Skip to content

Commit fda6115

Browse files
committed
Fixing inconsistent product name capitalisation
1 parent bccb3cf commit fda6115

File tree

12 files changed

+16
-16
lines changed

12 files changed

+16
-16
lines changed

Config/standards.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -486,7 +486,7 @@
486486
"name": "standards.DisableM365GroupUsers",
487487
"cat": "Entra (AAD) Standards",
488488
"tag": ["lowimpact"],
489-
"helpText": "Restricts M365 group creation to certain admin roles. This disables the ability to create Teams, Sharepoint sites, Planner, etc",
489+
"helpText": "Restricts M365 group creation to certain admin roles. This disables the ability to create Teams, SharePoint sites, Planner, etc",
490490
"docsDescription": "Users by default are allowed to create M365 groups. This restricts M365 group creation to certain admin roles. This disables the ability to create Teams, SharePoint sites, Planner, etc",
491491
"addedComponent": [],
492492
"label": "Disable M365 Group creation by users",

Modules/CIPPCore/Public/Entrypoints/Activity Triggers/Push-ExecOnboardTenantQueue.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ Function Push-ExecOnboardTenantQueue {
4444
@{ Name = 'Cloud App Security Administrator'; Id = '892c5842-a9a6-463a-8041-72aa08ca3cf6' },
4545
@{ Name = 'Cloud Device Administrator'; Id = '7698a772-787b-4ac8-901f-60d6b08affd2' },
4646
@{ Name = 'Teams Administrator'; Id = '69091246-20e8-4a56-aa4d-066075b2a7a8' },
47-
@{ Name = 'Sharepoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
47+
@{ Name = 'SharePoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
4848
@{ Name = 'Authentication Policy Administrator'; Id = '0526716b-113d-4c15-b2c8-68e3c22b9f80' },
4949
@{ Name = 'Privileged Role Administrator'; Id = 'e8611ab8-c189-46e8-94e1-60213ab1f814' },
5050
@{ Name = 'Privileged Authentication Administrator'; Id = '7be44c8a-adaf-4e2a-84d6-ab2649e08a13' }

Modules/CIPPCore/Public/Entrypoints/HTTP Functions/Tenant/GDAP/Invoke-ExecAddGDAPRole.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Function Invoke-ExecAddGDAPRole {
2222
@{ label = 'Cloud App Security Administrator'; value = '892c5842-a9a6-463a-8041-72aa08ca3cf6' },
2323
@{ label = 'Cloud Device Administrator'; value = '7698a772-787b-4ac8-901f-60d6b08affd2' },
2424
@{ label = 'Teams Administrator'; value = '69091246-20e8-4a56-aa4d-066075b2a7a8' },
25-
@{ label = 'Sharepoint Administrator'; value = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
25+
@{ label = 'SharePoint Administrator'; value = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
2626
@{ label = 'Authentication Policy Administrator'; value = '0526716b-113d-4c15-b2c8-68e3c22b9f80' },
2727
@{ label = 'Privileged Role Administrator'; value = 'e8611ab8-c189-46e8-94e1-60213ab1f814' },
2828
@{ label = 'Privileged Authentication Administrator'; value = '7be44c8a-adaf-4e2a-84d6-ab2649e08a13' }

Modules/CIPPCore/Public/PermissionsTranslator.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5320,7 +5320,7 @@
53205320
},
53215321
{
53225322
"description": "Allows the app to have full control of all site collections on behalf of the signed-in user.",
5323-
"displayName": "Manage Sharepoint Online",
5323+
"displayName": "Manage SharePoint Online",
53245324
"id": "56680e0d-d2a3-4ae1-80d8-3c4f2100e3d0",
53255325
"Origin": "Delegated (Office 365 SharePoint Online)",
53265326
"userConsentDescription": "Have full control of all site collections",

Modules/CIPPCore/Public/Set-CIPPSPOTenant.ps1

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
function Set-CIPPSPOTenant {
22
<#
33
.SYNOPSIS
4-
Set Sharepoint Tenant properties
4+
Set SharePoint Tenant properties
55
66
.DESCRIPTION
7-
Set Sharepoint Tenant properties via SPO API
7+
Set SharePoint Tenant properties via SPO API
88
99
.PARAMETER TenantFilter
1010
Tenant to apply settings to

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSPDisallowInfectedFiles.ps1

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ function Invoke-CIPPStandardSPDisallowInfectedFiles {
3838

3939
if ($Settings.remediate -eq $true) {
4040
if ($StateIsCorrect -eq $true) {
41-
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading Sharepoint infected files are already disallowed.' -Sev Info
41+
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading SharePoint infected files are already disallowed.' -Sev Info
4242
} else {
4343
$Properties = @{
4444
DisallowInfectedFileDownload = $true
@@ -49,16 +49,16 @@ function Invoke-CIPPStandardSPDisallowInfectedFiles {
4949
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Successfully disallowed downloading SharePoint infected files.' -Sev Info
5050
} catch {
5151
$ErrorMessage = Get-NormalizedError -Message $_.Exception.Message
52-
Write-LogMessage -API 'Standards' -tenant $tenant -Message "Failed to disallow downloading Sharepoint infected files. Error: $ErrorMessage" -Sev Error
52+
Write-LogMessage -API 'Standards' -tenant $tenant -Message "Failed to disallow downloading SharePoint infected files. Error: $ErrorMessage" -Sev Error
5353
}
5454
}
5555
}
5656

5757
if ($Settings.alert -eq $true) {
5858
if ($StateIsCorrect -eq $true) {
59-
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading Sharepoint infected files are disallowed.' -Sev Info
59+
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading SharePoint infected files are disallowed.' -Sev Info
6060
} else {
61-
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading Sharepoint infected files are allowed.' -Sev Alert
61+
Write-LogMessage -API 'Standards' -tenant $tenant -Message 'Downloading SharePoint infected files are allowed.' -Sev Alert
6262
}
6363
}
6464

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSPEmailAttestation.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ function Invoke-CIPPStandardSPEmailAttestation {
4040

4141
if ($Settings.remediate -eq $true) {
4242
if ($StateIsCorrect -eq $true) {
43-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Sharepoint reauthentication with verification code is already restricted.' -Sev Info
43+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'SharePoint reauthentication with verification code is already restricted.' -Sev Info
4444
} else {
4545
$Properties = @{
4646
EmailAttestationReAuthDays = $Settings.Days

Modules/CIPPCore/Public/Standards/Invoke-CIPPStandardSPExternalUserExpiration.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ function Invoke-CIPPStandardSPExternalUserExpiration {
4040

4141
if ($Settings.remediate -eq $true) {
4242
if ($StateIsCorrect -eq $true) {
43-
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'Sharepoint External User Expiration is already enabled.' -Sev Info
43+
Write-LogMessage -API 'Standards' -Tenant $Tenant -Message 'SharePoint External User Expiration is already enabled.' -Sev Info
4444
} else {
4545
$Properties = @{
4646
ExternalUserExpireInDays = $Settings.Days

Modules/CIPPCore/Public/Test-CIPPAccessTenant.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ function Test-CIPPAccessTenant {
1414
@{ Name = 'Cloud App Security Administrator'; Id = '892c5842-a9a6-463a-8041-72aa08ca3cf6' },
1515
@{ Name = 'Cloud Device Administrator'; Id = '7698a772-787b-4ac8-901f-60d6b08affd2' },
1616
@{ Name = 'Teams Administrator'; Id = '69091246-20e8-4a56-aa4d-066075b2a7a8' },
17-
@{ Name = 'Sharepoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
17+
@{ Name = 'SharePoint Administrator'; Id = 'f28a1f50-f6e7-4571-818b-6a12f2af6b6c' },
1818
@{ Name = 'Authentication Policy Administrator'; Id = '0526716b-113d-4c15-b2c8-68e3c22b9f80' },
1919
@{ Name = 'Privileged Role Administrator'; Id = 'e8611ab8-c189-46e8-94e1-60213ab1f814' },
2020
@{ Name = 'Privileged Authentication Administrator'; Id = '7be44c8a-adaf-4e2a-84d6-ab2649e08a13' }

Modules/CIPPCore/Public/Test-CIPPGDAPRelationships.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ function Test-CIPPGDAPRelationships {
5050
'M365 GDAP Cloud App Security Administrator',
5151
'M365 GDAP Cloud Device Administrator',
5252
'M365 GDAP Teams Administrator',
53-
'M365 GDAP Sharepoint Administrator',
53+
'M365 GDAP SharePoint Administrator',
5454
'M365 GDAP Authentication Policy Administrator',
5555
'M365 GDAP Privileged Role Administrator',
5656
'M365 GDAP Privileged Authentication Administrator'

0 commit comments

Comments
 (0)