Skip to content

Chrisda to Master #4665

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 5 commits into from
Jan 10, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -208,11 +208,7 @@ Accept wildcard characters: False
```

### -EnableAuthenticationSoftPassSafetyTip
The EnableAuthenticationSoftPassSafetyTip parameter specifies whether to enable safety tips that are shown to recipients when a message fails composite authentication with low to medium confidence. Valid values are:

- $true: Safety tips are enabled for messages that fail composite authentication with low to medium confidence. If you use this value, you might want to restrict the policy to a smaller number of users to avoid displaying too many of these types of safety tips to users.

- $false: Safety tips are disabled for messages that fail composite authentication with low to medium confidence. This is the default value.
This parameter is reserved for internal Microsoft use.

```yaml
Type: Boolean
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -193,11 +193,7 @@ Accept wildcard characters: False
```

### -EnableAuthenticationSoftPassSafetyTip
The EnableAuthenticationSoftPassSafetyTip parameter specifies whether to enable safety tips that are shown to recipients when a message fails composite authentication with low to medium confidence. Valid values are:

- $true: Safety tips are enabled for messages that fail composite authentication with low to medium confidence. If you use this value, you might want to restrict the policy to a smaller number of users to avoid displaying too many of these types of safety tips to users.

- $false: Safety tips are disabled for messages that fail composite authentication with low to medium confidence. This is the default value.
This parameter is reserved for internal Microsoft use.

```yaml
Type: Boolean
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -24,16 +24,29 @@ For information about the parameter sets in the Syntax section below, see [Excha

### Details
```
Get-QuarantineMessage -Identity <QuarantineMessageIdentity> [-SenderAddress <String[]>] [<CommonParameters>]
Get-QuarantineMessage -Identity <QuarantineMessageIdentity> [-SenderAddress <String[]>]
[<CommonParameters>]
```

### Summary
```
Get-QuarantineMessage [-Direction <QuarantineMessageDirectionEnum>] [-Domain <String[]>] [-EndExpiresDate <DateTime>]
[-EndReceivedDate <DateTime>] [-MessageId <String>] [-MyItems] [-Page <Int32>] [-PageSize <Int32>]
[-QuarantineTypes <QuarantineMessageTypeEnum[]>] [-RecipientAddress <String[]>] [-Reported <Boolean>]
[-SenderAddress <String[]>] [-StartExpiresDate <DateTime>] [-StartReceivedDate <DateTime>] [-Subject <String>]
[-Type <QuarantineMessageTypeEnum>] [<CommonParameters>]
Get-QuarantineMessage [-Direction <QuarantineMessageDirectionEnum>]
[-Domain <String[]>]
[-EndExpiresDate <DateTime>]
[-EndReceivedDate <DateTime>]
[-MessageId <String>]
[-MyItems]
[-Page <Int32>]
[-PageSize <Int32>]
[-QuarantineTypes <QuarantineMessageTypeEnum[]>]
[-RecipientAddress <String[]>]
[-Reported <Boolean>]
[-SenderAddress <String[]>]
[-StartExpiresDate <DateTime>]
[-StartReceivedDate <DateTime>]
[-Subject <String>]
[-Type <QuarantineMessageTypeEnum>]
[<CommonParameters>]
```

## DESCRIPTION
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -23,17 +23,30 @@ For information about the parameter sets in the Syntax section below, see [Excha
```
New-MalwareFilterPolicy [-Name] <String>
[-Action <MalwareFilteringAction>]
[-AdminDisplayName <String>] [-BypassInboundMessages <Boolean>]
[-BypassOutboundMessages <Boolean>] [-Confirm] [-CustomAlertText <String>]
[-CustomExternalBody <String>] [-CustomExternalSubject <String>] [-CustomFromAddress <SmtpAddress>]
[-CustomFromName <String>] [-CustomInternalBody <String>] [-CustomInternalSubject <String>]
[-CustomNotifications <Boolean>] [-DomainController <Fqdn>]
[-AdminDisplayName <String>]
[-BypassInboundMessages <Boolean>]
[-BypassOutboundMessages <Boolean>]
[-Confirm]
[-CustomAlertText <String>]
[-CustomExternalBody <String>]
[-CustomExternalSubject <String>]
[-CustomFromAddress <SmtpAddress>]
[-CustomFromName <String>]
[-CustomInternalBody <String>]
[-CustomInternalSubject <String>]
[-CustomNotifications <Boolean>]
[-DomainController <Fqdn>]
[-EnableExternalSenderAdminNotifications <Boolean>]
[-EnableExternalSenderNotifications <Boolean>]
[-EnableFileFilter <Boolean>]
[-EnableInternalSenderAdminNotifications <Boolean>]
[-EnableInternalSenderNotifications <Boolean>] [-ExternalSenderAdminAddress <SmtpAddress>]
[-InternalSenderAdminAddress <SmtpAddress>] [-WhatIf] [-EnableFileFilter <Boolean>]
[-FileTypes <String[]>] [-ZapEnabled <Boolean>] [<CommonParameters>]
[-EnableInternalSenderNotifications <Boolean>]
[-ExternalSenderAdminAddress <SmtpAddress>]
[-FileTypes <String[]>]
[-InternalSenderAdminAddress <SmtpAddress>]
[-WhatIf]
[-ZapEnabled <Boolean>]
[<CommonParameters>]
```

## DESCRIPTION
Expand Down Expand Up @@ -350,16 +363,20 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -EnableInternalSenderAdminNotifications
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to an administrator when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
### -EnableFileFilter
The EnableFileFilter parameter enables or disables common attachment blocking. Valid values are:

Specify the administrator to receive the notification messages by using the InternalSenderAdminAddress parameter.
- $true: Common attachment blocking is enabled.

- $false: Common attachment blocking is disabled.

To configure the blocked file types, use the FileTypes parameter.

```yaml
Type: Boolean
Parameter Sets: (All)
Aliases:
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection

Required: False
Position: Named
Expand All @@ -368,8 +385,10 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -EnableInternalSenderNotifications
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to senders when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.
### -EnableInternalSenderAdminNotifications
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to an administrator when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.

Specify the administrator to receive the notification messages by using the InternalSenderAdminAddress parameter.

```yaml
Type: Boolean
Expand All @@ -384,11 +403,11 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -ExternalSenderAdminAddress
The ExternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableExternalSenderAdminNotifications parameter is set to $true.
### -EnableInternalSenderNotifications
The EnableExternalSenderAdminNotifications parameter enables or disables sending notification messages to senders when malware is detected in messages from internal senders. Valid input for this parameter is $true or $false. The default value is $false.

```yaml
Type: SmtpAddress
Type: Boolean
Parameter Sets: (All)
Aliases:
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection
Expand All @@ -400,8 +419,8 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -InternalSenderAdminAddress
The InternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableInternalSenderAdminNotifications parameter is set to $true.
### -ExternalSenderAdminAddress
The ExternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableExternalSenderAdminNotifications parameter is set to $true.

```yaml
Type: SmtpAddress
Expand All @@ -416,44 +435,6 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -WhatIf
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.

```yaml
Type: SwitchParameter
Parameter Sets: (All)
Aliases: wi
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
```

### -EnableFileFilter
The EnableFileFilter parameter enables or disables common attachment blocking. Valid values are:

- $true: Common attachment blocking is enabled.

- $false: Common attachment blocking is disabled.

To configure the blocked file types, use the FileTypes parameter.

```yaml
Type: Boolean
Parameter Sets: (All)
Aliases:
Applicable: Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
```

### -FileTypes
The FileTypes parameter specifies the file types that are blocked by common attachment blocking. The default values are:

Expand Down Expand Up @@ -498,6 +479,38 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -InternalSenderAdminAddress
The InternalSenderAdminAddress parameter specifies the email address of the administrator who will receive notifications messages when messages from external senders contain malware. Notification messages are sent to the specified email address only if the EnableInternalSenderAdminNotifications parameter is set to $true.

```yaml
Type: SmtpAddress
Parameter Sets: (All)
Aliases:
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
```

### -WhatIf
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.

```yaml
Type: SwitchParameter
Parameter Sets: (All)
Aliases: wi
Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Online, Exchange Online Protection

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False
```

### -ZapEnabled
The ZapEnabled parameter specifies whether to enable zero-hour auto purge (ZAP) for malware. ZAP detects malware in unread messages that have already been delivered to the user's Inbox. Valid values are:

Expand Down
Loading