Skip to content

Commit 1ee2495

Browse files
authored
Merge pull request #8515 from MicrosoftDocs/chrisda
Chrisda to Master
2 parents 02473b5 + dcbf381 commit 1ee2495

23 files changed

+484
-423
lines changed

.openpublishing.redirection.json

Lines changed: 24 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5402,22 +5402,22 @@
54025402
},
54035403
{
54045404
"source_path": "exchange/virtual-folder/exchange/reporting/Get-TenantAnalyticsConfig.md",
5405-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-tenantanalyticsconfig",
5405+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
54065406
"redirect_document_id": false
54075407
},
54085408
{
54095409
"source_path": "exchange/virtual-folder/exchange/reporting/Get-UserAnalyticsConfig.md",
5410-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-useranalyticsconfig",
5410+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
54115411
"redirect_document_id": false
54125412
},
54135413
{
54145414
"source_path": "exchange/virtual-folder/exchange/reporting/Set-TenantAnalyticsConfig.md",
5415-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-tenantanalyticsconfig",
5415+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/myanalyticsfeatureconfig",
54165416
"redirect_document_id": false
54175417
},
54185418
{
54195419
"source_path": "exchange/virtual-folder/exchange/reporting/Set-UserAnalyticsConfig.md",
5420-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-useranalyticsconfig",
5420+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/myanalyticsfeatureconfig",
54215421
"redirect_document_id": false
54225422
},
54235423
{
@@ -6624,6 +6624,26 @@
66246624
"source_path": "exchange/docs-conceptual/mfa-connect-to-scc-powershell.md",
66256625
"redirect_url": "https://docs.microsoft.com/powershell/exchange/connect-to-scc-powershell",
66266626
"redirect_document_id": false
6627+
},
6628+
{
6629+
"source_path": "exchange/virtual-folder/exchange/mailboxes/Get-TenantAnalyticsConfig.md",
6630+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
6631+
"redirect_document_id": false
6632+
},
6633+
{
6634+
"source_path": "exchange/virtual-folder/exchange/mailboxes/Set-TenantAnalyticsConfig.md",
6635+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-myanalyticsfeatureconfig",
6636+
"redirect_document_id": false
6637+
},
6638+
{
6639+
"source_path": "exchange/virtual-folder/exchange/mailboxes/Get-UserAnalyticsConfig.md",
6640+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
6641+
"redirect_document_id": false
6642+
},
6643+
{
6644+
"source_path": "exchange/virtual-folder/exchange/mailboxes/Set-UserAnalyticsConfig.md",
6645+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-myanalyticsfeatureconfig",
6646+
"redirect_document_id": false
66276647
}
66286648
]
66296649
}

exchange/exchange-ps/exchange/Get-TenantAnalyticsConfig.md

Lines changed: 0 additions & 56 deletions
This file was deleted.

exchange/exchange-ps/exchange/Get-UserAnalyticsConfig.md

Lines changed: 0 additions & 80 deletions
This file was deleted.

exchange/exchange-ps/exchange/New-AntiPhishPolicy.md

Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,15 +45,20 @@ New-AntiPhishPolicy [-Name] <String>
4545
[-ImpersonationProtectionState <ImpersonationProtectionState>]
4646
[-MailboxIntelligenceProtectionAction <ImpersonationAction>]
4747
[-MailboxIntelligenceProtectionActionRecipients <MultiValuedProperty>]
48+
[-MailboxIntelligenceQuarantineTag <String>]
49+
[-MakeDefault]
4850
[-PhishThresholdLevel <Int32>]
4951
[-PolicyTag <String>]
5052
[-RecommendedPolicyType <RecommendedPolicyType>]
5153
[-SimilarUsersSafetyTipsCustomText <String>]
54+
[-SpoofQuarantineTag <String>]
5255
[-TargetedDomainActionRecipients <MultiValuedProperty>]
5356
[-TargetedDomainProtectionAction <ImpersonationAction>]
57+
[-TargetedDomainQuarantineTag <String>]
5458
[-TargetedDomainsToProtect <MultiValuedProperty>]
5559
[-TargetedUserActionRecipients <MultiValuedProperty>]
5660
[-TargetedUserProtectionAction <ImpersonationAction>]
61+
[-TargetedUserQuarantineTag <String>]
5762
[-TargetedUsersToProtect <MultiValuedProperty>]
5863
[-UnusualCharactersSafetyTipsCustomText <String>]
5964
[-WhatIf]
@@ -548,6 +553,48 @@ Accept pipeline input: False
548553
Accept wildcard characters: False
549554
```
550555

556+
### -MailboxIntelligenceQuarantineTag
557+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
558+
559+
The MailboxIntelligenceQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by mailbox intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
560+
561+
- Name
562+
- Distinguished name (DN)
563+
- GUID
564+
565+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
566+
567+
```yaml
568+
Type: String
569+
Parameter Sets: (All)
570+
Aliases:
571+
Applicable: Exchange Online
572+
573+
Required: False
574+
Position: Named
575+
Default value: None
576+
Accept pipeline input: False
577+
Accept wildcard characters: False
578+
```
579+
580+
### -MakeDefault
581+
The MakeDefault switch makes this antiphish policy the default antiphish policy. You don't have to specify a value with this switch.
582+
583+
The default antiphish policy is applied to everyone (no corresponding antiphish rule), can't be renamed, and has the unmodifiable priority value Lowest (the default policy is always applied last).
584+
585+
```yaml
586+
Type: SwitchParameter
587+
Parameter Sets: (All)
588+
Aliases:
589+
Applicable: Exchange Online, Exchange Online Protection
590+
591+
Required: False
592+
Position: Named
593+
Default value: None
594+
Accept pipeline input: False
595+
Accept wildcard characters: False
596+
```
597+
551598
### -PhishThresholdLevel
552599
This setting is part of advanced settings and is only available in Microsoft Defender for Office 365.
553600

@@ -620,6 +667,28 @@ Accept pipeline input: False
620667
Accept wildcard characters: False
621668
```
622669

670+
### -SpoofQuarantineTag
671+
The SpoofQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by spoof intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
672+
673+
- Name
674+
- Distinguished name (DN)
675+
- GUID
676+
677+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
678+
679+
```yaml
680+
Type: String
681+
Parameter Sets: (All)
682+
Aliases:
683+
Applicable: Exchange Online, Exchange Online Protection
684+
685+
Required: False
686+
Position: Named
687+
Default value: None
688+
Accept pipeline input: False
689+
Accept wildcard characters: False
690+
```
691+
623692
### -TargetedDomainActionRecipients
624693
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
625694

@@ -665,6 +734,30 @@ Accept pipeline input: False
665734
Accept wildcard characters: False
666735
```
667736

737+
### -TargetedDomainQuarantineTag
738+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
739+
740+
The TargetedDomainQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by domain impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
741+
742+
- Name
743+
- Distinguished name (DN)
744+
- GUID
745+
746+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
747+
748+
```yaml
749+
Type: String
750+
Parameter Sets: (All)
751+
Aliases:
752+
Applicable: Exchange Online
753+
754+
Required: False
755+
Position: Named
756+
Default value: None
757+
Accept pipeline input: False
758+
Accept wildcard characters: False
759+
```
760+
668761
### -TargetedDomainsToProtect
669762
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
670763

@@ -730,6 +823,30 @@ Accept pipeline input: False
730823
Accept wildcard characters: False
731824
```
732825

826+
### -TargetedUserQuarantineTag
827+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
828+
829+
The TargetedUserQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by user impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
830+
831+
- Name
832+
- Distinguished name (DN)
833+
- GUID
834+
835+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
836+
837+
```yaml
838+
Type: String
839+
Parameter Sets: (All)
840+
Aliases:
841+
Applicable: Exchange Online
842+
843+
Required: False
844+
Position: Named
845+
Default value: None
846+
Accept pipeline input: False
847+
Accept wildcard characters: False
848+
```
849+
733850
### -TargetedUsersToProtect
734851
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
735852

exchange/exchange-ps/exchange/New-InboundConnector.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,7 @@ New-InboundConnector [-Name] <String> -SenderDomains <MultiValuedProperty>
4343
[-SenderIPAddresses <MultiValuedProperty>]
4444
[-TlsSenderCertificateName <TlsCertificate>]
4545
[-TreatMessagesAsInternal <Boolean>]
46+
[-TrustedOrganizations <MultiValuedProperty>]
4647
[-WhatIf]
4748
[<CommonParameters>]
4849
```
@@ -472,6 +473,24 @@ Accept pipeline input: False
472473
Accept wildcard characters: False
473474
```
474475

476+
### -TrustedOrganizations
477+
This parameter is available only in the cloud-based service.
478+
479+
{{ Fill TrustedOrganizations Description }}
480+
481+
```yaml
482+
Type:
483+
Parameter Sets: (All)
484+
Aliases:
485+
Applicable: Exchange Online, Exchange Online Protection
486+
487+
Required: False
488+
Position: Named
489+
Default value: None
490+
Accept pipeline input: False
491+
Accept wildcard characters: False
492+
```
493+
475494
### -WhatIf
476495
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
477496

0 commit comments

Comments
 (0)