You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/client-advanced-settings.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,15 +64,15 @@ This advanced property to change \<EXT>.PFILE to P\<EXT> is supported by File Ex
64
64
65
65
Use the following table to identify the string value to specify:
66
66
67
-
| String value| Client and Scanner|
67
+
| String value| Client and scanner|
68
68
|-------------|---------------|
69
69
|\*|All PFile extensions become P\<EXT>|
70
-
|\<null value>| Default value behaves like the default protection value.|
70
+
|\<null value>| Default value behaves like the default encryption value.|
71
71
|ConvertTo-Json(".dwg", ".zip")|In addition to the previous list, ".dwg" and ".zip" become P\<EXT>|
72
72
73
73
With this setting, the following extensions always become **P\<EXT>**: ".txt", ".xml", ".bmp", ".jt", ".jpg", ".jpeg", ".jpe", ".jif", ".jfif", ".jfi", ".png", ".tif", ".tiff", ".gif"). Notable exclusion is that "ptxt" does not become "txt.pfile".
74
74
75
-
**AdditionalPPrefixExtensions** only works if protection of PFiles with the advanced property - [**PFileSupportedExtension**](#pfilesupportedextension) is enabled.
75
+
This setting requires the advanced setting *PFileSupportedExtension* to be enabled.
76
76
77
77
**Example 1**: PowerShell command to behave like the default behavior where Protect ".dwg" becomes ".dwg.pfile":
By default, the information protection clients sends audit data to Microsoft Purview where you can view this data in [activity explorer](/purview/data-classification-activity-explorer).
129
+
By default, the information protection client sends audit data to Microsoft Purview where you can view this data in [activity explorer](/purview/data-classification-activity-explorer).
130
130
131
131
To change this behavior, use the following advanced setting:
132
132
@@ -152,7 +152,7 @@ This setting enables the information protection client to remove encryption from
152
152
153
153
- Value: **True**
154
154
155
-
Example PowerShell command where your policy is enabled:
155
+
For example, if your label policy is named "Global":
156
156
157
157
```PowerShell
158
158
Set-LabelPolicy -Identity Global -AdvancedSettings @{EnableContainerSupport="True"}
@@ -176,15 +176,15 @@ Set-LabelPolicy -Identity Global -AdvancedSettings @{EnableCustomPermissions="Fa
176
176
177
177
## EnableCustomPermissionsForCustomProtectedFiles
178
178
179
-
When you configure the advanced client setting *EnableCustomPermissionsto* to turn off custom permissions in File Explorer, by default, users are not able to see or change custom permissions that are already set in an encrypted document.
179
+
When you configure the advanced client setting *EnableCustomPermissions* to turn off custom permissions in File Explorer, by default, users are not able to see or change custom permissions that are already set in an encrypted document.
180
180
181
181
However, there's another advanced client setting that you can specify so that in this scenario, users can see and change custom permissions for an encrypted document when they use File Explorer and right-click the file.
0 commit comments