Skip to content

Commit c80bcfa

Browse files
committed
Added quarantine policy params
1 parent eae523f commit c80bcfa

File tree

5 files changed

+287
-1
lines changed

5 files changed

+287
-1
lines changed

exchange/exchange-ps/exchange/New-AntiPhishPolicy.md

Lines changed: 117 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,15 +45,20 @@ New-AntiPhishPolicy [-Name] <String>
4545
[-ImpersonationProtectionState <ImpersonationProtectionState>]
4646
[-MailboxIntelligenceProtectionAction <ImpersonationAction>]
4747
[-MailboxIntelligenceProtectionActionRecipients <MultiValuedProperty>]
48+
[-MailboxIntelligenceQuarantineTag <String>]
49+
[-MakeDefault]
4850
[-PhishThresholdLevel <Int32>]
4951
[-PolicyTag <String>]
5052
[-RecommendedPolicyType <RecommendedPolicyType>]
5153
[-SimilarUsersSafetyTipsCustomText <String>]
54+
[-SpoofQuarantineTag <String>]
5255
[-TargetedDomainActionRecipients <MultiValuedProperty>]
5356
[-TargetedDomainProtectionAction <ImpersonationAction>]
57+
[-TargetedDomainQuarantineTag <String>]
5458
[-TargetedDomainsToProtect <MultiValuedProperty>]
5559
[-TargetedUserActionRecipients <MultiValuedProperty>]
5660
[-TargetedUserProtectionAction <ImpersonationAction>]
61+
[-TargetedUserQuarantineTag <String>]
5762
[-TargetedUsersToProtect <MultiValuedProperty>]
5863
[-UnusualCharactersSafetyTipsCustomText <String>]
5964
[-WhatIf]
@@ -548,6 +553,48 @@ Accept pipeline input: False
548553
Accept wildcard characters: False
549554
```
550555

556+
### -MailboxIntelligenceQuarantineTag
557+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
558+
559+
The MailboxIntelligenceQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by mailbox intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
560+
561+
- Name
562+
- Distinguished name (DN)
563+
- GUID
564+
565+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
566+
567+
```yaml
568+
Type: String
569+
Parameter Sets: (All)
570+
Aliases:
571+
Applicable: Exchange Online
572+
573+
Required: False
574+
Position: Named
575+
Default value: None
576+
Accept pipeline input: False
577+
Accept wildcard characters: False
578+
```
579+
580+
### -MakeDefault
581+
The MakeDefault switch makes this antiphish policy the default antiphish policy. You don't have to specify a value with this switch.
582+
583+
The default antiphish policy is applied to everyone (no corresponding antiphish rule), can't be renamed, and has the unmodifiable priority value Lowest (the default policy is always applied last).
584+
585+
```yaml
586+
Type: SwitchParameter
587+
Parameter Sets: (All)
588+
Aliases:
589+
Applicable: Exchange Online, Exchange Online Protection
590+
591+
Required: False
592+
Position: Named
593+
Default value: None
594+
Accept pipeline input: False
595+
Accept wildcard characters: False
596+
```
597+
551598
### -PhishThresholdLevel
552599
This setting is part of advanced settings and is only available in Microsoft Defender for Office 365.
553600

@@ -620,6 +667,28 @@ Accept pipeline input: False
620667
Accept wildcard characters: False
621668
```
622669

670+
### -SpoofQuarantineTag
671+
The SpoofQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by spoof intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
672+
673+
- Name
674+
- Distinguished name (DN)
675+
- GUID
676+
677+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
678+
679+
```yaml
680+
Type: String
681+
Parameter Sets: (All)
682+
Aliases:
683+
Applicable: Exchange Online, Exchange Online Protection
684+
685+
Required: False
686+
Position: Named
687+
Default value: None
688+
Accept pipeline input: False
689+
Accept wildcard characters: False
690+
```
691+
623692
### -TargetedDomainActionRecipients
624693
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
625694

@@ -665,6 +734,30 @@ Accept pipeline input: False
665734
Accept wildcard characters: False
666735
```
667736

737+
### -TargetedDomainQuarantineTag
738+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
739+
740+
The TargetedDomainQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by domain impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
741+
742+
- Name
743+
- Distinguished name (DN)
744+
- GUID
745+
746+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
747+
748+
```yaml
749+
Type: String
750+
Parameter Sets: (All)
751+
Aliases:
752+
Applicable: Exchange Online
753+
754+
Required: False
755+
Position: Named
756+
Default value: None
757+
Accept pipeline input: False
758+
Accept wildcard characters: False
759+
```
760+
668761
### -TargetedDomainsToProtect
669762
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
670763

@@ -730,6 +823,30 @@ Accept pipeline input: False
730823
Accept wildcard characters: False
731824
```
732825

826+
### -TargetedUserQuarantineTag
827+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
828+
829+
The TargetedUserQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by user impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
830+
831+
- Name
832+
- Distinguished name (DN)
833+
- GUID
834+
835+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
836+
837+
```yaml
838+
Type: String
839+
Parameter Sets: (All)
840+
Aliases:
841+
Applicable: Exchange Online
842+
843+
Required: False
844+
Position: Named
845+
Default value: None
846+
Accept pipeline input: False
847+
Accept wildcard characters: False
848+
```
849+
733850
### -TargetedUsersToProtect
734851
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
735852

exchange/exchange-ps/exchange/New-SafeAttachmentPolicy.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ New-SafeAttachmentPolicy [-Name] <String>
2929
[-AdminDisplayName <String>]
3030
[-Confirm]
3131
[-Enable <Boolean>]
32+
[-QuarantineTag <String>]
3233
[-RecommendedPolicyType <RecommendedPolicyType>]
3334
[-Redirect <Boolean>]
3435
[-RedirectAddress <SmtpAddress>]
@@ -179,6 +180,28 @@ Accept pipeline input: False
179180
Accept wildcard characters: False
180181
```
181182

183+
### -QuarantineTag
184+
The QuarantineTag specifies the quarantine policy that's used on messages that are quarantined as malware by Safe Attachments. You can use any value that uniquely identifies the quarantine policy. For example:
185+
186+
- Name
187+
- Distinguished name (DN)
188+
- GUID
189+
190+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
191+
192+
```yaml
193+
Type: String
194+
Parameter Sets: (All)
195+
Aliases:
196+
Applicable: Exchange Online, Exchange Online Protection
197+
198+
Required: False
199+
Position: Named
200+
Default value: None
201+
Accept pipeline input: False
202+
Accept wildcard characters: False
203+
```
204+
182205
### -RecommendedPolicyType
183206
The RecommendedPolicyType parameter is used for Standard and Strict policy creation as part of [Preset security policies](https://docs.microsoft.com/microsoft-365/security/office-365-security/preset-security-policies). Don't use this parameter yourself.
184207

exchange/exchange-ps/exchange/Set-AntiPhishPolicy.md

Lines changed: 99 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,14 +45,18 @@ Set-AntiPhishPolicy -Identity <AntiPhishPolicyIdParameter>
4545
[-ImpersonationProtectionState <ImpersonationProtectionState>]
4646
[-MailboxIntelligenceProtectionAction <ImpersonationAction>]
4747
[-MailboxIntelligenceProtectionActionRecipients <MultiValuedProperty>]
48+
[-MailboxIntelligenceQuarantineTag <String>]
4849
[-MakeDefault]
4950
[-PhishThresholdLevel <Int32>]
5051
[-PolicyTag <String>]
52+
[-SpoofQuarantineTag <String>]
5153
[-TargetedDomainActionRecipients <MultiValuedProperty>]
5254
[-TargetedDomainProtectionAction <ImpersonationAction>]
55+
[-TargetedDomainQuarantineTag <String>]
5356
[-TargetedDomainsToProtect <MultiValuedProperty>]
5457
[-TargetedUserActionRecipients <MultiValuedProperty>]
5558
[-TargetedUserProtectionAction <ImpersonationAction>]
59+
[-TargetedUserQuarantineTag <String>]
5660
[-TargetedUsersToProtect <MultiValuedProperty>]
5761
[-WhatIf]
5862
[<CommonParameters>]
@@ -552,8 +556,32 @@ Accept pipeline input: False
552556
Accept wildcard characters: False
553557
```
554558

559+
### -MailboxIntelligenceQuarantineTag
560+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
561+
562+
The MailboxIntelligenceQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by mailbox intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
563+
564+
- Name
565+
- Distinguished name (DN)
566+
- GUID
567+
568+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
569+
570+
```yaml
571+
Type: String
572+
Parameter Sets: (All)
573+
Aliases:
574+
Applicable: Exchange Online
575+
576+
Required: False
577+
Position: Named
578+
Default value: None
579+
Accept pipeline input: False
580+
Accept wildcard characters: False
581+
```
582+
555583
### -MakeDefault
556-
The MakeDefault switch makes the specified antiphish policy the default antiphish policy. You don't have to specify a value with this switch.
584+
The MakeDefault switch makes this antiphish policy the default antiphish policy. You don't have to specify a value with this switch.
557585

558586
The default antiphish policy is applied to everyone (no corresponding antiphish rule), can't be renamed, and has the unmodifiable priority value Lowest (the default policy is always applied last).
559587

@@ -609,6 +637,28 @@ Accept pipeline input: False
609637
Accept wildcard characters: False
610638
```
611639

640+
### -SpoofQuarantineTag
641+
The SpoofQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by spoof intelligence. You can use any value that uniquely identifies the quarantine policy. For example:
642+
643+
- Name
644+
- Distinguished name (DN)
645+
- GUID
646+
647+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
648+
649+
```yaml
650+
Type: String
651+
Parameter Sets: (All)
652+
Aliases:
653+
Applicable: Exchange Online, Exchange Online Protection
654+
655+
Required: False
656+
Position: Named
657+
Default value: None
658+
Accept pipeline input: False
659+
Accept wildcard characters: False
660+
```
661+
612662
### -TargetedDomainActionRecipients
613663
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
614664

@@ -654,6 +704,30 @@ Accept pipeline input: False
654704
Accept wildcard characters: False
655705
```
656706

707+
### -TargetedDomainQuarantineTag
708+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
709+
710+
The TargetedDomainQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by domain impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
711+
712+
- Name
713+
- Distinguished name (DN)
714+
- GUID
715+
716+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
717+
718+
```yaml
719+
Type: String
720+
Parameter Sets: (All)
721+
Aliases:
722+
Applicable: Exchange Online
723+
724+
Required: False
725+
Position: Named
726+
Default value: None
727+
Accept pipeline input: False
728+
Accept wildcard characters: False
729+
```
730+
657731
### -TargetedDomainsToProtect
658732
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
659733

@@ -719,6 +793,30 @@ Accept pipeline input: False
719793
Accept wildcard characters: False
720794
```
721795

796+
### -TargetedUserQuarantineTag
797+
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
798+
799+
The TargetedUserQuarantineTag specifies the quarantine policy that's used on messages that are quarantined by user impersonation protection. You can use any value that uniquely identifies the quarantine policy. For example:
800+
801+
- Name
802+
- Distinguished name (DN)
803+
- GUID
804+
805+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
806+
807+
```yaml
808+
Type: String
809+
Parameter Sets: (All)
810+
Aliases:
811+
Applicable: Exchange Online
812+
813+
Required: False
814+
Position: Named
815+
Default value: None
816+
Accept pipeline input: False
817+
Accept wildcard characters: False
818+
```
819+
722820
### -TargetedUsersToProtect
723821
This setting is part of impersonation protection and is only available in Microsoft Defender for Office 365.
724822

exchange/exchange-ps/exchange/Set-MalwareFilterPolicy.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ Set-MalwareFilterPolicy [-Identity] <MalwareFilterPolicyIdParameter>
4545
[-FileTypes <String[]>]
4646
[-InternalSenderAdminAddress <SmtpAddress>]
4747
[-MakeDefault]
48+
[-QuarantineTag <String>]
4849
[-WhatIf]
4950
[-ZapEnabled <Boolean>]
5051
[<CommonParameters>]
@@ -582,6 +583,30 @@ Accept pipeline input: False
582583
Accept wildcard characters: False
583584
```
584585

586+
### -QuarantineTag
587+
This parameter is available only in the cloud-based service.
588+
589+
The QuarantineTag specifies the quarantine policy that's used on messages that are quarantined as malware. You can use any value that uniquely identifies the quarantine policy. For example:
590+
591+
- Name
592+
- Distinguished name (DN)
593+
- GUID
594+
595+
Quarantine policies define what users are able to do to quarantined messages based on why the message was quarantined. To view the list of available quarantine policies, run the following command: `Get-QuarantinePolicy | Format-List Name,EndUser*,AdminNotification*`.
596+
597+
```yaml
598+
Type: String
599+
Parameter Sets: (All)
600+
Aliases:
601+
Applicable: Exchange Online, Exchange Online Protection
602+
603+
Required: False
604+
Position: Named
605+
Default value: None
606+
Accept pipeline input: False
607+
Accept wildcard characters: False
608+
```
609+
585610
### -WhatIf
586611
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
587612

0 commit comments

Comments
 (0)