You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This cmdlet is available only in the cloud-based service.
16
+
17
+
Use the Get-ExOSecOpsOverrideRule cmdlet to view SecOps mailbox override rules to bypass Exchange Online Protection filtering. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/microsoft-365/security/office-365-security/advanced-delivery-policy-configure).
18
+
19
+
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
34
+
35
+
## EXAMPLES
36
+
37
+
### Example 1
38
+
```powershell
39
+
Get-ExOSecOpsOverrideRule
40
+
```
41
+
42
+
This example returns detailed information about the one and only SecOps mailbox override rule.
43
+
44
+
## PARAMETERS
45
+
46
+
### -Identity
47
+
The Identity parameter specifies the SecOps override rule that you want to view. You can use any value that uniquely identifies the rule. For example:
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216).
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/Get-SecOpsOverrideRule.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,8 @@ ms.reviewer:
12
12
# Get-SecOpsOverrideRule
13
13
14
14
## SYNOPSIS
15
+
**Note**: The \*-SecOpsOverrideRule cmdlets in Security & Compliance PowerShell have been replaced by the \*-ExOSecOpsOverrideRule cmdlets in Exchange Online PowerShell.
16
+
15
17
This cmdlet is functional only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
16
18
17
19
Use the Get-SecOpsOverrideRule cmdlet to view SecOps mailbox override rules to bypass Exchange Online Protection filtering. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/microsoft-365/security/office-365-security/advanced-delivery-policy-configure).
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
15
+
This cmdlet is available only in the cloud-based service.
16
16
17
-
Use the New-SecOpsOverrideRule cmdlet to create SecOps mailbox override rules to bypass Exchange Online Protection filtering. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/microsoft-365/security/office-365-security/advanced-delivery-policy-configure).
17
+
Use the New-ExOSecOpsOverrideRule cmdlet to create SecOps mailbox override rules to bypass Exchange Online Protection filtering. For more information, see [Configure the advanced delivery policy for third-party phishing simulations and email delivery to SecOps mailboxes](https://learn.microsoft.com/microsoft-365/security/office-365-security/advanced-delivery-policy-configure).
18
18
19
19
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
You need to be assigned permissions in the Security & Compliance before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance](https://learn.microsoft.com/microsoft-365/security/office-365-security/scc-permissions).
35
+
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
This example creates the SecOps mailbox override rule with the specified settings.
43
45
44
46
## PARAMETERS
45
47
46
-
### -Name
47
-
The Name parameter specifies the name for the policy. Regardless of the value you specify, the name will be SecOpsOverrideRule\<GUID\> where \<GUID\> is a unique GUID value (for example, 6fed4b63-3563-495d-a481-b24a311f8329).
48
-
49
-
```yaml
50
-
Type: String
51
-
Parameter Sets: Default
52
-
Aliases:
53
-
Applicable: Security & Compliance
54
-
55
-
Required: True
56
-
Position: 0
57
-
Default value: None
58
-
Accept pipeline input: False
59
-
Accept wildcard characters: False
60
-
```
61
-
62
48
### -Policy
63
49
The Policy parameter specifies the phishing simulation override policy that's associated with the rule. You can use any value that uniquely identifies the policy. For example:
64
50
@@ -71,7 +57,6 @@ The Policy parameter specifies the phishing simulation override policy that's as
The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding.
101
-
102
-
- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: `-Confirm:$false`.
103
-
- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding.
84
+
This parameter is reserved for internal Microsoft use.
104
85
105
86
```yaml
106
87
Type: SwitchParameter
107
88
Parameter Sets: (All)
108
89
Aliases: cf
109
-
Applicable: Security & Compliance
110
90
111
91
Required: False
112
92
Position: Named
@@ -115,14 +95,28 @@ Accept pipeline input: False
115
95
Accept wildcard characters: False
116
96
```
117
97
118
-
### -SentTo
98
+
### -DomainController
119
99
This parameter is reserved for internal Microsoft use.
120
100
121
101
```yaml
122
-
Type: MultiValuedProperty
102
+
Type: Fqdn
103
+
Parameter Sets: (All)
104
+
Aliases:
105
+
106
+
Required: False
107
+
Position: Named
108
+
Default value: None
109
+
Accept pipeline input: False
110
+
Accept wildcard characters: False
111
+
```
112
+
113
+
### -Name
114
+
The Name parameter specifies the name for the policy. Regardless of the value you specify, the name will be `_Exe:SecOpsOverrid:<GUID\>` \[sic\] where \<GUID\> is a unique GUID value (for example, 6fed4b63-3563-495d-a481-b24a311f8329).
0 commit comments