Skip to content

Commit d6fb988

Browse files
authored
Merge branch 'main' into patch-19
2 parents dc1fbbf + 1677083 commit d6fb988

File tree

718 files changed

+10568
-8760
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

718 files changed

+10568
-8760
lines changed

exchange/exchange-ps/ExchangePowerShell/Get-ADSiteLink.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
2+
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
33
author: chrisda
44
external help file: Microsoft.Exchange.RemoteConnections-Help.xml
55
Locale: en-US
@@ -50,7 +50,7 @@ This example returns a list of all IP site links in your organization that have
5050

5151
### -Identity
5252

53-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
53+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
5454
5555
The Identity parameter specifies the name or GUID of the IP site link for which you want to view configuration information.
5656

@@ -68,7 +68,7 @@ Accept wildcard characters: False
6868
6969
### -DomainController
7070
71-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
71+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
7272
7373
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
7474

exchange/exchange-ps/ExchangePowerShell/Get-AgentLog.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
2+
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
33
author: chrisda
44
external help file: Microsoft.Exchange.TransportMailflow-Help.xml
55
Locale: en-US
@@ -45,7 +45,7 @@ This example returns a report that has statistics collected between 09:00 (9 A.M
4545

4646
### -EndDate
4747

48-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
48+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
4949
5050
The EndDate parameter specifies the end date of the date range.
5151

@@ -65,7 +65,7 @@ Accept wildcard characters: False
6565
6666
### -Location
6767
68-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
68+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
6969
7070
The Location parameter specifies the directory that contains the log files that you can use to build usage reports. The default path is %ExchangeInstallPath%TransportRoles\\Logs\\AgentLog. You need to enclose the file path in quotation marks (").
7171
@@ -83,7 +83,7 @@ Accept wildcard characters: False
8383
8484
### -StartDate
8585
86-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
86+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
8787
8888
The StartDate parameter specifies the start date of the date range.
8989
@@ -103,7 +103,7 @@ Accept wildcard characters: False
103103
104104
### -TransportService
105105
106-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
106+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
107107
108108
The TransportService parameter specifies the transport service that you want to view or modify. Valid values for this parameter are:
109109

exchange/exchange-ps/ExchangePowerShell/Get-App.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
2+
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online
33
author: chrisda
44
external help file: Microsoft.Exchange.WebClient-Help.xml
55
Locale: en-US
@@ -62,7 +62,7 @@ This example displays the summary list of apps installed by administrators for t
6262

6363
### -Identity
6464

65-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
65+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online
6666
6767
The Identity parameter specifies the GUID of the app that you want to view. To find the GUID value of an app, run the command Get-App | Format-Table -Auto DisplayName,AppId.
6868

@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
8181
### -DomainController
8282
83-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
83+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
8484
8585
This parameter is available only in on-premises Exchange.
8686
@@ -100,7 +100,7 @@ Accept wildcard characters: False
100100
101101
### -Mailbox
102102
103-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
103+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online
104104
105105
The Mailbox parameter specifies the identity of the mailbox where the apps are installed. You can use any value that uniquely identifies the mailbox. For example:
106106
@@ -133,7 +133,7 @@ Accept wildcard characters: False
133133
134134
### -OrganizationApp
135135
136-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
136+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online
137137
138138
The OrganizationApp switch includes apps that are installed for the organization (not bound to a specific user) in the results. You don't need to specify a value with this switch.
139139
@@ -151,7 +151,7 @@ Accept wildcard characters: False
151151
152152
### -PrivateCatalog
153153
154-
> Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online
154+
> Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online
155155
156156
The PrivateCatalog switch includes private catalog add-ins in the results. You don't need to specify a value with this switch.
157157

exchange/exchange-ps/ExchangePowerShell/Get-AttachmentFilterEntry.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
2+
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
33
author: chrisda
44
external help file: Microsoft.Exchange.RecordsandEdge-Help.xml
55
Locale: en-US
@@ -59,7 +59,7 @@ This example returns only the attachment filter entries that filter attachments
5959

6060
### -Identity
6161

62-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
62+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
6363
6464
The Identity parameter specifies which attachment filter entry the command retrieves. The Identity parameter accepts values in the format Type:Name, where Type is one of the following values:
6565

@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
8181
### -DomainController
8282
83-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
83+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
8484
8585
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
8686

exchange/exchange-ps/ExchangePowerShell/Get-AttachmentFilterListConfig.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
2+
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
33
author: chrisda
44
external help file: Microsoft.Exchange.RecordsandEdge-Help.xml
55
Locale: en-US
@@ -44,7 +44,7 @@ This example returns detailed information about the Attachment Filtering agent c
4444

4545
### -DomainController
4646

47-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
47+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
4848
4949
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
5050

exchange/exchange-ps/ExchangePowerShell/Get-AuditLogSearch.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
2+
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
33
author: chrisda
44
external help file: Microsoft.Exchange.RecordsandEdge-Help.xml
55
Locale: en-US
@@ -55,7 +55,7 @@ This example returns a list of current administrator audit log searches.
5555

5656
### -Identity
5757

58-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
58+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
5959
6060
The Identity parameter specifies the GUID for an audit log search. You can run the command Get-AuditLogSearch | Format-List Identity to display the GUIDs for all current audit log searches.
6161

@@ -73,7 +73,7 @@ Accept wildcard characters: False
7373
7474
### -CreatedAfter
7575
76-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
76+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
7777
7878
The CreatedAfter parameter filters the results to audit log searches that were created after the specified date.
7979
@@ -93,7 +93,7 @@ Accept wildcard characters: False
9393
9494
### -CreatedBefore
9595
96-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
96+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
9797
9898
The CreatedBefore parameter filters the results to audit log searches that were created before the specified date.
9999
@@ -113,7 +113,7 @@ Accept wildcard characters: False
113113
114114
### -ResultSize
115115
116-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
116+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
117117
118118
The ResultSize parameter specifies the maximum number of results to return. If you want to return all requests that match the query, use unlimited for the value of this parameter. The default value is 1000.
119119
@@ -131,7 +131,7 @@ Accept wildcard characters: False
131131
132132
### -Type
133133
134-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
134+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
135135
136136
The Type parameter specifies the type of audit log searches to return. Use the value Admin to return administrator audit log searches or use mailbox to return mailbox audit log searches. If the Type parameter isn't used, the cmdlet returns both administrator and mailbox audit log searches.
137137

exchange/exchange-ps/ExchangePowerShell/Get-AuthConfig.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
2+
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
33
author: chrisda
44
external help file: Microsoft.Exchange.RolesAndAccess-Help.xml
55
Locale: en-US
@@ -42,7 +42,7 @@ This example retrieves the authorization configuration for the Exchange organiza
4242

4343
### -DomainController
4444

45-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
45+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
4646
4747
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
4848

exchange/exchange-ps/ExchangePowerShell/Get-AuthRedirect.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
2+
applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
33
author: chrisda
44
external help file: Microsoft.Exchange.RemoteConnections-Help.xml
55
Locale: en-US
@@ -52,7 +52,7 @@ This example shows detailed information about the OAuth redirection object named
5252

5353
### -Identity
5454

55-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
55+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
5656
5757
The Identity parameter specifies the existing OAuth redirection object that you want to view. The object name uses the syntax `AuthRedirect-Bearer-GUID`.
5858

@@ -70,7 +70,7 @@ Accept wildcard characters: False
7070
7171
### -DomainController
7272
73-
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
73+
> Applicable: Exchange Server 2010, Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
7474
7575
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
7676

exchange/exchange-ps/ExchangePowerShell/Get-AuthServer.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
2+
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online
33
author: chrisda
44
external help file: Microsoft.Exchange.RolesAndAccess-Help.xml
55
Locale: en-US
@@ -52,7 +52,7 @@ This example retrieves detailed information for the authorization server named W
5252

5353
### -Identity
5454

55-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online
55+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online
5656
5757
The Identity parameter specifies the authorization server object that you want to view. You can use any value that uniquely identifies the authorization server. For example:
5858

@@ -74,7 +74,7 @@ Accept wildcard characters: False
7474
7575
### -DomainController
7676
77-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019
77+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
7878
7979
This parameter is available only in on-premises Exchange.
8080

exchange/exchange-ps/ExchangePowerShell/Get-AuthenticationPolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2019, Exchange Online, Exchange Online Protection
2+
applicable: Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
33
author: chrisda
44
external help file: Microsoft.Exchange.RolesAndAccess-Help.xml
55
Locale: en-US
@@ -57,7 +57,7 @@ In Exchange Online, this example specifies whether legacy Exchange tokens for Ou
5757

5858
### -Identity
5959

60-
> Applicable: Exchange Server 2019, Exchange Online, Exchange Online Protection
60+
> Applicable: Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
6161
6262
The Identity parameter specifies the authentication policy you want to view. You can use any value that uniquely identifies the policy. For example:
6363

0 commit comments

Comments
 (0)