Skip to content

Commit 37cd5e2

Browse files
authored
Merge branch 'main' into patch-1
2 parents a592ec9 + 42de48c commit 37cd5e2

38 files changed

+1129
-645
lines changed

.openpublishing.redirection.json

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -312,7 +312,7 @@
312312
},
313313
{
314314
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Get-PhishFilterPolicy.md",
315-
"redirect_url": "/powershell/module/exchange/get-tenantallowblocklistppoofitems",
315+
"redirect_url": "/powershell/module/exchange/get-tenantallowblocklistspoofitems",
316316
"redirect_document_id": false
317317
},
318318
{
@@ -422,7 +422,7 @@
422422
},
423423
{
424424
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Set-PhishFilterPolicy.md",
425-
"redirect_url": "/powershell/module/exchange/set-tenantallowblocklistppoofitems",
425+
"redirect_url": "/powershell/module/exchange/set-tenantallowblocklistspoofitems",
426426
"redirect_document_id": false
427427
},
428428
{
@@ -6847,12 +6847,12 @@
68476847
},
68486848
{
68496849
"source_path": "exchange/virtual-folder/exchange/Get-PhishFilterPolicy.md",
6850-
"redirect_url": "/powershell/module/exchange/get-tenantallowblocklistppoofitems",
6850+
"redirect_url": "/powershell/module/exchange/get-tenantallowblocklistspoofitems",
68516851
"redirect_document_id": false
68526852
},
68536853
{
68546854
"source_path": "exchange/virtual-folder/exchange/Set-PhishFilterPolicy.md",
6855-
"redirect_url": "/powershell/module/exchange/set-tenantallowblocklistppoofitems",
6855+
"redirect_url": "/powershell/module/exchange/set-tenantallowblocklistspoofitems",
68566856
"redirect_document_id": false
68576857
},
68586858
{
@@ -6929,6 +6929,11 @@
69296929
"source_path": "exchange/docs-conceptual/use-update-exchangehelp.md",
69306930
"redirect_url": "/powershell/exchange/exchange-management-shell",
69316931
"redirect_document_id": false
6932+
},
6933+
{
6934+
"source_path": "exchange/docs-conceptual/v1-module-mfa-connect-to-scc-powershell.md",
6935+
"redirect_url": "/powershell/exchange/connect-to-scc-powershell",
6936+
"redirect_document_id": false
69326937
}
69336938
]
69346939
}

exchange/docs-conceptual/connect-to-exchange-servers-using-remote-powershell.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Connect to Exchange servers using remote PowerShell"
33
ms.author: chrisda
44
author: chrisda
55
manager: dansimp
6-
ms.date:
6+
ms.date: 9/7/2023
77
ms.audience: ITPro
88
audience: ITPro
99
ms.topic: article
@@ -17,13 +17,13 @@ description: "Use Windows PowerShell on a local computer to connect to an Exchan
1717

1818
# Connect to Exchange servers using remote PowerShell
1919

20-
If you don't have the Exchange management tools installed on your local computer, you can use Windows PowerShell to create a remote PowerShell session to an Exchange server. It's a simple three-step process, where you enter your credentials, provide the required connection settings, and then import the Exchange cmdlets into your local Windows PowerShell session so that you can use them.
20+
If you don't have the Exchange management tools installed on your local computer, you can use Windows PowerShell to create a remote PowerShell session to an Exchange server. It's a simple three-step process, where you enter your credentials, provide the required connection settings, and then import the Exchange cmdlets into your local Windows PowerShell session.
2121

2222
> [!NOTE]
2323
>
2424
> - We recommend that you use the Exchange Management Shell on any computer that you use to extensively administer Exchange servers. You get the Exchange Management Shell by installing the Exchange management tools. For more information, see [Install the Exchange Server Management Tools](/Exchange/plan-and-deploy/post-installation-tasks/install-management-tools) and [Open the Exchange Management Shell](open-the-exchange-management-shell.md). For more information about the Exchange Management Shell, see [Exchange Server PowerShell (Exchange Management Shell)](exchange-management-shell.md).
2525
>
26-
> - The **Get-ExchangeCertificate** cmdlet does not fully support remote PowerShell. We recommend that you use the Exchange Management Shell instead to get all the properties of this cmdlet.
26+
> - The **Get-ExchangeCertificate** cmdlet does not fully support remote PowerShell. We recommend that you use the Exchange Management Shell instead to see all properties of certificate objects.
2727
2828
## What do you need to know before you begin?
2929

@@ -43,7 +43,7 @@ If you don't have the Exchange management tools installed on your local computer
4343

4444
<sup>\*</sup> This version of Windows has reached end of support, and is now supported only in Azure virtual machines. To use this version of Windows, you need to install the Microsoft .NET Framework 4.5 or later and then an updated version of the Windows Management Framework: 3.0, 4.0, or 5.1 (only one). For more information, see [Install the .NET Framework](/dotnet/framework/install/on-windows-7), [Windows Management Framework 3.0](https://aka.ms/wmf3download), [Windows Management Framework 4.0](https://aka.ms/wmf4download), and [Windows Management Framework 5.1](https://aka.ms/wmf5download).
4545

46-
- Windows PowerShell needs to be configured to run scripts, and by default, it isn't. You'll get the following error when you try to connect:
46+
- Windows PowerShell needs to be configured to run scripts, and by default, it isn't. You get the following error when you try to connect:
4747

4848
> Files cannot be loaded because running scripts is disabled on this system. Provide a valid certificate with which to sign the files.
4949
@@ -66,7 +66,7 @@ If you don't have the Exchange management tools installed on your local computer
6666
$UserCredential = Get-Credential
6767
```
6868

69-
In the **Windows PowerShell Credential Request** dialog box that opens, enter your user principal name (UPN) (for example, `[email protected]`) and password, and then click **OK**.
69+
In the **Windows PowerShell Credential Request** dialog box that opens, enter your user principal name (UPN) (for example, `[email protected]`) and password, and then select **OK**.
7070

7171
2. Replace `<ServerFQDN>` with the fully qualified domain name of your Exchange server (for example, `mailbox01.contoso.com`) and run the following command:
7272

@@ -89,7 +89,7 @@ If you don't have the Exchange management tools installed on your local computer
8989
Remove-PSSession $Session
9090
```
9191

92-
## How do you know this worked?
92+
## How do you know that you've successfully connected?
9393

9494
After Step 3, the Exchange cmdlets are imported into your local Windows PowerShell session and tracked by a progress bar. If you don't receive any errors, you connected successfully. A quick test is to run an Exchange cmdlet (for example, **Get-Mailbox**) and review the results.
9595

exchange/docs-conceptual/connect-to-scc-powershell.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Connect to Security & Compliance PowerShell
33
author: chrisda
44
manager: dansimp
5-
ms.date: 8/21/2023
5+
ms.date: 9/7/2023
66
ms.audience: Admin
77
audience: Admin
88
ms.topic: article
@@ -24,8 +24,6 @@ The Exchange Online PowerShell module uses modern authentication for connecting
2424

2525
To connect to Security & Compliance PowerShell for automation, see [App-only authentication for unattended scripts](app-only-auth-powershell-v2.md).
2626

27-
To use the older Exchange Online Remote PowerShell Module (the V1 module) to connect to Security & Compliance PowerShell using MFA, see [V1 module - Connect to Security & Compliance PowerShell using MFA](v1-module-mfa-connect-to-scc-powershell.md). This older version of the module will eventually be retired.
28-
2927
## What do you need to know before you begin?
3028

3129
- The requirements for installing and using the module are described in [Install and maintain the Exchange Online PowerShell module](exchange-online-powershell-v2.md#install-and-maintain-the-exchange-online-powershell-module).

exchange/docs-conceptual/control-remote-powershell-access-to-exchange-servers.md

Lines changed: 30 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: "Control remote PowerShell access to Exchange servers"
33
ms.author: chrisda
44
author: chrisda
55
manager: dansimp
6-
ms.date:
6+
ms.date: 9/7/2023
77
ms.audience: ITPro
88
audience: ITPro
99
ms.topic: article
@@ -15,7 +15,7 @@ description: "Administrators can learn how to block or allow users' remote Power
1515

1616
# Control remote PowerShell access to Exchange servers
1717

18-
Remote PowerShell in Microsoft Exchange allows you to manage your Exchange organization from a remote computer that's on your internal network or from the Internet. You can disable or enable a user's ability to connect to an Exchange server using remote PowerShell. For more information about remote PowerShell, see [Exchange Server PowerShell (Exchange Management Shell)](exchange-management-shell.md).
18+
Remote PowerShell in Microsoft Exchange allows you to manage your Exchange organization from a remote computer that's on your internal network or from the internet. You can disable or enable a user's ability to connect to an Exchange server using remote PowerShell and the Exchange Management Shell. For more information about remote PowerShell, see [Exchange Server PowerShell (Exchange Management Shell)](exchange-management-shell.md).
1919

2020
For additional management tasks related to remote PowerShell, see [Connect to Exchange servers using remote PowerShell](connect-to-exchange-servers-using-remote-powershell.md).
2121

@@ -30,17 +30,43 @@ For additional management tasks related to remote PowerShell, see [Connect to Ex
3030
>
3131
> If you accidentally lock yourself out of remote PowerShell access, you'll need to use the otherwise highly discouraged method of directly loading the Exchange Management Shell snap-in (`Add-PSSnapIn Microsoft.Exchange.Management.PowerShell.SnapIn`) to give yourself access. Minimize the time and changes you're using with this method. Fix one account and open the Exchange Management Shell to make any additional changes.
3232
33-
- You can only use PowerShell to perform this procedure. To learn how to open the Exchange Management Shell in your on-premises Exchange organization, see [Open the Exchange Management Shell](open-the-exchange-management-shell.md).
33+
- You can only use PowerShell to perform these procedures. To learn how to open the Exchange Management Shell in your on-premises Exchange organization, see [Open the Exchange Management Shell](open-the-exchange-management-shell.md).
3434

3535
- For detailed information about OPATH filter syntax in Exchange, see [Additional OPATH syntax information](recipient-filters.md#additional-opath-syntax-information).
3636

3737
- You need to be assigned permissions before you can perform this procedure or procedures. To see what permissions you need, see the "Remote PowerShell" entry in the [Exchange infrastructure and PowerShell permissions](/Exchange/permissions/feature-permissions/infrastructure-permissions) article.
3838

39-
- If you're using third-party tools to customize email addresses of users, you need to disable email address policies on the affected users before you do the procedures in this article. If you don't, the **Set-User** commands will change the email addresses of the users to match the applicable email address policy. To disable email address policies on users, set the value of the EmailAddressPolicyEnabled parameter to $false on the [Set-Mailbox](/powershell/module/exchange/set-mailbox) cmdlet.
39+
- If you're using third-party tools to customize email addresses of users, you need to disable email address policies on the affected users before you do the procedures in this article. If you don't, the **Set-User** commands change the email addresses of the users to match the applicable email address policy. To disable email address policies on users, set the value of the EmailAddressPolicyEnabled parameter to $false on the [Set-Mailbox](/powershell/module/exchange/set-mailbox) cmdlet.
4040

4141
> [!TIP]
4242
> Having problems? Ask for help in the [Exchange Server](https://go.microsoft.com/fwlink/p/?linkId=60612) forums.
4343
44+
## View the remote PowerShell access for users
45+
46+
To view the remote PowerShell access status for a specific user, replace \<UserIdentity\> with the name or user principal name (UPN) of the user, and then run the following command:
47+
48+
```powershell
49+
Get-User -Identity "<UserIdentity>" | Format-List RemotePowerShellEnabled
50+
```
51+
52+
To display the remote PowerShell access status for all users, run the following command:
53+
54+
```powershell
55+
Get-User -ResultSize unlimited | Format-Table Name,DisplayName,RemotePowerShellEnabled -AutoSize
56+
```
57+
58+
To display all users who don't have access to remote PowerShell, run the following command:
59+
60+
```powershell
61+
Get-User -ResultSize unlimited -Filter 'RemotePowerShellEnabled -eq $false'
62+
```
63+
64+
To display all users who have access to remote PowerShell, run the following command:
65+
66+
```powershell
67+
Get-User -ResultSize unlimited -Filter 'RemotePowerShellEnabled -eq $true'
68+
```
69+
4470
## Use the Exchange Management Shell to enable or disable remote PowerShell access for a user
4571

4672
This example disables remote PowerShell access for the user named Therese Lindqvist.
@@ -102,29 +128,3 @@ $NPS = Get-Content "C:\My Documents\NoPowerShell.txt"
102128
103129
$NPS | foreach {Set-User -Identity $_ -RemotePowerShellEnabled $false}
104130
```
105-
106-
## View the remote PowerShell access for users
107-
108-
To view the remote PowerShell access status for a specific user, replace \<UserIdentity\> with the name or user principal name (UPN) of the user, and then run the following command:
109-
110-
```powershell
111-
Get-User -Identity "<UserIdentity>" | Format-List RemotePowerShellEnabled
112-
```
113-
114-
To display the remote PowerShell access status for all users, run the following command:
115-
116-
```powershell
117-
Get-User -ResultSize unlimited | Format-Table Name,DisplayName,RemotePowerShellEnabled -AutoSize
118-
```
119-
120-
To display all users who don't have access to remote PowerShell, run the following command:
121-
122-
```powershell
123-
Get-User -ResultSize unlimited -Filter 'RemotePowerShellEnabled -eq $false'
124-
```
125-
126-
To display all users who have access to remote PowerShell, run the following command:
127-
128-
```powershell
129-
Get-User -ResultSize unlimited -Filter 'RemotePowerShellEnabled -eq $true'
130-
```

0 commit comments

Comments
 (0)