You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
558
+
559
+
The MailboxIntelligenceQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by mailbox intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
560
+
561
+
- Name
562
+
- Distinguished name (DN)
563
+
- GUID
564
+
565
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
566
+
567
+
```yaml
568
+
Type: String
569
+
Parameter Sets: (All)
570
+
Aliases:
571
+
Applicable: Exchange Online
572
+
573
+
Required: False
574
+
Position: Named
575
+
Default value: None
576
+
Accept pipeline input: False
577
+
Accept wildcard characters: False
578
+
```
579
+
580
+
### -MakeDefault
581
+
The MakeDefault switch makes this antiphish policy the default antiphish policy. You don't have to specify a value with this switch.
582
+
583
+
The default antiphish policy is applied to everyone (no corresponding antiphish rule), can't be renamed, and has the unmodifiable priority value Lowest (the default policy is always applied last).
This setting is part of advanced settings and is only available in Microsoft Defender for Office 365.
553
600
@@ -620,6 +667,28 @@ Accept pipeline input: False
620
667
Accept wildcard characters: False
621
668
```
622
669
670
+
### -SpoofQuarantineTag
671
+
The SpoofQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by spoof intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
672
+
673
+
- Name
674
+
- Distinguished name (DN)
675
+
- GUID
676
+
677
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
625
694
@@ -665,6 +734,30 @@ Accept pipeline input: False
665
734
Accept wildcard characters: False
666
735
```
667
736
737
+
### -TargetedDomainQuarantineTag
738
+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
739
+
740
+
The TargetedDomainQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by domain impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
741
+
742
+
- Name
743
+
- Distinguished name (DN)
744
+
- GUID
745
+
746
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
747
+
748
+
```yaml
749
+
Type: String
750
+
Parameter Sets: (All)
751
+
Aliases:
752
+
Applicable: Exchange Online
753
+
754
+
Required: False
755
+
Position: Named
756
+
Default value: None
757
+
Accept pipeline input: False
758
+
Accept wildcard characters: False
759
+
```
760
+
668
761
### -TargetedDomainsToProtect
669
762
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
670
763
@@ -730,6 +823,30 @@ Accept pipeline input: False
730
823
Accept wildcard characters: False
731
824
```
732
825
826
+
### -TargetedUserQuarantineTag
827
+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
828
+
829
+
The TargetedUserQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by user impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
830
+
831
+
- Name
832
+
- Distinguished name (DN)
833
+
- GUID
834
+
835
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
836
+
837
+
```yaml
838
+
Type: String
839
+
Parameter Sets: (All)
840
+
Aliases:
841
+
Applicable: Exchange Online
842
+
843
+
Required: False
844
+
Position: Named
845
+
Default value: None
846
+
Accept pipeline input: False
847
+
Accept wildcard characters: False
848
+
```
849
+
733
850
### -TargetedUsersToProtect
734
851
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
The QuarantineTag specifies the quarantine policy that's used on messages that are quarantined as malware by Safe Attachments. You can use any value that uniquely identifies the quarantine policy. For example:
185
+
186
+
- Name
187
+
- Distinguished name (DN)
188
+
- GUID
189
+
190
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
The RecommendedPolicyType parameter is used for Standard and Strict policy creation as part of [Preset security policies](https://docs.microsoft.com/microsoft-365/security/office-365-security/preset-security-policies). Don't use this parameter yourself.
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
561
+
562
+
The MailboxIntelligenceQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by mailbox intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
563
+
564
+
- Name
565
+
- Distinguished name (DN)
566
+
- GUID
567
+
568
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
569
+
570
+
```yaml
571
+
Type: String
572
+
Parameter Sets: (All)
573
+
Aliases:
574
+
Applicable: Exchange Online
575
+
576
+
Required: False
577
+
Position: Named
578
+
Default value: None
579
+
Accept pipeline input: False
580
+
Accept wildcard characters: False
581
+
```
582
+
555
583
### -MakeDefault
556
-
The MakeDefault switch makes the specified antiphish policy the default antiphish policy. You don't have to specify a value with this switch.
584
+
The MakeDefault switch makes this antiphish policy the default antiphish policy. You don't have to specify a value with this switch.
557
585
558
586
The default antiphish policy is applied to everyone (no corresponding antiphish rule), can't be renamed, and has the unmodifiable priority value Lowest (the default policy is always applied last).
559
587
@@ -609,6 +637,28 @@ Accept pipeline input: False
609
637
Accept wildcard characters: False
610
638
```
611
639
640
+
### -SpoofQuarantineTag
641
+
The SpoofQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by spoof intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
642
+
643
+
- Name
644
+
- Distinguished name (DN)
645
+
- GUID
646
+
647
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
614
664
@@ -654,6 +704,30 @@ Accept pipeline input: False
654
704
Accept wildcard characters: False
655
705
```
656
706
707
+
### -TargetedDomainQuarantineTag
708
+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
709
+
710
+
The TargetedDomainQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by domain impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
711
+
712
+
- Name
713
+
- Distinguished name (DN)
714
+
- GUID
715
+
716
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
717
+
718
+
```yaml
719
+
Type: String
720
+
Parameter Sets: (All)
721
+
Aliases:
722
+
Applicable: Exchange Online
723
+
724
+
Required: False
725
+
Position: Named
726
+
Default value: None
727
+
Accept pipeline input: False
728
+
Accept wildcard characters: False
729
+
```
730
+
657
731
### -TargetedDomainsToProtect
658
732
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
659
733
@@ -719,6 +793,30 @@ Accept pipeline input: False
719
793
Accept wildcard characters: False
720
794
```
721
795
796
+
### -TargetedUserQuarantineTag
797
+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
798
+
799
+
The TargetedUserQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by user impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
800
+
801
+
- Name
802
+
- Distinguished name (DN)
803
+
- GUID
804
+
805
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
806
+
807
+
```yaml
808
+
Type: String
809
+
Parameter Sets: (All)
810
+
Aliases:
811
+
Applicable: Exchange Online
812
+
813
+
Required: False
814
+
Position: Named
815
+
Default value: None
816
+
Accept pipeline input: False
817
+
Accept wildcard characters: False
818
+
```
819
+
722
820
### -TargetedUsersToProtect
723
821
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
This parameter is available only in the cloud-based service.
588
+
589
+
The QuarantineTag specifies the quarantine policy that's used on messages that are quarantined as malware. You can use any value that uniquely identifies the quarantine policy. For example:
590
+
591
+
- Name
592
+
- Distinguished name (DN)
593
+
- GUID
594
+
595
+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
0 commit comments