Skip to content

Commit 2438da2

Browse files
committed
Merge branch 'main' into SafeAttach-chrisda
2 parents bb6110a + c6827b0 commit 2438da2

File tree

1,215 files changed

+6092
-6054
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,215 files changed

+6092
-6054
lines changed

cabgen-bootstrap.yml

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
trigger:
2+
- live
3+
4+
pr: none # Disable pull request triggers.
5+
6+
resources:
7+
repositories:
8+
- repository: templates
9+
type: git
10+
name: Content CI/ReferenceAutomation
11+
ref: refs/heads/master
12+
13+
extends:
14+
template: PowerShell/cabgen.yml@templates

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -23,13 +23,13 @@ description: "Learn about using the Exchange Online V2 module in scripts and oth
2323
> The features and procedures described in this article require the following versions of the EXO V2 module:
2424
>
2525
> - **Exchange Online PowerShell (Connect-ExchangeOnline)**: Version 2.0.3 or later.
26-
> - **Security & Compliance Center PowerShell (Connect-IPPSSession)**: Version 2.0.6 Preview5 or later.
26+
> - **Security & Compliance PowerShell (Connect-IPPSSession)**: Version 2.0.6 Preview5 or later.
2727
>
2828
> For instructions on how to install or update the module, see [Install and maintain the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module).
2929
>
3030
> You can't use the procedures in this article to modify Microsoft 365 Groups ([Set-UnifiedGroup](/powershell/module/exchange/set-unifiedgroup)). To use Microsoft Graph instead, see [Update group](/graph/api/group-update).
3131
32-
Auditing and reporting scenarios in Microsoft 365 often involve unattended scripts in Exchange Online PowerShell and Security & Compliance Center PowerShell. In the past, unattended sign in required you to store the username and password in a local file or in a secret vault that's accessed at run-time. But, as we all know, storing user credentials locally is not a good security practice.
32+
Auditing and reporting scenarios in Microsoft 365 often involve unattended scripts in Exchange Online PowerShell and Security & Compliance PowerShell. In the past, unattended sign in required you to store the username and password in a local file or in a secret vault that's accessed at run-time. But, as we all know, storing user credentials locally is not a good security practice.
3333

3434
Certificate based authentication (CBA) or app-only authentication as described in this article supports unattended script and automation scenarios by using Azure AD apps and self-signed certificates.
3535

@@ -46,7 +46,7 @@ The following examples show how to use the Exchange Online PowerShell V2 module
4646
Connect-ExchangeOnline -CertificateFilePath "C:\Users\johndoe\Desktop\automation-cert.pfx" -CertificatePassword (ConvertTo-SecureString -String "<MyPassword>" -AsPlainText -Force) -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
4747
```
4848
49-
- **Security & Compliance Center PowerShell**:
49+
- **Security & Compliance PowerShell**:
5050
5151
```powershell
5252
Connect-IPPSSession -CertificateFilePath "C:\Users\johndoe\Desktop\automation-cert.pfx" -CertificatePassword (ConvertTo-SecureString -String "<MyPassword>" -AsPlainText -Force) -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
@@ -60,7 +60,7 @@ The following examples show how to use the Exchange Online PowerShell V2 module
6060
Connect-ExchangeOnline -CertificateThumbPrint "012THISISADEMOTHUMBPRINT" -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
6161
```
6262
63-
- **Security & Compliance Center PowerShell**:
63+
- **Security & Compliance PowerShell**:
6464
6565
```powershell
6666
Connect-IPPSSession -CertificateThumbPrint "012THISISADEMOTHUMBPRINT" -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
@@ -76,7 +76,7 @@ The following examples show how to use the Exchange Online PowerShell V2 module
7676
Connect-ExchangeOnline -Certificate <%X509Certificate2 Object%> -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
7777
```
7878
79-
- **Security & Compliance Center PowerShell**:
79+
- **Security & Compliance PowerShell**:
8080
8181
```powershell
8282
Connect-IPPSSession -Certificate <%X509Certificate2 Object%> -AppID "36ee4c6c-0812-40a2-b820-b22ebd02bce3" -Organization "contosoelectronics.onmicrosoft.com"
@@ -267,7 +267,7 @@ After you register the certificate with your application, you can use the privat
267267

268268
Azure AD has more than 50 admin roles available. The supported roles are described in the following table:
269269

270-
|Role|Exchange Online PowerShell|Security & Compliance Center PowerShell|
270+
|Role|Exchange Online PowerShell|Security & Compliance PowerShell|
271271
|---|:---:|:---:|
272272
|Compliance Administrator|![Check mark.](media/checkmark.png)|![Check mark.](media/checkmark.png)|
273273
|Exchange Administrator<sup>\*</sup>|![Check mark.](media/checkmark.png)||
@@ -287,7 +287,7 @@ The Security Administrator role does not have the necessary permissions for thos
287287
For general instructions about assigning roles in Azure AD, see [View and assign administrator roles in Azure Active Directory](/azure/active-directory/roles/manage-roles-portal).
288288

289289
> [!NOTE]
290-
> The following steps are slightly different for Exchange Online PowerShell vs. Security & Compliance Center PowerShell. The steps for both environments are shown. To configure roles for both environments, repeat the steps in this section.
290+
> The following steps are slightly different for Exchange Online PowerShell vs. Security & Compliance PowerShell. The steps for both environments are shown. To configure roles for both environments, repeat the steps in this section.
291291
292292
1. On the Azure AD portal at <https://portal.azure.com/>, under **Manage Azure Active Directory**, click **View**.
293293

@@ -303,19 +303,19 @@ For general instructions about assigning roles in Azure AD, see [View and assign
303303

304304
![Find and select a supported Exchange Online PowerShell role by clicking on the role name.](media/exo-app-only-auth-find-and-select-supported-role.png)
305305

306-
- **Security & Compliance Center PowerShell**:
306+
- **Security & Compliance PowerShell**:
307307

308-
![Find and select a supported Security & Compliance Center PowerShell role by clicking on the role name.](media/exo-app-only-auth-find-and-select-supported-role-scc.png)
308+
![Find and select a supported Security & Compliance PowerShell role by clicking on the role name.](media/exo-app-only-auth-find-and-select-supported-role-scc.png)
309309

310310
4. On the **Assignments** page that opens, click **Add assignments**.
311311

312312
- **Exchange Online PowerShell**:
313313

314314
![Select Add assignments on the role assignments page for Exchange Online PowerShell.](media/exo-app-only-auth-role-assignments-click-add-assignments.png)
315315

316-
- **Security & Compliance Center PowerShell**:
316+
- **Security & Compliance PowerShell**:
317317

318-
![Select Add assignments on the role assignments page for Security & Compliance Center PowerShell.](media/exo-app-only-auth-role-assignments-click-add-assignments-scc.png)
318+
![Select Add assignments on the role assignments page for Security & Compliance PowerShell.](media/exo-app-only-auth-role-assignments-click-add-assignments-scc.png)
319319

320320
5. In the **Add assignments** flyout that opens, find and select the app that you created in [Step 1](#step-1-register-the-application-in-azure-ad).
321321

@@ -329,6 +329,6 @@ For general instructions about assigning roles in Azure AD, see [View and assign
329329

330330
![The role assignments page after to added the app to the role for Exchange Online PowerShell.](media/exo-app-only-auth-app-assigned-to-role.png)
331331

332-
- **Security & Compliance Center PowerShell**:
332+
- **Security & Compliance PowerShell**:
333333

334-
![The role assignments page after to added the app to the role for Security & Compliance Center PowerShell.](media/exo-app-only-auth-app-assigned-to-role-scc.png)
334+
![The role assignments page after to added the app to the role for Security & Compliance PowerShell.](media/exo-app-only-auth-app-assigned-to-role-scc.png)

exchange/docs-conceptual/basic-auth-connect-to-scc-powershell.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Basic auth - Connect to Security & Compliance Center PowerShell"
2+
title: "Basic auth - Connect to Security & Compliance PowerShell"
33
ms.author: chrisda
44
author: chrisda
55
manager: dansimp
@@ -12,15 +12,15 @@ ms.localizationpriority: medium
1212
ms.assetid:
1313
ROBOTS: NOINDEX
1414
search.appverid: MET150
15-
description: "Learn how to connect to Security & Compliance Center PowerShell."
15+
description: "Learn how to connect to Security & Compliance PowerShell."
1616
---
1717

18-
# Basic auth - Connect to Security & Compliance Center PowerShell
18+
# Basic auth - Connect to Security & Compliance PowerShell
1919

2020
> [!NOTE]
21-
> The connection instructions in this article [will eventually be deprecated](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-july-update/ba-p/1530163) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Security & Compliance Center PowerShell. For instructions, see [Connect to Security & Compliance Center PowerShell](connect-to-scc-powershell.md).
21+
> The connection instructions in this article [will eventually be deprecated](https://techcommunity.microsoft.com/t5/exchange-team-blog/basic-authentication-and-exchange-online-july-update/ba-p/1530163) due to the security concerns around Basic authentication. Instead, you should use the Exchange Online PowerShell V2 module (the EXO V2 module) to connect to Security & Compliance PowerShell. For instructions, see [Connect to Security & Compliance PowerShell](connect-to-scc-powershell.md).
2222
23-
Security & Compliance Center PowerShell allows you to manage your Microsoft 365 Defender portal and Microsoft Purview compliance portal settings from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to Security & Compliance Center PowerShell. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the Security & Compliance Center PowerShell cmdlets into your local Windows PowerShell session so that you can use them.
23+
Security & Compliance PowerShell allows you to manage your Microsoft 365 Defender portal and Microsoft Purview compliance portal settings from the command line. You use Windows PowerShell on your local computer to create a remote PowerShell session to Security & Compliance PowerShell. It's a simple three-step process where you enter your Microsoft 365 credentials, provide the required connection settings, and then import the Security & Compliance PowerShell cmdlets into your local Windows PowerShell session so that you can use them.
2424

2525
> [!NOTE]
2626
> The procedures in this article won't work if:
@@ -31,15 +31,15 @@ Security & Compliance Center PowerShell allows you to manage your Microsoft 365
3131
>
3232
> - A location condition in an Azure Active Directory conditional access policy restricts your access to trusted IPs.
3333
>
34-
> In these scenarios, you need to download and use the Exchange Online PowerShell V2 module (EXO V2 module) to connect to Security & Compliance Center PowerShell. For instructions, see [Connect to Security & Compliance Center PowerShell using the EXO V2 module](connect-to-scc-powershell.md).
34+
> In these scenarios, you need to download and use the Exchange Online PowerShell V2 module (EXO V2 module) to connect to Security & Compliance PowerShell. For instructions, see [Connect to Security & Compliance PowerShell using the EXO V2 module](connect-to-scc-powershell.md).
3535
>
36-
> Some features in the Microsoft 365 Defender portal and Microsoft Purview compliance portal (for example, mailbox archiving) link to existing functionality in Exchange Online. To use PowerShell with these features, you need to connect to Exchange Online PowerShell instead of Security & Compliance Center PowerShell. For instructions, see [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md).
36+
> Some features in the Microsoft 365 Defender portal and Microsoft Purview compliance portal (for example, mailbox archiving) link to existing functionality in Exchange Online. To use PowerShell with these features, you need to connect to Exchange Online PowerShell instead of Security & Compliance PowerShell. For instructions, see [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md).
3737
3838
## What do you need to know before you begin?
3939

4040
- Estimated time to complete: 5 minutes
4141

42-
- After you connect, the cmdlets and parameters that you have or don't have access to is controlled by role-based access control (RBAC). For more information, see [Permissions in the Microsoft 365 Defender portal](/microsoft-365/security/office-365-security/permissions-microsoft-365-security-center) and [Permissions in the Microsoft 365 security center](/microsoft-365/compliance/microsoft-365-compliance-center-permissions).
42+
- After you connect, the cmdlets and parameters that you have or don't have access to is controlled by role-based access control (RBAC). For more information, see [Permissions in the Microsoft 365 Defender portal](/microsoft-365/security/office-365-security/permissions-microsoft-365-security-center) and [Permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions).
4343

4444
- You can use the following versions of Windows:
4545

@@ -87,7 +87,7 @@ Security & Compliance Center PowerShell allows you to manage your Microsoft 365
8787

8888
> The WinRM client cannot process the request. Basic authentication is currently disabled in the client configuration. Change the client configuration and try the request again.
8989
90-
## Connect to Security & Compliance Center PowerShell
90+
## Connect to Security & Compliance PowerShell
9191

9292
1. On your local computer, open Windows PowerShell and run the following command:
9393

@@ -115,7 +115,7 @@ Security & Compliance Center PowerShell allows you to manage your Microsoft 365
115115
Import-PSSession $Session -DisableNameChecking
116116
```
117117

118-
If you want to connect to Security & Compliance Center PowerShell in the same window as an active Exchange Online PowerShell connection, you need to add the Prefix parameter and value (for example, `-Prefix "CC"`) to the end of this command to prevent cmdlet name collisions (both environments share some cmdlets with the same names).
118+
If you want to connect to Security & Compliance PowerShell in the same window as an active Exchange Online PowerShell connection, you need to add the Prefix parameter and value (for example, `-Prefix "CC"`) to the end of this command to prevent cmdlet name collisions (both environments share some cmdlets with the same names).
119119

120120
> [!NOTE]
121121
> Be sure to disconnect the remote PowerShell session when you're finished. If you close the Windows PowerShell window without disconnecting the session, you could use up all the remote PowerShell sessions available to you, and you'll need to wait for the sessions to expire. To disconnect the remote PowerShell session, run the following command:
@@ -126,23 +126,21 @@ Remove-PSSession $Session
126126

127127
## How do you know this worked?
128128

129-
After Step 3, the Security & Compliance Center PowerShell cmdlets are imported into your local Windows PowerShell session as tracked by a progress bar. If you don't receive any errors, you connected successfully. A quick test is to run a Security & Compliance Center cmdlet, for example, **Get-RetentionCompliancePolicy**, and see the results.
129+
After Step 3, the Security & Compliance PowerShell cmdlets are imported into your local Windows PowerShell session as tracked by a progress bar. If you don't receive any errors, you connected successfully. A quick test is to run a Security & Compliance PowerShell cmdlet, for example, **Get-RetentionCompliancePolicy**, and see the results.
130130

131131
If you receive errors, check the following requirements:
132132

133133
- A common problem is an incorrect password. Run the three steps again and pay close attention to the user name and password you enter in Step 1.
134134

135-
- Verify that your account has permission to access the Microsoft 365 Defender portal or the Microsoft Purview compliance portal. For details, see [Give users access to the Security & Compliance Center](/microsoft-365/security/office-365-security/grant-access-to-the-security-and-compliance-center).
136-
137-
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to Security & Compliance Center PowerShell.
135+
- To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to Security & Compliance PowerShell.
138136

139137
- TCP port 80 traffic needs to be open between your local computer and Microsoft 365. It's probably open, but it's something to consider if your organization has a restrictive Internet access policy.
140138

141139
- The **New-PSSession** command (Step 2) might fail to connect if your client IP address changes during the connection request. This can happen if your organization uses a source network address translation (SNAT) pool that contains multiple IP addresses. The connection error looks like this:
142140

143141
> The request for the Windows Remote Shell with ShellId \<ID\> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
144142
145-
To fix the issue, use an SNAT pool that contains a single IP address, or force the use of a specific IP address for connections to the Security & Compliance Center PowerShell endpoint.
143+
To fix the issue, use an SNAT pool that contains a single IP address, or force the use of a specific IP address for connections to the Security & Compliance PowerShell endpoint.
146144

147145
## See also
148146

exchange/docs-conceptual/connect-to-exchange-online-powershell.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To use the older Exchange Online Remote PowerShell Module to connect to Exchange
3333
> [!NOTE]
3434
> The rest of the instructions in the article assume that you've already installed the module.
3535
>
36-
> If you're using version 2.0.6 of the module, you must use the _UseRPSSession_ switch in the **Connect-ExchangeOnline** command for access to all cmdlets. Otherwise, you'll only get the 250 REST API backed cmdlets. For more information, see [Updates for version 2.0.6](exchange-online-powershell-v2.md#updates-for-version-206).
36+
> If you're using version 2.0.6 of the module, if you don't use the _UseRPSSession_ switch in the **Connect-ExchangeOnline** command, you'll have access only to the available REST API cmdlets. For more information, see [Updates for version 2.0.6](exchange-online-powershell-v2.md#updates-for-version-206).
3737
3838
- After you connect, the cmdlets and parameters that you have or don't have access to is controlled by role-based access control (RBAC). For more information, see [Permissions in Exchange Online](/exchange/permissions-exo/permissions-exo).
3939

@@ -50,16 +50,15 @@ These connection instructions use modern authentication and work with or without
5050

5151
For other sign in methods that are available in PowerShell 7, see the [PowerShell 7 log in experiences](#powershell-7-log-in-experiences) section later in this topic.
5252

53-
1. In a PowerShell window, load the EXO V2 module by running the following command:
53+
1. In a PowerShell window, load the EXO V2 module by running the following command<sup>\*</sup>:
5454

5555
```powershell
5656
Import-Module ExchangeOnlineManagement
5757
```
5858

5959
**Notes**:
6060

61-
- If you've already [installed the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module), the previous command will work as written.
62-
- You might be able to skip this step and run **Connect-ExchangeOnline** without loading the module first.
61+
<sup>\*</sup> You might be able to skip this step and run **Connect-ExchangeOnline** without loading the module first.
6362

6463
2. The command that you need to run uses the following syntax:
6564

0 commit comments

Comments
 (0)