Skip to content

Commit a49a24a

Browse files
authored
Merge branch 'master' into patch-1
2 parents 6a3853d + 669bdfa commit a49a24a

File tree

59 files changed

+3217
-228
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+3217
-228
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -186,14 +186,14 @@ For a detailed visual flow about creating applications in Azure AD, see <https:/
186186

187187
Create a self-signed x.509 certificate using one of the following methods:
188188

189-
- (Recommended) Use the [New-SelfSignedCertificate](https://docs.microsoft.com/powershell/module/pkiclient/new-selfsignedcertificate), [Export-Certificate](https://docs.microsoft.com/powershell/module/pkiclient/export-certificate) and [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) cmdlets in an elevated (run as administrator) Windows PowerShell session to request a self-signed certificate and export it to `.cer` and `.pfx` (SHA1 by default).
189+
- (Recommended) Use the [New-SelfSignedCertificate](https://docs.microsoft.com/powershell/module/pkiclient/new-selfsignedcertificate), [Export-Certificate](https://docs.microsoft.com/powershell/module/pkiclient/export-certificate) and [Export-PfxCertificate](https://docs.microsoft.com/powershell/module/pkiclient/export-pfxcertificate) cmdlets in an elevated (run as administrator) Windows PowerShell session to request a self-signed certificate and export it to `.cer` and `.pfx` (SHA1 by default). For example:
190190

191191
```powershell
192192
# Create certificate
193193
$mycert = New-SelfSignedCertificate -DnsName "contoso.org" -CertStoreLocation "cert:\LocalMachine\My" -NotAfter (Get-Date).AddYears(1) -KeySpec KeyExchange
194194
195195
# Export certificate to .pfx file
196-
$mycert | Export-PfxCertificate -FilePath mycert.pfx -Password $(ConvertTo-SecureString -String "P@s$w0rd1234" -AsPlainText -Force)
196+
$mycert | Export-PfxCertificate -FilePath mycert.pfx -Password $(ConvertTo-SecureString -String "P@ssw0Rd1234" -AsPlainText -Force)
197197
198198
# Export certificate to .cer file
199199
$mycert | Export-Certificate -FilePath mycert.cer

exchange/exchange-ps/exchange/Enable-App.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Accept wildcard characters: False
108108
```
109109

110110
### -Mailbox
111-
The Mailbox parameter specifies the the mailbox. You can use any value that uniquely identifies the mailbox. For example:
111+
The Mailbox parameter specifies the mailbox. You can use any value that uniquely identifies the mailbox. For example:
112112

113113
- Name
114114
- Alias

exchange/exchange-ps/exchange/Get-DlpCompliancePolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ This example displays detailed information for the DLP policy named "PII Limited
4848

4949
### Example 3
5050
```powershell
51-
Get-DlpCompliancePolicy -Identity "PII Limited" DistributionDetail | Format-List DistributionStatus
51+
Get-DlpCompliancePolicy -Identity "PII Limited" -DistributionDetail | Format-List DistributionStatus
5252
```
5353

5454
This example displays distribution details for a DLP policy.

exchange/exchange-ps/exchange/Get-ExternalInOutlook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17-
Use the Get-ExternalInOutlook cmdlet to view the configuration of external sender identification that's available in supported versions of Outlook.
17+
Use the Get-ExternalInOutlook cmdlet to view the configuration of external sender identification that's available in supported versions of Outlook. Currently, this feature is supported in Outlook on the web and Outlook for iOS and Android.
1818

1919
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2020

exchange/exchange-ps/exchange/Get-WebServicesVirtualDirectory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
4949

5050
### Example 1
5151
```powershell
52-
Get-WebServicesVirtualDirectory -ServerMBX01
52+
Get-WebServicesVirtualDirectory -Server MBX01
5353
```
5454

5555
This example returns a summary list of all EWS virtual directories on the server named MBX01.

exchange/exchange-ps/exchange/New-AutoSensitivityLabelRule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -406,7 +406,7 @@ Accept wildcard characters: False
406406
```
407407

408408
### -ExceptIfProcessingLimitExceeded
409-
The ExceptIfProcessingLimitExceeded parameter specifies an exception for the auto-labeling policy rule rule that looks for files where scanning couldn't complete. Valid values are:
409+
The ExceptIfProcessingLimitExceeded parameter specifies an exception for the auto-labeling policy rule that looks for files where scanning couldn't complete. Valid values are:
410410

411411
- $true: Look for files where scanning couldn't complete.
412412
- $false: Don't look for files where scanning couldn't complete.
@@ -441,7 +441,7 @@ Accept wildcard characters: False
441441
```
442442

443443
### -ExceptIfSenderIPRanges
444-
The ExceptIfSenderIpRanges parameter specifies an exception for the auto-labeling policy rule rule that looks for senders whose IP addresses matches the specified value, or fall within the specified ranges. Valid values are:
444+
The ExceptIfSenderIpRanges parameter specifies an exception for the auto-labeling policy rule that looks for senders whose IP addresses matches the specified value, or fall within the specified ranges. Valid values are:
445445

446446
- Single IP address: For example, 192.168.1.1.
447447
- IP address range: For example, 192.168.0.1-192.168.0.254.

exchange/exchange-ps/exchange/New-LabelPolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ New-LabelPolicy -Name <String> -Labels <MultiValuedProperty>
2525
[-AdvancedSettings <PswsHashtable>]
2626
[-Comment <String>]
2727
[-Confirm]
28-
[-ExchangeLocationLocation <MultiValuedProperty>]
28+
[-ExchangeLocation <MultiValuedProperty>]
2929
[-ExchangeLocationException <MultiValuedProperty>]
3030
[-Force]
3131
[-MigrationId <String>]
@@ -311,7 +311,7 @@ Accept wildcard characters: False
311311
```
312312

313313
### -Setting
314-
{{ Fill Setting Description }}
314+
PARAMVALUE: PswsHashtable
315315

316316
```yaml
317317
Type: PswsHashtable

exchange/exchange-ps/exchange/Set-ExternalInOutlook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in the cloud-based service.
1616

17-
Use the Set-ExternalInOutlook cmdlet to modify the configuration of external sender identification that's available in supported versions of Outlook.
17+
Use the Set-ExternalInOutlook cmdlet to modify the configuration of external sender identification that's available in supported versions of Outlook. Currently, this feature is supported in Outlook on the web and Outlook for iOS and Android.
1818

1919
**Note**: We recommend that you use the Exchange Online PowerShell V2 module to connect to Exchange Online PowerShell. For instructions, see [Connect to Exchange Online PowerShell](https://docs.microsoft.com/powershell/exchange/connect-to-exchange-online-powershell).
2020

0 commit comments

Comments
 (0)