You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/exchange-online/exchange-online-powershell-v2/exchange-online-powershell-v2.md
+24Lines changed: 24 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -252,4 +252,28 @@ Get-EXOMailbox -ResultSize 10 -PropertySets All
252
252
> [!NOTE]
253
253
> We highly discourage using the _PropertySets_ parameter with the value `All` because it slows down the cmdlet and reduces reliability. Always use the _PropertySets_ and _Properties_ parameters to retreive only the requires properties.
254
254
255
+
## Release notes
255
256
257
+
### Version 0.3527.1
258
+
259
+
Released in the [PowerShell Gallery](https://www.powershellgallery.com/packages/ExchangeOnlineManagement/0.3527.1) on January 9, 2020:
260
+
261
+
- Added support for managing Exchange for a different tenant using delegation flow.
262
+
263
+
- Works in tandem with other PowerShell modules in a single PS window.
264
+
265
+
- Added support for positional parameters.
266
+
267
+
- Date Time field now supports client locale.
268
+
269
+
- Bug fix: PSCredential empty when passed during Connect-ExchangeOnline.
270
+
271
+
- Bug fix: Client module error when filter contained $null.
272
+
273
+
- Sessions created internal to EXO V2 Module now have names (naming pattern: ExchangeOnlineInternalSession_%SomeNumber%).
274
+
275
+
- Bug fix: Remote PowerShell cmdlets intermittently failing due to time the difference between token expiry and the PSSession going idle.
Safe Links is a feature in Advanced Threat Protection that checks links in email messages to see if they lead to malicious web sites. When a user clicks a link in a message, the URL is temporarily rewritten and checked against a list of known, malicious web sites. Safe Links includes the URL trace reporting feature to help determine who has clicked through to a malicious web site. For more information about Advanced Threat Protection Safe Links, see [Office 365 ATP Safe Links](https://docs.microsoft.com/office365/securitycompliance/atp-safe-links).
30
+
Safe Links is a feature in Advanced Threat Protection that checks links in email messages to see if they lead to malicious web sites. When a user clicks a link in a message, the URL is temporarily rewritten and checked against a list of known, malicious web sites. Safe Links includes the URL trace reporting feature to help determine who has clicked through to a malicious web site. For more information about Advanced Threat Protection Safe Links, see [Office 365 ATP Safe Links](https://docs.microsoft.com/microsoft-365/security/office-365-security/atp-safe-links).
31
31
32
32
The following list described the values that are returned in the output of this cmdlet:
The EnableAuthenticationSoftPassSafetyTip parameter specifies whether to enable safety tips that are shown to recipients when a message fails composite authentication with low to medium confidence. Valid values are:
212
-
213
-
- $true: Safety tips are enabled for messages that fail composite authentication with low to medium confidence. If you use this value, you might want to restrict the policy to a smaller number of users to avoid displaying too many of these types of safety tips to users.
214
-
215
-
- $false: Safety tips are disabled for messages that fail composite authentication with low to medium confidence. This is the default value.
211
+
This parameter is reserved for internal Microsoft use.
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/advanced-threat-protection/Set-AntiPhishPolicy.md
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ Use the Set-AntiPhishPolicy cmdlet to modify antiphishing policies in your cloud
19
19
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-server/exchange-cmdlet-syntax).
20
20
21
21
> [!NOTE]
22
-
> Please take into account the [recommended settings](https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365-atp) for EOP and Office 365 ATP security.
22
+
> Please take into account the [recommended settings](https://docs.microsoft.com/microsoft-365/security/office-365-security/recommended-settings-for-eop-and-office365-atp) for EOP and Office 365 ATP security.
The EnableAuthenticationSoftPassSafetyTip parameter specifies whether to enable safety tips that are shown to recipients when a message fails composite authentication with low to medium confidence. Valid values are:
197
-
198
-
- $true: Safety tips are enabled for messages that fail composite authentication with low to medium confidence. If you use this value, you might want to restrict the policy to a smaller number of users to avoid displaying too many of these types of safety tips to users.
199
-
200
-
- $false: Safety tips are disabled for messages that fail composite authentication with low to medium confidence. This is the default value.
196
+
This parameter is reserved for internal Microsoft use.
The BulkThreshold parameter specifies the Bulk Complaint Level (BCL) threshold setting. Valid values are from 1 - 9, where 1 marks most bulk email as spam, and 9 allows the most bulk email to be delivered. The default value is 7. For more information, see [Configure your spam filter policies](https://docs.microsoft.com/office365/SecurityCompliance/configure-your-spam-filter-policies).
263
+
The BulkThreshold parameter specifies the Bulk Complaint Level (BCL) threshold setting. Valid values are from 1 - 9, where 1 marks most bulk email as spam, and 9 allows the most bulk email to be delivered. The default value is 7. For more information, see [Configure your spam filter policies](https://docs.microsoft.com/microsoft-365/security/office-365-security/configure-your-spam-filter-policies).
The PhishZapEnabled parameter specifies whether to enable [zero-hour auto purge (ZAP)](https://docs.microsoft.com/office365/securitycompliance/zero-hour-auto-purge) to detect phish messages in the user's Inbox. Valid values are:
843
+
The PhishZapEnabled parameter specifies whether to enable [zero-hour auto purge (ZAP)](https://docs.microsoft.com/microsoft-365/security/office-365-security/zero-hour-auto-purge) to detect phish messages in the user's Inbox. Valid values are:
844
844
845
845
- $true: Phish ZAP is enabled. Phish messages that are detected in the user's Inbox (regardless of read or unread status) are automatically moved to the Junk Email folder. This is the default value.
The SpamZapEnabled parameter specifies whether to enable [zero-hour auto purge (ZAP)](https://docs.microsoft.com/office365/securitycompliance/zero-hour-auto-purge) to detect unread spam messages in the user's Inbox. Valid values are:
945
+
The SpamZapEnabled parameter specifies whether to enable [zero-hour auto purge (ZAP)](https://docs.microsoft.com/microsoft-365/security/office-365-security/zero-hour-auto-purge) to detect unread spam messages in the user's Inbox. Valid values are:
946
946
947
947
- $true: Spam ZAP is enabled. Unread spam messages that are detected in the user's Inbox are automatically moved to the Junk Email folder. This is the default value.
The RecipientLimitExternalPerHour parameter specifies the maximum number of external recipients that a user can send to within an hour. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
183
+
The RecipientLimitExternalPerHour parameter specifies the maximum number of external recipients that a user can send to within an hour. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
The RecipientLimitInternalPerHour parameter specifies the maximum number of internal recipients that a user can send to within an hour. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
199
+
The RecipientLimitInternalPerHour parameter specifies the maximum number of internal recipients that a user can send to within an hour. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
The RecipientLimitInternalPerHour parameter specifies the maximum number of recipients that a user can send to within a day. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/en-us/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
215
+
The RecipientLimitInternalPerHour parameter specifies the maximum number of recipients that a user can send to within a day. A valid value is 0 to 10000. The default value is 0, which means the service defaults are used. For more information, see [Sending limits across Office 365 options](https://docs.microsoft.com/office365/servicedescriptions/exchange-online-service-description/exchange-online-limits#sending-limits-across-office-365-options).
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to an administrator when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
366
+
### -EnableFileFilter
367
+
The EnableFileFilter parameter enables or disables common attachment blocking. Valid values are:
355
368
356
-
Specify the administrator to receive the notification messages by using the InternalSenderAdminAddress parameter.
369
+
- $true: Common attachment blocking is enabled.
370
+
371
+
- $false: Common attachment blocking is disabled.
372
+
373
+
To configure the blocked file types, use the FileTypes parameter.
357
374
358
375
```yaml
359
376
Type: Boolean
360
377
Parameter Sets: (All)
361
378
Aliases:
362
-
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
379
+
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
363
380
364
381
Required: False
365
382
Position: Named
@@ -368,8 +385,10 @@ Accept pipeline input: False
368
385
Accept wildcard characters: False
369
386
```
370
387
371
-
### -EnableInternalSenderNotifications
372
-
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to senders when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
388
+
### -EnableInternalSenderAdminNotifications
389
+
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to an administrator when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
390
+
391
+
Specify the administrator to receive the notification messages by using the InternalSenderAdminAddress parameter.
The ExternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableExternalSenderAdminNotifications parameter is set to $true.
406
+
### -EnableInternalSenderNotifications
407
+
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to senders when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
389
408
390
409
```yaml
391
-
Type: SmtpAddress
410
+
Type: Boolean
392
411
Parameter Sets: (All)
393
412
Aliases:
394
413
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
@@ -400,8 +419,8 @@ Accept pipeline input: False
400
419
Accept wildcard characters: False
401
420
```
402
421
403
-
### -InternalSenderAdminAddress
404
-
The InternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableInternalSenderAdminNotifications parameter is set to $true.
422
+
### -ExternalSenderAdminAddress
423
+
The ExternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableExternalSenderAdminNotifications parameter is set to $true.
405
424
406
425
```yaml
407
426
Type: SmtpAddress
@@ -416,44 +435,6 @@ Accept pipeline input: False
416
435
Accept wildcard characters: False
417
436
```
418
437
419
-
### -WhatIf
420
-
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
421
-
422
-
```yaml
423
-
Type: SwitchParameter
424
-
Parameter Sets: (All)
425
-
Aliases: wi
426
-
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
427
-
428
-
Required: False
429
-
Position: Named
430
-
Default value: None
431
-
Accept pipeline input: False
432
-
Accept wildcard characters: False
433
-
```
434
-
435
-
### -EnableFileFilter
436
-
The EnableFileFilter parameter enables or disables common attachment blocking. Valid values are:
437
-
438
-
- $true: Common attachment blocking is enabled.
439
-
440
-
- $false: Common attachment blocking is disabled.
441
-
442
-
To configure the blocked file types, use the FileTypes parameter.
443
-
444
-
```yaml
445
-
Type: Boolean
446
-
Parameter Sets: (All)
447
-
Aliases:
448
-
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
449
-
450
-
Required: False
451
-
Position: Named
452
-
Default value: None
453
-
Accept pipeline input: False
454
-
Accept wildcard characters: False
455
-
```
456
-
457
438
### -FileTypes
458
439
The FileTypes parameter specifies the file types that are blocked by common attachment blocking. The default values are:
459
440
@@ -498,6 +479,38 @@ Accept pipeline input: False
498
479
Accept wildcard characters: False
499
480
```
500
481
482
+
### -InternalSenderAdminAddress
483
+
The InternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableInternalSenderAdminNotifications parameter is set to $true.
484
+
485
+
```yaml
486
+
Type: SmtpAddress
487
+
Parameter Sets: (All)
488
+
Aliases:
489
+
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
490
+
491
+
Required: False
492
+
Position: Named
493
+
Default value: None
494
+
Accept pipeline input: False
495
+
Accept wildcard characters: False
496
+
```
497
+
498
+
### -WhatIf
499
+
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
500
+
501
+
```yaml
502
+
Type: SwitchParameter
503
+
Parameter Sets: (All)
504
+
Aliases: wi
505
+
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
506
+
507
+
Required: False
508
+
Position: Named
509
+
Default value: None
510
+
Accept pipeline input: False
511
+
Accept wildcard characters: False
512
+
```
513
+
501
514
### -ZapEnabled
502
515
The ZapEnabled parameter specifies whether to enable zero-hour auto purge (ZAP) for malware. ZAP detects malware in unread messages that have already been delivered to the user's Inbox. Valid values are:
0 commit comments