Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
32 commits
Select commit Hold shift + click to select a range
a0f9cf0
Update Test-TextExtraction.md
tiffanyyumsft Oct 28, 2024
edecc05
Merge branch 'main' into patch-13
chrisda Oct 28, 2024
0fdb74a
Update Test-TextExtraction.md
chrisda Oct 28, 2024
f130c4e
Merge branch 'main' into patch-13
chrisda Oct 28, 2024
8daa7f3
Merge branch 'main' into patch-13
chrisda Oct 30, 2024
3cc65bf
Merge branch 'main' into patch-13
chrisda Oct 31, 2024
cd14f85
Merge branch 'main' into patch-13
chrisda Nov 6, 2024
995caca
Merge branch 'main' into patch-13
chrisda Jan 21, 2025
cc02098
Updated Set-QuarantinePolicy.md to also mention DefaultFullAccessWith…
mbraakmicral Mar 4, 2025
9576b1b
Update New-ProtectionAlert.md
Yebbenbe Mar 4, 2025
150aab4
Update Set-AutoSensitivityLabelRule.md
tiffanyyumsft Mar 6, 2025
0231ee9
Update Get-MessageTrackingReport.md
MarcoLFrancisco Mar 11, 2025
ac25c15
Merge pull request #12583 from MarcoLFrancisco/patch-1
chrisda Mar 11, 2025
9164c2f
Fix punctuation in quarantine policy description
chrisda Mar 11, 2025
5d2939e
Merge branch 'main' into users/marcel.braak/fixdoc
chrisda Mar 11, 2025
f4ad780
Merge pull request #12567 from marcelbraak/users/marcel.braak/fixdoc
chrisda Mar 11, 2025
1442a80
Fix formatting for Exact Data Match types
chrisda Mar 11, 2025
2a6546b
Merge branch 'main' into patch-17
chrisda Mar 11, 2025
11bdb1a
Merge branch 'main' into patch-2
chrisda Mar 11, 2025
b667bc3
Clarify bypassing error in New-ProtectionAlert.md
chrisda Mar 11, 2025
c13961e
Merge pull request #12573 from tiffanyyumsft/patch-17
chrisda Mar 11, 2025
900a198
Merge branch 'main' into patch-2
chrisda Mar 11, 2025
240ee8b
Merge branch 'main' into patch-13
chrisda Mar 11, 2025
d0076f9
Merge pull request #12329 from tiffanyyumsft/patch-13
chrisda Mar 11, 2025
be84aa7
Merge branch 'main' into patch-2
chrisda Mar 11, 2025
12bf63e
Merge pull request #12569 from Yebbenbe/patch-2
chrisda Mar 11, 2025
e24c079
Update Set-AppRetentionCompliancePolicy.md
Dean-Haas Mar 11, 2025
cde4093
Update Set-AppRetentionCompliancePolicy.md
Dean-Haas Mar 11, 2025
fd48078
Merge pull request #12585 from MicrosoftDocs/Dean-Haas-patch-4
chrisda Mar 11, 2025
447c81c
Remove extra line break in documentation
chrisda Mar 11, 2025
916ddf3
Merge branch 'main' into Dean-Haas-patch-6
chrisda Mar 11, 2025
518a97a
Merge pull request #12587 from MicrosoftDocs/Dean-Haas-patch-6
chrisda Mar 11, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion exchange/exchange-ps/exchange/Get-MessageTrackingReport.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,9 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
```powershell
$Temp = Search-MessageTrackingReport -Identity "David Jones" -Recipients "[email protected]"

Get-MessageTrackingReport -Identity $Temp.MessageTrackingReportID -ReportTemplate Summary
foreach ($reportId in $Temp.MessageTrackingReportId) {
Get-MessageTrackingReport -Identity $reportId -ReportTemplate Summary -Status Delivered
}
```

This example gets the message tracking report for messages sent from one user to another. This example returns the summary of the message tracking report for a message that David Jones sent to Wendy Richardson.
Expand Down
2 changes: 2 additions & 0 deletions exchange/exchange-ps/exchange/New-ProtectionAlert.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,8 @@ Use the New-ProtectionAlert cmdlet to create alert policies in the Microsoft Pur
> _Creating advanced alert policies requires an Office 365 E5 subscription or Office 365 E3 subscription with an Office 365 Threat Intelligence or
Office 365 EquivioAnalytics add-on subscription for your organization. With your current subscription, only single event alerts can be created._
>
> You can bypass this error by specifying `-AggregationType None` and an `-Operation` within the command.
>
> For more information, see [Alert policies in Microsoft 365](https://learn.microsoft.com/purview/alert-policies).

For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -440,6 +440,8 @@ Accept wildcard characters: False
```

### -PolicyRBACScopes
**Note**: Admin units aren't currently supported, so this parameter isn't functional. The information presented here is for informational purposes when support for admin units is released.

The PolicyRBACScopes parameter specifies the administrative units to assign to the policy. A valid value is the Microsoft Entra ObjectID (GUID value) of the administrative unit. You can specify multiple values separated by commas.

Administrative units are available only in Microsoft Entra ID P1 or P2. You create and manage administrative units in Microsoft Graph PowerShell.
Expand Down
4 changes: 4 additions & 0 deletions exchange/exchange-ps/exchange/Set-AutoSensitivityLabelRule.md
Original file line number Diff line number Diff line change
Expand Up @@ -238,6 +238,10 @@ The ContentContainsSensitiveInformation parameter specifies a condition for the

This parameter uses the basic syntax `@(@{Name="SensitiveInformationType1";[minCount="Value"],@{Name="SensitiveInformationType2";[minCount="Value"],...)`. For example, `@(@{Name="U.S. Social Security Number (SSN)"; minCount="2"},@{Name="Credit Card Number"; minCount="1"; minConfidence="85"})`.

Exact Data Match sensitive types are not supported outside of Groups.

To use groups: `@(@{operator="And"; groups=@(@{name="Default"; operator="Or"; sensitivetypes=@(@{id="<<EDM SIT Id>>"; name="<<EDM SIT name>>"; maxcount="-1"; classifiertype="ExactMatch"; mincount="100"; confidencelevel="Medium"})})})`

```yaml
Type: PswsHashtable[]
Parameter Sets: (All)
Expand Down
2 changes: 1 addition & 1 deletion exchange/exchange-ps/exchange/Set-QuarantinePolicy.md
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ Set-QuarantinePolicy [-Identity] <QuarantineTagIdParameter>
```

## DESCRIPTION
You can't modify the built-in quarantine policies named AdminOnlyAccessPolicy or DefaultFullAccessPolicy.
You can't modify the built-in quarantine policies named AdminOnlyAccessPolicy, DefaultFullAccessPolicy, or DefaultFullAccessWithNotificationPolicy.

You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).

Expand Down
10 changes: 6 additions & 4 deletions exchange/exchange-ps/exchange/Test-TextExtraction.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ ms.reviewer:
## SYNOPSIS
This cmdlet is available in on-premises Exchange and in the cloud-based service. Some parameters and settings may be exclusive to one environment or the other.

Use the Test-TextExtraction cmdlet to find the text that is extracted from a specified email message in Exchange flow.
Use the Test-TextExtraction cmdlet to return the text from unencrypted email message files.

For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).

Expand All @@ -29,7 +29,9 @@ Test-TextExtraction [-FileData] <Byte[]>
```

## DESCRIPTION
This cmdlet returns the text that is found in a file in Exchange. The Microsoft classification engine uses this text to classify content and determine which sensitive information types are found in this file/message.
This cmdlet doesn't work on encrypted email message files.

The Microsoft classification engine uses the results to classify content and determine the sensitive information types in the message file.

You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see [Find the permissions required to run any Exchange cmdlet](https://learn.microsoft.com/powershell/exchange/find-exchange-cmdlet-permissions).

Expand All @@ -42,7 +44,7 @@ $content = Test-TextExtraction -FileData ([System.IO.File]::ReadAllBytes('.\fina
$content.ExtractedResults
```

This example returns the text that's extracted from the email "financial data.msg"
This example extracts the text from the email message file named "financial data.msg" that's in the same folder where you run the command, and shows the results.

### Example 2
```powershell
Expand All @@ -51,7 +53,7 @@ $content = Test-TextExtraction -FileData ([System.IO.File]::ReadAllBytes('.\fina
Test-DataClassification -TestTextExtractionResults $content.ExtractedResults
```

This example extracts the text from the email "financial data.msg" and returns the sensitive information types, their confidence, and count.
This example extracts the text from the email message file named "financial data.msg", stores the information in the variable named $content, and uses the variable with the Test-DataClassification cmdlet to return the sensitive information types, their confidence, and count.

## PARAMETERS

Expand Down