Skip to content

Commit 84671dd

Browse files
committed
Merge branch 'main' into EWSCortana-chrisda
2 parents fea4b5e + 4855358 commit 84671dd

File tree

135 files changed

+5372
-1957
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

135 files changed

+5372
-1957
lines changed

.openpublishing.redirection.json

Lines changed: 43 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -312,7 +312,7 @@
312312
},
313313
{
314314
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Get-PhishFilterPolicy.md",
315-
"redirect_url": "/powershell/module/exchange/get-phishfilterpolicy",
315+
"redirect_url": "/powershell/module/exchange/get-tenantallowblocklistppoofitems",
316316
"redirect_document_id": false
317317
},
318318
{
@@ -422,7 +422,7 @@
422422
},
423423
{
424424
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Set-PhishFilterPolicy.md",
425-
"redirect_url": "/powershell/module/exchange/set-phishfilterpolicy",
425+
"redirect_url": "/powershell/module/exchange/set-tenantallowblocklistppoofitems",
426426
"redirect_document_id": false
427427
},
428428
{
@@ -1977,7 +1977,7 @@
19771977
},
19781978
{
19791979
"source_path": "exchange/virtual-folder/exchange/encryption-and-certificates/Get-RMSTrustedPublishingDomain.md",
1980-
"redirect_url": "/powershell/module/exchange/get-rmstrustedpublishingdomain",
1980+
"redirect_url": "/powershell/module/exchange/#encryption-and-certificates",
19811981
"redirect_document_id": false
19821982
},
19831983
{
@@ -1992,7 +1992,7 @@
19921992
},
19931993
{
19941994
"source_path": "exchange/virtual-folder/exchange/encryption-and-certificates/Import-RMSTrustedPublishingDomain.md",
1995-
"redirect_url": "/powershell/module/exchange/import-rmstrustedpublishingdomain",
1995+
"redirect_url": "/powershell/module/exchange/#encryption-and-certificates",
19961996
"redirect_document_id": false
19971997
},
19981998
{
@@ -2022,7 +2022,7 @@
20222022
},
20232023
{
20242024
"source_path": "exchange/virtual-folder/exchange/encryption-and-certificates/Remove-RMSTrustedPublishingDomain.md",
2025-
"redirect_url": "/powershell/module/exchange/remove-rmstrustedpublishingdomain",
2025+
"redirect_url": "/powershell/module/exchange/#encryption-and-certificates",
20262026
"redirect_document_id": false
20272027
},
20282028
{
@@ -2052,7 +2052,7 @@
20522052
},
20532053
{
20542054
"source_path": "exchange/virtual-folder/exchange/encryption-and-certificates/Set-RMSTrustedPublishingDomain.md",
2055-
"redirect_url": "/powershell/module/exchange/set-rmstrustedpublishingdomain",
2055+
"redirect_url": "/powershell/module/exchange/#encryption-and-certificates",
20562056
"redirect_document_id": false
20572057
},
20582058
{
@@ -3152,7 +3152,7 @@
31523152
},
31533153
{
31543154
"source_path": "exchange/virtual-folder/exchange/mailboxes/Import-ContactList.md",
3155-
"redirect_url": "/powershell/module/exchange/import-contactlist",
3155+
"redirect_url": "https://support.microsoft.com/office/import-contacts-to-outlook-bb796340-b58a-46c1-90c7-b549b8f3c5f8",
31563156
"redirect_document_id": false
31573157
},
31583158
{
@@ -5282,7 +5282,7 @@
52825282
},
52835283
{
52845284
"source_path": "exchange/virtual-folder/exchange/reporting/Get-MailTrafficTopReport.md",
5285-
"redirect_url": "/powershell/module/exchange/get-mailtraffictopreport",
5285+
"redirect_url": "/powershell/module/exchange/get-mailtrafficsummaryreport",
52865286
"redirect_document_id": false
52875287
},
52885288
{
@@ -6839,6 +6839,41 @@
68396839
"source_path": "exchange/virtual-folder/exchange/Set-CustomNudgeSettings.md",
68406840
"redirect_url": "/powershell/module/exchange/",
68416841
"redirect_document_id": false
6842+
},
6843+
{
6844+
"source_path": "exchange/virtual-folder/exchange/Get-MailTrafficTopReport.md",
6845+
"redirect_url": "/powershell/module/exchange/get-mailtrafficsummaryreport",
6846+
"redirect_document_id": false
6847+
},
6848+
{
6849+
"source_path": "exchange/virtual-folder/exchange/Get-PhishFilterPolicy.md",
6850+
"redirect_url": "/powershell/module/exchange/get-tenantallowblocklistppoofitems",
6851+
"redirect_document_id": false
6852+
},
6853+
{
6854+
"source_path": "exchange/virtual-folder/exchange/Set-PhishFilterPolicy.md",
6855+
"redirect_url": "/powershell/module/exchange/set-tenantallowblocklistppoofitems",
6856+
"redirect_document_id": false
6857+
},
6858+
{
6859+
"source_path": "exchange/docs-conceptual/basic-auth-connect-to-eop-powershell.md",
6860+
"redirect_url": "/powershell/exchange/connect-to-exchange-online-protection-powershell",
6861+
"redirect_document_id": false
6862+
},
6863+
{
6864+
"source_path": "exchange/docs-conceptual/basic-auth-connect-to-exo-powershell.md",
6865+
"redirect_url": "/powershell/exchange/connect-to-exchange-online-powershell",
6866+
"redirect_document_id": false
6867+
},
6868+
{
6869+
"source_path": "exchange/docs-conceptual/basic-auth-connect-to-scc-powershell.md",
6870+
"redirect_url": "/powershell/exchange/connect-to-scc-powershell",
6871+
"redirect_document_id": false
6872+
},
6873+
{
6874+
"source_path": "exchange/docs-conceptual/v1-module-mfa-connect-to-exo-powershell.md",
6875+
"redirect_url": "/powershell/exchange/connect-to-exchange-online-powershell",
6876+
"redirect_document_id": false
68426877
}
68436878
]
68446879
}

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: App-only authentication in Exchange Online PowerShell and Security & Comp
33
ms.author: chrisda
44
author: chrisda
55
manager: dansimp
6-
ms.date:
6+
ms.date: 01/31/2023
77
ms.audience: Admin
88
audience: Admin
99
ms.topic: article
@@ -29,7 +29,7 @@ Certificate based authentication (CBA) or app-only authentication as described i
2929
>
3030
> - The features and procedures described in this article require the following versions of the Exchange Online PowerShell module:
3131
> - **Exchange Online PowerShell (Connect-ExchangeOnline)**: Version 2.0.3 or later.
32-
> - **Security & Compliance PowerShell (Connect-IPPSSession)**: Version 2.0.6-Preview5 or later.
32+
> - **Security & Compliance PowerShell (Connect-IPPSSession)**: Version 3.0.0 or later.
3333
>
3434
> For instructions on how to install or update the module, see [Install and maintain the Exchange Online PowerShell module](exchange-online-powershell-v2.md#install-and-maintain-the-exchange-online-powershell-module). For instructions on how to use the module in Azure automation, see [Manage modules in Azure Automation](/azure/automation/shared-resources/modules).
3535
>
@@ -48,7 +48,7 @@ Certificate based authentication (CBA) or app-only authentication as described i
4848
> - [Get-ComplianceCase](/powershell/module/exchange/get-compliancecase)
4949
> - [Get-CaseHoldPolicy](/powershell/module/exchange/get-caseholdpolicy)
5050
>
51-
> - Delegated scenarios are supported in **Exchange Online** using multi-tenant applications. The required steps are called out within the regular instructions in this article.
51+
> - Delegated scenarios are supported in Exchange Online. The recommended method for connecting with delegation is using GDAP and App Consent. For more information, see [Use the Exchange Online PowerShell v3 Module with GDAP and App Consent](/powershell/partnercenter/exchange-online-gdap-app). You can also use multi-tenant applications when CSP relationships are not created with the customer. The required steps for using multi-tenant applications are called out within the regular instructions in this article.
5252
5353
## How does it work?
5454

@@ -63,7 +63,9 @@ The following examples show how to use the Exchange Online PowerShell module wit
6363
>
6464
> The following connection commands have many of the same options available as described in [Connect to Exchange Online PowerShell](connect-to-exchange-online-powershell.md) and [Connect to Security & Compliance PowerShell](connect-to-scc-powershell.md). For example:
6565
>
66-
> - In Exchange Online PowerShell using the EXO V3 module, you can omit or include the _UseRPSSession_ switch to use REST API cmdlets or original remote PowerShell cmdlets. For more information, see [Updates for version 3.0.0 (the EXO V3 module)](exchange-online-powershell-v2.md#updates-for-version-300-the-exo-v3-module).
66+
> - In Exchange Online PowerShell using the EXO V3 module, you can omit or include the _UseRPSSession_ switch to use REST API cmdlets or original remote PowerShell cmdlets. For more information, see [Updates for the EXO V3 module)](exchange-online-powershell-v2.md#updates-for-the-exo-v3-module).
67+
>
68+
> Remote PowerShell support in Exchange Online PowerShell will be deprecated. For more information, see [Announcing Deprecation of Remote PowerShell (RPS) Protocol in Exchange Online PowerShell](https://aka.ms/RPSDeprecation).
6769
>
6870
> - Microsoft 365 GCC High or Microsoft 365 DoD environments require the following additional parameters and values:
6971
> - **Connect-ExchangeOnline in GCC High**: `-ExchangeEnvironmentName O365USGovGCCHigh`.
@@ -297,20 +299,20 @@ After you register the certificate with your application, you can use the privat
297299

298300
If you made the application multi-tenant for **Exchange Online** delegated scenarios in [Step 1](#step-1-register-the-application-in-azure-ad), you need to grant admin consent to the Exchange.ManageAsApp permission so the application can run cmdlets in Exchange Online **in each tenant organization**. To do this, generate an admin consent URL for each customer tenant. Before anyone uses the multi-tenant application to connect to Exchange Online in the tenant organization, an admin in the customer tenant should open the following URL:
299301

300-
`https://login.microsoftonline.com/<tenant-id>/adminconsent?client_id=<client-id>&scope=https://outlook.office365.com/.default`
302+
`https://login.microsoftonline.com/<tenant-id>/adminconsent?client_id=<client-id>&scope=https://outlook.office365.com/.default`
301303

302-
- `<tenant-id>` is the customer's tenant ID.
303-
- `<client-id>` is the ID of the multi-tenant application.
304-
- The default scope is used to grant application permissions.
304+
- `<tenant-id>` is the customer's tenant ID.
305+
- `<client-id>` is the ID of the multi-tenant application.
306+
- The default scope is used to grant application permissions.
305307

306-
For more information about the URL syntax, see [Request the permissions from a directory admin](/azure/active-directory/develop/v2-admin-consent#request-the-permissions-from-a-directory-admin).
308+
For more information about the URL syntax, see [Request the permissions from a directory admin](/azure/active-directory/develop/v2-admin-consent#request-the-permissions-from-a-directory-admin).
307309

308310
### Step 5: Assign Azure AD roles to the application
309311

310312
You have two options:
311313

312314
- **Assign Azure AD roles to the application**: This method is supported in Exchange Online PowerShell and Security & Compliance PowerShell.
313-
- **Assign custom Exchange Online role groups to the application**: Currently, this method is supported only in Exchange Online PowerShell, and only when you connect in [REST API mode](exchange-online-powershell-v2.md#updates-for-version-300-the-exo-v3-module) (don't use the _UseRPSSession_ switch in the **Connect-ExchangeOnline** command).
315+
- **Assign custom Exchange Online role groups to the application**: Currently, this method is supported only in Exchange Online PowerShell, and only when you connect in [REST API mode](exchange-online-powershell-v2.md#updates-for-the-exo-v3-module) (don't use the _UseRPSSession_ switch in the **Connect-ExchangeOnline** command).
314316

315317
> [!NOTE]
316318
> You can also combine both methods to assign permissions. For example, you can use Azure AD roles for the "Exchange Recipient Administrator" role and also assign your custom RBAC role to extend the permissions.
@@ -389,7 +391,7 @@ For general instructions about assigning roles in Azure AD, see [View and assign
389391
#### Assign custom Exchange Online role groups to the application
390392

391393
> [!NOTE]
392-
> Remember, this method is supported only in Exchange Online PowerShell, and only when you connect in [REST API mode](exchange-online-powershell-v2.md#updates-for-version-300-the-exo-v3-module) (don't use the _UseRPSSession_ switch in the **Connect-ExchangeOnline** command).
394+
> Remember, this method is supported only in Exchange Online PowerShell, and only when you connect in [REST API mode](exchange-online-powershell-v2.md#updates-for-the-exo-v3-module) (don't use the _UseRPSSession_ switch in the **Connect-ExchangeOnline** command).
393395
394396
For information about creating custom role groups, see [Create role groups](/exchange/permissions-exo/role-groups#create-role-groups). The custom role group that you assign to the application can contain any combination of built-in and custom roles.
395397

0 commit comments

Comments
 (0)