Skip to content

Commit 1bbcd22

Browse files
authored
Merge branch 'main' into patch-3
2 parents edfcdff + 3f99fe8 commit 1bbcd22

28 files changed

+399
-342
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7133,6 +7133,16 @@
71337133
"redirect_url": "/exchange/exchange-hybrid",
71347134
"redirect_document_id": false
71357135
},
7136+
{
7137+
"source_path": "exchange/virtual-folder/exchange/Get-PhishSimOverrideRule.md",
7138+
"redirect_url": "/powershell/module/exchange/get-exophishsimoverriderule",
7139+
"redirect_document_id": false
7140+
},
7141+
{
7142+
"source_path": "exchange/virtual-folder/exchange/Get-SecOpsOverrideRule.md",
7143+
"redirect_url": "/powershell/module/exchange/get-exosecopsoverriderule",
7144+
"redirect_document_id": false
7145+
},
71367146
{
71377147
"source_path": "skype/virtual-folder/skype/Disable-CsOnlineSipDomain.md",
71387148
"redirect_url": "/powershell/module/teams/Disable-CsOnlineSipDomain",

exchange/docs-conceptual/disable-access-to-exchange-online-powershell.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Enable or disable access to Exchange Online PowerShell"
33
ms.author: chrisda
44
author: chrisda
55
manager: deniseb
6-
ms.date: 5/16/2024
6+
ms.date: 12/11/2024
77
ms.audience: Admin
88
audience: Admin
99
ms.topic: article
@@ -18,7 +18,7 @@ description: "Admins can learn how to disable or enable access to Exchange Onlin
1818

1919
Exchange Online PowerShell is the administrative interface that enables admins to manage the Exchange Online part of a Microsoft 365 organization from the command line (including many security features in Exchange Online Protection and Microsoft Defender for Office 365).
2020

21-
By default, all accounts in Microsoft 365 are allowed to use Exchange Online PowerShell. This access doesn't give users administrative capabilities in an organization. They're still limited by [role based access control (RBAC)](/exchange/permissions-exo/permissions-exo) (for example, they can configure settings on their own mailbox or manage distribution groups that they own, but not much else).
21+
By default, all accounts in Microsoft 365 are allowed to use Exchange Online PowerShell. This access doesn't give users administrative capabilities. They're still limited by [role based access control (RBAC)](/exchange/permissions-exo/permissions-exo). For example, they can configure some settings on their own mailbox and manage distribution groups that they own, but not much else.
2222

2323
Admins can use the procedures in this article to disable or enable a user's ability to connect to Exchange Online PowerShell.
2424

@@ -33,7 +33,7 @@ Admins can use the procedures in this article to disable or enable a user's abil
3333
- [Microsoft Entra RBAC](/microsoft-365/admin/add-users/about-admin-roles): Membership in the **Exchange Administrator** or **Global Administrator**<sup>\*</sup> roles gives users the required permissions *and* permissions for other features in Microsoft 365.
3434

3535
> [!IMPORTANT]
36-
> In your haste to quickly and globally disable PowerShell access in your cloud-based organization, beware of commands like `Get-User | Set-User -EXOModuleEnabled $false` without considering admin accounts. Use the procedures in this article to selectively remove PowerShell access, or preserve access for those who need it by using the following syntax in your global removal command: `Get-User | Where-Object {$_.UserPrincipalName -ne '[email protected]' -and $_.UserPrincipalName -ne '[email protected]'...} | Set-User -EXOModuleEnabled $false`.
36+
> In your haste to quickly and globally disable PowerShell access in your cloud-based organization, beware of commands like `Get-User | Set-User -EXOModuleEnabled $false` without considering admin accounts. Use the procedures in this article to **selectively** remove PowerShell access, or **preserve access for those who need it** by using the following syntax in your global removal command: `Get-User | Where-Object {$_.UserPrincipalName -ne '[email protected]' -and $_.UserPrincipalName -ne '[email protected]'...} | Set-User -EXOModuleEnabled $false`.
3737
>
3838
> If you accidentally lock yourself out of PowerShell access, create a new admin account in the Microsoft 365 admin center, and then use that account to give yourself PowerShell access using the procedures in this article.
3939
>
@@ -62,7 +62,7 @@ Set-User -Identity [email protected] -EXOModuleEnabled $true
6262

6363
To prevent access to Exchange Online PowerShell for a specific group of existing users, you have the following options:
6464

65-
- **Filter users based on an existing attribute**: This method assumes that the target user accounts all share a unique filterable attribute. Some attributes, such as Title, Department, address information, and telephone number, are available only from the **Get-User** cmdlet. Other attributes, such as CustomAttribute1 to CustomAttribute15, are available only from the **Get-Mailbox** cmdlet.
65+
- **Filter users based on an existing attribute**: This method assumes that the target user accounts all share a unique filterable attribute. Some attributes (for example, Title, Department, address information, and telephone number) are available only from the **Get-User** cmdlet. Other attributes (for example, CustomAttribute1 to CustomAttribute15) are available only from the **Get-Mailbox** cmdlet.
6666
- **Use a list of specific users**: After you generate the list of specific users, you can use that list to disable their access to Exchange Online PowerShell.
6767

6868
### Filter users based on an existing attribute
@@ -107,6 +107,9 @@ $NoPS | foreach {Set-User -Identity $_ -EXOModuleEnabled $false}
107107

108108
## View the Exchange Online PowerShell access status for users
109109

110+
> [!TIP]
111+
> The newer `EXOModuleEnabled` property isn't available to use with the *Filter* parameter on the **Get-User** cmdlet, but the values of the `EXOModuleEnabled` property and the older `RemotePowerShellEnabled` property are always the same, so use the `RemotePowerShellEnabled` property with the *Filter* parameter on the **Get-User** cmdlet.
112+
110113
To view the PowerShell access status for a specific user, replace \<UserIdentity\> with the name or user principal name (UPN) of the user, and run the following command:
111114

112115
```powershell
@@ -122,11 +125,11 @@ Get-User -ResultSize unlimited | Format-Table -Auto DisplayName,EXOModuleEnabled
122125
To display all users who don't have access to Exchange Online PowerShell, run the following command:
123126

124127
```powershell
125-
Get-User -ResultSize unlimited -Filter 'EXOModuleEnabled -eq $false'
128+
Get-User -ResultSize unlimited -Filter 'RemotePowerShellEnabled -eq $false'
126129
```
127130

128131
To display all users who have access to Exchange Online PowerShell, run the following command:
129132

130133
```powershell
131-
Get-User -ResultSize unlimited -Filter 'EXOModuleEnabled -eq $true'
134+
Get-User -ResultSize unlimited -Filter 'RemotePowerShellEnabled -eq $true'
132135
```

exchange/exchange-ps/exchange/Get-ClientAccessRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.reviewer:
1313

1414
## SYNOPSIS
1515
> [!NOTE]
16-
> Beginning in October 2022, we've disabled access to client access rules for all existing Exchange Online organizations that weren't using them. In September 2024, support for client access rules will end for all Exchange Online organizations. For more information, see [Update: Deprecation of Client Access Rules in Exchange Online](https://techcommunity.microsoft.com/t5/exchange-team-blog/update-deprecation-of-client-access-rules-in-exchange-online/ba-p/3790165).
16+
> Beginning in October 2022, client access rules were deprecated for all Exchange Online organizations that weren't using them. Client access rules will be deprecated for all remaining organizations on September 1, 2025. If you choose to turn off client access rules before the deadline, the feature will be disabled in your organization. For more information, see [Update on Client Access Rules Deprecation in Exchange Online](https://techcommunity.microsoft.com/blog/exchange/update-on-client-access-rules-deprecation-in-exchange-online/4354809).
1717
1818
This cmdlet is functional only in Exchange Server 2019 and in the cloud-based service. Some parameters and settings may be exclusive to one environment or the other.
1919

exchange/exchange-ps/exchange/Get-FederatedOrganizationIdentifier.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
external help file: Microsoft.Exchange.CalendarsAndGroups-Help.xml
33
online version: https://learn.microsoft.com/powershell/module/exchange/get-federatedorganizationidentifier
4-
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
4+
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
55
title: Get-FederatedOrganizationIdentifier
66
schema: 2.0.0
77
author: chrisda
@@ -12,7 +12,7 @@ ms.reviewer:
1212
# Get-FederatedOrganizationIdentifier
1313

1414
## SYNOPSIS
15-
This cmdlet is available only in on-premises Exchange.
15+
This cmdlet is available in on-premises Exchange and in the cloud-based service. Some parameters and settings may be exclusive to one environment or the other.
1616

1717
Use the Get-FederatedOrganizationIdentifier cmdlet to retrieve the Exchange organization's federated organization identifier and related details, such as federated domains, organization contact and status.
1818

@@ -57,7 +57,7 @@ The Identity parameter specifies the organization ID.
5757
Type: OrganizationIdParameter
5858
Parameter Sets: (All)
5959
Aliases:
60-
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
60+
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
6161

6262
Required: False
6363
Position: 1
@@ -67,6 +67,8 @@ Accept wildcard characters: False
6767
```
6868
6969
### -DomainController
70+
This parameter is available only in on-premises Exchange.
71+
7072
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
7173
7274
```yaml
@@ -91,7 +93,7 @@ The status is returned with each domain in the Domains property.
9193
Type: SwitchParameter
9294
Parameter Sets: (All)
9395
Aliases:
94-
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
96+
Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
9597

9698
Required: False
9799
Position: Named

exchange/exchange-ps/exchange/Get-MailUser.md

Lines changed: 34 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,19 @@ Get-MailUser [[-Identity] <MailUserIdParameter>]
5252
[<CommonParameters>]
5353
```
5454

55+
### LOBAppAccount
56+
```
57+
Get-MailUser [-LOBAppAccount]
58+
[-Filter <String>]
59+
[-OrganizationalUnit <OrganizationalUnitIdParameter>]
60+
[-ProgressAction <ActionPreference>]
61+
[-ResultSize <Unlimited>]
62+
[-SharedWithMailUser]
63+
[-SoftDeletedMailUser]
64+
[-SortBy <String>]
65+
[<CommonParameters>]
66+
```
67+
5568
### HVEAccount
5669
```
5770
Get-MailUser [-HVEAccount]
@@ -193,6 +206,24 @@ Accept pipeline input: false
193206
Accept wildcard characters: False
194207
```
195208

209+
### -HVEAccount
210+
This parameter is available only in the cloud-based service.
211+
212+
The HVEAccount switch specifies that this mail user account is specifically used for the [High volume email service](https://learn.microsoft.com/exchange/mail-flow-best-practices/high-volume-mails-m365). You don't need to specify a value with this switch.
213+
214+
```yaml
215+
Type: SwitchParameter
216+
Parameter Sets: LOBAppAccount
217+
Aliases:
218+
Applicable: Exchange Online, Exchange Online Protection
219+
220+
Position: Named
221+
Default value: None
222+
Required: False
223+
Accept pipeline input: False
224+
Accept wildcard characters: False
225+
```
226+
196227
### -IgnoreDefaultScope
197228
This parameter is available only in on-premises Exchange.
198229

@@ -216,20 +247,20 @@ Accept pipeline input: false
216247
Accept wildcard characters: False
217248
```
218249

219-
### -HVEAccount
250+
### -LOBAppAccount
220251
This parameter is available only in the cloud-based service.
221252

222-
The HVEAccount switch specifies that this mail user account is specifically used for the [High volume email service](https://learn.microsoft.com/exchange/mail-flow-best-practices/high-volume-mails-m365). You don't need to specify a value with this switch.
253+
{{ Fill LOBAppAccount Description }}
223254

224255
```yaml
225256
Type: SwitchParameter
226257
Parameter Sets: LOBAppAccount
227258
Aliases:
228259
Applicable: Exchange Online, Exchange Online Protection
229260
261+
Required: False
230262
Position: Named
231263
Default value: None
232-
Required: False
233264
Accept pipeline input: False
234265
Accept wildcard characters: False
235266
```

exchange/exchange-ps/exchange/Get-Mailbox.md

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ Get-Mailbox [-Anr <String>]
3939
[-IncludeAcceptMessagesOnlyFromSendersOrMembersWithDisplayNames]
4040
[-IncludeAcceptMessagesOnlyFromWithDisplayNames]
4141
[-IncludeEmailAddressDisplayNames]
42+
[-IncludeGrantSendOnBehalfToWithDisplayNames]
4243
[-IncludeInactiveMailbox]
4344
[-Migration]
4445
[-Monitoring]
@@ -96,6 +97,7 @@ Get-Mailbox [[-Identity] <MailboxIdParameter>]
9697
[-IncludeAcceptMessagesOnlyFromSendersOrMembersWithDisplayNames]
9798
[-IncludeAcceptMessagesOnlyFromWithDisplayNames]
9899
[-IncludeEmailAddressDisplayNames]
100+
[-IncludeGrantSendOnBehalfToWithDisplayNames]
99101
[-IncludeInactiveMailbox]
100102
[-Migration]
101103
[-Monitoring]
@@ -147,6 +149,7 @@ Get-Mailbox [-MailboxPlan <MailboxPlanIdParameter>]
147149
[-IncludeAcceptMessagesOnlyFromSendersOrMembersWithDisplayNames]
148150
[-IncludeAcceptMessagesOnlyFromWithDisplayNames]
149151
[-IncludeEmailAddressDisplayNames]
152+
[-IncludeGrantSendOnBehalfToWithDisplayNames]
150153
[-IncludeInactiveMailbox]
151154
[-Migration]
152155
[-OrganizationalUnit <OrganizationalUnitIdParameter>]
@@ -555,6 +558,24 @@ Accept pipeline input: False
555558
Accept wildcard characters: False
556559
```
557560

561+
### -IncludeGrantSendOnBehalfToWithDisplayNames
562+
This parameter is available only in the cloud-based service.
563+
564+
{{ Fill IncludeGrantSendOnBehalfToWithDisplayNames Description }}
565+
566+
```yaml
567+
Type: SwitchParameter
568+
Parameter Sets: Identity, AnrSet, MailboxPlanSet
569+
Aliases:
570+
Applicable: Exchange Online
571+
572+
Required: False
573+
Position: Named
574+
Default value: None
575+
Accept pipeline input: False
576+
Accept wildcard characters: False
577+
```
578+
558579
### -IncludeInactiveMailbox
559580
This parameter is available only in the cloud-based service.
560581

exchange/exchange-ps/exchange/Get-PhishSimOverrideRule.md

Lines changed: 0 additions & 146 deletions
This file was deleted.

0 commit comments

Comments
 (0)