You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/connect-to-exchange-online-protection-powershell.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,6 @@ For detailed syntax and parameter information, see [Connect-IPPSSession](/powers
69
69
70
70
- If you're behind a proxy server, you can use the _PSSessionOption_ parameter in the connection command. First, run this command: `$ProxyOptions = New-PSSessionOption -ProxyAccessType <Value>`, where \<Value\> is `IEConfig`, `WinHttpConfig`, or `AutoDetect`. Then, use the value `$ProxyOptions` for the _PSSessionOption_ parameter. For more information, see [New-PSSessionOption](/powershell/module/microsoft.powershell.core/new-pssessionoption).
71
71
72
-
73
72
### Connect to Security & Compliance PowerShell with an interactive login prompt
74
73
75
74
This example connects to Exchange Online Protection PowerShell in a Microsoft 365 organization:
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/Set-Label.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,11 @@ ms.reviewer:
12
12
# Set-Label
13
13
14
14
## SYNOPSIS
15
+
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
15
16
16
17
Use the Set-Label cmdlet to modify sensitivity labels in your organization.
17
18
19
+
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
Copy file name to clipboardExpand all lines: skype/skype-ps/skype/Get-CsExternalAccessPolicy.md
+6-23Lines changed: 6 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,24 +40,19 @@ That might be sufficient to meet your communication needs.
40
40
If it doesn't meet your needs, you can use external access policies to extend the ability of your users to communicate and collaborate.
41
41
External access policies can grant (or revoke) the ability of your users to do any or all of the following:
42
42
43
-
1.
44
-
Communicate with people who have SIP accounts with a federated organization.
43
+
1. Communicate with people who have SIP accounts with a federated organization.
45
44
Note that enabling federation alone will not provide users with this capability.
46
45
Instead, you must enable federation and then assign users an external access policy that gives them the right to communicate with federated users.
47
46
48
-
2.
49
-
(Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](/powershell/module/teams/set-csteamsacsfederationconfiguration).
47
+
2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](/powershell/module/teams/set-csteamsacsfederationconfiguration).
50
48
51
-
3.
52
-
Access Skype for Business Server over the Internet, without having to first log on to your internal network.
49
+
3. Access Skype for Business Server over the Internet, without having to first log on to your internal network.
53
50
This enables your users to use Skype for Business and log on to Skype for Business Server from an Internet café or other remote location.
54
51
55
-
4.
56
-
Communicate with people who have SIP accounts with a public instant messaging service such as Skype.
52
+
4. Communicate with people who have SIP accounts with a public instant messaging service such as Skype.
57
53
58
54
The Get-CsExternalAccessPolicy cmdlet provides a way for you to return information about all of the external access policies that have been configured for use in your organization.
59
55
60
-
61
56
## EXAMPLES
62
57
63
58
### -------------------------- EXAMPLE 1 --------------------------
@@ -68,7 +63,6 @@ Get-CsExternalAccessPolicy
68
63
Example 1 returns a collection of all the external access policies configured for use in your organization.
69
64
Calling the Get-CsExternalAccessPolicy cmdlet without any additional parameters always returns the complete collection of external access policies.
70
65
71
-
72
66
### -------------------------- EXAMPLE 2 -------------------------- (Skype for Business Online)
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (https://go.microsoft.com/fwlink/?LinkID=113216).
Copy file name to clipboardExpand all lines: skype/skype-ps/skype/Get-CsOnlineUser.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,13 +111,13 @@ Example 6 returns information for user accounts that are categorized as resource
111
111
## PARAMETERS
112
112
113
113
### -AccountType
114
-
This parameter is added to Get-CsOnlineUser starting from TPM 4.5.1 to indicate the user type. The possible values for the AccountType parameter are:
114
+
This parameter is added to Get-CsOnlineUser starting from TPM 4.5.1 to indicate the user type. The possible values for the AccountType parameter are:
115
+
115
116
-`User` - to query for user accounts.
116
117
-`ResourceAccount` - to query for app endpoints or resource accounts.
117
118
-`Guest` - to query for guest accounts.
118
119
-`Unknown` - to query for a user type that is not known.
119
120
120
-
121
121
```yaml
122
122
Type: UserIdParameter
123
123
Parameter Sets: (All)
@@ -136,7 +136,6 @@ Indicates the Identity of the user account to be retrieved.
136
136
137
137
For TeamsOnly customers using the Teams PowerShell Module version 3.0.0 or later, you use the following values to identify the account (note that these changes are currently only rolled out in commercial environments and are currently **not** applicable to government environments):
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters(https://go.microsoft.com/fwlink/?LinkID=113216).
460
+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
462
461
463
462
## OUTPUTS
464
463
@@ -468,7 +467,8 @@ The following updates are applicable for organizations having TeamsOnly users th
468
467
469
468
*New user attributes*:
470
469
471
-
FeatureTypes – Array of unique strings specifying what features are enabled for a user. This attribute is an alternatitive to several attributes that have been dropped as outlined in the next section.
470
+
FeatureTypes: Array of unique strings specifying what features are enabled for a user. This attribute is an alternative to several attributes that have been dropped as outlined in the next section.
471
+
472
472
Some of the commonly used FeatureTypes include:
473
473
474
474
- Teams
@@ -592,8 +592,8 @@ The following attributes are no longer relevant to Teams and have been dropped f
592
592
- WindowsEmailAddress
593
593
- SoftDeletedUsers (available in Teams PowerShell Module 4.4.3 and later)
594
594
595
-
596
595
The following attributes are temporarily unavailable in the output when using the "-Filter" or when used without the "-Identity" parameter:
596
+
597
597
- WhenChanged
598
598
- CountryAbbreviation
599
599
@@ -625,7 +625,8 @@ In Teams PowerShell Modules 3.0.0 and above OnPremLineURI will only refer to the
625
625
## INPUTS
626
626
627
627
## NOTES
628
-
- These changes are currently only rolled out in commercial environments and are **not** applicable to government environments.
628
+
629
+
These changes are currently only rolled out in commercial environments and are **not** applicable to government environments.
Copy file name to clipboardExpand all lines: skype/skype-ps/skype/Grant-CsExternalAccessPolicy.md
+4-15Lines changed: 4 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,19 +36,15 @@ That might be sufficient to meet your communication needs.
36
36
If it doesn't meet your needs you can use external access policies to extend the ability of your users to communicate and collaborate.
37
37
External access policies can grant (or revoke) the ability of your users to do any or all of the following:
38
38
39
-
1.
40
-
Communicate with people who have SIP accounts with a federated organization.
39
+
1. Communicate with people who have SIP accounts with a federated organization.
41
40
Note that enabling federation will not automatically provide users with this capability.
42
41
Instead, you must enable federation, and then assign users an external access policy that gives them the right to communicate with federated users.
43
42
44
-
2.
45
-
(Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](/powershell/module/teams/set-csteamsacsfederationconfiguration).
43
+
2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](/powershell/module/teams/set-csteamsacsfederationconfiguration).
46
44
47
-
3.
48
-
Communicate with people who have SIP accounts with a public instant messaging service such as Skype.
45
+
3. Communicate with people who have SIP accounts with a public instant messaging service such as Skype.
49
46
50
-
4.
51
-
Access Skype for Business Server over the Internet, without having to first log on to your internal network.
47
+
4. Access Skype for Business Server over the Internet, without having to first log on to your internal network.
52
48
This enables your users to use Skype for Business and log on to Skype for Business Server from an Internet café or other remote location.
53
49
54
50
When you install Skype for Business Server, a global external access policy is automatically created for you.
@@ -64,7 +60,6 @@ For example, suppose you create a per-user policy that allows communication with
64
60
As long as that policy is in force, Ken will be allowed to communicate with federated users even if this type of communication is not allowed by Ken's site policy or by the global policy.
65
61
That's because the settings in the per-user policy take precedence.
66
62
67
-
68
63
## EXAMPLES
69
64
70
65
### -------------------------- EXAMPLE 1 --------------------------
@@ -84,7 +78,6 @@ The command shown in Example 2 assigns the external access policy RedmondAccessP
84
78
To do this, the command first uses the Get-CsUser cmdlet and the LdapFilter parameter to return a collection of all the users who work in Redmond; the filter value "l=Redmond" limits returned data to those users who work in the city of Redmond (the l in the filter, a lowercase L, represents the locality).
85
79
That collection is then piped to the Grant-CsExternalAccessPolicy cmdlet, which assigns the policy RedmondAccessPolicy to each user in the collection.
86
80
87
-
88
81
### -------------------------- EXAMPLE 3 --------------------------
@@ -94,7 +87,6 @@ In Example 3, all the users who have the job title "Sales Representative" are as
94
87
To perform this task, the command first uses the Get-CsUser cmdlet and the LdapFilter parameter to return a collection of all the Sales Representatives; the filter value "Title=Sales Representative" restricts the returned collection to users who have the job title "Sales Representative".
95
88
This filtered collection is then piped to the Grant-CsExternalAccessPolicy cmdlet, which assigns the policy SalesAccessPolicy to each user in the collection.
96
89
97
-
98
90
### -------------------------- EXAMPLE 4 --------------------------
@@ -104,7 +96,6 @@ The command shown in Example 4 assigns the external access policy BasicAccessPol
104
96
(That is, users currently being governed by a site policy or by the global policy.) To do this, the Get-CsUser cmdlet and the Filter parameter are used to return the appropriate set of users; the filter value {ExternalAccessPolicy -eq $Null} limits the returned data to user accounts where the ExternalAccessPolicy property is equal to (-eq) a null value ($Null).
105
97
By definition, ExternalAccessPolicy will be null only if users have not been assigned a per-user policy.
106
98
107
-
108
99
### -------------------------- EXAMPLE 5 --------------------------
@@ -114,7 +105,6 @@ Example 5 assigns the external access policy USAccessPolicy to all the users who
114
105
The command starts off by calling the Get-CsUser cmdlet and the OU parameter; the parameter value "ou=US,dc=litwareinc,dc=com" limits the returned data to user accounts found in the US OU.
115
106
The returned collection is then piped to the Grant-CsExternalAccessPolicy cmdlet, which assigns the policy USAccessPolicy to each user in the collection.
116
107
117
-
118
108
### -------------------------- EXAMPLE 6 --------------------------
@@ -124,7 +114,6 @@ Example 6 unassigns any per-user external access policy previously assigned to a
124
114
To do this, the command calls the Get-CsUser cmdlet (without any additional parameters) in order to return a collection of all the users enabled for Skype for Business Server.
125
115
That collection is then piped to the Grant-CsExternalAccessPolicy cmdlet, which uses the syntax "`-PolicyName $Null`" to remove any per-user external access policy previously assigned to these users.
0 commit comments