Skip to content

Commit 6156f83

Browse files
committed
chore: update Standards capitalization and spelling
1 parent eb8f4fc commit 6156f83

File tree

34 files changed

+113
-113
lines changed

34 files changed

+113
-113
lines changed

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAnonReportDisable.ps1

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,8 @@ function Invoke-CIPPStandardAnonReportDisable {
5757
}
5858
}
5959
if ($Settings.report -eq $true) {
60-
$stateisCorrrect = $CurrentInfo.displayConcealedNames ? $false : $true
61-
Set-CIPPStandardsCompareField -FieldName 'standards.AnonReportDisable' -FieldValue $stateisCorrrect -TenantFilter $tenant
60+
$StateIsCorrect = $CurrentInfo.displayConcealedNames ? $false : $true
61+
Set-CIPPStandardsCompareField -FieldName 'standards.AnonReportDisable' -FieldValue $StateIsCorrect -TenantFilter $tenant
6262
Add-CIPPBPAField -FieldName 'AnonReport' -FieldValue $CurrentInfo.displayConcealedNames -StoreAs bool -Tenant $tenant
6363
}
6464
}

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAntiPhishPolicy.ps1

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ function Invoke-CIPPStandardAntiPhishPolicy {
124124
Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Anti-phishing policy already correctly configured' -sev Info
125125
} else {
126126
if ($MDOLicensed) {
127-
$cmdparams = @{
127+
$cmdParams = @{
128128
Enabled = $true
129129
PhishThresholdLevel = $Settings.PhishThresholdLevel
130130
EnableMailboxIntelligence = $true
@@ -147,7 +147,7 @@ function Invoke-CIPPStandardAntiPhishPolicy {
147147
EnableOrganizationDomainsProtection = $true
148148
}
149149
} else {
150-
$cmdparams = @{
150+
$cmdParams = @{
151151
Enabled = $true
152152
EnableSpoofIntelligence = $true
153153
EnableFirstContactSafetyTips = $Settings.EnableFirstContactSafetyTips
@@ -160,16 +160,16 @@ function Invoke-CIPPStandardAntiPhishPolicy {
160160

161161
if ($CurrentState.Name -eq $PolicyName) {
162162
try {
163-
$cmdparams.Add('Identity', $PolicyName)
164-
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-AntiPhishPolicy' -cmdparams $cmdparams -UseSystemMailbox $true
163+
$cmdParams.Add('Identity', $PolicyName)
164+
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-AntiPhishPolicy' -cmdParams $cmdParams -UseSystemMailbox $true
165165
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Updated Anti-phishing policy $PolicyName." -sev Info
166166
} catch {
167167
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to update Anti-phishing policy $PolicyName." -sev Error -LogData $_
168168
}
169169
} else {
170170
try {
171-
$cmdparams.Add('Name', $PolicyName)
172-
New-ExoRequest -tenantid $Tenant -cmdlet 'New-AntiPhishPolicy' -cmdparams $cmdparams -UseSystemMailbox $true
171+
$cmdParams.Add('Name', $PolicyName)
172+
New-ExoRequest -tenantid $Tenant -cmdlet 'New-AntiPhishPolicy' -cmdParams $cmdParams -UseSystemMailbox $true
173173
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Created Anti-phishing policy $PolicyName." -sev Info
174174
} catch {
175175
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Anti-phishing policy $PolicyName." -sev Error -LogData $_
@@ -178,27 +178,27 @@ function Invoke-CIPPStandardAntiPhishPolicy {
178178
}
179179

180180
if ($RuleStateIsCorrect -eq $false) {
181-
$cmdparams = @{
181+
$cmdParams = @{
182182
Priority = 0
183183
RecipientDomainIs = $AcceptedDomains.Name
184184
}
185185

186186
if ($RuleState.AntiPhishPolicy -ne $PolicyName) {
187-
$cmdparams.Add('AntiPhishPolicy', $PolicyName)
187+
$cmdParams.Add('AntiPhishPolicy', $PolicyName)
188188
}
189189

190190
if ($RuleState.Name -eq $RuleName) {
191191
try {
192-
$cmdparams.Add('Identity', $RuleName)
193-
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-AntiPhishRule' -cmdparams $cmdparams -UseSystemMailbox $true
192+
$cmdParams.Add('Identity', $RuleName)
193+
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-AntiPhishRule' -cmdParams $cmdParams -UseSystemMailbox $true
194194
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Updated Anti-phishing rule $RuleName." -sev Info
195195
} catch {
196196
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to update Anti-phishing rule $RuleName." -sev Error -LogData $_
197197
}
198198
} else {
199199
try {
200-
$cmdparams.Add('Name', $RuleName)
201-
New-ExoRequest -tenantid $Tenant -cmdlet 'New-AntiPhishRule' -cmdparams $cmdparams -UseSystemMailbox $true
200+
$cmdParams.Add('Name', $RuleName)
201+
New-ExoRequest -tenantid $Tenant -cmdlet 'New-AntiPhishRule' -cmdParams $cmdParams -UseSystemMailbox $true
202202
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Created Anti-phishing rule $RuleName." -sev Info
203203
} catch {
204204
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Anti-phishing rule $RuleName." -sev Error -LogData $_

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardAtpPolicyForO365.ps1

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,14 +48,14 @@ function Invoke-CIPPStandardAtpPolicyForO365 {
4848
if ($StateIsCorrect -eq $true) {
4949
Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Atp Policy For O365 already set.' -sev Info
5050
} else {
51-
$cmdparams = @{
51+
$cmdParams = @{
5252
EnableATPForSPOTeamsODB = $true
5353
EnableSafeDocs = $true
5454
AllowSafeDocsOpen = $Settings.AllowSafeDocsOpen
5555
}
5656

5757
try {
58-
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-AtpPolicyForO365' -cmdparams $cmdparams -UseSystemMailbox $true
58+
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-AtpPolicyForO365' -cmdParams $cmdParams -UseSystemMailbox $true
5959
Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Updated Atp Policy For O365' -sev Info
6060
} catch {
6161
$ErrorMessage = Get-NormalizedError -Message $_.Exception.Message

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDisableOutlookAddins.ps1

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,8 +47,8 @@ function Invoke-CIPPStandardDisableOutlookAddins {
4747

4848
foreach ($Role in $RolesToRemove) {
4949
try {
50-
New-ExoRequest -tenantid $Tenant -cmdlet 'Get-ManagementRoleAssignment' -cmdparams @{ RoleAssignee = $CurrentInfo.Identity; Role = $Role } | ForEach-Object {
51-
New-ExoRequest -tenantid $Tenant -cmdlet 'Remove-ManagementRoleAssignment' -cmdparams @{ Identity = $_.Guid; Confirm = $false } -UseSystemMailbox $true
50+
New-ExoRequest -tenantid $Tenant -cmdlet 'Get-ManagementRoleAssignment' -cmdParams @{ RoleAssignee = $CurrentInfo.Identity; Role = $Role } | ForEach-Object {
51+
New-ExoRequest -tenantid $Tenant -cmdlet 'Remove-ManagementRoleAssignment' -cmdParams @{ Identity = $_.Guid; Confirm = $false } -UseSystemMailbox $true
5252
Write-LogMessage -API 'Standards' -tenant $tenant -message "Disabled Outlook add-in role: $Role" -sev Debug
5353
}
5454
} catch {

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardDisableTNEF.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ function Invoke-CIPPStandardDisableTNEF {
3838

3939
if ($CurrentState.TNEFEnabled -ne $false) {
4040
try {
41-
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-RemoteDomain' -cmdParams @{Identity = 'Default'; TNEFEnabled = $false } -useSystemmailbox $true
41+
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-RemoteDomain' -cmdParams @{Identity = 'Default'; TNEFEnabled = $false } -useSystemMailbox $true
4242
Write-LogMessage -API 'Standards' -tenant $tenant -message 'Disabled TNEF for Default Remote Domain' -sev Info
4343
} catch {
4444
$ErrorMessage = Get-NormalizedError -Message $_.Exception.Message

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEXODisableAutoForwarding.ps1

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,13 +35,13 @@ function Invoke-CIPPStandardEXODisableAutoForwarding {
3535
param($Tenant, $Settings)
3636
##$Rerun -Type Standard -Tenant $Tenant -Settings $Settings 'EXODisableAutoForwarding'
3737

38-
$CurrentInfo = New-ExoRequest -tenantid $Tenant -cmdlet 'Get-HostedOutboundSpamFilterPolicy' -cmdparams @{Identity = 'Default' } -useSystemMailbox $true
38+
$CurrentInfo = New-ExoRequest -tenantid $Tenant -cmdlet 'Get-HostedOutboundSpamFilterPolicy' -cmdParams @{Identity = 'Default' } -useSystemMailbox $true
3939
$StateIsCorrect = $CurrentInfo.AutoForwardingMode -eq 'Off'
4040

4141
If ($Settings.remediate -eq $true) {
4242

4343
try {
44-
New-ExoRequest -tenantid $tenant -cmdlet 'Set-HostedOutboundSpamFilterPolicy' -cmdparams @{ Identity = 'Default'; AutoForwardingMode = 'Off' } -useSystemMailbox $true
44+
New-ExoRequest -tenantid $tenant -cmdlet 'Set-HostedOutboundSpamFilterPolicy' -cmdParams @{ Identity = 'Default'; AutoForwardingMode = 'Off' } -useSystemMailbox $true
4545
Write-LogMessage -API 'Standards' -tenant $tenant -message 'Disabled auto forwarding' -sev Info
4646
} catch {
4747
$ErrorMessage = Get-CippException -Exception $_

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableMailTips.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ function Invoke-CIPPStandardEnableMailTips {
4444
Write-LogMessage -API 'Standards' -tenant $Tenant -message 'All MailTips are already enabled.' -sev Info
4545
} else {
4646
try {
47-
New-ExoRequest -useSystemMailbox $true -tenantid $Tenant -cmdlet 'Set-OrganizationConfig' -cmdparams @{ MailTipsAllTipsEnabled = $true; MailTipsExternalRecipientsTipsEnabled = $true; MailTipsGroupMetricsEnabled = $true; MailTipsLargeAudienceThreshold = $Settings.MailTipsLargeAudienceThreshold }
47+
New-ExoRequest -useSystemMailbox $true -tenantid $Tenant -cmdlet 'Set-OrganizationConfig' -cmdParams @{ MailTipsAllTipsEnabled = $true; MailTipsExternalRecipientsTipsEnabled = $true; MailTipsGroupMetricsEnabled = $true; MailTipsLargeAudienceThreshold = $Settings.MailTipsLargeAudienceThreshold }
4848
Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Enabled all MailTips' -sev Info
4949
} catch {
5050
$ErrorMessage = Get-NormalizedError -Message $_.Exception.Message

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardEnableOnlineArchiving.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ function Invoke-CIPPStandardEnableOnlineArchiving {
3232

3333
$MailboxPlans = @( 'ExchangeOnline', 'ExchangeOnlineEnterprise' )
3434
$MailboxesNoArchive = $MailboxPlans | ForEach-Object {
35-
New-ExoRequest -tenantid $Tenant -cmdlet 'Get-Mailbox' -cmdparams @{ MailboxPlan = $_; Filter = 'ArchiveGuid -Eq "00000000-0000-0000-0000-000000000000" -AND RecipientTypeDetails -Eq "UserMailbox"' }
35+
New-ExoRequest -tenantid $Tenant -cmdlet 'Get-Mailbox' -cmdParams @{ MailboxPlan = $_; Filter = 'ArchiveGuid -Eq "00000000-0000-0000-0000-000000000000" -AND RecipientTypeDetails -Eq "UserMailbox"' }
3636
Write-Host "Getting mailboxes without Online Archiving for plan $_"
3737
}
3838

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardIntuneTemplate.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ function Invoke-CIPPStandardIntuneTemplate {
3939
$CompareList = foreach ($Template in $Settings) {
4040
Write-Host "IntuneTemplate: $($Template.TemplateList.value) - Trying to find template"
4141
$Request.body = (Get-CIPPAzDataTableEntity @Table -Filter $Filter | Where-Object -Property RowKey -Like "$($Template.TemplateList.value)*").JSON | ConvertFrom-Json -ErrorAction SilentlyContinue
42-
if ($Request.body -eq $null) {
42+
if ($null -eq $Request.body) {
4343
Write-LogMessage -API 'Standards' -tenant $tenant -message "Failed to find template $($Template.TemplateList.value). Has this Intune Template been deleted?" -sev 'Error'
4444
continue
4545
}

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardMalwareFilterPolicy.ps1

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ function Invoke-CIPPStandardMalwareFilterPolicy {
9696
if ($StateIsCorrect -eq $true) {
9797
Write-LogMessage -API 'Standards' -tenant $Tenant -message 'Malware Filter Policy already correctly configured' -sev Info
9898
} else {
99-
$cmdparams = @{
99+
$cmdParams = @{
100100
EnableFileFilter = $true
101101
FileTypes = $ExpectedFileTypes
102102
FileTypeAction = $Settings.FileTypeAction
@@ -110,16 +110,16 @@ function Invoke-CIPPStandardMalwareFilterPolicy {
110110

111111
if ($CurrentState.Name -eq $PolicyName) {
112112
try {
113-
$cmdparams.Add('Identity', $PolicyName)
114-
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-MalwareFilterPolicy' -cmdparams $cmdparams -UseSystemMailbox $true
113+
$cmdParams.Add('Identity', $PolicyName)
114+
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-MalwareFilterPolicy' -cmdParams $cmdParams -UseSystemMailbox $true
115115
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Updated Malware Filter policy $PolicyName." -sev Info
116116
} catch {
117117
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to update Malware Filter policy $PolicyName." -sev Error -LogData $_
118118
}
119119
} else {
120120
try {
121-
$cmdparams.Add('Name', $PolicyName)
122-
New-ExoRequest -tenantid $Tenant -cmdlet 'New-MalwareFilterPolicy' -cmdparams $cmdparams -UseSystemMailbox $true
121+
$cmdParams.Add('Name', $PolicyName)
122+
New-ExoRequest -tenantid $Tenant -cmdlet 'New-MalwareFilterPolicy' -cmdParams $cmdParams -UseSystemMailbox $true
123123
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Created Malware Filter policy $PolicyName." -sev Info
124124
} catch {
125125
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Malware Filter policy $PolicyName." -sev Error -LogData $_
@@ -128,27 +128,27 @@ function Invoke-CIPPStandardMalwareFilterPolicy {
128128
}
129129

130130
if ($RuleStateIsCorrect -eq $false) {
131-
$cmdparams = @{
131+
$cmdParams = @{
132132
Priority = 0
133133
RecipientDomainIs = $AcceptedDomains.Name
134134
}
135135

136136
if ($RuleState.MalwareFilterPolicy -ne $PolicyName) {
137-
$cmdparams.Add('MalwareFilterPolicy', $PolicyName)
137+
$cmdParams.Add('MalwareFilterPolicy', $PolicyName)
138138
}
139139

140140
if ($RuleState.Name -eq $RuleName) {
141141
try {
142-
$cmdparams.Add('Identity', $RuleName)
143-
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-MalwareFilterRule' -cmdparams $cmdparams -UseSystemMailbox $true
142+
$cmdParams.Add('Identity', $RuleName)
143+
New-ExoRequest -tenantid $Tenant -cmdlet 'Set-MalwareFilterRule' -cmdParams $cmdParams -UseSystemMailbox $true
144144
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Updated Malware Filter rule $RuleName." -sev Info
145145
} catch {
146146
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to update Malware Filter Rule $RuleName." -sev Error -LogData $_
147147
}
148148
} else {
149149
try {
150-
$cmdparams.Add('Name', $RuleName)
151-
New-ExoRequest -tenantid $Tenant -cmdlet 'New-MalwareFilterRule' -cmdparams $cmdparams -UseSystemMailbox $true
150+
$cmdParams.Add('Name', $RuleName)
151+
New-ExoRequest -tenantid $Tenant -cmdlet 'New-MalwareFilterRule' -cmdParams $cmdParams -UseSystemMailbox $true
152152
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Created Malware Filter rule $RuleName." -sev Info
153153
} catch {
154154
Write-LogMessage -API 'Standards' -tenant $Tenant -message "Failed to create Malware Filter rule $RuleName." -sev Error -LogData $_

0 commit comments

Comments
 (0)