Skip to content

Commit 56936fc

Browse files
committed
Merge branch 'main' into Grace-chrisda
2 parents 5e56e0d + 1119f9b commit 56936fc

File tree

313 files changed

+2961
-1037
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

313 files changed

+2961
-1037
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6944,6 +6944,36 @@
69446944
"source_path": "exchange/virtual-folder/exchange/Get-AdvancedThreatProtectionDocumentReport.md",
69456945
"redirect_url": "/powershell/module/exchange/get-contentmalwaremdoaggregatereport",
69466946
"redirect_document_id": false
6947+
},
6948+
{
6949+
"source_path": "exchange/virtual-folder/exchange/New-SecOpsOverrideRule.md",
6950+
"redirect_url": "/powershell/module/exchange/new-exosecopsoverriderule",
6951+
"redirect_document_id": false
6952+
},
6953+
{
6954+
"source_path": "exchange/virtual-folder/exchange/Remove-SecOpsOverrideRule.md",
6955+
"redirect_url": "/powershell/module/exchange/remove-exosecopsoverriderule",
6956+
"redirect_document_id": false
6957+
},
6958+
{
6959+
"source_path": "exchange/virtual-folder/exchange/Set-SecOpsOverrideRule.md",
6960+
"redirect_url": "/powershell/module/exchange/set-exosecopsoverriderule",
6961+
"redirect_document_id": false
6962+
},
6963+
{
6964+
"source_path": "exchange/virtual-folder/exchange/New-PhishSimOverrideRule.md",
6965+
"redirect_url": "/powershell/module/exchange/new-exophishsimoverriderule",
6966+
"redirect_document_id": false
6967+
},
6968+
{
6969+
"source_path": "exchange/virtual-folder/exchange/Remove-PhishSimOverrideRule.md",
6970+
"redirect_url": "/powershell/module/exchange/remove-exophishsimoverriderule",
6971+
"redirect_document_id": false
6972+
},
6973+
{
6974+
"source_path": "exchange/virtual-folder/exchange/Set-PhishSimOverrideRule.md",
6975+
"redirect_url": "/powershell/module/exchange/set-exophishsimoverriderule",
6976+
"redirect_document_id": false
69476977
}
69486978
]
69496979
}

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 22 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ Certificate based authentication (CBA) or app-only authentication as described i
4848
> - In Security & Compliance PowerShell, you can't use the procedures in this article with the following Microsoft 365 Group cmdlets:
4949
> - [Get-ComplianceSearchAction](/powershell/module/exchange/get-compliancesearchaction)
5050
> - [New-ComplianceSearch](/powershell/module/exchange/new-compliancesearch)
51+
> - [Start-ComplianceSearch](/powershell/module/exchange/start-compliancesearch)
5152
>
5253
> - Delegated scenarios are supported in Exchange Online. The recommended method for connecting with delegation is using GDAP and App Consent. For more information, see [Use the Exchange Online PowerShell v3 Module with GDAP and App Consent](/powershell/partnercenter/exchange-online-gdap-app). You can also use multi-tenant applications when CSP relationships are not created with the customer. The required steps for using multi-tenant applications are called out within the regular instructions in this article.
5354
>
@@ -128,11 +129,11 @@ The following examples show how to use the Exchange Online PowerShell module wit
128129
129130
## Set up app-only authentication
130131
131-
An initial onboarding is required for authentication using application objects. Application and service principal are used interchangeably, but an application is like a class object while a service principal is like an instance of the class. For more information, see [Application and service principal objects in Microsoft Entra ID](/azure/active-directory/develop/app-objects-and-service-principals).
132+
An initial onboarding is required for authentication using application objects. Application and service principal are used interchangeably, but an application is like a class object while a service principal is like an instance of the class. For more information, see [Application and service principal objects in Microsoft Entra ID](/entra/identity-platform/app-objects-and-service-principals).
132133
133134
For a detailed visual flow about creating applications in Microsoft Entra ID, see <https://aka.ms/azuread-app>.
134135
135-
1. [Register the application in Microsoft Entra ID](#step-1-register-the-application-in-azure-ad).
136+
1. [Register the application in Microsoft Entra ID](#step-1-register-the-application-in-microsoft-entra-id).
136137
137138
2. [Assign API permissions to the application](#step-2-assign-api-permissions-to-the-application).
138139
@@ -149,18 +150,16 @@ For a detailed visual flow about creating applications in Microsoft Entra ID, se
149150
> [!NOTE]
150151
> Cryptography: Next Generation (CNG) certificates aren't supported for app-only authentication with Exchange. CNG certificates are created by default in modern versions of Windows. You must use a certificate from a CSP key provider. [This section](#step-3-generate-a-self-signed-certificate) section covers two supported methods to create a CSP certificate.
151152
152-
4. [Attach the certificate to the Microsoft Entra application](#step-4-attach-the-certificate-to-the-azure-ad-application)
153+
4. [Attach the certificate to the Microsoft Entra application](#step-4-attach-the-certificate-to-the-microsoft-entra-application)
153154
154-
5. [Assign Microsoft Entra roles to the application](#step-5-assign-azure-ad-roles-to-the-application)
155+
5. [Assign Microsoft Entra roles to the application](#step-5-assign-microsoft-entra-roles-to-the-application)
155156
156157
The application needs to have the appropriate RBAC roles assigned. Because the apps are provisioned in Microsoft Entra ID, you can use any of the supported built-in roles.
157158
158-
<a name='step-1-register-the-application-in-azure-ad'></a>
159-
160159
### Step 1: Register the application in Microsoft Entra ID
161160
162161
> [!NOTE]
163-
> If you encounter problems, check the [required permissions](/azure/active-directory/develop/howto-create-service-principal-portal#required-permissions) to verify that your account can create the identity.
162+
> If you encounter problems, check the [required permissions](/entra/identity-platform/howto-create-service-principal-portal#permissions-required-for-registering-an-app) to verify that your account can create the identity.
164163
165164
1. Open the Microsoft Entra admin center at <https://portal.azure.com/>.
166165
@@ -188,7 +187,7 @@ For a detailed visual flow about creating applications in Microsoft Entra ID, se
188187
- **URI**: Enter the URI where the access token is sent.
189188
190189
> [!NOTE]
191-
> You can't create credentials for [native applications](/azure/active-directory/manage-apps/application-proxy-configure-native-client-application), because you can't use native applications for automated applications.
190+
> You can't create credentials for [native applications](/entra/identity/app-proxy/application-proxy-configure-native-client-application), because you can't use native applications for automated applications.
192191
193192
![Register an application.](media/exo-app-only-auth-register-app.png)
194193
@@ -246,7 +245,7 @@ Choose **one** of the following methods in this section to assign API permission
246245
#### Modify the app manifest to assign API permissions
247246
248247
> [!NOTE]
249-
> The procedures in this section _append_ the existing default permissions on the app (delegated **User.Read** permissions in **Microsoft Graph**) with the required application **Exchange.Manage.AsApp** permissions in **Office 365 Exchange Online**.
248+
> The procedures in this section _append_ the existing default permissions on the app (delegated **User.Read** permissions in **Microsoft Graph**) with the required application **Exchange.ManageAsApp** permissions in **Office 365 Exchange Online**.
250249
251250
1. On the app **Overview** page, select **Manifest** from the **Manage** section.
252251
@@ -352,8 +351,6 @@ Create a self-signed x.509 certificate using one of the following methods:
352351
.\Create-SelfSignedCertificate.ps1 -CommonName "MyCompanyName" -StartDate 2021-01-06 -EndDate 2022-01-06
353352
```
354353

355-
<a name='step-4-attach-the-certificate-to-the-azure-ad-application'></a>
356-
357354
### Step 4: Attach the certificate to the Microsoft Entra application
358355

359356
After you register the certificate with your application, you can use the private key (`.pfx` file) or the thumbprint for authentication.
@@ -386,17 +383,15 @@ After you register the certificate with your application, you can use the privat
386383

387384
### Step 4b: Exchange Online delegated scenarios only: Grant admin consent for the multi-tenant app
388385

389-
If you made the application multi-tenant for **Exchange Online** delegated scenarios in [Step 1](#step-1-register-the-application-in-azure-ad), you need to grant admin consent to the Exchange.ManageAsApp permission so the application can run cmdlets in Exchange Online **in each tenant organization**. To do this, generate an admin consent URL for each customer tenant. Before anyone uses the multi-tenant application to connect to Exchange Online in the tenant organization, an admin in the customer tenant should open the following URL:
386+
If you made the application multi-tenant for **Exchange Online** delegated scenarios in [Step 1](#step-1-register-the-application-in-microsoft-entra-id), you need to grant admin consent to the Exchange.ManageAsApp permission so the application can run cmdlets in Exchange Online **in each tenant organization**. To do this, generate an admin consent URL for each customer tenant. Before anyone uses the multi-tenant application to connect to Exchange Online in the tenant organization, an admin in the customer tenant should open the following URL:
390387

391388
`https://login.microsoftonline.com/<tenant-id>/adminconsent?client_id=<client-id>&scope=https://outlook.office365.com/.default`
392389

393390
- `<tenant-id>` is the customer's tenant ID.
394391
- `<client-id>` is the ID of the multi-tenant application.
395392
- The default scope is used to grant application permissions.
396393

397-
For more information about the URL syntax, see [Request the permissions from a directory admin](/azure/active-directory/develop/v2-admin-consent#request-the-permissions-from-a-directory-admin).
398-
399-
<a name='step-5-assign-azure-ad-roles-to-the-application'></a>
394+
For more information about the URL syntax, see [Request the permissions from a directory admin](/entra/identity-platform/v2-admin-consent#request-the-permissions-from-a-directory-admin).
400395

401396
### Step 5: Assign Microsoft Entra roles to the application
402397

@@ -410,22 +405,20 @@ You have two options:
410405
>
411406
> For multi-tenant applications in **Exchange Online** delegated scenarios, you need to assign permissions in each customer tenant.
412407
413-
<a name='assign-azure-ad-roles-to-the-application'></a>
414-
415408
#### Assign Microsoft Entra roles to the application
416409

417410
The supported Microsoft Entra roles are described in the following table:
418411

419412
|Role|Exchange Online<br>PowerShell|Security & Compliance<br>PowerShell|
420413
|---|:---:|:---:|
421-
|[Compliance Administrator](/azure/active-directory/roles/permissions-reference#compliance-administrator)|||
422-
|[Exchange Administrator](/azure/active-directory/roles/permissions-reference#exchange-administrator)<sup>\*</sup>|||
423-
|[Exchange Recipient Administrator](/azure/active-directory/roles/permissions-reference#exchange-recipient-administrator)|||
424-
|[Global Administrator](/azure/active-directory/roles/permissions-reference#global-administrator)<sup>\*</sup>|||
425-
|[Global Reader](/azure/active-directory/roles/permissions-reference#global-reader)|||
426-
|[Helpdesk Administrator](/azure/active-directory/roles/permissions-reference#helpdesk-administrator)|||
427-
|[Security Administrator](/azure/active-directory/roles/permissions-reference#security-administrator)<sup>\*</sup>|||
428-
|[Security Reader](/azure/active-directory/roles/permissions-reference#security-reader)|||
414+
|[Compliance Administrator](/entra/identity/role-based-access-control/permissions-reference#compliance-administrator)|||
415+
|[Exchange Administrator](/entra/identity/role-based-access-control/permissions-reference#exchange-administrator)<sup>\*</sup>|||
416+
|[Exchange Recipient Administrator](/entra/identity/role-based-access-control/permissions-reference#exchange-recipient-administrator)|||
417+
|[Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator)<sup>\*</sup>|||
418+
|[Global Reader](/entra/identity/role-based-access-control/permissions-reference#global-reader)|||
419+
|[Helpdesk Administrator](/entra/identity/role-based-access-control/permissions-reference#helpdesk-administrator)|||
420+
|[Security Administrator](/entra/identity/role-based-access-control/permissions-reference#security-administrator)<sup>\*</sup>|||
421+
|[Security Reader](/entra/identity/role-based-access-control/permissions-reference#security-reader)|||
429422

430423
> <sup>\*</sup> The Global Administrator and Exchange Administrator roles provide the required permissions for any task in Exchange Online PowerShell. For example:
431424
>
@@ -434,7 +427,7 @@ The supported Microsoft Entra roles are described in the following table:
434427
>
435428
> The Security Administrator role does not have the necessary permissions for those same tasks.
436429
437-
For general instructions about assigning roles in Microsoft Entra ID, see [View and assign administrator roles in Microsoft Entra ID](/azure/active-directory/roles/manage-roles-portal).
430+
For general instructions about assigning roles in Microsoft Entra ID, see [Assign Microsoft Entra roles to users](/entra/identity/role-based-access-control/manage-roles-portal).
438431

439432
> [!NOTE]
440433
> The following steps are slightly different for Exchange Online PowerShell vs. Security & Compliance PowerShell. The steps for both environments are shown. To configure roles for both environments, repeat the steps in this section.
@@ -465,7 +458,7 @@ For general instructions about assigning roles in Microsoft Entra ID, see [View
465458

466459
![Select Add assignments on the role assignments page for Security & Compliance PowerShell.](media/exo-app-only-auth-role-assignments-click-add-assignments-scc.png)
467460

468-
4. In the **Add assignments** flyout that opens, find and select the app that you created in [Step 1](#step-1-register-the-application-in-azure-ad).
461+
4. In the **Add assignments** flyout that opens, find and select the app that you created in [Step 1](#step-1-register-the-application-in-microsoft-entra-id).
469462

470463
![Find and select your app on the Add assignments flyout.](media/exo-app-only-auth-find-add-select-app-for-assignment.png)
471464

@@ -488,11 +481,11 @@ For general instructions about assigning roles in Microsoft Entra ID, see [View
488481
>
489482
> This method is supported only when you connect to Exchange Online PowerShell or Security & Compliance PowerShell in [REST API mode](exchange-online-powershell-v2.md#rest-api-connections-in-the-exo-v3-module). Security & Compliance PowerShell supports REST API mode in v3.2.0 or later.
490483
491-
For information about creating custom role groups, see [Create role groups in Exchange Online](/exchange/permissions-exo/role-groups#create-role-groups) and [Create Email & collaboration role groups in the Microsoft Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-365-defender-portal). The custom role group that you assign to the application can contain any combination of built-in and custom roles.
484+
For information about creating custom role groups, see [Create role groups in Exchange Online](/exchange/permissions-exo/role-groups#create-role-groups) and [Create Email & collaboration role groups in the Microsoft Defender portal](/microsoft-365/security/office-365-security/mdo-portal-permissions#create-email--collaboration-role-groups-in-the-microsoft-defender-portal). The custom role group that you assign to the application can contain any combination of built-in and custom roles.
492485

493486
To assign custom role groups to the application using service principals, do the following steps:
494487

495-
1. In [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation), run the following commands to store the details of the Microsoft Entra application that you registered in [Step 1](#step-1-register-the-application-in-azure-ad) in a variable:
488+
1. In [Microsoft Graph PowerShell](/powershell/microsoftgraph/installation), run the following commands to store the details of the Microsoft Entra application that you registered in [Step 1](#step-1-register-the-application-in-microsoft-entra-id) in a variable:
496489

497490
```powershell
498491
Connect-MgGraph -Scopes AppRoleAssignment.ReadWrite.All,Application.Read.All

0 commit comments

Comments
 (0)