Skip to content

Commit fea3e40

Browse files
authored
Merge pull request #11394 from alexbuckgit/alexbuckgit/docutune-autopr-20231019-211106-1442557-ignore-build
[BULK] - DocuTune - Rebranding of Azure Active Directory to Microsoft Entra terminology (part 2)
2 parents 75da59a + 5b7f82a commit fea3e40

30 files changed

+52
-52
lines changed

exchange/exchange-ps/exchange/Get-OrganizationSegment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ Get-OrganizationSegment [[-Identity] <PolicyIdParameter>]
3232
```
3333

3434
## DESCRIPTION
35-
Segments are defined by using certain [attributes](https://learn.microsoft.com/purview/information-barriers-attributes) in Azure Active Directory.
35+
Segments are defined by using certain [attributes](https://learn.microsoft.com/purview/information-barriers-attributes) in Microsoft Entra ID.
3636

3737
To use this cmdlet in Security & Compliance PowerShell, you need to be assigned permissions. For more information, see [Permissions in the Microsoft Purview compliance portal](https://learn.microsoft.com/purview/microsoft-365-compliance-center-permissions).
3838

exchange/exchange-ps/exchange/Get-ServicePrincipal.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ Get-ServicePrincipal [[-Identity] <ServicePrincipalIdParameter>]
2626
```
2727

2828
## DESCRIPTION
29-
Service principals exist in Azure Active Directory to define what apps can do, who can access the apps, and what resources the apps can access. In Exchange Online, service principals are references to the service principals in Azure AD. To assign Exchange Online role-based access control (RBAC) roles to service principals in Azure AD, you use the service principal references in Exchange Online. The **\*-ServicePrincipal** cmdlets in Exchange Online PowerShell let you view, create, and remove these service principal references.
29+
Service principals exist in Microsoft Entra ID to define what apps can do, who can access the apps, and what resources the apps can access. In Exchange Online, service principals are references to the service principals in Microsoft Entra ID. To assign Exchange Online role-based access control (RBAC) roles to service principals in Microsoft Entra ID, you use the service principal references in Exchange Online. The **\*-ServicePrincipal** cmdlets in Exchange Online PowerShell let you view, create, and remove these service principal references.
3030

31-
For more information, see [Application and service principal objects in Azure Active Directory](https://learn.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals).
31+
For more information, see [Application and service principal objects in Microsoft Entra ID](https://learn.microsoft.com/azure/active-directory/develop/app-objects-and-service-principals).
3232

3333
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).
3434

exchange/exchange-ps/exchange/Get-UserBriefingConfig.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ This cmdlet requires the .NET Framework 4.7.2 or later. To run this cmdlet, you
3232
- Exchange Administrator
3333
- Insights Administrator
3434

35-
To learn more about administrator role permissions in Azure Active Directory, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
35+
To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
3636

3737
## EXAMPLES
3838

exchange/exchange-ps/exchange/Get-VivaInsightsSettings.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This cmdlet requires the .NET Framework 4.7.2 or later. To run this cmdlet, you
3636
- Exchange Administrator
3737
- Teams Administrator
3838

39-
To learn more about administrator role permissions in Azure Active Directory, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
39+
To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
4040

4141
## EXAMPLES
4242

exchange/exchange-ps/exchange/Get-VivaModuleFeatureEnablement.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ This cmdlet requires the .NET Framework 4.7.2 or later.
3838

3939
Currently, you need to be a member of the Global administrators role to run this cmdlet.
4040

41-
To learn more about administrator role permissions in Azure Active Directory, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
41+
To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
4242

4343
## EXAMPLES
4444

@@ -79,7 +79,7 @@ Accept wildcard characters: False
7979
### -Identity
8080
The Identity parameter specifies the user principal name (UPN) of the user or the SMTP address (email address) of the group that you want to view the feature enablement status of.
8181
82-
[Mail-enabled AAD groups](https://docs.microsoft.com/graph/api/resources/groups-overview#group-types-in-azure-ad-and-microsoft-graph) are supported.
82+
[Mail-enabled Microsoft Entra groups](https://docs.microsoft.com/graph/api/resources/groups-overview#group-types-in-azure-ad-and-microsoft-graph) are supported.
8383
8484
```yaml
8585
Type: String

exchange/exchange-ps/exchange/Get-VivaModuleFeaturePolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ This cmdlet requires the .NET Framework 4.7.2 or later.
4141

4242
Currently, you need to be a member of the Global administrators role to run this cmdlet.
4343

44-
To learn more about administrator role permissions in Azure Active Directory, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
44+
To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/azure/active-directory/roles/permissions-reference#role-template-ids).
4545

4646
## EXAMPLES
4747

exchange/exchange-ps/exchange/New-AppRetentionCompliancePolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -308,9 +308,9 @@ Accept wildcard characters: False
308308
```
309309

310310
### -PolicyRBACScopes
311-
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Azure Active Directory ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
311+
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Microsoft Entra ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
312312

313-
Administrative units are available only in Azure Active Directory Premium. You create and manage administrative units in Microsoft Graph PowerShell.
313+
Administrative units are available only in Microsoft Entra ID P1 or P2. You create and manage administrative units in Microsoft Graph PowerShell.
314314

315315
```yaml
316316
Type: MultiValuedProperty

exchange/exchange-ps/exchange/New-AutoSensitivityLabelPolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -410,9 +410,9 @@ Accept wildcard characters: False
410410
```
411411

412412
### -PolicyRBACScopes
413-
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Azure Active Directory ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
413+
The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Microsoft Entra ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.
414414

415-
Administrative units are available only in Azure Active Directory Premium. You create and manage administrative units in Microsoft Graph PowerShell.
415+
Administrative units are available only in Microsoft Entra ID P1 or P2. You create and manage administrative units in Microsoft Graph PowerShell.
416416

417417
```yaml
418418
Type: MultiValuedProperty

exchange/exchange-ps/exchange/New-CaseHoldPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ To specify a mailbox or distribution group, you can use the following values:
154154

155155
- Name
156156
- SMTP address. To specify an inactive mailbox, precede the address with a period (.).
157-
- Azure AD ObjectId. Use the [Get-MgUser](https://learn.microsoft.com/powershell/module/microsoft.graph.users/get-mguser) or [Get-MgGroup](https://learn.microsoft.com/powershell/module/microsoft.graph.groups/get-mggroup) cmdlets in Microsoft Graph PowerShell to find this value.
157+
- Microsoft Entra ObjectId. Use the [Get-MgUser](https://learn.microsoft.com/powershell/module/microsoft.graph.users/get-mguser) or [Get-MgGroup](https://learn.microsoft.com/powershell/module/microsoft.graph.groups/get-mggroup) cmdlets in Microsoft Graph PowerShell to find this value.
158158

159159
You can enter multiple values separated by commas. If the values contain spaces or otherwise require quotation marks, use the following syntax: `"Value1","Value2",..."ValueN"`.
160160

exchange/exchange-ps/exchange/New-DistributionGroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ The Alias parameter specifies the Exchange alias (also known as the mail nicknam
107107
The Alias value can contain letters, numbers and the following characters:
108108
109109
- !, #, %, \*, +, -, /, =, ?, ^, \_, and ~.
110-
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Azure AD Connect synchronization.
110+
- $, &, ', \`, {, }, and \| need to be escaped (for example ``-Alias what`'snew``) or the entire value enclosed in single quotation marks (for example, `-Alias 'what'snew'`). The & character is not supported in the Alias value for Microsoft Entra Connect synchronization.
111111
- Periods (.) must be surrounded by other valid characters (for example, `help.desk`).
112112
- Unicode characters U+00A1 to U+00FF.
113113

0 commit comments

Comments
 (0)