Skip to content

Commit 2e8ac85

Browse files
author
cabailey
committed
formatting fixes
1 parent 3b52089 commit 2e8ac85

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

exchange/docs-conceptual/client-advanced-settings.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -64,15 +64,15 @@ This advanced property to change \<EXT>.PFILE to P\<EXT> is supported by File Ex
6464

6565
Use the following table to identify the string value to specify:
6666

67-
| String value| Client and Scanner|
67+
| String value| Client and scanner|
6868
|-------------|---------------|
6969
|\*|All PFile extensions become P\<EXT>|
70-
|\<null value>| Default value behaves like the default protection value.|
70+
|\<null value>| Default value behaves like the default encryption value.|
7171
|ConvertTo-Json(".dwg", ".zip")|In addition to the previous list, ".dwg" and ".zip" become P\<EXT>|
7272

7373
With this setting, the following extensions always become **P\<EXT>**: ".txt", ".xml", ".bmp", ".jt", ".jpg", ".jpeg", ".jpe", ".jif", ".jfif", ".jfi", ".png", ".tif", ".tiff", ".gif"). Notable exclusion is that "ptxt" does not become "txt.pfile".
7474

75-
**AdditionalPPrefixExtensions** only works if protection of PFiles with the advanced property - [**PFileSupportedExtension**](#pfilesupportedextension) is enabled.
75+
This setting requires the advanced setting *PFileSupportedExtension* to be enabled.
7676

7777
**Example 1**: PowerShell command to behave like the default behavior where Protect ".dwg" becomes ".dwg.pfile":
7878

@@ -126,7 +126,7 @@ Set-Label -Identity "Confidential" -AdvancedSettings @{DefaultSubLabelId="8faca7
126126

127127
## EnableAudit
128128

129-
By default, the information protection clients sends audit data to Microsoft Purview where you can view this data in [activity explorer](/purview/data-classification-activity-explorer).
129+
By default, the information protection client sends audit data to Microsoft Purview where you can view this data in [activity explorer](/purview/data-classification-activity-explorer).
130130

131131
To change this behavior, use the following advanced setting:
132132

@@ -152,7 +152,7 @@ This setting enables the information protection client to remove encryption from
152152

153153
- Value: **True**
154154

155-
Example PowerShell command where your policy is enabled:
155+
For example, if your label policy is named "Global":
156156

157157
```PowerShell
158158
Set-LabelPolicy -Identity Global -AdvancedSettings @{EnableContainerSupport="True"}
@@ -176,15 +176,15 @@ Set-LabelPolicy -Identity Global -AdvancedSettings @{EnableCustomPermissions="Fa
176176

177177
## EnableCustomPermissionsForCustomProtectedFiles
178178

179-
When you configure the advanced client setting *EnableCustomPermissionsto* to turn off custom permissions in File Explorer, by default, users are not able to see or change custom permissions that are already set in an encrypted document.
179+
When you configure the advanced client setting *EnableCustomPermissions* to turn off custom permissions in File Explorer, by default, users are not able to see or change custom permissions that are already set in an encrypted document.
180180

181181
However, there's another advanced client setting that you can specify so that in this scenario, users can see and change custom permissions for an encrypted document when they use File Explorer and right-click the file.
182182

183183
- Key: **EnableCustomPermissionsForCustomProtectedFiles**
184184

185185
- Value: **True**
186186

187-
Example PowerShell command:
187+
Example PowerShell command, where your label policy is named "Global":
188188

189189
```PowerShell
190190
Set-LabelPolicy -Identity Global -AdvancedSettings @{EnableCustomPermissionsForCustomProtectedFiles="True"}

0 commit comments

Comments
 (0)