Skip to content

Commit 33cf48c

Browse files
Merge branch 'main' into martinpchal/adding-externalaccesswithtrialtenants
2 parents dcd183c + 3542c99 commit 33cf48c

File tree

154 files changed

+1892
-312
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

154 files changed

+1892
-312
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -481,7 +481,7 @@ For general instructions about assigning roles in Microsoft Entra ID, see [Assig
481481
>
482482
> This method is supported only when you connect to Exchange Online PowerShell or Security & Compliance PowerShell in [REST API mode](exchange-online-powershell-v2.md#rest-api-connections-in-the-exo-v3-module). Security & Compliance PowerShell supports REST API mode in v3.2.0 or later.
483483
484-
For information about creating custom role groups, see [Create role groups in Exchange Online](/exchange/permissions-exo/role-groups#create-role-groups) and [Create Email & collaboration role groups in the Microsoft Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal). The custom role group that you assign to the application can contain any combination of built-in and custom roles.
484+
For information about creating custom role groups, see [Create role groups in Exchange Online](/exchange/permissions-exo/role-groups#create-role-groups) and [Create Email & collaboration role groups in the Microsoft Defender portal](/defender-office-365/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal). The custom role group that you assign to the application can contain any combination of built-in and custom roles.
485485

486486
To assign custom role groups to the application using service principals, do the following steps:
487487

exchange/docs-conceptual/connect-to-scc-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To connect to Security & Compliance PowerShell for automation, see [App-only aut
3333
>
3434
> REST API connections in the Exchange Online PowerShell V3 module require the PowerShellGet and PackageManagement modules. For more information, see [PowerShellGet for REST-based connections in Windows](exchange-online-powershell-v2.md#powershellget-for-rest-based-connections-in-windows).
3535
36-
- After you connect, the cmdlets and parameters that you have or don't have access to is controlled by role-based access control (RBAC). For more information, see [Permissions in the Microsoft Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions) and [Permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions).
36+
- After you connect, the cmdlets and parameters that you have or don't have access to is controlled by role-based access control (RBAC). For more information, see [Permissions in the Microsoft Defender portal](/defender-office-365/mdo-portal-permissions) and [Permissions in the Microsoft Purview compliance portal](/purview/purview-compliance-portal-permissions).
3737

3838
## Step 1: Load the Exchange Online PowerShell module
3939

exchange/docs-conceptual/find-exchange-cmdlet-permissions.md

Lines changed: 19 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Find the permissions required to run any Exchange cmdlet"
33
ms.author: chrisda
44
author: chrisda
55
manager: deniseb
6-
ms.date: 9/7/2023
6+
ms.date: 06/06/2024
77
ms.audience: ITPro
88
audience: ITPro
99
ms.topic: article
@@ -26,16 +26,23 @@ You can use PowerShell to find the permissions required to run any Exchange or E
2626

2727
- You can only use PowerShell to perform these procedures.
2828

29-
- Basically, you need to be an administrator to complete this procedure. Specifically, you need access to the **Get-ManagementRole** and **Get-ManagementRoleAssignment** cmdlets. By default, access to these cmdlets is granted by the **View-Only Configuration** or **Role Management** roles in Exchange Online, which are assigned only to the **View-Only Organization Management** and **Organization Management** role groups by default.
30-
31-
In cloud-based organizations, membership in the **Global Administrators** role in Microsoft Entra ID gives you the required permissions.
32-
3329
- The procedures in this article don't work in Security & Compliance PowerShell. For more information about Security & Compliance permissions, see the following articles:
34-
- [Permissions in the Microsoft Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions)
35-
- [Permissions in the Microsoft Purview compliance portal](/microsoft-365/compliance/microsoft-365-compliance-center-permissions)
36-
37-
> [!TIP]
38-
> Having problems? Ask for help in the Exchange forums. Visit the forums at: [Exchange Server](https://go.microsoft.com/fwlink/p/?linkId=60612) or [Exchange Online](https://go.microsoft.com/fwlink/p/?linkId=267542).
30+
- [Permissions in the Microsoft Defender portal](/defender-office-365/mdo-portal-permissions)
31+
- [Permissions in the Microsoft Purview compliance portal](/purview/purview-compliance-portal-permissions)
32+
33+
- You need to be assigned permissions before you can do the procedures in this article. You have the following options:
34+
- [Exchange Server permissions](/exchange/permissions/permissions): Membership in one of the following role groups:
35+
- **Compliance Management**
36+
- **Hygiene Management**
37+
- **Organization Management**
38+
- **View-Only Organization Management**
39+
- [Exchange Online permissions](/exchange/permissions-exo/permissions-exo): Membership in one of the following role groups:
40+
- **Compliance Management**
41+
- **Delegated Setup**
42+
- **Hygiene Management**
43+
- **Organization Management**
44+
- **View-Only Organization Management**
45+
- [Microsoft Entra permissions](/entra/identity/role-based-access-control/manage-roles-portal): Membership in the **Global Administrator** or **Global Reader** roles gives users the required permissions _and_ permissions for other features in Microsoft 365.
3946

4047
## Use PowerShell to find the permissions required to run a cmdlet
4148

@@ -50,8 +57,8 @@ You can use PowerShell to find the permissions required to run any Exchange or E
5057
$Perms = Get-ManagementRole -Cmdlet <Cmdlet> [-CmdletParameters <Parameter1>,<Parameter2>,...]
5158
```
5259

53-
> [!TIP]
54-
> If you specify multiple parameters, only roles that include _all_ of the specified parameters on the cmdlet are returned.
60+
> [!TIP]
61+
> If you specify multiple parameters, only roles that include _all_ of the specified parameters on the cmdlet are returned.
5562
5663
3. Run the following command:
5764

exchange/docs-conceptual/scc-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,6 @@ Security & Compliance PowerShell contains the following types of cmdlets:
3737
- Basic cmdlets that are also available in Exchange Online PowerShell (for example, [Get-User](/powershell/module/exchange/get-user), and [Get-RoleGroup](/powershell/module/exchange/get-rolegroup)).
3838
- A few cmdlets that correspond to security features available in Exchange Online Protection (EOP) and Microsoft Defender for Office 365 in the Microsoft Defender portal (for example, [Set-SecOpsOverridePolicy](/powershell/module/exchange/set-secopsoverridepolicy)).
3939

40-
Cmdlets for most EOP and Defender for Office 365 security features (for example, [anti-spam policies](/microsoft-365/security/office-365-security/anti-spam-protection)) are available only in [Exchange Online PowerShell](exchange-online-powershell.md).
40+
Cmdlets for most EOP and Defender for Office 365 security features (for example, [anti-spam policies](/defender-office-365/anti-spam-protection-about)) are available only in [Exchange Online PowerShell](exchange-online-powershell.md).
4141

4242
Check the **Applies to** value in the cmdlet references article to verify the PowerShell environment where the cmdlet actually resides.

exchange/exchange-ps/exchange/Add-VivaModuleFeaturePolicy.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ This example adds a policy for the Reflection feature in Viva Insights. The poli
8181

8282
### Example 2
8383
```powershell
84-
Add-VivaModuleFeaturePolicy -ModuleId VivaInsights -FeatureId Reflection -Name MultipleGroups -IsFeatureEnabled $false -GroupIds [email protected],[email protected]
84+
Add-VivaModuleFeaturePolicy -ModuleId VivaInsights -FeatureId Reflection -Name MultipleGroups -IsFeatureEnabled $false -GroupIds [email protected],[email protected],57680382-61a5-4378-85ad-f72095d4e9c3
8585
```
8686

8787
This example adds a policy for the Reflection feature in Viva Insights. The policy disables the feature for all users in the specified groups.
@@ -95,7 +95,7 @@ This example adds a policy for the Reflection feature in Viva Insights. The poli
9595

9696
### Example 4
9797
```powershell
98-
Add-VivaModuleFeaturePolicy -ModuleId VivaInsights -FeatureId Reflection -Name UsersAndGroups -IsFeatureEnabled $false -GroupIds [email protected],[email protected] -UserIds [email protected],[email protected]
98+
Add-VivaModuleFeaturePolicy -ModuleId VivaInsights -FeatureId Reflection -Name UsersAndGroups -IsFeatureEnabled $false -GroupIds [email protected],[email protected],57680382-61a5-4378-85ad-f72095d4e9c3 -UserIds [email protected],[email protected]
9999
```
100100

101101
This example adds a policy for the Reflection feature in Viva Insights. The policy disables the feature for the specified users and group members.
@@ -109,7 +109,7 @@ This example adds a policy for the `<cateogry_id>` category in Viva. The policy
109109

110110
### Example 6
111111
```powershell
112-
Add-VivaModuleFeaturePolicy -CategoryId <category_id> -Name MultipleGroups -IsCategoryEnabled $false -GroupIds [email protected],[email protected]
112+
Add-VivaModuleFeaturePolicy -CategoryId <category_id> -Name MultipleGroups -IsCategoryEnabled $false -GroupIds [email protected],[email protected],57680382-61a5-4378-85ad-f72095d4e9c3
113113
```
114114

115115
This example adds a policy for the `<cateogry_id>` category in Viva. The policy disables the category (effectively all features under the category) for all users in the specified groups.
@@ -123,7 +123,7 @@ This example adds a policy for the `<cateogry_id>` category in Viva. The policy
123123

124124
### Example 8
125125
```powershell
126-
Add-VivaModuleFeaturePolicy -CategoryId <category_id> -Name UsersAndGroups -IsCategoryEnabled $false -GroupIds [email protected],[email protected] -UserIds [email protected],[email protected]
126+
Add-VivaModuleFeaturePolicy -CategoryId <category_id> -Name UsersAndGroups -IsCategoryEnabled $false -GroupIds [email protected],[email protected],57680382-61a5-4378-85ad-f72095d4e9c3 -UserIds [email protected],[email protected]
127127
```
128128

129129
This example adds a policy for the `<cateogry_id>` category in Viva. The policy disables the category (effectively all features under the category) for the specified users and group members.
@@ -291,7 +291,7 @@ Accept wildcard characters: False
291291
```
292292

293293
### -GroupIds
294-
The GroupIds parameter specifies the SMTP addresses (email addresses) of the groups that the policy applies to. [Mail-enabled Microsoft Entra groups]( https://learn.microsoft.com/graph/api/resources/groups-overview#group-types-in-azure-ad-and-microsoft-graph) are supported. You can enter multiple values separated by commas.
294+
The GroupIds parameter specifies the email addresses or security group object IDs (GUIDs) of groups that the updated policy applies to. Both [Mail-enabled and non-mail-enabled Microsoft Entra groups](https://docs.microsoft.com/graph/api/resources/groups-overview#group-types-in-azure-ad-and-microsoft-graph) are supported. You can enter multiple values separated by commas.
295295

296296
You can specify a maximum of 20 total users or groups (20 users and no groups, 10 users and 10 groups, etc.).
297297

exchange/exchange-ps/exchange/Disable-ATPProtectionPolicyRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Disable-ATPProtectionPolicyRule [-Identity] <RuleIdParameter>
3030
## DESCRIPTION
3131
The State property in rules that are associated with preset security policies indicates whether the rule is Enabled or Disabled.
3232

33-
For more information about preset security policies in PowerShell, see [Preset security policies in Exchange Online PowerShell](https://learn.microsoft.com/microsoft-365/security/office-365-security/preset-security-policies#preset-security-policies-in-exchange-online-powershell).
33+
For more information about preset security policies in PowerShell, see [Preset security policies in Exchange Online PowerShell](https://learn.microsoft.com/defender-office-365/preset-security-policies#preset-security-policies-in-exchange-online-powershell).
3434

3535
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3636

Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,105 @@
1+
---
2+
external help file: Microsoft.Exchange.ServerStatus-Help.xml
3+
online version: https://learn.microsoft.com/powershell/module/exchange/disable-dnssecforverifieddomain
4+
applicable: Exchange Online
5+
title: Disable-DnssecForVerifiedDomain
6+
schema: 2.0.0
7+
author: chrisda
8+
ms.author: chrisda
9+
ms.reviewer:
10+
---
11+
12+
# Disable-DnssecForVerifiedDomain
13+
14+
## SYNOPSIS
15+
This cmdlet is available only in the cloud-based service.
16+
17+
**Note**: This cmdlet and the associated features are currently in Preview, aren't available in all organizations, and are subject to change.
18+
19+
Use the Disable-DnssecForVerifiedDomain cmdlet to disable Domain Name System Security (DNSSEC) for inbound mail to accepted domains in Exchange Online.
20+
21+
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
22+
23+
## SYNTAX
24+
25+
```
26+
Disable-DnssecForVerifiedDomain [-DomainName] <String>
27+
[-Confirm]
28+
[-WhatIf]
29+
[<CommonParameters>]
30+
```
31+
32+
## DESCRIPTION
33+
For more information about debugging, enabling, and disabling SMTP DANE with DNSSEC, see [How SMTP DANE works](https://learn.microsoft.com/purview/how-smtp-dane-works).
34+
35+
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
36+
37+
## EXAMPLES
38+
39+
### Example 1
40+
```powershell
41+
Disable-DnssecForVerifiedDomain -DomainName contoso.com
42+
```
43+
44+
This example disables DNSSEC for mail sent to contoso.com.
45+
46+
## PARAMETERS
47+
48+
### -DomainName
49+
The DomainName parameter specifies the accepted domain in the Exchange Online organization where you want to disable DNSSEC (for example, contoso.com). Use the Get-DnssecForVerifiedDomain cmdlet to see information about DNSSEC for the domain.
50+
51+
```yaml
52+
Type: String
53+
Parameter Sets: (All)
54+
Aliases:
55+
Applicable: Exchange Online
56+
57+
Required: True
58+
Position: 1
59+
Default value: None
60+
Accept pipeline input: False
61+
Accept wildcard characters: False
62+
```
63+
64+
### -Confirm
65+
This parameter is reserved for internal Microsoft use.
66+
67+
```yaml
68+
Type: SwitchParameter
69+
Parameter Sets: (All)
70+
Aliases: cf
71+
Applicable: Exchange Online
72+
73+
Required: False
74+
Position: Named
75+
Default value: None
76+
Accept pipeline input: False
77+
Accept wildcard characters: False
78+
```
79+
80+
### -WhatIf
81+
This parameter is reserved for internal Microsoft use.
82+
83+
```yaml
84+
Type: SwitchParameter
85+
Parameter Sets: (All)
86+
Aliases: wi
87+
Applicable: Exchange Online
88+
89+
Required: False
90+
Position: Named
91+
Default value: None
92+
Accept pipeline input: False
93+
Accept wildcard characters: False
94+
```
95+
96+
### CommonParameters
97+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/p/?LinkID=113216).
98+
99+
## INPUTS
100+
101+
## OUTPUTS
102+
103+
## NOTES
104+
105+
## RELATED LINKS

exchange/exchange-ps/exchange/Disable-EOPProtectionPolicyRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Disable-EOPProtectionPolicyRule [-Identity] <RuleIdParameter>
3030
## DESCRIPTION
3131
The State property in rules that are associated with preset security policies indicates whether the rule is Enabled or Disabled.
3232

33-
For more information about preset security policies in PowerShell, see [Preset security policies in Exchange Online PowerShell](https://learn.microsoft.com/microsoft-365/security/office-365-security/preset-security-policies#preset-security-policies-in-exchange-online-powershell).
33+
For more information about preset security policies in PowerShell, see [Preset security policies in Exchange Online PowerShell](https://learn.microsoft.com/defender-office-365/preset-security-policies#preset-security-policies-in-exchange-online-powershell).
3434

3535
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3636

exchange/exchange-ps/exchange/Disable-SafeAttachmentRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Disable-SafeAttachmentRule [-Identity] <RuleIdParameter>
2828
```
2929

3030
## DESCRIPTION
31-
Safe Attachments is a feature in Microsoft Defender for Office 365 that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Defender for Office 365](https://learn.microsoft.com/microsoft-365/security/office-365-security/safe-attachments-about).
31+
Safe Attachments is a feature in Microsoft Defender for Office 365 that opens email attachments in a special hypervisor environment to detect malicious activity. For more information, see [Safe Attachments in Defender for Office 365](https://learn.microsoft.com/defender-office-365/safe-attachments-about).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

0 commit comments

Comments
 (0)