Skip to content

Commit f0305ee

Browse files
Merge branch 'master' into patch-3
2 parents d04b1fc + 5300df9 commit f0305ee

File tree

80 files changed

+2238
-447
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+2238
-447
lines changed

exchange/docs-conceptual/exchange-online/exchange-online-powershell-v2/exchange-online-powershell-v2.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -252,4 +252,28 @@ Get-EXOMailbox -ResultSize 10 -PropertySets All
252252
> [!NOTE]
253253
> We highly discourage using the _PropertySets_ parameter with the value `All` because it slows down the cmdlet and reduces reliability. Always use the _PropertySets_ and _Properties_ parameters to retreive only the requires properties.
254254
255+
## Release notes
255256

257+
### Version 0.3527.1
258+
259+
Released in the [PowerShell Gallery](https://www.powershellgallery.com/packages/ExchangeOnlineManagement/0.3527.1) on January 9, 2020:
260+
261+
- Added support for managing Exchange for a different tenant using delegation flow.
262+
263+
- Works in tandem with other PowerShell modules in a single PS window.
264+
265+
- Added support for positional parameters.
266+
267+
- Date Time field now supports client locale.
268+
269+
- Bug fix: PSCredential empty when passed during Connect-ExchangeOnline.
270+
271+
- Bug fix: Client module error when filter contained $null.
272+
273+
- Sessions created internal to EXO V2 Module now have names (naming pattern: ExchangeOnlineInternalSession_%SomeNumber%).
274+
275+
- Bug fix: Remote PowerShell cmdlets intermittently failing due to time the difference between token expiry and the PSSession going idle.
276+
277+
- Major security update.
278+
279+
- Bug fixes and enhancements.

exchange/exchange-ps/exchange/advanced-threat-protection/Get-UrlTrace.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Get-UrlTrace [-ClickId <Guid>] [-EndDate <DateTime>] [-Expression <Expression>]
2727
```
2828

2929
## DESCRIPTION
30-
Safe Links is a feature in Advanced Threat Protection that checks links in email messages to see if they lead to malicious web sites. When a user clicks a link in a message, the URL is temporarily rewritten and checked against a list of known, malicious web sites. Safe Links includes the URL trace reporting feature to help determine who has clicked through to a malicious web site. For more information about Advanced Threat Protection Safe Links, see [Office 365 ATP Safe Links](https://docs.microsoft.com/office365/securitycompliance/atp-safe-links).
30+
Safe Links is a feature in Advanced Threat Protection that checks links in email messages to see if they lead to malicious web sites. When a user clicks a link in a message, the URL is temporarily rewritten and checked against a list of known, malicious web sites. Safe Links includes the URL trace reporting feature to help determine who has clicked through to a malicious web site. For more information about Advanced Threat Protection Safe Links, see [Office 365 ATP Safe Links](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-links).
3131

3232
The following list described the values that are returned in the output of this cmdlet:
3333

exchange/exchange-ps/exchange/advanced-threat-protection/New-AntiPhishPolicy.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -208,11 +208,7 @@ Accept wildcard characters: False
208208
```
209209
210210
### -EnableAuthenticationSoftPassSafetyTip
211-
The EnableAuthenticationSoftPassSafetyTip parameter specifies whether to enable safety tips that are shown to recipients when a message fails composite authentication with low to medium confidence. Valid values are:
212-
213-
- $true: Safety tips are enabled for messages that fail composite authentication with low to medium confidence. If you use this value, you might want to restrict the policy to a smaller number of users to avoid displaying too many of these types of safety tips to users.
214-
215-
- $false: Safety tips are disabled for messages that fail composite authentication with low to medium confidence. This is the default value.
211+
This parameter is reserved for internal Microsoft use.
216212
217213
```yaml
218214
Type: Boolean

exchange/exchange-ps/exchange/advanced-threat-protection/Set-AntiPhishPolicy.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Use the Set-AntiPhishPolicy cmdlet to modify antiphishing policies in your cloud
1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-server/exchange-cmdlet-syntax).
2020

2121
> [!NOTE]
22-
> Please take into account the [recommended settings](https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365-atp) for EOP and Office 365 ATP security.
22+
> Please take into account the [recommended settings](https://docs.microsoft.com/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365-atp) for EOP and Office 365 ATP security.
2323
2424
## SYNTAX
2525

@@ -193,11 +193,7 @@ Accept wildcard characters: False
193193
```
194194
195195
### -EnableAuthenticationSoftPassSafetyTip
196-
The EnableAuthenticationSoftPassSafetyTip parameter specifies whether to enable safety tips that are shown to recipients when a message fails composite authentication with low to medium confidence. Valid values are:
197-
198-
- $true: Safety tips are enabled for messages that fail composite authentication with low to medium confidence. If you use this value, you might want to restrict the policy to a smaller number of users to avoid displaying too many of these types of safety tips to users.
199-
200-
- $false: Safety tips are disabled for messages that fail composite authentication with low to medium confidence. This is the default value.
196+
This parameter is reserved for internal Microsoft use.
201197
202198
```yaml
203199
Type: Boolean

exchange/exchange-ps/exchange/antispam-antimalware/Get-QuarantineMessage.md

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,16 +24,29 @@ For information about the parameter sets in the Syntax section below, see [Excha
2424

2525
### Details
2626
```
27-
Get-QuarantineMessage -Identity <QuarantineMessageIdentity> [-SenderAddress <String[]>] [<CommonParameters>]
27+
Get-QuarantineMessage -Identity <QuarantineMessageIdentity> [-SenderAddress <String[]>]
28+
[<CommonParameters>]
2829
```
2930

3031
### Summary
3132
```
32-
Get-QuarantineMessage [-Direction <QuarantineMessageDirectionEnum>] [-Domain <String[]>] [-EndExpiresDate <DateTime>]
33-
[-EndReceivedDate <DateTime>] [-MessageId <String>] [-MyItems] [-Page <Int32>] [-PageSize <Int32>]
34-
[-QuarantineTypes <QuarantineMessageTypeEnum[]>] [-RecipientAddress <String[]>] [-Reported <Boolean>]
35-
[-SenderAddress <String[]>] [-StartExpiresDate <DateTime>] [-StartReceivedDate <DateTime>] [-Subject <String>]
36-
[-Type <QuarantineMessageTypeEnum>] [<CommonParameters>]
33+
Get-QuarantineMessage [-Direction <QuarantineMessageDirectionEnum>]
34+
[-Domain <String[]>]
35+
[-EndExpiresDate <DateTime>]
36+
[-EndReceivedDate <DateTime>]
37+
[-MessageId <String>]
38+
[-MyItems]
39+
[-Page <Int32>]
40+
[-PageSize <Int32>]
41+
[-QuarantineTypes <QuarantineMessageTypeEnum[]>]
42+
[-RecipientAddress <String[]>]
43+
[-Reported <Boolean>]
44+
[-SenderAddress <String[]>]
45+
[-StartExpiresDate <DateTime>]
46+
[-StartReceivedDate <DateTime>]
47+
[-Subject <String>]
48+
[-Type <QuarantineMessageTypeEnum>]
49+
[<CommonParameters>]
3750
```
3851

3952
## DESCRIPTION

exchange/exchange-ps/exchange/antispam-antimalware/New-HostedContentFilterPolicy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ Accept wildcard characters: False
260260
```
261261
262262
### -BulkThreshold
263-
The BulkThreshold parameter specifies the Bulk Complaint Level (BCL) threshold setting. Valid values are from 1 - 9, where 1 marks most bulk email as spam, and 9 allows the most bulk email to be delivered. The default value is 7. For more information, see [Configure your spam filter policies](https://docs.microsoft.com/office365/SecurityCompliance/configure-your-spam-filter-policies).
263+
The BulkThreshold parameter specifies the Bulk Complaint Level (BCL) threshold setting. Valid values are from 1 - 9, where 1 marks most bulk email as spam, and 9 allows the most bulk email to be delivered. The default value is 7. For more information, see [Configure your spam filter policies](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-your-spam-filter-policies).
264264
265265
```yaml
266266
Type: Int32
@@ -840,7 +840,7 @@ Accept wildcard characters: False
840840
```
841841
842842
### -PhishZapEnabled
843-
The PhishZapEnabled parameter specifies whether to enable [zero-hour auto purge (ZAP)](https://docs.microsoft.com/office365/securitycompliance/zero-hour-auto-purge) to detect phish messages in the user's Inbox. Valid values are:
843+
The PhishZapEnabled parameter specifies whether to enable [zero-hour auto purge (ZAP)](https://docs.microsoft.com/microsoft-365/security/office-365-security/zero-hour-auto-purge) to detect phish messages in the user's Inbox. Valid values are:
844844
845845
- $true: Phish ZAP is enabled. Phish messages that are detected in the user's Inbox (regardless of read or unread status) are automatically moved to the Junk Email folder. This is the default value.
846846
@@ -942,7 +942,7 @@ Accept wildcard characters: False
942942
```
943943
944944
### -SpamZapEnabled
945-
The SpamZapEnabled parameter specifies whether to enable [zero-hour auto purge (ZAP)](https://docs.microsoft.com/office365/securitycompliance/zero-hour-auto-purge) to detect unread spam messages in the user's Inbox. Valid values are:
945+
The SpamZapEnabled parameter specifies whether to enable [zero-hour auto purge (ZAP)](https://docs.microsoft.com/microsoft-365/security/office-365-security/zero-hour-auto-purge) to detect unread spam messages in the user's Inbox. Valid values are:
946946
947947
- $true: Spam ZAP is enabled. Unread spam messages that are detected in the user's Inbox are automatically moved to the Junk Email folder. This is the default value.
948948

exchange/exchange-ps/exchange/antispam-antimalware/New-HostedOutboundSpamFilterPolicy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ Accept wildcard characters: False
180180
```
181181
182182
### -RecipientLimitExternalPerHour
183-
The RecipientLimitExternalPerHour parameter specifies the maximum number of external recipients that a user can send to within an hour. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
183+
The RecipientLimitExternalPerHour parameter specifies the maximum number of external recipients that a user can send to within an hour. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
184184
185185
```yaml
186186
Type: UInt32
@@ -196,7 +196,7 @@ Accept wildcard characters: False
196196
```
197197
198198
### -RecipientLimitInternalPerHour
199-
The RecipientLimitInternalPerHour parameter specifies the maximum number of internal recipients that a user can send to within an hour. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
199+
The RecipientLimitInternalPerHour parameter specifies the maximum number of internal recipients that a user can send to within an hour. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
200200
201201
```yaml
202202
Type: UInt32
@@ -212,7 +212,7 @@ Accept wildcard characters: False
212212
```
213213
214214
### -RecipientLimitPerDay
215-
The RecipientLimitInternalPerHour parameter specifies the maximum number of recipients that a user can send to within a day. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
215+
The RecipientLimitInternalPerHour parameter specifies the maximum number of recipients that a user can send to within a day. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
216216
217217
```yaml
218218
Type: UInt32

exchange/exchange-ps/exchange/antispam-antimalware/New-MalwareFilterPolicy.md

Lines changed: 70 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -23,17 +23,30 @@ For information about the parameter sets in the Syntax section below, see [Excha
2323
```
2424
New-MalwareFilterPolicy [-Name] <String>
2525
[-Action <MalwareFilteringAction>]
26-
[-AdminDisplayName <String>] [-BypassInboundMessages <Boolean>]
27-
[-BypassOutboundMessages <Boolean>] [-Confirm] [-CustomAlertText <String>]
28-
[-CustomExternalBody <String>] [-CustomExternalSubject <String>] [-CustomFromAddress <SmtpAddress>]
29-
[-CustomFromName <String>] [-CustomInternalBody <String>] [-CustomInternalSubject <String>]
30-
[-CustomNotifications <Boolean>] [-DomainController <Fqdn>]
26+
[-AdminDisplayName <String>]
27+
[-BypassInboundMessages <Boolean>]
28+
[-BypassOutboundMessages <Boolean>]
29+
[-Confirm]
30+
[-CustomAlertText <String>]
31+
[-CustomExternalBody <String>]
32+
[-CustomExternalSubject <String>]
33+
[-CustomFromAddress <SmtpAddress>]
34+
[-CustomFromName <String>]
35+
[-CustomInternalBody <String>]
36+
[-CustomInternalSubject <String>]
37+
[-CustomNotifications <Boolean>]
38+
[-DomainController <Fqdn>]
3139
[-EnableExternalSenderAdminNotifications <Boolean>]
3240
[-EnableExternalSenderNotifications <Boolean>]
41+
[-EnableFileFilter <Boolean>]
3342
[-EnableInternalSenderAdminNotifications <Boolean>]
34-
[-EnableInternalSenderNotifications <Boolean>] [-ExternalSenderAdminAddress <SmtpAddress>]
35-
[-InternalSenderAdminAddress <SmtpAddress>] [-WhatIf] [-EnableFileFilter <Boolean>]
36-
[-FileTypes <String[]>] [-ZapEnabled <Boolean>] [<CommonParameters>]
43+
[-EnableInternalSenderNotifications <Boolean>]
44+
[-ExternalSenderAdminAddress <SmtpAddress>]
45+
[-FileTypes <String[]>]
46+
[-InternalSenderAdminAddress <SmtpAddress>]
47+
[-WhatIf]
48+
[-ZapEnabled <Boolean>]
49+
[<CommonParameters>]
3750
```
3851

3952
## DESCRIPTION
@@ -350,16 +363,20 @@ Accept pipeline input: False
350363
Accept wildcard characters: False
351364
```
352365
353-
### -EnableInternalSenderAdminNotifications
354-
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to an administrator when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
366+
### -EnableFileFilter
367+
The EnableFileFilter parameter enables or disables common attachment blocking. Valid values are:
355368
356-
Specify the administrator to receive the notification messages by using the InternalSenderAdminAddress parameter.
369+
- $true: Common attachment blocking is enabled.
370+
371+
- $false: Common attachment blocking is disabled.
372+
373+
To configure the blocked file types, use the FileTypes parameter.
357374
358375
```yaml
359376
Type: Boolean
360377
Parameter Sets: (All)
361378
Aliases:
362-
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
379+
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
363380

364381
Required: False
365382
Position: Named
@@ -368,8 +385,10 @@ Accept pipeline input: False
368385
Accept wildcard characters: False
369386
```
370387
371-
### -EnableInternalSenderNotifications
372-
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to senders when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
388+
### -EnableInternalSenderAdminNotifications
389+
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to an administrator when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
390+
391+
Specify the administrator to receive the notification messages by using the InternalSenderAdminAddress parameter.
373392
374393
```yaml
375394
Type: Boolean
@@ -384,11 +403,11 @@ Accept pipeline input: False
384403
Accept wildcard characters: False
385404
```
386405
387-
### -ExternalSenderAdminAddress
388-
The ExternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableExternalSenderAdminNotifications parameter is set to $true.
406+
### -EnableInternalSenderNotifications
407+
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to senders when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
389408
390409
```yaml
391-
Type: SmtpAddress
410+
Type: Boolean
392411
Parameter Sets: (All)
393412
Aliases:
394413
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
@@ -400,8 +419,8 @@ Accept pipeline input: False
400419
Accept wildcard characters: False
401420
```
402421
403-
### -InternalSenderAdminAddress
404-
The InternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableInternalSenderAdminNotifications parameter is set to $true.
422+
### -ExternalSenderAdminAddress
423+
The ExternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableExternalSenderAdminNotifications parameter is set to $true.
405424
406425
```yaml
407426
Type: SmtpAddress
@@ -416,44 +435,6 @@ Accept pipeline input: False
416435
Accept wildcard characters: False
417436
```
418437
419-
### -WhatIf
420-
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
421-
422-
```yaml
423-
Type: SwitchParameter
424-
Parameter Sets: (All)
425-
Aliases: wi
426-
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
427-
428-
Required: False
429-
Position: Named
430-
Default value: None
431-
Accept pipeline input: False
432-
Accept wildcard characters: False
433-
```
434-
435-
### -EnableFileFilter
436-
The EnableFileFilter parameter enables or disables common attachment blocking. Valid values are:
437-
438-
- $true: Common attachment blocking is enabled.
439-
440-
- $false: Common attachment blocking is disabled.
441-
442-
To configure the blocked file types, use the FileTypes parameter.
443-
444-
```yaml
445-
Type: Boolean
446-
Parameter Sets: (All)
447-
Aliases:
448-
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
449-
450-
Required: False
451-
Position: Named
452-
Default value: None
453-
Accept pipeline input: False
454-
Accept wildcard characters: False
455-
```
456-
457438
### -FileTypes
458439
The FileTypes parameter specifies the file types that are blocked by common attachment blocking. The default values are:
459440
@@ -498,6 +479,38 @@ Accept pipeline input: False
498479
Accept wildcard characters: False
499480
```
500481
482+
### -InternalSenderAdminAddress
483+
The InternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableInternalSenderAdminNotifications parameter is set to $true.
484+
485+
```yaml
486+
Type: SmtpAddress
487+
Parameter Sets: (All)
488+
Aliases:
489+
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
490+
491+
Required: False
492+
Position: Named
493+
Default value: None
494+
Accept pipeline input: False
495+
Accept wildcard characters: False
496+
```
497+
498+
### -WhatIf
499+
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
500+
501+
```yaml
502+
Type: SwitchParameter
503+
Parameter Sets: (All)
504+
Aliases: wi
505+
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
506+
507+
Required: False
508+
Position: Named
509+
Default value: None
510+
Accept pipeline input: False
511+
Accept wildcard characters: False
512+
```
513+
501514
### -ZapEnabled
502515
The ZapEnabled parameter specifies whether to enable zero-hour auto purge (ZAP) for malware. ZAP detects malware in unread messages that have already been delivered to the user's Inbox. Valid values are:
503516

0 commit comments

Comments
 (0)