSafetyTips $true
73+
New-AntiPhishPolicy -Name "Research Quarantine" -AdminDisplayName "Research department policy" -EnableOrganizationDomainsProtection $true -EnableTargetedDomainsProtection $true -TargetedDomainsToProtect fabrikam.com -TargetedDomainProtectionAction Quarantine -EnableTargetedUserProtection $true -TargetedUsersToProtect "Mai Fujito;[email protected]" -TargetedUserProtectionAction Quarantine -EnableMailboxIntelligenceProtection $true -MailboxIntelligenceProtectionAction Quarantine -EnableSimilarUsersSafetyTips $true -EnableSimilarDomainsSafetyTips $true -EnableUnusualCharactersSafetyTips $true
7474
```
7575

7676
In Microsoft Defender for Office 365, this example creates and enables an antiphish policy named Research Quarantine with the following settings:
@@ -120,7 +120,7 @@ This setting is part of spoof protection.
120120
121121
The AuthenticationFailAction parameter specifies the action to take when the message fails composite authentication (a mixture of traditional SPF, DKIM, and DMARC email authentication checks and proprietary backend intelligence). Valid values are:
122122
123-
- MoveToJmf: This is the default value. Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder. The message is only moved if the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes).
123+
- MoveToJmf: This is the default value. Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder. The message is moved only if the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes).
124124
- Quarantine: Move the message to quarantine. Quarantined high confidence phishing messages are only available to admins. As of April 2020, quarantined phishing messages are available to the intended recipients.
125125
126126
```yaml
@@ -177,10 +177,10 @@ Accept wildcard characters: False
177177
### -EnableMailboxIntelligence
178178
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
179179

180-
The EnableMailboxIntelligence parameter specifies whether to enable or disable mailbox intelligence (artificial intelligence that determines user email patterns with their frequent contacts). Valid values are:
180+
The EnableMailboxIntelligence parameter specifies whether to enable or disable mailbox intelligence, which is artificial intelligence (AI) that determines user email patterns with their frequent contacts. Mailbox intelligence helps distinguish between messages from legitimate and impersonated senders based on a recipient's previous communication history. Valid values are:
181181

182182
- $true: Mailbox intelligence is enabled. This is the default value.
183-
- $false: Mailbox intelligence is disabled.
183+
- $false: Mailbox intelligence is disabled. The values of the EnableMailboxIntelligenceProtection and MailboxIntelligenceProtectionAction parameters are ignored.
184184

185185
```yaml
186186
Type: Boolean
@@ -198,10 +198,14 @@ Accept wildcard characters: False
198198
### -EnableMailboxIntelligenceProtection
199199
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
200200

201-
The EnableMailboxIntelligenceProtection specifies whether to enable or disable enhanced impersonation results based on each user's individual sender map. This intelligence allows Microsoft 365 to customize user impersonation detection and better handle false positives. Valid values are:
201+
The EnableMailboxIntelligenceProtection specifies whether to enable or disable taking action for impersonation detections from mailbox intelligence results. Valid values are:
202202

203-
- $true: Enable intelligence based impersonation protection.
204-
- $false: Don't enable intelligence based impersonation protection. This is the default value.
203+
- $true: Take action for impersonation detections from mailbox intelligence results. Use the MailboxIntelligenceProtectionAction parameter to specify the action.
204+
- $false: Don't take action for impersonation detections from mailbox intelligence results. The value of the MailboxIntelligenceProtectionAction parameter is ignored. This is the default value.
205+
206+
This parameter is meaningful only if the EnableMailboxIntelligence parameter is set to the value $true.
207+
208+
If you set this parameter to the value $false when the value of the EnableMailboxIntelligence parameter is $true, no action is taken on messages based on mailbox intelligence results (for example, lack of communication history). But, but mailbox intelligence can still help reduce impersonation false positives based on frequent contact information.
205209

206210
```yaml
207211
Type: Boolean
@@ -468,13 +472,15 @@ This setting is part of impersonation protection and is only available in Micros
468472

469473
The MailboxIntelligenceProtectionAction parameter specifies what to do with messages that fail mailbox intelligence protection. Valid values are:
470474

471-
- NoAction: This is the default value.
475+
- NoAction: This is the default value. Note that this value has the same result as setting the EnableMailboxIntelligenceProtection parameter to $false when the EnableMailboxIntelligence parameter is $true.
472476
- BccMessage: Add the recipients specified by the MailboxIntelligenceProtectionActionRecipients parameter to the Bcc field of the message.
473477
- Delete: Delete the message during filtering. Use caution when selecting this value, because you can't recover the deleted message.
474-
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder. The message is only moved if the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes).
478+
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder. The message is moved only if the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes).
475479
- Quarantine: Move the message to quarantine. Quarantined high confidence phishing messages are only available to admins. As of April 2020, quarantined phishing messages are available to the intended recipients.
476480
- Redirect: Redirect the message to the recipients specified by the MailboxIntelligenceProtectionActionRecipients parameter.
477481

482+
This parameter is meaningful only if the EnableMailboxIntelligence and EnableMailboxIntelligenceProtection parameters are set to the value $true.
483+
478484
```yaml
479485
Type: ImpersonationAction
480486
Parameter Sets: (All)
@@ -608,7 +614,7 @@ The TargetedDomainProtectionAction parameter specifies the action to take on d
608614
- NoAction: This is the default value.
609615
- BccMessage: Add the recipients specified by the TargetedDomainActionRecipients parameter to the Bcc field of the message.
610616
- Delete: Delete the message during filtering. Use caution when selecting this value, because you can't recover the deleted message.
611-
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder. The message is only moved if the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes).
617+
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder. The message is moved only if the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes).
612618
- Quarantine: Move the message to quarantine. Quarantined high confidence phishing messages are only available to admins. As of April 2020, quarantined phishing messages are available to the intended recipients.
613619
- Redirect: Redirect the message to the recipients specified by the TargetedDomainActionRecipients parameter.
614620

@@ -673,7 +679,7 @@ The TargetedUserProtectionAction parameter specifies the action to take on det
673679
- NoAction: This is the default value.
674680
- BccMessage: Add the recipients specified by the TargetedDomainActionRecipients parameter to the Bcc field of the message.
675681
- Delete: Delete the message during filtering. Use caution when selecting this value, because you can't recover the deleted message.
676-
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder. The message is only moved if the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes).
682+
- MoveToJmf: Deliver the message to the recipient's mailbox, and move the message to the Junk Email folder. The message is moved only if the junk email rule is enabled on the mailbox (it's enabled by default). For more information, see [Configure junk email settings on Exchange Online mailboxes](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-junk-email-settings-on-exo-mailboxes).
677683
- Quarantine: Move the message to quarantine. Quarantined high confidence phishing messages are only available to admins. As of April 2020, quarantined phishing messages are available to the intended recipients.
678684
- Redirect: Redirect the message to the recipients specified by the TargetedDomainActionRecipients parameter.
679685

exchange/exchange-ps/exchange/New-EdgeSubscription.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ New-EdgeSubscription [-AccountExpiryDuration <TimeSpan>]
3535
```
3636

3737
## DESCRIPTION
38-
The Edge Transport server doesn't have access to Active Directory. All configuration and recipient information is stored in the Active Directory Lightweight Directory Services (AD LDS) instance. The New-EdgeSubscription cmdlet creates the Edge Subscription file that will be imported on a Mailbox server in the Active Directory site to which you want to subscribe this Edge Transport server..
38+
The Edge Transport server doesn't have access to Active Directory. All configuration and recipient information is stored in the Active Directory Lightweight Directory Services (AD LDS) instance. The New-EdgeSubscription cmdlet creates the Edge Subscription file that will be imported on a Mailbox server in the Active Directory site to which you want to subscribe this Edge Transport server.
3939

4040
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://docs.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
4141

0 commit comments

Comments
 (0)