Skip to content

Commit 19418c2

Browse files
authored
Merge pull request #681 from MicrosoftDocs/jacktremper-patch-3
Global admin security updates
2 parents f96c62d + 7778696 commit 19418c2

File tree

6 files changed

+6
-6
lines changed

6 files changed

+6
-6
lines changed

sharepoint/sharepoint-ps/sharepoint-online/Get-SPOGeoStorageQuota.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Get-SPOGeoStorageQuota [-AllLocations] [<CommonParameters>]
2626

2727
This cmdlet shows the storage on the current location or all locations in a multi-geo tenant.
2828

29-
This cmdlet requires a connection to a multi-geo tenant to run correctly. You must be a SharePoint Online Administrator or Global Administrator to get the storage on the current location or all locations in a multi-geo SPO tenant.
29+
This cmdlet requires a connection to a multi-geo tenant to run correctly. You must be a SharePoint Online Administrator to get the storage on the current location or all locations in a multi-geo SPO tenant.
3030

3131
## EXAMPLES
3232

sharepoint/sharepoint-ps/sharepoint-online/Get-SPOMalwareFile.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Get-SPOMalwareFile -FileUri <String> [<CommonParameters>]
2525

2626
## DESCRIPTION
2727

28-
The `Get-SPOMalwareFile` cmdlet runs on a single file. If the file is malware-infected then it returns an object of the type `SPOMalwareFile` which contains siteURL, filePath, malwareStatus flag, and malwareInfo (if applicable). You must be a SharePoint Online administrator or Global administrator to run the `Get-SPOMalwareFile` cmdlet. Note that this cmdlet does not work on files that are not malware-infected.
28+
The `Get-SPOMalwareFile` cmdlet runs on a single file. If the file is malware-infected then it returns an object of the type `SPOMalwareFile` which contains siteURL, filePath, malwareStatus flag, and malwareInfo (if applicable). You must be a SharePoint Online administrator to run the `Get-SPOMalwareFile` cmdlet. Note that this cmdlet does not work on files that are not malware-infected.
2929

3030
For permissions and the most current information about Windows PowerShell for SharePoint Online, see the online documentation at [Intro to SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/introduction-sharepoint-online-management-shell).
3131

sharepoint/sharepoint-ps/sharepoint-online/Get-SPOMalwareFileContent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Get-SPOMalwareFileContent -MalwareInfectedFile <SPOMalwareFile> [<CommonParamete
2424

2525
## DESCRIPTION
2626

27-
The `Get-SPOMalwareFileContent` cmdlet runs on a single file. If the file is malware-infected then it returns the file stream associated with it. You must be a SharePoint Online administrator or Global administrator to run the `Get-SPOMalwareFileContent` cmdlet. Note that this cmdlet does not work on files that are not malware-infected.
27+
The `Get-SPOMalwareFileContent` cmdlet runs on a single file. If the file is malware-infected then it returns the file stream associated with it. You must be a SharePoint Online administrator to run the `Get-SPOMalwareFileContent` cmdlet. Note that this cmdlet does not work on files that are not malware-infected.
2828

2929
For permissions and the most current information about Windows PowerShell for SharePoint Online, see the online documentation at [Intro to SharePoint Online Management Shell](/powershell/sharepoint/sharepoint-online/introduction-sharepoint-online-management-shell).
3030

sharepoint/sharepoint-ps/sharepoint-online/Get-SPOSite.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ The Detailed parameter has been deprecated. It will continue to work with earlie
5454
>
5555
> Site redirects, like the ones created after [changing the SharePoint domain name](/sharepoint/change-your-sharepoint-domain-name) will be retrieved by using this cmdlet.
5656
57-
You need to be a SharePoint Online administrator or Global Administrator and be a site collection administrator to run the cmdlet.
57+
You need to be a SharePoint Online administrator and be a site collection administrator to run the cmdlet.
5858

5959
For permissions and the most current information about Windows PowerShell for SharePoint Online, see the online documentation at [Intro to SharePoint Online Management Shell](https://learn.microsoft.com/powershell/sharepoint/sharepoint-online/introduction-sharepoint-online-management-shell?view=sharepoint-ps).
6060

sharepoint/sharepoint-ps/sharepoint-online/Get-SPOTenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ The `Get-SPOTenant` cmdlet returns organization-level site collection properties
2828

2929
Currently, there are no parameters for this cmdlet.
3030

31-
You must be a SharePoint Online administrator or Global Administrator to run the cmdlet.
31+
You must be a SharePoint Online administrator to run the cmdlet.
3232

3333
For permissions and the most current information about Windows PowerShell for SharePoint Online, see the online documentation at [Intro to SharePoint Online Management Shell](https://learn.microsoft.com/powershell/sharepoint/sharepoint-online/introduction-sharepoint-online-management-shell?view=sharepoint-ps).
3434

sharepoint/sharepoint-ps/sharepoint-online/Get-SPOTenantCdnOrigins.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414

1515
## SYNOPSIS
1616

17-
Lists all the configured origins under the tenancy or under a given site. You must be a SharePoint Online administrator or Global Administrator to run this cmdlet.
17+
Lists all the configured origins under the tenancy or under a given site. You must be a SharePoint Online administrator to run this cmdlet.
1818

1919
## SYNTAX
2020

0 commit comments

Comments
 (0)