Skip to content

Commit 750ed09

Browse files
committed
Copied param descriptions
1 parent 39ecba0 commit 750ed09

File tree

6 files changed

+179
-56
lines changed

6 files changed

+179
-56
lines changed

exchange/exchange-ps/exchange/Get-SensitiveInformationScan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
1616

17-
Use the Get-SensitiveInformationScan cmdlet to view sensitive information scans.
17+
Use the Get-SensitiveInformationScan cmdlet to view the properties of sensitive information scans.
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

exchange/exchange-ps/exchange/Get-SensitiveInformationScanRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
1616

17-
Use the Get-SensitiveInformationScanRule cmdlet to
17+
Use the Get-SensitiveInformationScanRule cmdlet to view sensitive information scan rules.
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

exchange/exchange-ps/exchange/New-SensitiveInformationScan.md

Lines changed: 23 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
1616

17-
Use the New-SensitiveInformationScan cmdlet to
17+
Use the New-SensitiveInformationScan cmdlet to create sensitive information scans.
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

@@ -61,7 +61,7 @@ To use this cmdlet in Security & Compliance PowerShell, you need to be assigned
6161
## PARAMETERS
6262

6363
### -Name
64-
{{ Fill Name Description }}
64+
The Name parameter specifies the unique name of the scan. If the value contains spaces, enclose the value in quotation marks.
6565

6666
```yaml
6767
Type: String
@@ -156,7 +156,7 @@ Accept wildcard characters: False
156156
```
157157

158158
### -ExceptIfOneDriveSharedBy
159-
The ExceptIfOneDriveSharedBy parameter specifies the users to exclude from the scan (the sites of the OneDrive user accounts are included in the scan). You identify the users by UPN ([email protected]).
159+
The ExceptIfOneDriveSharedBy parameter specifies the users to exclude from the scan (the sites of the OneDrive user accounts are included in the scan). You identify the users by UPN (`[email protected]`).
160160

161161
To use this parameter, OneDrive sites need to be included in the scan (the OneDriveLocation parameter value is All, which is the default value).
162162

@@ -355,7 +355,7 @@ Accept wildcard characters: False
355355
```
356356

357357
### -OneDriveSharedBy
358-
The OneDriveSharedBy parameter specifies the users to include in the scan (the sites of the OneDrive user accounts are included in the scan). You identify the users by UPN ([email protected]).
358+
The OneDriveSharedBy parameter specifies the users to include in the scan (the sites of the OneDrive user accounts are included in the scan). You identify the users by UPN (`[email protected]`).
359359

360360
To use this parameter, OneDrive sites need to be included in the scan (the OneDriveLocation parameter value is All, which is the default value).
361361

@@ -401,7 +401,9 @@ Accept wildcard characters: False
401401
```
402402

403403
### -PolicyRBACScopes
404-
{{ Fill PolicyRBACScopes Description }}
404+
The PolicyRBACScopes parameter specifies the administrative units to assign to the scan. A valid value is the Microsoft Entra ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
405+
406+
Administrative units are available only in Microsoft Entra ID P1 or P2. You create and manage administrative units in Microsoft Graph PowerShell.
405407

406408
```yaml
407409
Type: MultiValuedProperty
@@ -417,7 +419,11 @@ Accept wildcard characters: False
417419
```
418420

419421
### -SharePointLocation
420-
{{ Fill SharePointLocation Description }}
422+
The SharePointLocation parameter specifies the SharePoint sites to include in the scan. You identify the site by its URL value, or you can use the value All to include all sites.
423+
424+
You can't add SharePoint sites to the policy until they have been indexed.
425+
426+
To enter multiple values, use the following syntax: `<value1>,<value2>,...<valueX>`. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"<value1>","<value2>",..."<valueX>"`.
421427

422428
```yaml
423429
Type: MultiValuedProperty
@@ -433,7 +439,11 @@ Accept wildcard characters: False
433439
```
434440

435441
### -SharePointLocationException
436-
{{ Fill SharePointLocationException Description }}
442+
The SharePointLocationException parameter specifies the SharePoint sites to exclude when you use the value All for the SharePointLocation parameter. You identify the site by its URL value.
443+
444+
You can't add SharePoint sites to the scan until they have been indexed.
445+
446+
To enter multiple values, use the following syntax: `<value1>,<value2>,...<valueX>`. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"<value1>","<value2>",..."<valueX>"`.
437447

438448
```yaml
439449
Type: MultiValuedProperty
@@ -449,7 +459,9 @@ Accept wildcard characters: False
449459
```
450460

451461
### -TeamsLocation
452-
{{ Fill TeamsLocation Description }}
462+
The TeamsLocation parameter specifies the Teams chat and channel messages to include in the scan. You identify the entries by the email address or name of the account, distribution group, or mail-enabled security group. You can use the value All to include all accounts, distribution groups, and mail-enabled security groups.
463+
464+
To enter multiple values, use the following syntax: `<value1>,<value2>,...<valueX>`. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"<value1>","<value2>",..."<valueX>"`.
453465

454466
```yaml
455467
Type: MultiValuedProperty
@@ -465,7 +477,9 @@ Accept wildcard characters: False
465477
```
466478

467479
### -TeamsLocationException
468-
{{ Fill TeamsLocationException Description }}
480+
The TeamsLocation parameter specifies the Teams chat and channel messages to exclude from the DLP policy when you use the value All for the TeamsLocation parameter. You identify the entries by the email address or name of the account, distribution group, or mail-enabled security group.
481+
482+
To enter multiple values, use the following syntax: `<value1>,<value2>,...<valueX>`. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"<value1>","<value2>",..."<valueX>"`.
469483

470484
```yaml
471485
Type: MultiValuedProperty

exchange/exchange-ps/exchange/New-SensitiveInformationScanRule.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
1616

17-
Use the New-SensitiveInformationScan cmdlet to
17+
Use the New-SensitiveInformationScan cmdlet to create sensitive information scan rules.
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

@@ -191,7 +191,7 @@ Accept wildcard characters: False
191191
```
192192

193193
### -ContentExtensionMatchesWords
194-
{{ Fill ContentExtensionMatchesWords Description }}
194+
The ContentExtensionMatchesWords parameter specifies a condition for the rule that looks for words in file extensions. You can specify multiple words separated by commas. Irrespective of the original file type, this predicate matches based on the extension that is present in the name of the file.
195195

196196
```yaml
197197
Type: MultiValuedProperty
@@ -207,7 +207,9 @@ Accept wildcard characters: False
207207
```
208208

209209
### -ContentPropertyContainsWords
210-
{{ Fill ContentPropertyContainsWords Description }}
210+
The ContentPropertyContainsWords parameter specifies a condition for the rule that's based on a property match in content. The rule is applied to content that contains the specified property.
211+
212+
This parameter accepts values in the format: `"Property1:Value1,Value2","Property2:Value3,Value4",..."PropertyN:ValueN,ValueN"`.
211213

212214
```yaml
213215
Type: MultiValuedProperty
@@ -223,7 +225,7 @@ Accept wildcard characters: False
223225
```
224226

225227
### -ExceptIfContentExtensionMatchesWords
226-
{{ Fill ExceptIfContentExtensionMatchesWords Description }}
228+
The ExceptIfContentExtensionMatchesWords parameter specifies an exception for the rule that looks for words in file extensions. You can specify multiple words separated by commas. Irrespective of what the original file type is, this predicate matches based on the extension that is present in the name of the file.
227229

228230
```yaml
229231
Type: MultiValuedProperty
@@ -239,7 +241,9 @@ Accept wildcard characters: False
239241
```
240242

241243
### -ExceptIfContentPropertyContainsWords
242-
{{ Fill ExceptIfContentPropertyContainsWords Description }}
244+
The ExceptIfContentPropertyContainsWords parameter specifies an exception for the rule that's based on a property match in content. The rule is not applied to content that contains the specified property.
245+
246+
This parameter accepts values in the format: `"Property1:Value1,Value2","Property2:Value3,Value4",..."PropertyN:ValueN,ValueN"`.
243247

244248
```yaml
245249
Type: MultiValuedProperty

0 commit comments

Comments
 (0)