Skip to content

Commit 26991d4

Browse files
authored
Merge branch 'master' into patch-9
2 parents 7ca4801 + 804367d commit 26991d4

File tree

475 files changed

+4597
-2729
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

475 files changed

+4597
-2729
lines changed

.openpublishing.redirection.json

Lines changed: 38 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -282,7 +282,7 @@
282282
},
283283
{
284284
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Get-AdvancedThreatProtectionTrafficReport.md",
285-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-advancedthreatprotectiontrafficreport",
285+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
286286
"redirect_document_id": false
287287
},
288288
{
@@ -342,7 +342,7 @@
342342
},
343343
{
344344
"source_path": "exchange/virtual-folder/exchange/advanced-threat-protection/Get-UrlTrace.md",
345-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-urltrace",
345+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-safelinksaggregatereport",
346346
"redirect_document_id": false
347347
},
348348
{
@@ -5247,12 +5247,12 @@
52475247
},
52485248
{
52495249
"source_path": "exchange/virtual-folder/exchange/reporting/Get-MailDetailMalwareReport.md",
5250-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailmalwarereport",
5250+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
52515251
"redirect_document_id": false
52525252
},
52535253
{
52545254
"source_path": "exchange/virtual-folder/exchange/reporting/Get-MailDetailSpamReport.md",
5255-
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailspamreport",
5255+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
52565256
"redirect_document_id": false
52575257
},
52585258
{
@@ -6626,24 +6626,54 @@
66266626
"redirect_document_id": false
66276627
},
66286628
{
6629-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Get-TenantAnalyticsConfig.md",
6629+
"source_path": "exchange/virtual-folder/exchange/Get-TenantAnalyticsConfig.md",
66306630
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
66316631
"redirect_document_id": false
66326632
},
66336633
{
6634-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Set-TenantAnalyticsConfig.md",
6634+
"source_path": "exchange/virtual-folder/exchange/Set-TenantAnalyticsConfig.md",
66356635
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-myanalyticsfeatureconfig",
66366636
"redirect_document_id": false
66376637
},
66386638
{
6639-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Get-UserAnalyticsConfig.md",
6639+
"source_path": "exchange/virtual-folder/exchange/Get-UserAnalyticsConfig.md",
66406640
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-myanalyticsfeatureconfig",
66416641
"redirect_document_id": false
66426642
},
66436643
{
6644-
"source_path": "exchange/virtual-folder/exchange/mailboxes/Set-UserAnalyticsConfig.md",
6644+
"source_path": "exchange/virtual-folder/exchange/Set-UserAnalyticsConfig.md",
66456645
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/set-myanalyticsfeatureconfig",
66466646
"redirect_document_id": false
6647+
},
6648+
{
6649+
"source_path": "exchange/virtual-folder/exchange/Get-MailDetailMalwareReport.md",
6650+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6651+
"redirect_document_id": false
6652+
},
6653+
{
6654+
"source_path": "exchange/virtual-folder/exchange/Get-MailDetailSpamReport.md",
6655+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6656+
"redirect_document_id": false
6657+
},
6658+
{
6659+
"source_path": "exchange/virtual-folder/exchange/Get-AdvancedThreatProtectionTrafficReport.md",
6660+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6661+
"redirect_document_id": false
6662+
},
6663+
{
6664+
"source_path": "exchange/virtual-folder/exchange/Get-UrlTrace.md",
6665+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-safelinksaggregatereport",
6666+
"redirect_document_id": false
6667+
},
6668+
{
6669+
"source_path": "exchange/virtual-folder/exchange/Get-MailTrafficReport.md",
6670+
"redirect_url": "https://docs.microsoft.com/powershell/module/exchange/get-maildetailatpreport",
6671+
"redirect_document_id": false
6672+
},
6673+
{
6674+
"source_path": "exchange/virtual-folder/exchange/Import-ContactList.md",
6675+
"redirect_url": "https://support.microsoft.com/office/import-contacts-to-outlook-bb796340-b58a-46c1-90c7-b549b8f3c5f8",
6676+
"redirect_document_id": false
66476677
}
66486678
]
66496679
}

exchange/docs-conceptual/basic-auth-connect-to-eop-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -133,11 +133,11 @@ If you receive errors, check the following requirements:
133133

134134
- The account you use to connect to Exchange Online Protection PowerShell must be represented as a [mail user in EOP](/microsoft-365/security/office-365-security/manage-mail-users-in-eop) (created manually or by directory synchronization). If the account is not visible in the Exchange admin center (EAC) as a mail user at **Recipients** \> **Contacts**, you'll receive the following error when you try to connect:
135135

136-
> Import-PSSession : Running the Get-Command command in a remote session reported the following error: Processing data for a remote command failed with the following error message: The request for the Windows Remote Shell with ShellId <GUID> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
136+
> Import-PSSession : Running the Get-Command command in a remote session reported the following error: Processing data for a remote command failed with the following error message: The request for the Windows Remote Shell with ShellId \<GUID\> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
137137
138138
- The **New-PSSession** command (Step 2) might fail to connect if your client IP address changes during the connection request. This can happen if your organization uses a source network address translation (SNAT) pool that contains multiple IP addresses. The connection error looks like this:
139139

140-
> The request for the Windows Remote Shell with ShellId <ID> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
140+
> The request for the Windows Remote Shell with ShellId \<ID\> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
141141
142142
To fix the issue, use an SNAT pool that contains a single IP address, or force the use of a specific IP address for connections to the Exchange Online Protection PowerShell endpoint.
143143

exchange/docs-conceptual/basic-auth-connect-to-scc-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ If you receive errors, check the following requirements:
140140

141141
- The **New-PSSession** command (Step 2) might fail to connect if your client IP address changes during the connection request. This can happen if your organization uses a source network address translation (SNAT) pool that contains multiple IP addresses. The connection error looks like this:
142142

143-
> The request for the Windows Remote Shell with ShellId <ID> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
143+
> The request for the Windows Remote Shell with ShellId \<ID\> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
144144
145145
To fix the issue, use an SNAT pool that contains a single IP address, or force the use of a specific IP address for connections to the Security & Compliance Center PowerShell endpoint.
146146

exchange/docs-conceptual/connect-to-exchange-online-protection-powershell.md

Lines changed: 6 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,8 @@ If your account uses multi-factor authentication, use the steps in this section.
4747
Import-Module ExchangeOnlineManagement
4848
```
4949

50-
**Note**: If you've already [installed the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module), the previous command will work as written.
50+
> [!NOTE]
51+
> If you've already [installed the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module), the previous command will work as written.
5152
5253
2. The command that you need to run uses the following syntax:
5354

@@ -65,12 +66,6 @@ If your account uses multi-factor authentication, use the steps in this section.
6566
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://ps.protection.outlook.com/powershell-liveid/
6667
```
6768

68-
**This example connects to Exchange Online Protection PowerShell in an Office 365 Germany organization**:
69-
70-
```powershell
71-
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://ps.protection.outlook.de/powershell-liveid/ -AzureADAuthorizationEndPointUri https://login.microsoftonline.de/common
72-
```
73-
7469
For detailed syntax and parameter information, see [Connect-IPPSSession](/powershell/module/exchange/connect-exchangeonline).
7570

7671
> [!NOTE]
@@ -90,7 +85,8 @@ If your account doesn't use multi-factor authentication, use the steps in this s
9085
Import-Module ExchangeOnlineManagement
9186
```
9287

93-
**Note**: If you've already [installed the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module), the previous command will work as written.
88+
> [!NOTE]
89+
> If you've already [installed the EXO V2 module](exchange-online-powershell-v2.md#install-and-maintain-the-exo-v2-module), the previous command will work as written.
9490
9591
2. Run the following command:
9692

@@ -118,12 +114,6 @@ If your account doesn't use multi-factor authentication, use the steps in this s
118114
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.protection.outlook.com/powershell-liveid/
119115
```
120116

121-
**This example connects to Exchange Online Protection PowerShell in an Office 365 Germany organization**:
122-
123-
```powershell
124-
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.protection.outlook.de/powershell-liveid/
125-
```
126-
127117
For detailed syntax and parameter information, see [Connect-IPPSSession](/powershell/module/exchange/connect-exchangeonline).
128118

129119
> [!NOTE]
@@ -147,10 +137,10 @@ If you receive errors, check the following requirements:
147137

148138
- The account that you use to connect to Exchange Online Protection PowerShell must be represented as a [mail user in EOP](/microsoft-365/security/office-365-security/manage-mail-users-in-eop) (created manually or by directory synchronization). If the account is not visible in the Exchange admin center (EAC) as a mail user at **Recipients** \> **Contacts**, you'll receive the following error when you try to connect:
149139

150-
> Import-PSSession : Running the Get-Command command in a remote session reported the following error: Processing data for a remote command failed with the following error message: The request for the Windows Remote Shell with ShellId <GUID> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
140+
> Import-PSSession : Running the Get-Command command in a remote session reported the following error: Processing data for a remote command failed with the following error message: The request for the Windows Remote Shell with ShellId \<GUID\> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
151141
152142
- You might fail to connect if your client IP address changes during the connection request. This can happen if your organization uses a source network address translation (SNAT) pool that contains multiple IP addresses. The connection error looks like this:
153143

154-
> The request for the Windows Remote Shell with ShellId <ID> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
144+
> The request for the Windows Remote Shell with ShellId \<ID\> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
155145
156146
To fix the issue, use an SNAT pool that contains a single IP address, or force the use of a specific IP address for connections to the Exchange Online Protection PowerShell endpoint.

exchange/docs-conceptual/connect-to-scc-powershell.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -61,22 +61,22 @@ If your account uses multi-factor authentication, use the steps in this section.
6161
Connect-IPPSSession -UserPrincipalName [email protected]
6262
```
6363

64-
**This example connects to Security & Compliance Center PowerShell in an Office 365 Germany organization**.
64+
**This example connects to Security & Compliance Center PowerShell in an Office 365 operated by 21Vianet organization**.
6565

6666
```powershell
67-
Connect-IPPSSession -UserPrincipalName lukas@fabrikam.de -ConnectionUri https://ps.compliance.protection.outlook.de/PowerShell-LiveID
67+
Connect-IPPSSession -UserPrincipalName li@fabrikam.cn -ConnectionUri https://ps.compliance.protection.partner.outlook.cn/powershell-liveid
6868
```
6969

7070
**This example connects to Security & Compliance Center PowerShell in a Microsoft GCC High organization**.
7171

7272
```powershell
73-
Connect-IPPSSession -UserPrincipalName -ConnectionUri https://ps.compliance.protection.office365.us/powershell-liveid/
73+
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://ps.compliance.protection.office365.us/powershell-liveid/
7474
```
7575

7676
**This example connects to Security & Compliance Center PowerShell in a Microsoft 365 DoD organization**.
7777

7878
```powershell
79-
Connect-IPPSSession -UserPrincipalName -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/
79+
Connect-IPPSSession -UserPrincipalName [email protected] -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/
8080
```
8181

8282
For detailed syntax and parameter information, see [Connect-IPPSSession](/powershell/module/exchange/connect-ippssession).
@@ -128,10 +128,10 @@ If your account doesn't use multi-factor authentication, use the steps in this s
128128
Connect-IPPSSession -Credential $UserCredential
129129
```
130130

131-
**This example connects to Security & Compliance Center PowerShell in an Office 365 Germany organization**.
131+
**This example connects to Security & Compliance Center PowerShell in aOffice 365 operated by 21Vianet organization**.
132132

133133
```powershell
134-
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.compliance.protection.outlook.de/ -AzureADAuthorizationEndpointUri https://login.microsoftonline.de/common
134+
Connect-IPPSSession -Credential $UserCredential -ConnectionUri https://ps.compliance.protection.partner.outlook.cn/powershell-liveid -AzureADAuthorizationEndpointUri https://login.chinacloudapi.cn/common
135135
```
136136

137137
**This example connects to Security & Compliance Center PowerShell in a Microsoft GCC High organization**.

0 commit comments

Comments
 (0)