diff --git a/exchange/exchange-ps/ExchangePowerShell/Add-VivaModuleFeaturePolicy.md b/exchange/exchange-ps/ExchangePowerShell/Add-VivaModuleFeaturePolicy.md index 532e5ea442..11f17402bd 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Add-VivaModuleFeaturePolicy.md +++ b/exchange/exchange-ps/ExchangePowerShell/Add-VivaModuleFeaturePolicy.md @@ -53,7 +53,7 @@ To learn more about assigned roles at the feature level, see [Features Available To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Add-VivaOrgInsightsDelegatedRole.md b/exchange/exchange-ps/ExchangePowerShell/Add-VivaOrgInsightsDelegatedRole.md index cbe05a370e..8f0a7df33c 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Add-VivaOrgInsightsDelegatedRole.md +++ b/exchange/exchange-ps/ExchangePowerShell/Add-VivaOrgInsightsDelegatedRole.md @@ -33,7 +33,7 @@ To run this cmdlet, you need to be a member of one of the following role groups - Insights Administrator > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Check-PurviewConfig.md b/exchange/exchange-ps/ExchangePowerShell/Check-PurviewConfig.md index 27692105c9..774e3fdbc4 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Check-PurviewConfig.md +++ b/exchange/exchange-ps/ExchangePowerShell/Check-PurviewConfig.md @@ -48,7 +48,7 @@ Admins with the Organization Configuration role assigned have the necessary perm To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Get-DefaultTenantBriefingConfig.md b/exchange/exchange-ps/ExchangePowerShell/Get-DefaultTenantBriefingConfig.md index a10b574eb4..895047a913 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Get-DefaultTenantBriefingConfig.md +++ b/exchange/exchange-ps/ExchangePowerShell/Get-DefaultTenantBriefingConfig.md @@ -41,7 +41,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro For more information, see [Microsoft Entra built-in roles](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Get-DefaultTenantMyAnalyticsFeatureConfig.md b/exchange/exchange-ps/ExchangePowerShell/Get-DefaultTenantMyAnalyticsFeatureConfig.md index 7e45af76f7..59f4e7dc02 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Get-DefaultTenantMyAnalyticsFeatureConfig.md +++ b/exchange/exchange-ps/ExchangePowerShell/Get-DefaultTenantMyAnalyticsFeatureConfig.md @@ -37,7 +37,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro For more information, see [Microsoft Entra built-in roles](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Get-MyAnalyticsFeatureConfig.md b/exchange/exchange-ps/ExchangePowerShell/Get-MyAnalyticsFeatureConfig.md index 9e84a9bb8b..aee28abf83 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Get-MyAnalyticsFeatureConfig.md +++ b/exchange/exchange-ps/ExchangePowerShell/Get-MyAnalyticsFeatureConfig.md @@ -41,7 +41,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Get-UserBriefingConfig.md b/exchange/exchange-ps/ExchangePowerShell/Get-UserBriefingConfig.md index 4053998bbe..50b475fdc0 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Get-UserBriefingConfig.md +++ b/exchange/exchange-ps/ExchangePowerShell/Get-UserBriefingConfig.md @@ -38,7 +38,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Get-VivaInsightsSettings.md b/exchange/exchange-ps/ExchangePowerShell/Get-VivaInsightsSettings.md index 3e9042e558..6a0a7132cf 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Get-VivaInsightsSettings.md +++ b/exchange/exchange-ps/ExchangePowerShell/Get-VivaInsightsSettings.md @@ -42,7 +42,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Get-VivaModuleFeatureEnablement.md b/exchange/exchange-ps/ExchangePowerShell/Get-VivaModuleFeatureEnablement.md index 8b2a28c7a4..7a5b8c979a 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Get-VivaModuleFeatureEnablement.md +++ b/exchange/exchange-ps/ExchangePowerShell/Get-VivaModuleFeatureEnablement.md @@ -39,7 +39,7 @@ Currently, you need to be a member of the Global Administrators role to run this To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Get-VivaModuleFeaturePolicy.md b/exchange/exchange-ps/ExchangePowerShell/Get-VivaModuleFeaturePolicy.md index be764f9f84..1be55bd86b 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Get-VivaModuleFeaturePolicy.md +++ b/exchange/exchange-ps/ExchangePowerShell/Get-VivaModuleFeaturePolicy.md @@ -53,7 +53,7 @@ To learn more about assigned roles at the feature level, see [Features Available To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Get-VivaOrgInsightsDelegatedRole.md b/exchange/exchange-ps/ExchangePowerShell/Get-VivaOrgInsightsDelegatedRole.md index 7ac3a0cb63..fe330acc77 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Get-VivaOrgInsightsDelegatedRole.md +++ b/exchange/exchange-ps/ExchangePowerShell/Get-VivaOrgInsightsDelegatedRole.md @@ -35,7 +35,7 @@ To run this cmdlet, you need to be a member of one of the following role groups - Insights Administrator > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Remove-VivaModuleFeaturePolicy.md b/exchange/exchange-ps/ExchangePowerShell/Remove-VivaModuleFeaturePolicy.md index 1e16fd4904..96453de8c7 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Remove-VivaModuleFeaturePolicy.md +++ b/exchange/exchange-ps/ExchangePowerShell/Remove-VivaModuleFeaturePolicy.md @@ -42,7 +42,7 @@ To learn more about assigned roles at the feature level, see [Features Available To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Remove-VivaOrgInsightsDelegatedRole.md b/exchange/exchange-ps/ExchangePowerShell/Remove-VivaOrgInsightsDelegatedRole.md index cdd6c1c4ce..f4091747c1 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Remove-VivaOrgInsightsDelegatedRole.md +++ b/exchange/exchange-ps/ExchangePowerShell/Remove-VivaOrgInsightsDelegatedRole.md @@ -35,7 +35,7 @@ To run this cmdlet, you need to be a member of one of the following role groups - Insights Administrator > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Set-AtpPolicyForO365.md b/exchange/exchange-ps/ExchangePowerShell/Set-AtpPolicyForO365.md index 4b4654ecbd..f550a69956 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Set-AtpPolicyForO365.md +++ b/exchange/exchange-ps/ExchangePowerShell/Set-AtpPolicyForO365.md @@ -123,7 +123,7 @@ Accept wildcard characters: False The EnableATPForSPOTeamsODB parameter enables or disables Safe Attachments for SharePoint, OneDrive, and Microsoft Teams. Valid values are: -- $true: Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is enabled. SharePoint admins can use the DisallowInfectedFileDownload parameter on the [Set-SPOTenant](https://learn.microsoft.com/powershell/module/sharepoint-online/Set-SPOTenant) cmdlet to control whether users are allowed to download files that are found to be malicious. +- $true: Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is enabled. SharePoint admins can use the DisallowInfectedFileDownload parameter on the [Set-SPOTenant](https://learn.microsoft.com/powershell/module/microsoft.online.sharepoint.powershell/Set-SPOTenant) cmdlet to control whether users are allowed to download files that are found to be malicious. - $false: Safe Attachments for SharePoint, OneDrive, and Microsoft Teams is disabled. This value is the default. ```yaml diff --git a/exchange/exchange-ps/ExchangePowerShell/Set-DefaultTenantBriefingConfig.md b/exchange/exchange-ps/ExchangePowerShell/Set-DefaultTenantBriefingConfig.md index 624d0d94d3..ef54ac82a8 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Set-DefaultTenantBriefingConfig.md +++ b/exchange/exchange-ps/ExchangePowerShell/Set-DefaultTenantBriefingConfig.md @@ -39,7 +39,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro For more information, see [Microsoft Entra built-in roles](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Set-DefaultTenantMyAnalyticsFeatureConfig.md b/exchange/exchange-ps/ExchangePowerShell/Set-DefaultTenantMyAnalyticsFeatureConfig.md index 4bbfbdba3d..c29977085f 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Set-DefaultTenantMyAnalyticsFeatureConfig.md +++ b/exchange/exchange-ps/ExchangePowerShell/Set-DefaultTenantMyAnalyticsFeatureConfig.md @@ -42,7 +42,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro For more information, see [Microsoft Entra built-in roles](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Set-MyAnalyticsFeatureConfig.md b/exchange/exchange-ps/ExchangePowerShell/Set-MyAnalyticsFeatureConfig.md index e20c354134..100a680128 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Set-MyAnalyticsFeatureConfig.md +++ b/exchange/exchange-ps/ExchangePowerShell/Set-MyAnalyticsFeatureConfig.md @@ -44,7 +44,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Set-UserBriefingConfig.md b/exchange/exchange-ps/ExchangePowerShell/Set-UserBriefingConfig.md index d27da2058d..e3cb714a83 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Set-UserBriefingConfig.md +++ b/exchange/exchange-ps/ExchangePowerShell/Set-UserBriefingConfig.md @@ -39,7 +39,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Set-VivaInsightsSettings.md b/exchange/exchange-ps/ExchangePowerShell/Set-VivaInsightsSettings.md index e15f50ba9d..319b3ecec3 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Set-VivaInsightsSettings.md +++ b/exchange/exchange-ps/ExchangePowerShell/Set-VivaInsightsSettings.md @@ -41,7 +41,7 @@ To run this cmdlet, you need to be a member of one of the following directory ro To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/exchange/exchange-ps/ExchangePowerShell/Update-HybridConfiguration.md b/exchange/exchange-ps/ExchangePowerShell/Update-HybridConfiguration.md index f5c22913e3..d5a6cb4358 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Update-HybridConfiguration.md +++ b/exchange/exchange-ps/ExchangePowerShell/Update-HybridConfiguration.md @@ -82,7 +82,7 @@ Accept wildcard characters: False The TenantCredentials parameter specifies the Microsoft 365 organization account and password that's used to configure the hybrid configuration object. This is often the administrator account that's assigned when the Microsoft 365 organization was created. This account must be a member of the Global Administrators role. > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. A value for this parameter requires the Get-Credential cmdlet. To pause this command and receive a prompt for credentials, use the value `(Get-Credential)`. Or, before you run this command, store the credentials in a variable (for example, `$cred = Get-Credential`) and then use the variable name (`$cred`) for this parameter. For more information, see [Get-Credential](https://learn.microsoft.com/powershell/module/microsoft.powershell.security/get-credential). diff --git a/exchange/exchange-ps/ExchangePowerShell/Update-VivaModuleFeaturePolicy.md b/exchange/exchange-ps/ExchangePowerShell/Update-VivaModuleFeaturePolicy.md index 326d86d230..25b1d29a75 100644 --- a/exchange/exchange-ps/ExchangePowerShell/Update-VivaModuleFeaturePolicy.md +++ b/exchange/exchange-ps/ExchangePowerShell/Update-VivaModuleFeaturePolicy.md @@ -66,7 +66,7 @@ To learn more about assigned roles at the feature level, see [Features Available To learn more about administrator role permissions in Microsoft Entra ID, see [Role template IDs](https://learn.microsoft.com/entra/identity/role-based-access-control/permissions-reference#role-template-ids). > [!IMPORTANT] -> Microsoft recommends that you use roles with the fewest permissions. Using lower permissioned accounts helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role. +> Microsoft strongly advocates for the principle of least privilege. Assigning accounts only the minimum permissions necessary to perform their tasks helps reduce security risks and strengthens your organization's overall protection. Global Administrator is a highly privileged role that you typically limit to emergency scenarios or when you can't use a different role. ## EXAMPLES diff --git a/skype/skype-ps/SkypeForBusiness/Get-CsExternalAccessPolicy.md b/skype/skype-ps/SkypeForBusiness/Get-CsExternalAccessPolicy.md index 00ff93f3ba..d97087389f 100644 --- a/skype/skype-ps/SkypeForBusiness/Get-CsExternalAccessPolicy.md +++ b/skype/skype-ps/SkypeForBusiness/Get-CsExternalAccessPolicy.md @@ -46,7 +46,7 @@ External access policies can grant (or revoke) the ability of your users to do a Note that enabling federation alone will not provide users with this capability. Instead, you must enable federation and then assign users an external access policy that gives them the right to communicate with federated users. -2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](/powershell/module/teams/set-csteamsacsfederationconfiguration). +2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](https://learn.microsoft.com/powershell/module/microsoftteams/set-csteamsacsfederationconfiguration). 3. Access Skype for Business Server over the Internet, without having to first log on to your internal network. This enables your users to use Skype for Business and log on to Skype for Business Server from an Internet café or other remote location. diff --git a/skype/skype-ps/SkypeForBusiness/Grant-CsExternalAccessPolicy.md b/skype/skype-ps/SkypeForBusiness/Grant-CsExternalAccessPolicy.md index 4c23f36cd9..3c6945b0be 100644 --- a/skype/skype-ps/SkypeForBusiness/Grant-CsExternalAccessPolicy.md +++ b/skype/skype-ps/SkypeForBusiness/Grant-CsExternalAccessPolicy.md @@ -57,7 +57,7 @@ External access policies can grant (or revoke) the ability of your users to do a Note that enabling federation will not automatically provide users with this capability. Instead, you must enable federation, and then assign users an external access policy that gives them the right to communicate with federated users. -2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](/powershell/module/teams/set-csteamsacsfederationconfiguration). +2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](https://learn.microsoft.com/powershell/module/microsoftteams/set-csteamsacsfederationconfiguration). 3. Communicate with people who have SIP accounts with a public instant messaging service such as Skype. diff --git a/skype/skype-ps/SkypeForBusiness/Move-CsUser.md b/skype/skype-ps/SkypeForBusiness/Move-CsUser.md index af6e71552d..6780aa866c 100644 --- a/skype/skype-ps/SkypeForBusiness/Move-CsUser.md +++ b/skype/skype-ps/SkypeForBusiness/Move-CsUser.md @@ -40,13 +40,15 @@ Move-CsUser [-Credential ] [-Target] [-MoveToTeams] [-Hoste ## DESCRIPTION **PRE-REQUISITES steps for running Move-CsUser** + - Install or update the Microsoft Teams PowerShell module to version 6.2.1 or later **PRE-REQUISITES steps for** [Office 365 operated by 21Vianet](/microsoft-365/admin/services-in-china/services-in-china?view=o365-21vianet) + - Install or update the Microsoft Teams PowerShell module to version 6.2.1 or later - Run Set-TeamsEnvironmentConfig -TeamsEnvironmentName TeamsChina -For more information, see [Set-TeamsEnvironmentConfig](/powershell/module/teams/set-teamsenvironmentconfig). +For more information, see [Set-TeamsEnvironmentConfig](https://learn.microsoft.com/powershell/module/microsoftteams/set-teamsenvironmentconfig). The Move-CsUser cmdlet enables you to move a user account enabled for Skype for Business in the following scenarios: diff --git a/skype/skype-ps/SkypeForBusiness/New-CsExternalAccessPolicy.md b/skype/skype-ps/SkypeForBusiness/New-CsExternalAccessPolicy.md index 4887c30715..22966b9e53 100644 --- a/skype/skype-ps/SkypeForBusiness/New-CsExternalAccessPolicy.md +++ b/skype/skype-ps/SkypeForBusiness/New-CsExternalAccessPolicy.md @@ -47,7 +47,7 @@ External access policies can grant (or revoke) the ability of your users to do a Note that enabling federation alone will not provide users with this capability. Instead, you must enable federation and then assign users an external access policy that gives them the right to communicate with federated users. -2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](/powershell/module/teams/set-csteamsacsfederationconfiguration). +2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](https://learn.microsoft.com/powershell/module/microsoftteams/set-csteamsacsfederationconfiguration). 3. Access Skype for Business Server over the Internet, without having to first log on to your internal network. This enables your users to use Skype for Business and log on to Skype for Business Server from an Internet café or other remote location. diff --git a/skype/skype-ps/SkypeForBusiness/Remove-CsExternalAccessPolicy.md b/skype/skype-ps/SkypeForBusiness/Remove-CsExternalAccessPolicy.md index 8c9e86fd3c..ac51ad6826 100644 --- a/skype/skype-ps/SkypeForBusiness/Remove-CsExternalAccessPolicy.md +++ b/skype/skype-ps/SkypeForBusiness/Remove-CsExternalAccessPolicy.md @@ -38,7 +38,7 @@ External access policies can grant (or revoke) the ability of your users to do a Note that enabling federation alone will not provide users with this capability. Instead, you must enable federation and then assign users an external access policy that gives them the right to communicate with federated users. -3. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](/powershell/module/teams/set-csteamsacsfederationconfiguration). +3. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](https://learn.microsoft.com/powershell/module/microsoftteams/set-csteamsacsfederationconfiguration). 4. Communicate with people who have SIP accounts with a public instant messaging service such as Windows Live. diff --git a/skype/skype-ps/SkypeForBusiness/Set-CsExternalAccessPolicy.md b/skype/skype-ps/SkypeForBusiness/Set-CsExternalAccessPolicy.md index b7139b067f..7b154fabd0 100644 --- a/skype/skype-ps/SkypeForBusiness/Set-CsExternalAccessPolicy.md +++ b/skype/skype-ps/SkypeForBusiness/Set-CsExternalAccessPolicy.md @@ -51,7 +51,7 @@ External access policies can grant (or revoke) the ability of your users to do a Note that enabling federation alone will not provide users with this capability. Instead, you must enable federation and then assign users an external access policy that gives them the right to communicate with federated users. -2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](/powershell/module/teams/set-csteamsacsfederationconfiguration). +2. (Microsoft Teams only) Communicate with users who are using custom applications built with [Azure Communication Services (ACS)](/azure/communication-services/concepts/teams-interop). This policy setting only applies if ACS federation has been enabled at the tenant level using the cmdlet [Set-CsTeamsAcsFederationConfiguration](https://learn.microsoft.com/powershell/module/microsoftteams/set-csteamsacsfederationconfiguration). 3. Access Skype for Business Server over the Internet, without having to first log on to your internal network. This enables your users to use Skype for Business and log on to Skype for Business Server from an Internet café or other remote location. diff --git a/skype/skype-ps/SkypeForBusiness/Set-CsUser.md b/skype/skype-ps/SkypeForBusiness/Set-CsUser.md index 51c80c06c1..f2f6869da1 100644 --- a/skype/skype-ps/SkypeForBusiness/Set-CsUser.md +++ b/skype/skype-ps/SkypeForBusiness/Set-CsUser.md @@ -19,7 +19,7 @@ Modifies Skype for Business properties for an existing user account. Properties can be modified only for accounts that have been enabled for use with Skype for Business. This cmdlet was introduced in Lync Server 2010. -**Note**: Using this cmdlet for Microsoft Teams users in commercial and GCC cloud instances has been deprecated. Use the new [Set-CsPhoneNumberAssignment](/powershell/module/teams/set-csphonenumberassignment) and [Remove-CsPhoneNumberAssignment](/powershell/module/teams/remove-csphonenumberassignment) cmdlets instead. +**Note**: Using this cmdlet for Microsoft Teams users in commercial and GCC cloud instances has been deprecated. Use the new [Set-CsPhoneNumberAssignment](https://learn.microsoft.com/powershell/module/microsoftteams/set-csphonenumberassignment) and [Remove-CsPhoneNumberAssignment](https://learn.microsoft.com/powershell/module/microsoftteams/remove-csphonenumberassignment) cmdlets instead. ## SYNTAX @@ -165,7 +165,7 @@ Accept wildcard characters: False Indicates whether the user has been enabled for Enterprise Voice, which is the Microsoft implementation of Voice over Internet Protocol (VoIP). With Enterprise Voice, users can make telephone calls using the Internet rather than using the standard telephone network. -**Note**: Using this parameter for Microsoft Teams users in commercial and GCC cloud instances has been deprecated. Use the new [Set-CsPhoneNumberAssignment](/powershell/module/teams/set-csphonenumberassignment) cmdlet instead. +**Note**: Using this parameter for Microsoft Teams users in commercial and GCC cloud instances has been deprecated. Use the new [Set-CsPhoneNumberAssignment](https://learn.microsoft.com/powershell/module/microsoftteams/set-csphonenumberassignment) cmdlet instead. ```yaml Type: Boolean @@ -316,7 +316,7 @@ Depending on your setup, those two numbers could actually be different. For example, in some organizations dialing 1-425-555-1297 routes your call to an Exchange Auto Attendant. Conversely, dialing just the extension (51297) or using Skype for Business to dial the number 1-425-555-1297 extension 51297 will route your call directly to the user. -**Note**: Using this parameter for Microsoft Teams users in commercial and GCC cloud instances has been deprecated. Use the new [Set-CsPhoneNumberAssignment](/powershell/module/teams/set-csphonenumberassignment) cmdlet instead. +**Note**: Using this parameter for Microsoft Teams users in commercial and GCC cloud instances has been deprecated. Use the new [Set-CsPhoneNumberAssignment](https://learn.microsoft.com/powershell/module/microsoftteams/set-csphonenumberassignment) cmdlet instead. **Note**: Using this parameter for Microsoft Teams users in GCC High and DoD cloud instances has been deprecated. Use the -LineURI parameter instead. diff --git a/teams/teams-ps/MicrosoftTeams/Disable-CsTeamsShiftsConnectionErrorReport.md b/teams/teams-ps/MicrosoftTeams/Disable-CsTeamsShiftsConnectionErrorReport.md index 60edafb900..f61be42a6f 100644 --- a/teams/teams-ps/MicrosoftTeams/Disable-CsTeamsShiftsConnectionErrorReport.md +++ b/teams/teams-ps/MicrosoftTeams/Disable-CsTeamsShiftsConnectionErrorReport.md @@ -5,7 +5,7 @@ title: Disable-CsTeamsShiftsConnectionErrorReport author: gucsun ms.author: gucsun manager: navinth -online version: https://learn.microsoft.com/powershell/module/teams/disable-csteamsshiftsconnectionerrorreport +online version: https://learn.microsoft.com/powershell/module/microsoftteams/disable-csteamsshiftsconnectionerrorreport schema: 2.0.0 --- @@ -25,7 +25,7 @@ Disable-CsTeamsShiftsConnectionErrorReport -ErrorReportId [ [-Brea ## DESCRIPTION > [!IMPORTANT] -> This cmdlet is being deprecated. Use the **Get-CsPhoneNumberAssignment** cmdlet to display information about one or more phone numbers. Detailed instructions on how to use the new cmdlet can be found at [Get-CsPhoneNumberAssignment](/powershell/module/microsoftteams/get-csphonenumberassignment) +> This cmdlet is being deprecated. Use the **Get-CsPhoneNumberAssignment** cmdlet to display information about one or more phone numbers. Detailed instructions on how to use the new cmdlet can be found at [Get-CsPhoneNumberAssignment](https://learn.microsoft.com/powershell/module/microsoftteams/get-csphonenumberassignment) This cmdlet displays information about one or more hybrid telephone numbers used for Audio Conferencing with Direct Routing for GCC High and DoD clouds.