You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
558
+
559
+
The MailboxIntelligenceQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by mailbox intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
560
+
561
+
- Name
562
+
- Distinguished name (DN)
563
+
- GUID
564
+
565
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
566
+
567
+
```yaml
568
+
Type: String
569
+
Parameter Sets: (All)
570
+
Aliases:
571
+
Applicable: Exchange Online
572
+
573
+
Required: False
574
+
Position: Named
575
+
Default value: None
576
+
Accept pipeline input: False
577
+
Accept wildcard characters: False
578
+
```
579
+
580
+
### -MakeDefault
581
+
The MakeDefault switch makes this antiphish policy the default antiphish policy. You don't have to specify a value with this switch.
582
+
583
+
The default antiphish policy is applied to everyone (no corresponding antiphish rule), can't be renamed, and has the unmodifiable priority value Lowest (the default policy is always applied last).
This setting is part of advanced settings and is only available in Microsoft Defender for Office 365.
553
600
@@ -620,6 +667,28 @@ Accept pipeline input: False
620
667
Accept wildcard characters: False
621
668
```
622
669
670
+
### -SpoofQuarantineTag
671
+
The SpoofQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by spoof intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
672
+
673
+
- Name
674
+
- Distinguished name (DN)
675
+
- GUID
676
+
677
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
625
694
@@ -665,6 +734,30 @@ Accept pipeline input: False
665
734
Accept wildcard characters: False
666
735
```
667
736
737
+
### -TargetedDomainQuarantineTag
738
+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
739
+
740
+
The TargetedDomainQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by domain impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
741
+
742
+
- Name
743
+
- Distinguished name (DN)
744
+
- GUID
745
+
746
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
747
+
748
+
```yaml
749
+
Type: String
750
+
Parameter Sets: (All)
751
+
Aliases:
752
+
Applicable: Exchange Online
753
+
754
+
Required: False
755
+
Position: Named
756
+
Default value: None
757
+
Accept pipeline input: False
758
+
Accept wildcard characters: False
759
+
```
760
+
668
761
### -TargetedDomainsToProtect
669
762
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
670
763
@@ -730,6 +823,30 @@ Accept pipeline input: False
730
823
Accept wildcard characters: False
731
824
```
732
825
826
+
### -TargetedUserQuarantineTag
827
+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
828
+
829
+
The TargetedUserQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by user impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
830
+
831
+
- Name
832
+
- Distinguished name (DN)
833
+
- GUID
834
+
835
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
836
+
837
+
```yaml
838
+
Type: String
839
+
Parameter Sets: (All)
840
+
Aliases:
841
+
Applicable: Exchange Online
842
+
843
+
Required: False
844
+
Position: Named
845
+
Default value: None
846
+
Accept pipeline input: False
847
+
Accept wildcard characters: False
848
+
```
849
+
733
850
### -TargetedUsersToProtect
734
851
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
0 commit comments