Skip to content

Commit d32b573

Browse files
committed
Merge remote-tracking branch 'upstream/master' into markjjo-working
2 parents 8765186 + 567e332 commit d32b573

File tree

5 files changed

+17
-7
lines changed

5 files changed

+17
-7
lines changed

exchange/exchange-ps/exchange/advanced-threat-protection/Set-SafeLinksPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
3838

3939
### Example 1
4040
```powershell
41-
Set-SafeAttachmentsPolicy -Identity "Engineering Block URL" -TrackClicks $true
41+
Set-SafeLinksPolicy -Identity "Engineering Block URL" -TrackClicks $true
4242
```
4343

4444
This example modifies the existing Safe Links policy named Engineering Block URL to track user clicks on URLs in URL trace.

exchange/exchange-ps/exchange/client-access/Set-OwaMailboxPolicy.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2569,3 +2569,11 @@ To see the return types, which are also known as output types, that this cmdlet
25692569
## RELATED LINKS
25702570
25712571
[Online Version](https://docs.microsoft.com/powershell/module/exchange/client-access/set-owamailboxpolicy)
2572+
2573+
[New-OwaMailboxPolicy](New-OwaMailboxPolicy.md)
2574+
2575+
[Get-OwaMailboxPolicy](Get-OwaMailboxPolicy.md)
2576+
2577+
[Set-CASMailbox](Set-CASMailbox.md)
2578+
2579+
[Outlook on the web mailbox policy procedures in Exchange Online](https://docs.microsoft.com/exchange/clients-and-mobile-in-exchange-online/outlook-on-the-web/outlook-web-app-mailbox-policy-procedures)

exchange/exchange-ps/exchange/policy-and-compliance-dlp/New-DlpComplianceRule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ New-DlpComplianceRule [-Name] <String> -Policy <PolicyIdParameter>
2525
[-AccessScope <AccessScope>]
2626
[-ActivationDate <DateTime>]
2727
[-BlockAccess <Boolean>]
28-
[-BlockAccessScope <Boolean>]
28+
[-BlockAccessScope <BlockAccessScope>]
2929
[-Comment <String>]
3030
[-Confirm]
3131
[-ContentContainsSensitiveInformation <PswsHashtable[]>]
@@ -176,7 +176,7 @@ The BlockAccessScope parameter specifies the scope of the block access action. V
176176
- PerUser: Block access to external users.
177177
178178
```yaml
179-
Type: Boolean
179+
Type: BlockAccessScope
180180
Parameter Sets: (All)
181181
Aliases:
182182
Applicable: Office 365 Security & Compliance Center

exchange/exchange-ps/exchange/policy-and-compliance-dlp/Set-DlpComplianceRule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Set-DlpComplianceRule [-Identity] <ComplianceRuleIdParameter>
2525
[-AccessScope <AccessScope>]
2626
[-ActivationDate <DateTime>]
2727
[-BlockAccess <Boolean>]
28-
[-BlockAccessScope <Boolean>]
28+
[-BlockAccessScope <BlockAccessScope>]
2929
[-Comment <String>]
3030
[-Confirm]
3131
[-ContentContainsSensitiveInformation <PswsHashtable[]>]
@@ -158,7 +158,7 @@ The BlockAccessScope parameter specifies the scope of the block access action. V
158158
- PerUser: Block access to external users.
159159
160160
```yaml
161-
Type: Boolean
161+
Type: BlockAccessScope
162162
Parameter Sets: (All)
163163
Aliases:
164164
Applicable: Office 365 Security & Compliance Center

skype/skype-ps/skype/Set-CsAuthConfig.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -49,10 +49,12 @@ This example forces all external clients to use MA but allows NTLM or Kerberos (
4949

5050
### Example 2
5151
```powershell
52-
PS C:\> Set-CsAuthConfig -Scenario BlockWindowsAuthExternallyAndModernAuthInternally
52+
PS C:\> Set-CsAuthConfig -Scenario BlockWindowsAuthExternalyAndModernAuthInternally
5353
```
5454

55-
This example blocks NTLM externally and MA internally. It forces all external clients to use MA, but allows all clients to use legacy authentication methods internally (even ADAL-capable clients).
55+
This example blocks NTLM externally and MA internally. It forces all external clients to use MA, but allows all clients to use legacy authentication methods internally (even ADAL-capable clients).
56+
>[!NOTE]
57+
>Please note that in the current version of the module the parameter value BlockWindowsAuthExternalyAndModernAuthInternally is misspelled and to be able to use it, only one l for Externally should be used.
5658
5759

5860
## PARAMETERS

0 commit comments

Comments
 (0)