Skip to content

Commit bd150e9

Browse files
authored
Merge pull request #4671 from MicrosoftDocs/chrisda
Exchange cmdlet ref links 3
2 parents fad68f7 + 099a60a commit bd150e9

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

CloudAppSecurityDocs/troubleshooting-proxy-end-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ To allow the preview, an Exchange administrator should perform the following ste
192192

193193
1. Connect to the module. For more information, see [Connect to Exchange Online PowerShell](/powershell/exchange/connect-to-exchange-online-powershell#connect-to-exchange-online-powershell-using-mfa-and-modern-authentication).
194194

195-
1. After you connected to the Exchange Online PowerShell, use the [Set-OwaMailboxPolicy](/powershell/module/exchange/set-owamailboxpolicy) cmdlet to update the parameters in the policy:
195+
1. After you connected to the Exchange Online PowerShell, use the [Set-OwaMailboxPolicy](/powershell/module/exchangepowershell/set-owamailboxpolicy) cmdlet to update the parameters in the policy:
196196

197197
```powershell
198198
Set-OwaMailboxPolicy -Identity OwaMailboxPolicy-Default -DirectFileAccessOnPrivateComputersEnabled $false -DirectFileAccessOnPublicComputersEnabled $false

defender-xdr/alert-grading-playbook-email-forwarding.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -228,7 +228,7 @@ You can also find suspicious forwarding rules using the Exchange admin center, b
228228

229229
- InboxRule
230230

231-
Inbox rules are configured with the e-mail client. You can use the [Get-InboxRule](/powershell/module/exchange/get-inboxrule) PowerShell cmdlet to list the inbox rules created by users.
231+
Inbox rules are configured with the e-mail client. You can use the [Get-InboxRule](/powershell/module/exchangepowershell/get-inboxrule) PowerShell cmdlet to list the inbox rules created by users.
232232

233233
### Additional investigation
234234

defender-xdr/alert-policies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ Here's a quick overview of how alert policies work and the alerts that are trigg
5858

5959
![Overview of how alert policies work.](media/M365ComplianceDefender-AlertPolicies-Overview.png)
6060

61-
1. An admin in your organization creates, configures, and turns on an alert policy by using the **Alert policies** page in the compliance portal or the Microsoft Defender portal. You can also create alert policies by using the [New-ProtectionAlert](/powershell/module/exchange/new-protectionalert) cmdlet in Security & Compliance PowerShell.
61+
1. An admin in your organization creates, configures, and turns on an alert policy by using the **Alert policies** page in the compliance portal or the Microsoft Defender portal. You can also create alert policies by using the [New-ProtectionAlert](/powershell/module/exchangepowershell/new-protectionalert) cmdlet in Security & Compliance PowerShell.
6262

6363
To create alert policies, you have to be assigned the Manage Alerts role or the Organization Configuration role in the compliance portal or the Defender portal.
6464

0 commit comments

Comments
 (0)