Skip to content

Commit 862561f

Browse files
authored
Merge pull request MicrosoftDocs#5349 from MicrosoftDocs/chrisda
Chrisda to Master
2 parents f8cd99f + 0670946 commit 862561f

File tree

2 files changed

+21
-10
lines changed

2 files changed

+21
-10
lines changed

exchange/exchange-ps/exchange/advanced-threat-protection/Set-PhishFilterPolicy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -128,17 +128,17 @@ There are two basic options for the CSV file:
128128

129129
- **Block or allow all spoofed mail from the source**: You want to block or allow any and all spoofed messages from the specified message source, regardless of the spoofed email address. You can get the CSV file by running the command `Get-PhishFilterPolicy -Detailed | Export-CSV "<PathAndFileName>.csv"`. The important header fields (column headers) are:
130130

131-
**Sender**: The ___domain of the source email server from DNS records, or the IP address if there aren't any DNS records.
131+
**Sender**: The ___domain of the source email server from reverse DNS lookup (PTR records), or the IP address if there aren't any PTR records.
132132

133133
**AllowedToSpoof**: Indicates whether the message source is allowed to send spoofed messages. Valid values are Yes or No.
134134

135-
- **Block or allow some spoofed mail from the source**: You want to block or allow some spoofed messages from the specified message source, but not others. You can get the CSV file by running the command `Get-PhishFilterPolicy -Detailed -SpoofAllowBlockList | Export-CSV "<PathAndFileName>.csv"`. The important header fields (column headers) are:
135+
- **Block or allow some spoofed mail from the source**: You want to block or allow some spoofed messages from the specified message source, but not others. You can get the CSV file by running the command `Get-PhishFilterPolicy -Detailed | Export-CSV "<PathAndFileName>.csv"`. The important header fields (column headers) are:
136136

137-
**Sender**: The ___domain of the source email server from DNS records, or the IP address if there aren't any DNS records.
137+
**Sender**
138138

139139
**SpoofedUser**: The spoofed email address in your organization that the messages appear to be coming from.
140140

141-
**AllowedToSpoof**: Indicates whether messages that contain the spoofed sender from the source email server are allowed. Valid values are Yes or No.
141+
**AllowedToSpoof**
142142

143143
```yaml
144144
Type: String

exchange/exchange-ps/exchange/mail-flow/Get-MessageTrace.md

Lines changed: 17 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,16 +25,27 @@ For information about the parameter sets in the Syntax section below, see [Excha
2525
## SYNTAX
2626

2727
```
28-
Get-MessageTrace [-EndDate <DateTime>] [-Expression <Expression>] [-FromIP <String>]
29-
[-MessageId <MultiValuedProperty>] [-MessageTraceId <Guid>] [-Page <Int32>] [-PageSize <Int32>]
30-
[-ProbeTag <String>] [-RecipientAddress <MultiValuedProperty>] [-SenderAddress <MultiValuedProperty>]
31-
[-StartDate <DateTime>] [-Status <MultiValuedProperty>] [-ToIP <String>] [<CommonParameters>]
28+
Get-MessageTrace
29+
[-EndDate <DateTime>]
30+
[-Expression <Expression>]
31+
[-FromIP <String>]
32+
[-MessageId <MultiValuedProperty>]
33+
[-MessageTraceId <Guid>]
34+
[-Page <Int32>]
35+
[-PageSize <Int32>]
36+
[-ProbeTag <String>]
37+
[-RecipientAddress <MultiValuedProperty>]
38+
[-SenderAddress <MultiValuedProperty>]
39+
[-StartDate <DateTime>]
40+
[-Status <MultiValuedProperty>]
41+
[-ToIP <String>]
42+
[<CommonParameters>]
3243
```
3344

3445
## DESCRIPTION
35-
You can use this cmdlet to search message data for the last 10 days. If you run this cmdlet without any parameters, only data from the last 48 hours is returned.
46+
You can use this cmdlet to search message data for the last 30 days. If you run this cmdlet without any parameters, only data from the last 48 hours is returned.
3647

37-
If you enter a time period that's older than 10 days, you won't receive an error, but the command will return no results. To search for message data that's between 10 and 90 days old, use the Start-HistoricalSearch and Get-HistoricalSearch cmdlets.
48+
If you enter a time period that's older than 30 days, you won't receive an error, but the command will return no results. To search for message data that's between 10 and 90 days old, use the Start-HistoricalSearch and Get-HistoricalSearch cmdlets.
3849

3950
This cmdlet returns a maximum of 1000000 results, and will timeout on very large queries. If your query returns too many results, consider splitting it up using smaller StartDate and EndDate intervals.
4051

0 commit comments

Comments
 (0)