Skip to content

Commit d23ddcf

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 8568074 + 6314d63 commit d23ddcf

35 files changed

+384
-208
lines changed

.github/workflows/AutoLabelMsftContributor.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
1+
12
name: Auto label Microsoft contributors
23

34
permissions:
@@ -31,4 +32,5 @@ jobs:
3132
PayloadJson: ${{ needs.download-payload.outputs.WorkflowPayload }}
3233
secrets:
3334
AccessToken: ${{ secrets.GITHUB_TOKEN }}
34-
TeamReadAccessToken: ${{ secrets.ORG_READTEAMS_TOKEN }}
35+
ClientId: ${{ secrets.M365_APP_CLIENT_ID }}
36+
PrivateKey: ${{ secrets.M365_APP_PRIVATE_KEY }}

exchange/exchange-ps/exchange/Add-VivaOrgInsightsDelegatedRole.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.reviewer:
1212
# Add-VivaOrgInsightsDelegatedRole
1313

1414
## SYNOPSIS
15-
This cmdlet is available only in the Exchange Online PowerShell module v3.7.0-Preview1 or later. For more information, see [About the Exchange Online PowerShell module](https://aka.ms/exov3-module).
15+
This cmdlet is available only in the Exchange Online PowerShell module v3.7.1 or later. For more information, see [About the Exchange Online PowerShell module](https://aka.ms/exov3-module).
1616

1717
Use the Add-VivaOrgInsightsDelegatedRole cmdlet to add delegate access to the specified account (the delegate) so they can view organizational insights like the leader (the delegator).
1818

exchange/exchange-ps/exchange/Connect-ExchangeOnline.md

Lines changed: 23 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ Connect-ExchangeOnline
4242
[-CertificateThumbprint <String>]
4343
[-Credential <PSCredential>]
4444
[-Device]
45+
[-DisableWAM]
4546
[-EnableErrorReporting]
4647
[-InlineCredential]
4748
[-LoadCmdletHelp]
@@ -276,9 +277,9 @@ Accept wildcard characters: False
276277
### -AccessToken
277278
**Note**: This parameter is available in version 3.1.0 or later of the module.
278279

279-
The AccessToken parameter specifies the OAuth JSON Web Token (JWT) that's used to connect to ExchangeOnline.
280+
The AccessToken parameter specifies the OAuth JSON Web Token (JWT) that's used to connect to Exchange Online.
280281

281-
Depending on the type of access token, you need to use this parameter with the Organization, DelegatedOrganization, or UserPrincipalName parameter.
282+
Depending on the type of access token, you need to use this parameter with the Organization, DelegatedOrganization, or UserPrincipalName parameters.
282283

283284
```yaml
284285
Type: String
@@ -459,6 +460,26 @@ Accept pipeline input: False
459460
Accept wildcard characters: False
460461
```
461462

463+
### -DisableWAM
464+
**Note**: This parameter is available in version 3.7.2-Preview1 or later of the module.
465+
466+
The DisableWAM switch disables Web Account Manager (WAM). You don't need to specify a value with this switch.
467+
468+
Starting in version 3.7.0, WAM is enabled by default when connecting to Exchange Online. If you encounter WAM-related issues during sign in, you can use this switch to disable WAM.
469+
470+
```yaml
471+
Type: SwitchParameter
472+
Parameter Sets: (All)
473+
Aliases:
474+
Applicable: Exchange Online
475+
476+
Required: False
477+
Position: Named
478+
Default value: None
479+
Accept pipeline input: False
480+
Accept wildcard characters: False
481+
```
482+
462483
### -EnableErrorReporting
463484
The EnableErrorReporting switch specifies whether to enable error reporting. You don't need to specify a value with this switch.
464485

exchange/exchange-ps/exchange/Export-ContentExplorerData.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,8 +110,6 @@ When you use this switch with the TagName, TagType, and Workload parameters, the
110110
- Exchange Online and Microsoft Teams: The list of UPNs.
111111
- The count of items in the folders stamped with relevant tag.
112112
113-
114-
115113
```yaml
116114
Type: SwitchParameter
117115
Parameter Sets: (All)

exchange/exchange-ps/exchange/Get-AuthenticationPolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -83,8 +83,8 @@ Legacy Exchange tokens include Exchange user identity and callback tokens.
8383
8484
**Important**:
8585
86-
- Currently, the AllowLegacyExchangeTokens switch only specifies whether legacy Exchange tokens are allowed in your organization. For now, disregard the empty Allowed and Blocked arrays returned by the switch.
87-
- Legacy Exchange tokens will eventually be blocked by default in all cloud-based organizations. For more information, see [Nested app authentication and Outlook legacy tokens deprecation FAQ](https://learn.microsoft.com/office/dev/add-ins/outlook/faq-nested-app-auth-outlook-legacy-tokens#what-is-the-timeline-for-shutting-down-legacy-exchange-online-tokens).
86+
- The AllowLegacyExchangeTokens switch returns `Not Set` if tokens haven't been explicitly allowed or blocked in your organization using the _AllowLegacyExchangeTokens_ or _BlockLegacyExchangeTokens_ parameters on the **Set-AuthenticationPolicy** cmdlet. For more information, see [Get the status of legacy Exchange Online tokens and add-ins that use them](https://learn.microsoft.com/office/dev/add-ins/outlook/turn-exchange-tokens-on-off#get-the-status-of-legacy-exchange-online-tokens-and-add-ins-that-use-them).
87+
- As of February 17 2025, legacy Exchange tokens are blocked by default in all cloud-based organizations. Although tokens are blocked by default, the AllowLegacyExchangeTokens switch still returns `Not Set` if you haven't used the _AllowLegacyExchangeTokens_ or _BlockLegacyExchangeTokens_ parameters on the **Set-AuthenticationPolicy** cmdlet. For more information, see [Nested app authentication and Outlook legacy tokens deprecation FAQ](https://learn.microsoft.com/office/dev/add-ins/outlook/faq-nested-app-auth-outlook-legacy-tokens#what-is-the-timeline-for-shutting-down-legacy-exchange-online-tokens).
8888

8989
```yaml
9090
Type: SwitchParameter

exchange/exchange-ps/exchange/Get-MessageTrackingReport.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,9 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
4848
```powershell
4949
$Temp = Search-MessageTrackingReport -Identity "David Jones" -Recipients "[email protected]"
5050
51-
Get-MessageTrackingReport -Identity $Temp.MessageTrackingReportID -ReportTemplate Summary
51+
foreach ($reportId in $Temp.MessageTrackingReportId) {
52+
Get-MessageTrackingReport -Identity $reportId -ReportTemplate Summary -Status Delivered
53+
}
5254
```
5355

5456
This example gets the message tracking report for messages sent from one user to another. This example returns the summary of the message tracking report for a message that David Jones sent to Wendy Richardson.

exchange/exchange-ps/exchange/Get-VivaOrgInsightsDelegatedRole.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.reviewer:
1212
# Get-VivaOrgInsightsDelegatedRole
1313

1414
## SYNOPSIS
15-
This cmdlet is available only in the Exchange Online PowerShell module v3.7.0-Preview1 or later. For more information, see [About the Exchange Online PowerShell module](https://aka.ms/exov3-module).
15+
This cmdlet is available only in the Exchange Online PowerShell module v3.7.1 or later. For more information, see [About the Exchange Online PowerShell module](https://aka.ms/exov3-module).
1616

1717
Use the Get-VivaOrgInsightsDelegatedRole cmdlet to view all delegates of the specified delegator. Delegate accounts can view organizational insights like the specified delegator.
1818

exchange/exchange-ps/exchange/New-AppRetentionCompliancePolicy.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -308,6 +308,8 @@ Accept wildcard characters: False
308308
```
309309

310310
### -PolicyRBACScopes
311+
**Note**: Admin units aren't currently supported, so this parameter isn't functional. The information presented here is for informational purposes when support for admin units is released.
312+
311313
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Microsoft Entra ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
312314

313315
Administrative units are available only in Microsoft Entra ID P1 or P2. You create and manage administrative units in Microsoft Graph PowerShell.

exchange/exchange-ps/exchange/New-AutoSensitivityLabelRule.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -254,6 +254,10 @@ The ContentContainsSensitiveInformation parameter specifies a condition for the
254254

255255
This parameter uses the basic syntax `@(@{Name="SensitiveInformationType1";[minCount="Value"],@{Name="SensitiveInformationType2";[minCount="Value"],...)`. For example, `@(@{Name="U.S. Social Security Number (SSN)"; minCount="2"},@{Name="Credit Card Number"; minCount="1"; minConfidence="85"})`.
256256

257+
Exact Data Match sensitive information types are supported only groups. For example:
258+
259+
`@(@{operator="And"; groups=@(@{name="Default"; operator="Or"; sensitivetypes=@(@{id="<<EDM SIT Id>>"; name="<<EDM SIT name>>"; maxcount="-1"; classifiertype="ExactMatch"; mincount="100"; confidencelevel="Medium"})})})`
260+
257261
```yaml
258262
Type: PswsHashtable[]
259263
Parameter Sets: (All)

exchange/exchange-ps/exchange/New-ProtectionAlert.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,17 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
1616

17-
Use the New-ProtectionAlert cmdlet to create alert policies in the Microsoft Purview compliance portal. Alert policies contain conditions that define the user activities to monitor, and the notification options for email alerts and entries in the Microsoft Purview compliance portal.
17+
Use the New-ProtectionAlert cmdlet to create alert policies in the Microsoft Purview compliance portal and the Microsoft Defender portal. Alert policies contain conditions that define the user activities to monitor, and the notification options for email alerts and entries.
18+
19+
> [!NOTE]
20+
> Although the cmdlet is available, you receive the following error if you don't have an enterprise license:
21+
>
22+
> _Creating advanced alert policies requires an Office 365 E5 subscription or Office 365 E3 subscription with an Office 365 Threat Intelligence or
23+
Office 365 EquivioAnalytics add-on subscription for your organization. With your current subscription, only single event alerts can be created._
24+
>
25+
> You can bypass this error by specifying `-AggregationType None` and an `-Operation` within the command.
26+
>
27+
> For more information, see [Alert policies in Microsoft 365](https://learn.microsoft.com/purview/alert-policies).
1828
1929
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2030

0 commit comments

Comments
 (0)