Skip to content

Commit e96320e

Browse files
committed
only available to available only
1 parent 662f9d7 commit e96320e

25 files changed

+283
-283
lines changed

exchange/exchange-ps/exchange/Add-ManagementRoleEntry.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -265,7 +265,7 @@ Accept wildcard characters: False
265265
### -UnScopedTopLevel
266266
This parameter is available only in on-premises Exchange.
267267

268-
By default, this parameter is only available in the UnScoped Role Management role, and that role isn't assigned to any role groups. To use this parameter, you need to add the UnScoped Role Management role to a role group (for example, to the Organization Management role group). For more information, see [Add a role to a role group](https://learn.microsoft.com/Exchange/permissions/role-groups#add-a-role-to-a-role-group).
268+
By default, this parameter is available only in the UnScoped Role Management role, and that role isn't assigned to any role groups. To use this parameter, you need to add the UnScoped Role Management role to a role group (for example, to the Organization Management role group). For more information, see [Add a role to a role group](https://learn.microsoft.com/Exchange/permissions/role-groups#add-a-role-to-a-role-group).
269269

270270
The UnScopedTopLevel switch specifies that you're adding the role entry to an unscoped top-level management role. You don't need to specify a value with this switch.
271271

exchange/exchange-ps/exchange/Get-AdministrativeUnit.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This cmdlet is functional only in the cloud-based service.
1616

1717
Use the Get-AdministrativeUnit cmdlet to view administrative units, which are Azure Active Directory containers of resources. You can use administrative units to delegate administrative permissions and apply policies to different groups of users.
1818

19-
**Note**: Administrative units are only available in Azure Active Directory Premium. You create and manage administrative units in Microsoft Graph PowerShell.
19+
**Note**: Administrative units are available only in Azure Active Directory Premium. You create and manage administrative units in Microsoft Graph PowerShell.
2020

2121
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2222

exchange/exchange-ps/exchange/Get-AntiPhishPolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ The Advanced switch filters the properties that are returned to the advanced set
7777
7878
You don't need to specify a value with this switch.
7979
80-
Advanced settings are only available in anti-phishing policies in Microsoft Defender for Office 365.
80+
Advanced settings are available only in anti-phishing policies in Microsoft Defender for Office 365.
8181
8282
```yaml
8383
Type: SwitchParameter
@@ -117,7 +117,7 @@ The Impersonation switch filters the properties that are returned to the imperso
117117
118118
You don't need to specify a value with this switch.
119119
120-
Impersonation settings are only available in anti-phishing policies in Microsoft Defender for Office 365.
120+
Impersonation settings are available only in anti-phishing policies in Microsoft Defender for Office 365.
121121
122122
```yaml
123123
Type: SwitchParameter

exchange/exchange-ps/exchange/Get-EmailAddressPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.reviewer:
1414
## SYNOPSIS
1515
This cmdlet is available in on-premises Exchange and in the cloud-based service. Some parameters and settings may be exclusive to one environment or the other.
1616

17-
Use the Get-EmailAddressPolicy cmdlet to view email address policies. In Exchange Online, email address policies are only available for Microsoft 365 Groups.
17+
Use the Get-EmailAddressPolicy cmdlet to view email address policies. In Exchange Online, email address policies are available only for Microsoft 365 Groups.
1818

1919
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2020

exchange/exchange-ps/exchange/Get-EventsFromEmailConfiguration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.reviewer:
1212
# Get-EventsFromEmailConfiguration
1313

1414
## SYNOPSIS
15-
This cmdlet is only available in the cloud-based service.
15+
This cmdlet is available only in the cloud-based service.
1616

1717
Use the Get-EventsFromEmailConfiguration cmdlet to view the events from email settings on a mailbox. These settings define whether Outlook or Outlook on the web (formerly known as Outlook Web App) automatically discovers events from email messages and adds them to the user's calendar.
1818

exchange/exchange-ps/exchange/Get-MailDetailATPReport.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,7 @@ The EventType parameter filters the report by the event type. Valid values are:
173173
- URL detonation reputation
174174
- URL malicious reputation
175175
176-
**Note**: Some values correspond to features that are only available in Defender for Office 365 (plan 1 and plan 2 or plan 2 only).
176+
**Note**: Some values correspond to features that are available only in Defender for Office 365 (plan 1 and plan 2 or plan 2 only).
177177
178178
You can enter multiple values separated by commas. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"Value1","Value2",..."ValueN"`.
179179

exchange/exchange-ps/exchange/Get-MailTrafficATPReport.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -190,7 +190,7 @@ The EventType parameter filters the report by the event type. Valid values are:
190190
- URL detonation reputation
191191
- URL malicious reputation
192192

193-
**Note**: Some values correspond to features that are only available in Defender for Office 365 (plan 1 and plan 2 or plan 2 only).
193+
**Note**: Some values correspond to features that are available only in Defender for Office 365 (plan 1 and plan 2 or plan 2 only).
194194

195195
You can enter multiple values separated by commas. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"Value1","Value2",..."ValueN"`.
196196

0 commit comments

Comments
 (0)