diff --git a/exchange/exchange-ps/exchange/Get-AutoSensitivityLabelPolicy.md b/exchange/exchange-ps/exchange/Get-AutoSensitivityLabelPolicy.md new file mode 100644 index 0000000000..5c646c92ae --- /dev/null +++ b/exchange/exchange-ps/exchange/Get-AutoSensitivityLabelPolicy.md @@ -0,0 +1,116 @@ +--- +external help file: Microsoft.Exchange.TransportMailflow-Help.xml +online version: https://docs.microsoft.com/powershell/module/exchange/get-autosensitivitylabelpolicy +applicable: Office 365 Security & Compliance Center +title: Get-Label +schema: 2.0.0 +author: chrisda +ms.author: chrisda +ms.reviewer: +monikerRange: "o365scc-ps" +--- + +# Get-AutoSensitivityLabelPolicy + +## SYNOPSIS +This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell). + +Use the Get-AutoSensitivityLabelPolicy cmdlet to view auto-labeling policies in your organization. + +For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax). + +## SYNTAX + +``` +Get-AutoSensitivityLabelPolicy [[-Identity] ] + [-DistributionDetail] + [-IncludeTestModeResults ] + [] +``` + +## DESCRIPTION +You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center). + +## EXAMPLES + +### Example 1 +```powershell +Get-AutoSensitivityLabelPolicy -Identity "Employee Numbers" -IncludeTestModeResults $true +``` + +This example returns detailed information about the autosensitivity label policy named Employee Numbers. The IncludeTestModeResults parameter and value allows you to see the status of test mode. + +## PARAMETERS + +### -Identity +The Identity parameter specifies the auto-labeling policy that you want to view. You can use any value that uniquely identifies the policy. For example: + +- Name + +- Distinguished name (DN) + +- GUID + +```yaml +Type: PolicyIdParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: 0 +Default value: None +Accept pipeline input: True (ByPropertyName, ByValue) +Accept wildcard characters: False +``` + +### -DistributionDetail +The DistributionDetail switch returns detailed policy distribution information in the DistributionResults property. You don't need to specify a value with this switch. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -IncludeTestModeResults +The IncludeTestModeResults parameter specifies whether to include the status of test mode in the policy details. Valid values are: + +- $true: Include the status of test mode in the policy details. + +- $false: Don't include the status of test mode in the policy details. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216). + +## INPUTS + +### + +## OUTPUTS + +### + +## NOTES + +## RELATED LINKS diff --git a/exchange/exchange-ps/exchange/Get-AutoSensitivityLabelRule.md b/exchange/exchange-ps/exchange/Get-AutoSensitivityLabelRule.md new file mode 100644 index 0000000000..70d397728b --- /dev/null +++ b/exchange/exchange-ps/exchange/Get-AutoSensitivityLabelRule.md @@ -0,0 +1,175 @@ +--- +external help file: Microsoft.Exchange.TransportMailflow-Help.xml +online version: https://docs.microsoft.com/powershell/module/exchange/get-autosensitivitylabelrule +applicable: Office 365 Security & Compliance Center +title: Get-Label +schema: 2.0.0 +author: chrisda +ms.author: chrisda +ms.reviewer: +monikerRange: "o365scc-ps" +--- + +# Get-AutoSensitivityLabelRule + +## SYNOPSIS +This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell). + +Use the Get-AutoSensitivityLabelPolicy cmdlet to view auto-labeling policy rules in your organization. + +For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax). + +## SYNTAX + +``` +Get-AutoSensitivityLabelRule [[-Identity] ] + [-Confirm] + [-IncludeExecutionRuleGuids ] + [-IncludeExecutionRuleInformation ] + [-Policy ] + [-WhatIf] + [] +``` + +## DESCRIPTION +You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center). + +## EXAMPLES + +### Example 1 +```powershell +Get-AutoSensitivityLabelRule +``` + +This example displays summary information for all autolabeling rules in the Security & Compliance Center. + +## PARAMETERS + +### -Identity +The Identity parameter specifies the auto-labeling policy rule that you want to view. You can use any value that uniquely identifies the rule. For example: + +- Name + +- Distinguished name (DN) + +- GUID + +```yaml +Type: ComplianceRuleIdParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: 0 +Default value: None +Accept pipeline input: True (ByPropertyName, ByValue) +Accept wildcard characters: False +``` + +### -Confirm +This parameter is reserved for internal Microsoft use. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: cf +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -IncludeExecutionRuleGuids +The IncludeExecutionRuleGuids parameter specifies whether to include the execution rule GUID in the rule details. Valid values are: + +- $true: Include the execution rule GUID in the rule details. + +- $false: Don't include the execution rule GUID in the rule details. This is the default value. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -IncludeExecutionRuleInformation +The IncludeExecutionRuleInformation parameter specifies whether to include the execution rule information in the rule details. Valid values are: + +- $true: Include the execution rule information in the rule details. + +- $false: Don't include the execution rule information in the rule details. This is the default value. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Policy +The Policy parameter filters the auto-labeling policy rule results by the associated auto-labeling policy. You can use any value that uniquely identifies the policy. For example: + +- Name +- Distinguished name (DN) +- GUID + +```yaml +Type: PolicyIdParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +This parameter is reserved for internal Microsoft use. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: wi +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216). + +## INPUTS + +### + +## OUTPUTS + +### + +## NOTES + +## RELATED LINKS diff --git a/exchange/exchange-ps/exchange/New-AutoSensitivityLabelPolicy.md b/exchange/exchange-ps/exchange/New-AutoSensitivityLabelPolicy.md new file mode 100644 index 0000000000..b913faa654 --- /dev/null +++ b/exchange/exchange-ps/exchange/New-AutoSensitivityLabelPolicy.md @@ -0,0 +1,405 @@ +--- +external help file: Microsoft.Exchange.TransportMailflow-Help.xml +online version: https://docs.microsoft.com/powershell/module/exchange/new-autosensitivitylabelpolicy +applicable: Office 365 Security & Compliance Center +title: Get-Label +schema: 2.0.0 +author: chrisda +ms.author: chrisda +ms.reviewer: +monikerRange: "o365scc-ps" +--- + +# New-AutoSensitivityLabelPolicy + +## SYNOPSIS +This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell). + +Use the New-AutoSensitivityLabelPolicy cmdlet to create auto-labeling policies in your organization. + +For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax). + +## SYNTAX + +``` +New-AutoSensitivityLabelPolicy [-Name] -ApplySensitivityLabel [-Comment ] + [-Confirm] + [-Enabled ] + [-ExchangeLocation ] + [-ExchangeSender ] + [-ExchangeSenderException ] + [-ExchangeSenderMemberOf ] + [-ExchangeSenderMemberOfException ] + [-Force] + [-Mode ] + [-OneDriveLocation ] + [-OneDriveLocationException ] + [-Priority ] + [-SharePointLocation ] + [-SharePointLocationException ] + [-WhatIf] + [] +``` + +## DESCRIPTION +You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center). + +## EXAMPLES + +### Example 1 +```powershell +New-AutoSensitivityLabelPolicy -Name "GlobalPolicy" -Comment "Primary policy" -SharePointLocation "https://my.url","https://my.url2" -OneDriveLocation "https://my.url3","https://my.url4" -Mode TestWithoutNotifications -ApplySensitivityLabel "Test" +``` + +This example creates an autolabel policy named GlobalPolicy for the specified SharePoint Online and OneDrive for Business locations with the label "Test". The new policy has a descriptive comment and will be in simulation mode on creation. + +## PARAMETERS + +### -Name +The Name parameter specifies a unique name for the auto-labeling policy. If the value contains spaces, enclose the value with quotation marks ("). + +```yaml +Type: String +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: 0 +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ApplySensitivityLabel +The AppleSensitivityLabel parameter specifies which label to use for the autolabel policy. + +```yaml +Type: String +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Comment +The Comment parameter specifies an optional comment. If you specify a value that contains spaces, enclose the value in quotation marks ("), for example: "This is an admin note". + +```yaml +Type: String +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding. + +- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false. + +- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: cf +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Enabled +The Enabled parameter specifies whether the policy is enabled. Valid values are: + +- $true: The policy is enabled. + +- $false: The policy is disabled. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExchangeLocation +The ExchangeLocation parameter specifies the mailboxes to include in the policy. Valid values are: + +- A mailbox + +- A distribution group or mail-enabled security group (all mailboxes that are currently members of the group). + +- The value All for all mailboxes. You can only use this value by itself. + +To specify a mailbox or distribution group, you can use any value that uniquely identifies it. For example: + +- Name + +- Distinguished name (DN) + +- Email address + +- GUID + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExchangeSender +The ExchangeSender parameter specifies which senders to include in the policy. + +```yaml +Type: SmtpAddress[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExchangeSenderException +The ExchangeSenderException parameter specifies which senders to exclude in the policy. + +```yaml +Type: SmtpAddress[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExchangeSenderMemberOf +The ExchangeSenderMemberOf parameter specifies the distribution groups, mail-enabled security groups, or dynamic distribution groups to include in the auto-labeling policy. You identify the group by its email address. + +To enter multiple values, use the following syntax: \,\,...\. + +```yaml +Type: SmtpAddress[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExchangeSenderMemberOfException +The ExchangeSenderMemberOf parameter specifies the distribution groups, mail-enabled security groups, or dynamic distribution groups to exclude from the auto-labeling policy. You identify the group by its email address. + +To enter multiple values, use the following syntax: \,\,...\. + +You can't use this parameter to specify Microsoft 365 Groups. + +```yaml +Type: SmtpAddress[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Force +The Force switch specifies whether to suppress warning or confirmation messages. You can use this switch to run tasks programmatically where prompting for administrative input is inappropriate. You don't need to specify a value with this switch. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Mode +The Mode parameter specifies the action and notification level of the auto-labeling policy. Valid values are: + +- Enable: The policy is enabled for actions and notifications. This is the default value. +- Disable: The policy is disabled. +- TestWithNotifications: No actions are taken, but notifications are sent. +- TestWithoutNotifications: An audit mode where no actions are taken, and no notifications are sent. + +```yaml +Type: PolicyMode +Parameter Sets: (All) +Aliases: +Accepted values: Enable, TestWithNotifications, TestWithoutNotifications, Disable, PendingDeletion +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -OneDriveLocation +The OneDriveLocation parameter specifies the OneDrive for Business sites to include. You identify the site by its URL value. The value All is currently not supported. + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -OneDriveLocationException +This parameter specifies the OneDrive for Business sites to exclude when you use the value All for the OneDriveLocation parameter. You identify the site by its URL value. + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Priority +The Priority parameter specifies the priority of the policy. The highest priority policy will take action over lower priority policies if two policies are applicable for a file. + +```yaml +Type: System.Int32 +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SharePointLocation +The SharePointLocation parameter specifies the SharePoint Online sites to include. You identify the site by its URL value. The value All is currently not supported. + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". SharePoint Online sites can't be added to a policy until they have been indexed. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SharePointLocationException +This parameter specifies the SharePoint Online sites to exclude when you use the value All for the SharePointLocation parameter. You identify the site by its URL value. + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +The WhatIf switch doesn't work in Security & Compliance Center PowerShell. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: wi +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216). + +## INPUTS + +### + +## OUTPUTS + +### + +## NOTES + +## RELATED LINKS diff --git a/exchange/exchange-ps/exchange/New-AutoSensitivityLabelRule.md b/exchange/exchange-ps/exchange/New-AutoSensitivityLabelRule.md new file mode 100644 index 0000000000..38d0266980 --- /dev/null +++ b/exchange/exchange-ps/exchange/New-AutoSensitivityLabelRule.md @@ -0,0 +1,762 @@ +--- +external help file: Microsoft.Exchange.TransportMailflow-Help.xml +online version: https://docs.microsoft.com/powershell/module/exchange/new-autosensitivitylabelrule +applicable: Office 365 Security & Compliance Center +title: Get-Label +schema: 2.0.0 +author: chrisda +ms.author: chrisda +ms.reviewer: +monikerRange: "o365scc-ps" +--- + +# New-AutoSensitivityLabelRule + +## SYNOPSIS +This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell). + +Use the New-AutoSensitivityLabelPolicy cmdlet to create auto-labeling policy rules in your organization. + +For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax). + +## SYNTAX + +``` +New-AutoSensitivityLabelRule [-Name] -Workload + [-AccessScope ] + [-ActivationDate ] + [-Comment ] + [-Confirm] + [-ContentContainsSensitiveInformation ] + [-ContentExtensionMatchesWords ] + [-Disabled ] + [-DocumentIsPasswordProtected ] + [-DocumentIsUnsupported ] + [-ExceptIfAccessScope ] + [-ExceptIfContentContainsSensitiveInformation ] + [-ExceptIfContentExtensionMatchesWords ] + [-ExceptIfDocumentIsPasswordProtected ] + [-ExceptIfDocumentIsUnsupported ] + [-ExceptIfFrom ] + [-ExceptIfFromMemberOf ] + [-ExceptIfProcessingLimitExceeded ] + [-ExceptIfRecipientDomainIs ] + [-ExceptIfSenderIPRanges ] + [-ExceptIfSentTo ] + [-ExpiryDate ] + [-From ] + [-FromMemberOf ] + [-ImmutableId ] -Policy + [-Priority ] + [-ProcessingLimitExceeded ] + [-RecipientDomainIs ] + [-ReportSeverityLevel ] + [-RuleErrorAction ] + [-SenderIPRanges ] + [-SentTo ] + [-WhatIf] + [] +``` + +## DESCRIPTION +You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center). + +## EXAMPLES + +### Example 1 +```powershell +New-AutoSensitivityLabelRule -Name "SocialSecurityRule" -Policy "SSNPolicy" -ContentContainsSensitiveInformation @{"name"="U.S. Social Security Number (SSN)";"mincount"="1"} -Workload SharePoint +``` + +This example creates an autolabeling rule named "SocialSecurityRule" that is assigned to the policy "SSNPolicy." This rule looks for Social Security Numbers on documents with a minimum count of 1 on SharePoint sites. + +## PARAMETERS + +### -Name +The Name parameter specifies a unique name for the auto-labeling policy rule. If the value contains spaces, enclose the value with quotation marks ("). + +```yaml +Type: String +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: 0 +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Workload +The Workload parameter specifies the workload. Valid values are: + +- AuditAlerting +- DynamicScope +- EndpointDevices +- Exchange +- ExchangeOnPremises +- Intune +- ModernGroup +- OneDriveForBusiness +- PublicFolder +- SharePoint +- SharePointOnPremises +- Skype +- Teams +- ThirdPartyApps +- UnifiedAuditAzure + +```yaml +Type: Workload +Parameter Sets: (All) +Aliases: +Accepted values: None, Exchange, SharePoint, Intune, OneDriveForBusiness, PublicFolder, SharePointOnPremises, ExchangeOnPremises, AuditAlerting, Skype, ModernGroup, DynamicScope, Teams, UnifiedAuditAzure, EndpointDevices, ThirdPartyApps +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -AccessScope +The AccessScope parameter specifies a condition for the auto-labeling policy rule that's based on the access scope of the content. The rule is applied to content that matches the specified access scope. Valid values are: + +- InOrganization: The rule is applied to content that's accessible inside the organization. +- NotInOrganization: The rule is applied to content that's accessible outside the organization. +- None: The condition isn't used. + +```yaml +Type: AccessScope +Parameter Sets: (All) +Aliases: +Accepted values: InOrganization, NotInOrganization, None +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ActivationDate +This parameter is reserved for internal Microsoft use. + +```yaml +Type: System.DateTime +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Comment +The Comment parameter specifies an optional comment. If you specify a value that contains spaces, enclose the value in quotation marks ("), for example: "This is an admin note". + +```yaml +Type: String +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding. + +- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false. + +- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: cf +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ContentContainsSensitiveInformation +The ContentContainsSensitiveInformation parameter specifies a condition for the rule that's based on a sensitive information type match in content. The rule is applied to content that contains the specified sensitive information type. + +This parameter uses the basic syntax @(@{Name="\";[minCount="\"],@{Name="\";[minCount="\"],...). For example, @(@{Name="U.S. Social Security Number (SSN)"; minCount="2"},@{Name="Credit Card Number"}). + +```yaml +Type: PswsHashtable[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ContentExtensionMatchesWords +The ContentExtensionMatchesWords parameter specifies a condition for the auto-labeling policy rule that looks for words in file name extensions. You can specify multiple words separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Disabled +The Disabled parameter specifies whether the auto-labeling policy rule is enabled or disabled. Valid values are: + +- $true: The rule is disabled. +- $false: The rule is enabled. This is the default value. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -DocumentIsPasswordProtected +The DocumentIsPasswordProtected parameter specifies a condition for the auto-labeling policy rule that looks for password protected files (because the contents of the file can't be inspected). Password detection only works for Office documents and .zip files. Valid values are: + +- $true: Look for password protected files. +- $false: Don't look for password protected files. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -DocumentIsUnsupported +The DocumentIsUnsupported parameter specifies a condition for the auto-labeling policy rule that looks for files that can't be scanned. Valid values are: + +- $true: Look for unsupported files that can't be scanned. +- $false: Don't look for unsupported files that can't be scanned. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfAccessScope +The ExceptIfAccessScopeAccessScope parameter specifies an exception for the auto-labeling policy rule that's based on the access scope of the content. The rule isn't applied to content that matches the specified access scope. Valid values are: + +- InOrganization: The rule isn't applied to content that's accessible inside the organization. +- NotInOrganization: The rule isn't applied to content that's accessible outside the organization. +- None: The exception isn't used. + +```yaml +Type: AccessScope +Parameter Sets: (All) +Aliases: +Accepted values: InOrganization, NotInOrganization, None +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfContentContainsSensitiveInformation +The ExceptIfContentContainsSensitiveInformation parameter specifies an exception for the auto-labeling policy rule that's based on a sensitive information type match in content. The rule isn't applied to content that contains the specified sensitive information type. + +This parameter uses the basic syntax @(@{Name="\";[minCount="\"],@{Name="\";[minCount="\"],...). For example, @(@{Name="U.S. Social Security Number (SSN)"; minCount="2"},@{Name="Credit Card Number"}). + +```yaml +Type: PswsHashtable[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfContentExtensionMatchesWords +The ExceptIfContentExtensionMatchesWords parameter specifies an exception for the auto-labeling policy rule that looks for words in file name extensions. You can specify multiple words separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfDocumentIsPasswordProtected +The ExceptIfDocumentIsPasswordProtected parameter specifies an exception for the auto-labeling policy rule that looks for password protected files (because the contents of the file can't be inspected). Password detection only works for Office documents and .zip files. Valid values are: + +- $true: Look for password protected files. +- $false: Don't look for password protected files. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfDocumentIsUnsupported +The ExceptIfDocumentIsUnsupported parameter specifies an exception for the auto-labeling policy rule that looks for files that can't be scanned. Valid values are: + +- $true: Look for unsupported files that can't be scanned. +- $false: Don't look for unsupported files that can't be scanned. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfFrom +The ExceptIfFrom parameter specifies an exception for the auto-labeling policy rule that looks for messages from specific senders. You can use any value that uniquely identifies the sender. For example: + +- Name +- Alias +- Distinguished name (DN) +- Canonical DN +- Email address +- GUID + +```yaml +Type: RecipientIdParameter[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfFromMemberOf +The ExceptIfFromMemberOf parameter specifies an exception for the auto-labeling policy rule that looks for messages sent by group members. You identify the group members by their email addresses. + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +```yaml +Type: SmtpAddress[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfProcessingLimitExceeded +The ExceptIfProcessingLimitExceeded parameter specifies an exception for the auto-labeling policy rule rule that looks for files where scanning couldn't complete. Valid values are: + +- $true: Look for files where scanning couldn't complete. +- $false: Don't look for files where scanning couldn't complete. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfRecipientDomainIs +The ExceptIfRecipientDomainIs parameter specifies an exception for the auto-labeling policy rule that looks for recipients with email address in the specified domains. You can specify multiple domains separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfSenderIPRanges +The ExceptIfSenderIpRanges parameter specifies an exception for the auto-labeling policy rule rule that looks for senders whose IP addresses matches the specified value, or fall within the specified ranges. Valid values are: + +- Single IP address: For example, 192.168.1.1. +- IP address range: For example, 192.168.0.1-192.168.0.254. +- Classless InterDomain Routing (CIDR) IP address range: For example, 192.168.0.1/25. + +You can specify multiple IP addresses or ranges separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfSentTo +The ExceptIfSentTo parameter specifies an exception for the auto-labeling policy rule that looks for recipients in messages. You can use any value that uniquely identifies the recipient. For example: + +- Name +- Alias +- Distinguished name (DN) +- Canonical DN +- Email address +- GUID + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +You can use this exception in auto-labeling policies that are scoped only to Exchange. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExpiryDate +This parameter is reserved for internal Microsoft use. + +```yaml +Type: System.DateTime +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -From +This parameter is reserved for internal Microsoft use. + +```yaml +Type: RecipientIdParameter[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -FromMemberOf +This parameter is reserved for internal Microsoft use. + +```yaml +Type: SmtpAddress[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ImmutableId +This parameter is reserved for internal Microsoft use. + +```yaml +Type: System.Guid +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Policy +The Policy parameter specifies the auto-labeling policy that contains the auto-labeling policy rule. You can use any value that uniquely identifies the policy. For example: + +- Name +- Distinguished name (DN) +- GUID + +```yaml +Type: PolicyIdParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Priority +This parameter is reserved for internal Microsoft use. + +```yaml +Type: System.Int32 +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProcessingLimitExceeded +The ProcessingLimitExceeded parameter specifies a condition for the auto-labeling policy rule that looks for files where scanning couldn't complete. You can use this condition to create rules that work together to identify and process messages where the content couldn't be fully scanned. Valid values are: + +- $true: Look for files where scanning couldn't complete. +- $false: Don't look for files where scanning couldn't complete. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RecipientDomainIs +The RecipientDomainIs parameter specifies a condition for the auto-labeling policy rule that looks for recipients with email address in the specified domains. You can specify multiple domains separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ReportSeverityLevel +The ReportSeverityLevel parameter specifies the severity level of the incident report for content detections based on the rule. Valid values are: + +- None: You can't select this value if the rule has no actions configured. +- Low: This is the default value. +- Medium +- High + +```yaml +Type: RuleSeverity +Parameter Sets: (All) +Aliases: +Accepted values: Low, Medium, High, None, Informational, Information +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RuleErrorAction +The RuleErrorAction parameter specifies what to do if an error is encountered during the evaluation of the rule. Valid values are: + +- Ignore +- RetryThenBlock +- Blank (the value $null): This is the default value. + +```yaml +Type: PolicyRuleErrorAction +Parameter Sets: (All) +Aliases: +Accepted values: Ignore, RetryThenBlock +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SenderIPRanges +The SenderIpRanges parameter specifies a condition for the auto-sensitivity policy rule that looks for senders whose IP addresses matches the specified value, or fall within the specified ranges. Valid values are: + +- Single IP address: For example, 192.168.1.1. +- IP address range: For example, 192.168.0.1-192.168.0.254. +- Classless InterDomain Routing (CIDR) IP address range: For example, 192.168.0.1/25. + +You can specify multiple IP addresses or ranges separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SentTo +The SentTo parameter specifies a condition for the auto-sensitivity policy rule that looks for recipients in messages. You can use any value that uniquely identifies the recipient. For example: + +- Name +- Alias +- Distinguished name (DN) +- Canonical DN +- Email address +- GUID + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +You can use this condition in auto-sensitivity policies that are scoped only to Exchange. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +The WhatIf switch doesn't work in Security & Compliance Center PowerShell. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: wi +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216). + +## INPUTS + +### + +## OUTPUTS + +### + +## NOTES + +## RELATED LINKS diff --git a/exchange/exchange-ps/exchange/Remove-AutoSensitivityLabelPolicy.md b/exchange/exchange-ps/exchange/Remove-AutoSensitivityLabelPolicy.md new file mode 100644 index 0000000000..982023f7c0 --- /dev/null +++ b/exchange/exchange-ps/exchange/Remove-AutoSensitivityLabelPolicy.md @@ -0,0 +1,113 @@ +--- +external help file: Microsoft.Exchange.TransportMailflow-Help.xml +online version: https://docs.microsoft.com/powershell/module/exchange/remove-autosensitivitylabelpolicy +applicable: Office 365 Security & Compliance Center +title: Get-Label +schema: 2.0.0 +author: chrisda +ms.author: chrisda +ms.reviewer: +monikerRange: "o365scc-ps" +--- + +# Remove-AutoSensitivityLabelPolicy + +## SYNOPSIS +This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell). + +Use the Remove-AutoSensitivityLabelPolicy cmdlet to remove auto-labeling policies from your organization. + +For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax). + +## SYNTAX + +``` +Remove-AutoSensitivityLabelPolicy [-Identity] [-Confirm] [-WhatIf] [] +``` + +## DESCRIPTION +You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center). + +## EXAMPLES + +### Example 1 +```powershell +Remove-AutoSensitivityLabelPolicy -Identity "Marketing Group" +``` + +This example removes the policy named Marketing Group. + +## PARAMETERS + +### -Identity +The Identity parameter specifies the auto-labeling policy that you want to remove. You can use any value that uniquely identifies the policy. For example: + +- Name + +- Distinguished name (DN) + +- GUID + +```yaml +Type: PolicyIdParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: 0 +Default value: None +Accept pipeline input: True (ByPropertyName, ByValue) +Accept wildcard characters: False +``` + +### -Confirm +The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding. + +- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false. + +- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: cf +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +The WhatIf switch doesn't work in Security & Compliance Center PowerShell. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: wi +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216). + +## INPUTS + +### + +## OUTPUTS + +### + +## NOTES + +## RELATED LINKS diff --git a/exchange/exchange-ps/exchange/Remove-AutoSensitivityLabelRule.md b/exchange/exchange-ps/exchange/Remove-AutoSensitivityLabelRule.md new file mode 100644 index 0000000000..ece47f7418 --- /dev/null +++ b/exchange/exchange-ps/exchange/Remove-AutoSensitivityLabelRule.md @@ -0,0 +1,113 @@ +--- +external help file: Microsoft.Exchange.TransportMailflow-Help.xml +online version: https://docs.microsoft.com/powershell/module/exchange/remove-autosensitivitylabelrule +applicable: Office 365 Security & Compliance Center +title: Get-Label +schema: 2.0.0 +author: chrisda +ms.author: chrisda +ms.reviewer: +monikerRange: "o365scc-ps" +--- + +# Remove-AutoSensitivityLabelRule + +## SYNOPSIS +This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell). + +Use the Remove-AutoSensitivityLabelPolicy cmdlet to remove auto-labeling policy rules from your organization. + +For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax). + +## SYNTAX + +``` +Remove-AutoSensitivityLabelRule [-Identity] [-Confirm] [-WhatIf] [] +``` + +## DESCRIPTION +You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center). + +## EXAMPLES + +### Example 1 +```powershell +Remove-AutoSensitivityLabelRule -Identity "Social Security Rule" +``` + +This example removes the rule named Social Security Rule. + +## PARAMETERS + +### -Identity +The Identity parameter specifies the auto-labeling policy rule that you want to remove. You can use any value that uniquely identifies the rule. For example: + +- Name + +- Distinguished name (DN) + +- GUID + +```yaml +Type: PolicyIdParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: 0 +Default value: None +Accept pipeline input: True (ByPropertyName, ByValue) +Accept wildcard characters: False +``` + +### -Confirm +The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding. + +- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false. + +- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: cf +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +The WhatIf switch doesn't work in Security & Compliance Center PowerShell. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: wi +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216). + +## INPUTS + +### + +## OUTPUTS + +### + +## NOTES + +## RELATED LINKS diff --git a/exchange/exchange-ps/exchange/Set-AutoSensitivityLabelPolicy.md b/exchange/exchange-ps/exchange/Set-AutoSensitivityLabelPolicy.md new file mode 100644 index 0000000000..4783639296 --- /dev/null +++ b/exchange/exchange-ps/exchange/Set-AutoSensitivityLabelPolicy.md @@ -0,0 +1,546 @@ +--- +external help file: Microsoft.Exchange.TransportMailflow-Help.xml +online version: https://docs.microsoft.com/powershell/module/exchange/set-autosensitivitylabelpolicy +applicable: Office 365 Security & Compliance Center +title: Get-Label +schema: 2.0.0 +author: chrisda +ms.author: chrisda +ms.reviewer: +monikerRange: "o365scc-ps" +--- + +# Set-AutoSensitivityLabelPolicy + +## SYNOPSIS +This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell). + +Use the Set-AutoSensitivityLabelPolicy cmdlet to modify auto-labeling policies in your organization. + +For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax). + +## SYNTAX + +### Identity +``` +Set-AutoSensitivityLabelPolicy [-Identity] + [-AddExchangeLocation ] + [-AddOneDriveLocation ] + [-AddOneDriveLocationException ] + [-AddSharePointLocation ] + [-AddSharePointLocationException ] + [-ApplySensitivityLabel ] + [-Comment ] + [-Confirm] + [-Enabled ] + [-ExchangeSender ] + [-ExchangeSenderException ] + [-ExchangeSenderMemberOf ] + [-ExchangeSenderMemberOfException ] + [-Force] + [-Mode ] + [-Priority ] + [-RemoveExchangeLocation ] + [-RemoveOneDriveLocation ] + [-RemoveOneDriveLocationException ] + [-RemoveSharePointLocation ] + [-RemoveSharePointLocationException ] + [-WhatIf] + [] +``` + +### TeamLocation +``` +Set-AutoSensitivityLabelPolicy [-Identity] + [-Comment ] + [-Confirm] + [-Enabled ] + [-Force] + [-Mode ] + [-WhatIf] + [] +``` + +### RetryDistributionParameterSet +``` +Set-AutoSensitivityLabelPolicy [-Identity] + [-Confirm] + [-Mode ] + [-RetryDistribution] + [-WhatIf] + [] +``` + +## DESCRIPTION +You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center). + +## EXAMPLES + +### Example 1 +```powershell +Set-AutoSensitivityLabelPolicy -Identity "Main PII" -AddSharePointLocation "https://my.url1","https://my.url2" -AddOneDriveLocation "https://my.url3","https://my.url4" +``` + +This example adds the specified URLs to the SharePoint Online and OneDrive for Business locations for the autolabeling policy named Main PII without affecting the existing URL values. + +## PARAMETERS + +### -Identity +The Identity parameter specifies the auto-labeling policy that you want to modify. You can use any value that uniquely identifies the policy. For example: + +- Name + +- Distinguished name (DN) + +- GUID + +```yaml +Type: PolicyIdParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: 0 +Default value: None +Accept pipeline input: True (ByPropertyName, ByValue) +Accept wildcard characters: False +``` + +### -AddExchangeLocation +This AddExchangeLocation parameter specifies new Exchange locations to be added to the policy without affecting the existing ones. + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -AddOneDriveLocation +The AddOneDriveLocation parameter specifies the OneDrive for Business sites to add to the list of included sites when you aren't using the value All for the OneDriveLocation parameter. You identify the site by its URL value. + +To enter multiple values, use the following syntax: ,,.... If the values contain spaces or otherwise require quotation marks, use the following syntax: "","",..."". + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -AddOneDriveLocationException +The AddOneDriveLocationException parameter specifies the OneDrive for Business sites to add to the list of excluded sites when you use the value All for the OneDriveLocation parameter. You identify the site by its URL value. + +To enter multiple values, use the following syntax: ,,.... If the values contain spaces or otherwise require quotation marks, use the following syntax: "","",..."". + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -AddSharePointLocation +The AddSharePointLocation parameter specifies the SharePoint Online sites to add to the list of included sites when you aren't using the value All for the SharePointLocation parameter. You identify the site by its URL value. + +SharePoint Online sites can't be added to the policy until they have been indexed. + +To enter multiple values, use the following syntax: ,,.... If the values contain spaces or otherwise require quotation marks, use the following syntax: "","",..."". + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -AddSharePointLocationException +The AddSharePointLocationException parameter specifies the SharePoint Online sites to add to the list of excluded sites when you use the value All for the SharePointLocation parameter. You identify the site by its URL value. + +To enter multiple values, use the following syntax: ,,.... If the values contain spaces or otherwise require quotation marks, use the following syntax: "","",..."". }} + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ApplySensitivityLabel +The ApplySensitivityLabel parameter selects which label to be used for the policy. This will override the previous label on the policy. + +```yaml +Type: String +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Comment +The Comment parameter specifies an optional comment. If you specify a value that contains spaces, enclose the value in quotation marks ("), for example: "This is an admin note". + +```yaml +Type: String +Parameter Sets: Identity, TeamLocation +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding. + +- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false. + +- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: cf +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Enabled +The Enabled parameter enables or disables the policy. Valid values are: + +- $true: The policy is enabled. This is the default value. + +- $false: The policy is disabled. + +```yaml +Type: Boolean +Parameter Sets: Identity, TeamLocation +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExchangeSender +The ExchangeSender parameter specifies the sender list in Exchange for which the policy should include. + +```yaml +Type: SmtpAddress[] +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExchangeSenderException +The ExchangeSenderException parameter specifies the sender list in Exchange for which the policy should exclude. + +```yaml +Type: SmtpAddress[] +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExchangeSenderMemberOf +The ExchangeSenderMemberOf parameter specifies the distribution groups, mail-enabled security groups, or dynamic distribution groups to include in the autolabeling policy. You identify the group by its email address. + +To enter multiple values, use the following syntax: ,,.... + +You can't use this parameter to specify Microsoft 365 Groups. + +```yaml +Type: SmtpAddress[] +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExchangeSenderMemberOfException +The ExchangeSenderMemberOf parameter specifies the distribution groups, mail-enabled security groups, or dynamic distribution groups to exclude from the autolabeling policy. You identify the group by its email address. + +To enter multiple values, use the following syntax: ,,.... + +You can't use this parameter to specify Microsoft 365 Groups. + +```yaml +Type: SmtpAddress[] +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Force +The Force switch specifies whether to suppress warning or confirmation messages. You can use this switch to run tasks programmatically where prompting for administrative input is inappropriate. You don't need to specify a value with this switch. + +```yaml +Type: SwitchParameter +Parameter Sets: Identity, TeamLocation +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Mode +The Mode parameter specifies the action and notification level of the autolabel policy. Valid values are: + +- Enable: The policy is enabled for actions and notifications. + +- Disable: The policy is disabled. + +- TestWithNotifications: Not supported. + +- TestWithoutNotifications: An audit mode where no actions are taken, and no notifications are sent (Test mode). + +```yaml +Type: PolicyMode +Parameter Sets: (All) +Aliases: +Accepted values: Enable, TestWithNotifications, TestWithoutNotifications, Disable, PendingDeletion +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Priority +The Priority parameter specifies a priority value for the policy that determines the order of policy processing. A lower integer value indicates a higher priority, the value 0 is the highest priority, and policies can't have the same priority value. + +Valid values and the default value for this parameter depend on the number of existing policies. For example, if there are 5 existing policies: + +- Valid priority values for the existing 5 policies are from 0 through 4. + +- Valid priority values for a new 6th policy are from 0 through 5. + +- The default value for a new 6th policy is 5. + +If you modify the priority value of a policy, the position of the policy in the list changes to match the priority value you specify. In other words, if you set the priority value of a policy to the same value as an existing policy, the priority value of the existing policy and all other lower priority policies after it is increased by 1. + +```yaml +Type: System.Int32 +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RemoveExchangeLocation +The RemoveExchangeLocation parameter removes locations on Exchange from the policy. + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RemoveOneDriveLocation +The RemoveOneDriveLocation parameter specifies the OneDrive for Business sites to remove from the list of included sites when you aren't using the value All for the OneDriveLocation parameter. You identify the site by its URL value. + +To enter multiple values, use the following syntax: ,,.... If the values contain spaces or otherwise require quotation marks, use the following syntax: "","",..."". + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RemoveOneDriveLocationException +This RemoveOneDriveLocationException parameter specifies the OneDrive for Business sites to remove from the list of excluded sites when you use the value All for the OneDriveLocation parameter. You identify the site by its URL value. + +To enter multiple values, use the following syntax: ,,.... If the values contain spaces or otherwise require quotation marks, use the following syntax: "","",..."". + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RemoveSharePointLocation +The RemoveSharePointLocation parameter specifies the SharePoint Online sites to remove from the list of included sites when you aren't using the value All for the SharePointLocation parameter. You identify the site by its URL value. + +To enter multiple values, use the following syntax: ,,.... If the values contain spaces or otherwise require quotation marks, use the following syntax: "","",..."". + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RemoveSharePointLocationException +The RemoveSharePointLocationException parameter specifies the SharePoint Online sites to remove from the list of excluded sites when you use the value All for the SharePointLocation parameter. You identify the site by its URL value. + +To enter multiple values, use the following syntax: ,,.... If the values contain spaces or otherwise require quotation marks, use the following syntax: "","",..."". + +```yaml +Type: MultiValuedProperty +Parameter Sets: Identity +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RetryDistribution +The RetryDistribution switch redistributes the policy to all OneDrive for Business and SharePoint Online locations. You don't need to specify a value with this switch. + +Locations whose initial distributions succeeded aren't included in the retry. Policy distribution errors are reported when you use this switch. + +```yaml +Type: SwitchParameter +Parameter Sets: RetryDistributionParameterSet +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +The WhatIf switch doesn't work in Security & Compliance Center PowerShell. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: wi +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216). + +## INPUTS + +### + +## OUTPUTS + +### + +## NOTES + +## RELATED LINKS diff --git a/exchange/exchange-ps/exchange/Set-AutoSensitivityLabelRule.md b/exchange/exchange-ps/exchange/Set-AutoSensitivityLabelRule.md new file mode 100644 index 0000000000..ef09137681 --- /dev/null +++ b/exchange/exchange-ps/exchange/Set-AutoSensitivityLabelRule.md @@ -0,0 +1,734 @@ +--- +external help file: Microsoft.Exchange.TransportMailflow-Help.xml +online version: https://docs.microsoft.com/powershell/module/exchange/set-autosensitivitylabelrule +applicable: Office 365 Security & Compliance Center +title: Get-Label +schema: 2.0.0 +author: chrisda +ms.author: chrisda +ms.reviewer: +monikerRange: "o365scc-ps" +--- + +# Set-AutoSensitivityLabelRule + +## SYNOPSIS +This cmdlet is available only in Security & Compliance Center PowerShell. For more information, see [Security & Compliance Center PowerShell](https://docs.microsoft.com/powershell/exchange/scc-powershell). + +Use the Set-AutoSensitivityLabelPolicy cmdlet to modify auto-labeling policy rules in your organization. + +For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://docs.microsoft.com/powershell/exchange/exchange-cmdlet-syntax). + +## SYNTAX + +``` +Set-AutoSensitivityLabelRule [-Identity] + [-AccessScope ] + [-ActivationDate ] + [-Comment ] + [-Confirm] + [-ContentContainsSensitiveInformation ] + [-ContentExtensionMatchesWords ] + [-Disabled ] + [-DocumentIsPasswordProtected ] + [-DocumentIsUnsupported ] + [-ExceptIfAccessScope ] + [-ExceptIfContentContainsSensitiveInformation ] + [-ExceptIfContentExtensionMatchesWords ] + [-ExceptIfDocumentIsPasswordProtected ] + [-ExceptIfDocumentIsUnsupported ] + [-ExceptIfFrom ] + [-ExceptIfFromMemberOf ] + [-ExceptIfProcessingLimitExceeded ] + [-ExceptIfRecipientDomainIs ] + [-ExceptIfSenderIPRanges ] + [-ExceptIfSentTo ] + [-ExpiryDate ] + [-From ] + [-FromMemberOf ] + [-Priority ] + [-ProcessingLimitExceeded ] + [-RecipientDomainIs ] + [-ReportSeverityLevel ] + [-RuleErrorAction ] + [-SenderIPRanges ] + [-SentTo ] + [-WhatIf] + [-Workload ] + [] +``` + +## DESCRIPTION +You need to be assigned permissions in the Security & Compliance Center before you can use this cmdlet. For more information, see [Permissions in the Security & Compliance Center](https://docs.microsoft.com/microsoft-365/security/office-365-security/permissions-in-the-security-and-compliance-center). + +## EXAMPLES + +### Example 1 +```powershell +Set-AutoSensitivityLabelRule -Identity "SocialSecurityRule1" -Comment "Example" +``` + +This example changes the rule property "Comment" with the rule name "SocialSecurityRule1" to the text "Example". + +## PARAMETERS + +### -Identity +The Identity parameter specifies the auto-labeling policy rule that you want to modify. You can use any value that uniquely identifies the rule. For example: + +- Name + +- Distinguished name (DN) + +- GUID + +```yaml +Type: ComplianceRuleIdParameter +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: True +Position: 0 +Default value: None +Accept pipeline input: True (ByPropertyName, ByValue) +Accept wildcard characters: False +``` + +### -AccessScope +The AccessScope parameter specifies a condition for the auto-labeling policy rule that's based on the access scope of the content. The rule is applied to content that matches the specified access scope. Valid values are: + +- InOrganization: The rule is applied to content that's accessible inside the organization. +- NotInOrganization: The rule is applied to content that's accessible outside the organization. +- None: The condition isn't used. + +```yaml +Type: AccessScope +Parameter Sets: (All) +Aliases: +Accepted values: InOrganization, NotInOrganization, None +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ActivationDate +{{ Fill ActivationDate Description }} + +```yaml +Type: System.DateTime +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Comment +The Comment parameter specifies an optional comment. If you specify a value that contains spaces, enclose the value in quotation marks ("), for example: "This is an admin note". + +```yaml +Type: String +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding. + +- Destructive cmdlets (for example, Remove-\* cmdlets) have a built-in pause that forces you to acknowledge the command before proceeding. For these cmdlets, you can skip the confirmation prompt by using this exact syntax: -Confirm:$false. + +- Most other cmdlets (for example, New-\* and Set-\* cmdlets) don't have a built-in pause. For these cmdlets, specifying the Confirm switch without a value introduces a pause that forces you acknowledge the command before proceeding. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: cf +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ContentContainsSensitiveInformation +The ContentContainsSensitiveInformation parameter specifies a condition for the rule that's based on a sensitive information type match in content. The rule is applied to content that contains the specified sensitive information type. + +This parameter uses the basic syntax @(@{Name="\";[minCount="\"],@{Name="\";[minCount="\"],...). For example, @(@{Name="U.S. Social Security Number (SSN)"; minCount="2"},@{Name="Credit Card Number"}). + +```yaml +Type: PswsHashtable[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ContentExtensionMatchesWords +The ContentExtensionMatchesWords parameter specifies a condition for the auto-labeling policy rule that looks for words in file name extensions. You can specify multiple words separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Disabled +The Disabled parameter specifies whether the case hold rule is enabled or disabled. Valid values are: + +- $true: The rule is disabled. + +- $false: The rule is enabled. This is the default value. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -DocumentIsPasswordProtected +The DocumentIsPasswordProtected parameter specifies a condition for the auto-labeling policy rule that looks for password protected files (because the contents of the file can't be inspected). Password detection only works for Office documents and .zip files. Valid values are: + +- $true: Look for password protected files. + +- $false: Don't look for password protected files. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -DocumentIsUnsupported +The DocumentIsUnsupported parameter specifies a condition for the auto-labeling policy rule that looks for files that can't be scanned. Valid values are: + +- $true: Look for unsupported files that can't be scanned. +- $false: Don't look for unsupported files that can't be scanned. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfAccessScope +The ExceptIfAccessScopeAccessScope parameter specifies an exception for the auto-labeling policy rule that's based on the access scope of the content. The rule isn't applied to content that matches the specified access scope. Valid values are: + +- InOrganization: The rule isn't applied to content that's accessible inside the organization. +- NotInOrganization: The rule isn't applied to content that's accessible outside the organization. +- None: The exception isn't used. + +```yaml +Type: AccessScope +Parameter Sets: (All) +Aliases: +Accepted values: InOrganization, NotInOrganization, None +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfContentContainsSensitiveInformation +The ExceptIfContentContainsSensitiveInformation parameter specifies an exception for the auto-labeling policy rule that's based on a sensitive information type match in content. The rule isn't applied to content that contains the specified sensitive information type. + +This parameter uses the basic syntax @(@{Name="\";[minCount="\"],@{Name="\";[minCount="\"],...). For example, @(@{Name="U.S. Social Security Number (SSN)"; minCount="2"},@{Name="Credit Card Number"}). + +```yaml +Type: PswsHashtable[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfContentExtensionMatchesWords +The ExceptIfContentExtensionMatchesWords parameter specifies an exception for the auto-labeling policy rule that looks for words in file name extensions. You can specify multiple words separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfDocumentIsPasswordProtected +The ExceptIfDocumentIsPasswordProtected parameter specifies an exception for the auto-labeling policy rule that looks for password protected files (because the contents of the file can't be inspected). Password detection only works for Office documents and .zip files. Valid values are: + +- $true: Look for password protected files. +- $false: Don't look for password protected files. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfDocumentIsUnsupported +The ExceptIfDocumentIsUnsupported parameter specifies an exception for the auto-labeling policy rule that looks for files that can't be scanned. Valid values are: + +- $true: Look for unsupported files that can't be scanned. +- $false: Don't look for unsupported files that can't be scanned. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfFrom +The ExceptIfFrom parameter specifies an exception for the auto-labeling policy rule that looks for messages from specific senders. You can use any value that uniquely identifies the sender. For example: + +- Name +- Alias +- Distinguished name (DN) +- Canonical DN +- Email address +- GUID + +```yaml +Type: RecipientIdParameter[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfFromMemberOf +The ExceptIfFromMemberOf parameter specifies an exception for the auto-labeling policy rule that looks for messages sent by group members. You identify the group members by their email addresses. + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +```yaml +Type: SmtpAddress[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfProcessingLimitExceeded +The ExceptIfProcessingLimitExceeded parameter specifies an exception for the auto-labeling policy rule rule that looks for files where scanning couldn't complete. Valid values are: + +- $true: Look for files where scanning couldn't complete. +- $false: Don't look for files where scanning couldn't complete. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfRecipientDomainIs +The ExceptIfRecipientDomainIs parameter specifies an exception for the auto-labeling policy rule that looks for recipients with email address in the specified domains. You can specify multiple domains separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfSenderIPRanges +The ExceptIfSenderIpRanges parameter specifies an exception for the auto-labeling policy rule rule that looks for senders whose IP addresses matches the specified value, or fall within the specified ranges. Valid values are: + +- Single IP address: For example, 192.168.1.1. +- IP address range: For example, 192.168.0.1-192.168.0.254. +- Classless InterDomain Routing (CIDR) IP address range: For example, 192.168.0.1/25. + +You can specify multiple IP addresses or ranges separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExceptIfSentTo +The ExceptIfSentTo parameter specifies an exception for the auto-labeling policy rule that looks for recipients in messages. You can use any value that uniquely identifies the recipient. For example: + +- Name +- Alias +- Distinguished name (DN) +- Canonical DN +- Email address +- GUID + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +You can use this exception in auto-labeling policies that are scoped only to Exchange. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExpiryDate +This parameter is reserved for internal Microsoft use. + +```yaml +Type: System.DateTime +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -From +This parameter is reserved for internal Microsoft use. + +```yaml +Type: RecipientIdParameter[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -FromMemberOf +This parameter is reserved for internal Microsoft use. + +```yaml +Type: SmtpAddress[] +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Priority +This parameter is reserved for internal Microsoft use. + +```yaml +Type: System.Int32 +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProcessingLimitExceeded +The ProcessingLimitExceeded parameter specifies a condition for the auto-labeling policy rule that looks for files where scanning couldn't complete. You can use this condition to create rules that work together to identify and process messages where the content couldn't be fully scanned. Valid values are: + +- $true: Look for files where scanning couldn't complete. +- $false: Don't look for files where scanning couldn't complete. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RecipientDomainIs +The RecipientDomainIs parameter specifies a condition for the auto-labeling policy rule that looks for recipients with email address in the specified domains. You can specify multiple domains separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ReportSeverityLevel +The ReportSeverityLevel parameter specifies the severity level of the incident report for content detections based on the rule. Valid values are: + +- None: You can't select this value if the rule has no actions configured. +- Low: This is the default value. +- Medium +- High + +```yaml +Type: RuleSeverity +Parameter Sets: (All) +Aliases: +Accepted values: Low, Medium, High, None, Informational, Information +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -RuleErrorAction +The RuleErrorAction parameter specifies what to do if an error is encountered during the evaluation of the rule. Valid values are: + +- Ignore +- RetryThenBlock +- Blank (the value $null): This is the default value. + +```yaml +Type: PolicyRuleErrorAction +Parameter Sets: (All) +Aliases: +Accepted values: Ignore, RetryThenBlock +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SenderIPRanges +The SenderIpRanges parameter specifies a condition for the auto-sensitivity policy rule that looks for senders whose IP addresses matches the specified value, or fall within the specified ranges. Valid values are: + +- Single IP address: For example, 192.168.1.1. +- IP address range: For example, 192.168.0.1-192.168.0.254. +- Classless InterDomain Routing (CIDR) IP address range: For example, 192.168.0.1/25. + +You can specify multiple IP addresses or ranges separated by commas. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SentTo +The SentTo parameter specifies a condition for the auto-sensitivity policy rule that looks for recipients in messages. You can use any value that uniquely identifies the recipient. For example: + +- Name +- Alias +- Distinguished name (DN) +- Canonical DN +- Email address +- GUID + +To enter multiple values, use the following syntax: \,\,...\. If the values contain spaces or otherwise require quotation marks, use the following syntax: "\","\",..."\". + +You can use this condition in auto-sensitivity policies that are scoped only to Exchange. + +```yaml +Type: MultiValuedProperty +Parameter Sets: (All) +Aliases: +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +The WhatIf switch doesn't work in Security & Compliance Center PowerShell. + +```yaml +Type: SwitchParameter +Parameter Sets: (All) +Aliases: wi +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Workload +The Workload parameter specifies the workload. Valid values are: + +- AuditAlerting +- DynamicScope +- EndpointDevices +- Exchange +- ExchangeOnPremises +- Intune +- ModernGroup +- OneDriveForBusiness +- PublicFolder +- SharePoint +- SharePointOnPremises +- Skype +- Teams +- ThirdPartyApps +- UnifiedAuditAzure + +```yaml +Type: Workload +Parameter Sets: (All) +Aliases: +Accepted values: None, Exchange, SharePoint, Intune, OneDriveForBusiness, PublicFolder, SharePointOnPremises, ExchangeOnPremises, AuditAlerting, Skype, ModernGroup, DynamicScope, Teams, UnifiedAuditAzure, EndpointDevices, ThirdPartyApps +Applicable: Office 365 Security & Compliance Center + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/p/?LinkID=113216). + +## INPUTS + +### + +## OUTPUTS + +### + +## NOTES + +## RELATED LINKS