Skip to content

Commit 74735a5

Browse files
committed
Fixed up product name capitalisations
1 parent c753bf2 commit 74735a5

13 files changed

+22
-22
lines changed

Config/standards.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -486,7 +486,7 @@
486486
"name": "standards.DisableM365GroupUsers",
487487
"cat": "Entra (AAD) Standards",
488488
"tag": ["lowimpact"],
489-
"helpText": "Restricts M365 group creation to certain admin roles. This disables the ability to create Teams, Sharepoint sites, Planner, etc",
489+
"helpText": "Restricts M365 group creation to certain admin roles. This disables the ability to create Teams, SharePoint sites, Planner, etc",
490490
"docsDescription": "Users by default are allowed to create M365 groups. This restricts M365 group creation to certain admin roles. This disables the ability to create Teams, SharePoint sites, Planner, etc",
491491
"addedComponent": [],
492492
"label": "Disable M365 Group creation by users",

Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecOnboardTenantQueue.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Function Push-ExecOnboardTenantQueue {
4444
@{ Name = 'Cloud App Security Administrator'; Id = '892c5842-a9a6-463a-8041-72aa08ca3cf6' },
4545
@{ Name = 'Cloud Device Administrator'; Id = '7698a772-787b-4ac8-901f-60d6b08affd2' },
4646
@{ Name = 'Teams Administrator'; Id = '69091246-20e8-4a56-aa4d-066075b2a7a8' },
47-
@{ Name = 'Sharepoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
47+
@{ Name = 'SharePoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
4848
@{ Name = 'Authentication Policy Administrator'; Id = '0526716b-113d-4c15-b2c8-68e3c22b9f80' },
4949
@{ Name = 'Privileged Role Administrator'; Id = 'e8611ab8-c189-46e8-94e1-60213ab1f814' },
5050
@{ Name = 'Privileged Authentication Administrator'; Id = '7be44c8a-adaf-4e2a-84d6-ab2649e08a13' }

Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/GDAP/Invoke-ExecAddGDAPRole.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Function Invoke-ExecAddGDAPRole {
2222
@{ label = 'Cloud App Security Administrator'; value = '892c5842-a9a6-463a-8041-72aa08ca3cf6' },
2323
@{ label = 'Cloud Device Administrator'; value = '7698a772-787b-4ac8-901f-60d6b08affd2' },
2424
@{ label = 'Teams Administrator'; value = '69091246-20e8-4a56-aa4d-066075b2a7a8' },
25-
@{ label = 'Sharepoint Administrator'; value = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
25+
@{ label = 'SharePoint Administrator'; value = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
2626
@{ label = 'Authentication Policy Administrator'; value = '0526716b-113d-4c15-b2c8-68e3c22b9f80' },
2727
@{ label = 'Privileged Role Administrator'; value = 'e8611ab8-c189-46e8-94e1-60213ab1f814' },
2828
@{ label = 'Privileged Authentication Administrator'; value = '7be44c8a-adaf-4e2a-84d6-ab2649e08a13' }

Modules/CIPPCore/Public/PermissionsTranslator.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5320,7 +5320,7 @@
53205320
},
53215321
{
53225322
"description": "Allows the app to have full control of all site collections on behalf of the signed-in user.",
5323-
"displayName": "Manage Sharepoint Online",
5323+
"displayName": "Manage SharePoint Online",
53245324
"id": "56680e0d-d2a3-4ae1-80d8-3c4f2100e3d0",
53255325
"Origin": "Delegated (Office 365 SharePoint Online)",
53265326
"userConsentDescription": "Have full control of all site collections",

Modules/CIPPCore/Public/Set-CIPPSPOTenant.ps1

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
function Set-CIPPSPOTenant {
22
<#
33
.SYNOPSIS
4-
Set Sharepoint Tenant properties
4+
Set SharePoint Tenant properties
55
66
.DESCRIPTION
7-
Set Sharepoint Tenant properties via SPO API
7+
Set SharePoint Tenant properties via SPO API
88
99
.PARAMETER TenantFilter
1010
Tenant to apply settings to

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardIntuneComplianceSettings.ps1

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ function Invoke-CIPPStandardIntuneComplianceSettings {
2020
IMPACT
2121
Low Impact
2222
POWERSHELLEQUIVALENT
23-
23+
2424
RECOMMENDEDBY
2525
UPDATECOMMENTBLOCK
2626
Run the Tools\Update-StandardsComments.ps1 script to update this comment block
@@ -39,7 +39,7 @@ function Invoke-CIPPStandardIntuneComplianceSettings {
3939

4040
if ($Settings.remediate -eq $true) {
4141
if ($StateIsCorrect -eq $true) {
42-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'InTune Compliance settings is already applied correctly.' -Sev Info
42+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Intune Compliance settings is already applied correctly.' -Sev Info
4343
} else {
4444
try {
4545
$GraphRequest = @{
@@ -56,18 +56,18 @@ function Invoke-CIPPStandardIntuneComplianceSettings {
5656
} | ConvertTo-Json -Compress
5757
}
5858
New-GraphPostRequest @GraphRequest
59-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Successfully updated InTune Compliance settings.' -Sev Info
59+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Successfully updated Intune Compliance settings.' -Sev Info
6060
} catch {
61-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message "Failed to update InTune Compliance settings." -Sev Error -LogData $_
61+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message "Failed to update Intune Compliance settings." -Sev Error -LogData $_
6262
}
6363
}
6464
}
6565

6666
if ($Settings.alert -eq $true) {
6767
if ($StateIsCorrect -eq $true) {
68-
Write-LogMessage -API 'Standards' -tenant $tenant -message 'InTune Compliance settings is enabled.' -sev Info
68+
Write-LogMessage -API 'Standards' -tenant $tenant -message 'Intune Compliance settings is enabled.' -sev Info
6969
} else {
70-
Write-LogMessage -API 'Standards' -tenant $tenant -message 'InTune Compliance settings is not enabled.' -sev Alert
70+
Write-LogMessage -API 'Standards' -tenant $tenant -message 'Intune Compliance settings is not enabled.' -sev Alert
7171
}
7272
}
7373

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSPDisallowInfectedFiles.ps1

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ function Invoke-CIPPStandardSPDisallowInfectedFiles {
3838

3939
if ($Settings.remediate -eq $true) {
4040
if ($StateIsCorrect -eq $true) {
41-
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading Sharepoint infected files are already disallowed.' -Sev Info
41+
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading SharePoint infected files are already disallowed.' -Sev Info
4242
} else {
4343
$Properties = @{
4444
DisallowInfectedFileDownload = $true
@@ -49,16 +49,16 @@ function Invoke-CIPPStandardSPDisallowInfectedFiles {
4949
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Successfully disallowed downloading SharePoint infected files.' -Sev Info
5050
} catch {
5151
$ErrorMessage = Get-NormalizedError -Message $_.Exception.Message
52-
Write-LogMessage -API 'Standards' -tenant $tenant -Message "Failed to disallow downloading Sharepoint infected files. Error: $ErrorMessage" -Sev Error
52+
Write-LogMessage -API 'Standards' -tenant $tenant -Message "Failed to disallow downloading SharePoint infected files. Error: $ErrorMessage" -Sev Error
5353
}
5454
}
5555
}
5656

5757
if ($Settings.alert -eq $true) {
5858
if ($StateIsCorrect -eq $true) {
59-
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading Sharepoint infected files are disallowed.' -Sev Info
59+
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading SharePoint infected files are disallowed.' -Sev Info
6060
} else {
61-
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading Sharepoint infected files are allowed.' -Sev Alert
61+
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading SharePoint infected files are allowed.' -Sev Alert
6262
}
6363
}
6464

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSPEmailAttestation.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ function Invoke-CIPPStandardSPEmailAttestation {
4040

4141
if ($Settings.remediate -eq $true) {
4242
if ($StateIsCorrect -eq $true) {
43-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Sharepoint reauthentication with verification code is already restricted.' -Sev Info
43+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'SharePoint reauthentication with verification code is already restricted.' -Sev Info
4444
} else {
4545
$Properties = @{
4646
EmailAttestationReAuthDays = $Settings.Days

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSPExternalUserExpiration.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ function Invoke-CIPPStandardSPExternalUserExpiration {
4040

4141
if ($Settings.remediate -eq $true) {
4242
if ($StateIsCorrect -eq $true) {
43-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Sharepoint External User Expiration is already enabled.' -Sev Info
43+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'SharePoint External User Expiration is already enabled.' -Sev Info
4444
} else {
4545
$Properties = @{
4646
ExternalUserExpireInDays = $Settings.Days

Modules/CIPPCore/Public/Test-CIPPAccessTenant.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ function Test-CIPPAccessTenant {
1414
@{ Name = 'Cloud App Security Administrator'; Id = '892c5842-a9a6-463a-8041-72aa08ca3cf6' },
1515
@{ Name = 'Cloud Device Administrator'; Id = '7698a772-787b-4ac8-901f-60d6b08affd2' },
1616
@{ Name = 'Teams Administrator'; Id = '69091246-20e8-4a56-aa4d-066075b2a7a8' },
17-
@{ Name = 'Sharepoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
17+
@{ Name = 'SharePoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
1818
@{ Name = 'Authentication Policy Administrator'; Id = '0526716b-113d-4c15-b2c8-68e3c22b9f80' },
1919
@{ Name = 'Privileged Role Administrator'; Id = 'e8611ab8-c189-46e8-94e1-60213ab1f814' },
2020
@{ Name = 'Privileged Authentication Administrator'; Id = '7be44c8a-adaf-4e2a-84d6-ab2649e08a13' }

0 commit comments

Comments
 (0)