You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For any parameters that are passed in, the `Set-SPOContainer` cmdlet sets or updates the setting for the active container identified by the parameter `Identity`. The cmdlet throws an error if the identity of an archived container is provided.
59
+
For any parameters that are passed in, the `Set-SPOContainer` cmdlet sets or updates the setting for the active container identified by the parameter `Identity`. The cmdlet throws an error if the identity of an archived container is provided. The principal owner transfer operation is supported only for containers that are user-owned. Attempting to perform this operation on non user-owned containers will result in an error.
60
+
61
+
> [!IMPORTANT]
62
+
> Always wait for the current principal owner transfer attempt to finish before reusing the cmdlet. Concurrent or premature reuse can lead to incomplete or invalid ownership changes.
63
+
>
56
64
57
65
You must be a SharePoint Embedded Administrator to run the cmdlet.
58
66
@@ -93,6 +101,8 @@ This example removes any previously set sensitivity label on the container.
93
101
94
102
### -AllowEditing
95
103
104
+
> Applicable: SharePoint Online
105
+
96
106
Prevents users from editing Office files in the browser and copying and pasting Office file contents out of the browser window.
As a SharePoint Embedded Administrator, you can block the download of files from SharePoint Embedded containers. This feature does not need Microsoft Entra Conditional Access policies. This feature can be set for individual containers but not at the organization level.
Read the [Control access from unmanaged devices](/sharepoint/control-access-from-unmanaged-devices) documentation to understand Conditional Access Policy usage in SharePoint Embedded container.
The following parameters can be used with -ConditionalAccessPolicy AllowLimitedAccess for both the organization-wide setting and the container-level setting.
203
241
204
242
OfficeOnlineFilesOnly: Allows users to preview only Office files in the browser. This option increases security but may be a barrier to user productivity.
@@ -220,7 +258,27 @@ Accept pipeline input: False
220
258
Accept wildcard characters: False
221
259
```
222
260
261
+
### -NewPrincipalOwner
262
+
263
+
> Applicable: SharePoint Online
264
+
265
+
The new user to whom a user-owned container's lifecycle will be tied to.
266
+
```yaml
267
+
Type: String
268
+
Parameter Sets: PrincipalOwnerTransfer
269
+
Aliases:
270
+
271
+
Required: True
272
+
Position: Named
273
+
Default value: None
274
+
Accept pipeline input: False
275
+
Accept wildcard characters: False
276
+
```
277
+
223
278
### -ReadOnlyForBlockDownloadPolicy
279
+
280
+
> Applicable: SharePoint Online
281
+
224
282
Controls if read-only should be enabled for block download policy.
Specifies a list of email domains that are allowed for sharing with the external collaborators. Use the space character as the delimiter for entering multiple values. For example, "contoso.com fabrikam.com".
Specifies a list of email domains that are blocked or prohibited for sharing with the external collaborators. Use space character as the delimiter for entering multiple values. For example, "contoso.com fabrikam.com".
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
When an admin with a Copilot license marks a site as authoritative, it signals to Microsoft Search, Microsoft 365 Copilot, and other AI agents that the content is official, trusted, and verified. This designation helps improve content discoverability and increases user confidence in AI-generated responses.
Specifies the Entra object IDs of the users for whom permissions report should be generated. Can be fetched using the `Get-MgUser` command from [Microsoft Graph PowerShell](/powershell/module/microsoft.graph.users/get-mguser).
232
+
Specifies the email IDs of the users for whom permissions report should be generated.
0 commit comments