You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/exchange-online-powershell-v2.md
+9-3Lines changed: 9 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: About the Exchange Online PowerShell V3 module
3
3
ms.author: chrisda
4
4
author: chrisda
5
5
manager: deniseb
6
-
ms.date: 06/26/2024
6
+
ms.date: 07/16/2024
7
7
ms.audience: Admin
8
8
audience: Admin
9
9
ms.topic: article
@@ -610,14 +610,20 @@ Unless otherwise noted, the current release of the Exchange Online PowerShell mo
610
610
611
611
### Current release
612
612
613
+
#### Version 3.5.1
614
+
615
+
- Bug fixes in **Get-EXOMailboxPermission** and **Get-EXOMailbox**.
616
+
- The module has been upgraded to run on .NET 8, replacing the previous version based on .NET 6.
617
+
- Enhancements in **Add-VivaModuleFeaturePolicy**.
618
+
619
+
### Previous releases
620
+
613
621
#### Version 3.5.0
614
622
615
623
- New **Get-VivaFeatureCategory** cmdlet.
616
624
- Added support for policy operations at the category level in Viva Feature Access Management (VFAM).
617
625
- New IsFeatureEnabledByDefault property in the output of **Get-VivaModuleFeaturePolicy**. The value of this property shows the default enablement state for users in the tenant when no tenant or user/group policies were created.
618
626
619
-
### Previous releases
620
-
621
627
#### Version 3.4.0
622
628
623
629
- Bug fixes in **Connect-ExchangeOnline**, **Get-EXORecipientPermission**, and **Get-EXOMailboxFolderPermission**.
Copy file name to clipboardExpand all lines: exchange/docs-conceptual/whats-new-in-the-exo-module.md
+7-1Lines changed: 7 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: What's new in the Exchange Online PowerShell module
3
3
ms.author: chrisda
4
4
author: chrisda
5
5
manager: deniseb
6
-
ms.date: 05/17/2024
6
+
ms.date: 07/16/2024
7
7
ms.audience: Admin
8
8
audience: Admin
9
9
ms.topic: article
@@ -22,6 +22,12 @@ description: "Learn about the new features and functionality available in the la
22
22
23
23
This article lists new features in the Exchange Online PowerShell module that's used for connecting to Exchange Online PowerShell, Security & Compliance PowerShell, and standalone Exchange Online Protection (EOP) PowerShell. Features that are currently in preview are denoted with **(preview)**.
24
24
25
+
## July 2024
26
+
27
+
-[Version 3.5.1](https://www.powershellgallery.com/packages/ExchangeOnlineManagement/3.5.1) has been released.
28
+
29
+
For information about what's in this release, see [Version 3.5.1](exchange-online-powershell-v2.md#version-351)
30
+
25
31
## May 2024
26
32
27
33
-[Version 3.5.0](https://www.powershellgallery.com/packages/ExchangeOnlineManagement/3.5.0) has been released.
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/Add-VivaModuleFeaturePolicy.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -300,6 +300,8 @@ You can specify a maximum of 20 total users or groups (20 users and no groups, 1
300
300
301
301
To have the policy apply to all users in the organization, use the Everyone switch.
302
302
303
+
**Note**: In v3.5.1-Preview2 or later of the module, this parameter supports security group object IDs (GUIDs). Previous versions of the module accept only email addresses for this parameter.
**Note**: This parameter is currently in Public Preview, isn't available in all organizations, and is subject to change.
477
+
478
+
The ApplyDynamicWatermarkingEnabled parameter enables dynamic watermarking for a specific label that applies encryption. Valid values are:
479
+
480
+
- $true: Enables dynamic watermarking for a specific label.
481
+
- $false: Disables dynamic watermarking for a specific label.
482
+
483
+
You set the watermark text with the DynamicWatermarkDisplay parameter. For more information about using dynamic watermarks for supported apps, see [Dynamic watermarks](https://learn.microsoft.com/purview/encryption-sensitivity-labels#dynamic-watermarks).
484
+
485
+
```yaml
486
+
Type: System.Boolean
487
+
Parameter Sets: (All)
488
+
Aliases:
489
+
Applicable: Security & Compliance
490
+
491
+
Required: False
492
+
Position: Named
493
+
Default value: None
494
+
Accept pipeline input: False
495
+
Accept wildcard characters: False
496
+
```
497
+
473
498
### -ApplyWaterMarkingEnabled
474
499
The ApplyWaterMarkingEnabled parameter enables or disables the Apply Watermarking Header action for the label. Valid values are:
475
500
@@ -691,6 +716,28 @@ Accept pipeline input: False
691
716
Accept wildcard characters: False
692
717
```
693
718
719
+
### -DynamicWatermarkDisplay
720
+
**Note**: This parameter is currently in Public Preview, isn't available in all organizations, and is subject to change.
721
+
722
+
The DynamicWatermarkDisplay parameter specifies the watermark text to display for a given label. This parameter supports text and the following special tokens:
723
+
724
+
- `${Consumer.PrincipalName}`: Required. The value is the user principal name (UPN) of the user.
725
+
726
+
This parameter is meaningful only when the ApplyDynamicWatermarkingEnabled parameter value is $true.
727
+
728
+
```yaml
729
+
Type: String
730
+
Parameter Sets: (All)
731
+
Aliases:
732
+
Applicable: Security & Compliance
733
+
734
+
Required: False
735
+
Position: Named
736
+
Default value: None
737
+
Accept pipeline input: False
738
+
Accept wildcard characters: False
739
+
```
740
+
694
741
### -EncryptionAipTemplateScopes
695
742
The EncryptionAipTemplateScopes parameter specifies that the label is still published and usable in the AIP classic client. An example value is `"['[email protected]','[email protected]']"`.
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/New-TransportRule.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -676,6 +676,8 @@ The ApplyHtmlDisclaimerFallbackAction parameter specifies what to do if the HTML
676
676
677
677
If the process of inserting the original message as an attachment in the new message fails, the original message isn't delivered. The original message is returned to the sender in an NDR.
678
678
679
+
In Microsoft 365, don't use this value in rules that affect incoming messages from external senders. Use the value Reject instead. The effects of the value Wrap interfere with Safe Attachments scanning of messages from external senders.
680
+
679
681
- Ignore: The rule is ignored and the original message is delivered without the disclaimer.
680
682
- Reject: The original message is returned to the sender in an NDR.
**Note**: This parameter is currently in Public Preview, isn't available in all organizations, and is subject to change.
459
+
460
+
The ApplyDynamicWatermarkingEnabled parameter enables dynamic watermarking for a specific label that applies encryption. Valid values are:
461
+
462
+
- $true: Enables dynamic watermarking for a specific label.
463
+
- $false: Disables dynamic watermarking for a specific label.
464
+
465
+
You set the watermark text with the DynamicWatermarkDisplay parameter. For more information about using dynamic watermarks for supported apps, see [Dynamic watermarks](https://learn.microsoft.com/purview/encryption-sensitivity-labels#dynamic-watermarks).
466
+
467
+
```yaml
468
+
Type: System.Boolean
469
+
Parameter Sets: (All)
470
+
Aliases:
471
+
Applicable: Security & Compliance
472
+
473
+
Required: False
474
+
Position: Named
475
+
Default value: None
476
+
Accept pipeline input: False
477
+
Accept wildcard characters: False
478
+
```
479
+
455
480
### -ApplyWaterMarkingEnabled
456
481
The ApplyWaterMarkingEnabled parameter enables or disables the Apply Watermarking Header action for the label. Valid values are:
457
482
@@ -689,6 +714,28 @@ Accept pipeline input: False
689
714
Accept wildcard characters: False
690
715
```
691
716
717
+
### -DynamicWatermarkDisplay
718
+
**Note**: This parameter is currently in Public Preview, isn't available in all organizations, and is subject to change.
719
+
720
+
The DynamicWatermarkDisplay parameter specifies the watermark text to display for a given label. This parameter supports text and the following special tokens:
721
+
722
+
- `${Consumer.PrincipalName}`: Required. The value is the user principal name (UPN) of the user.
723
+
724
+
This parameter is meaningful only when the ApplyDynamicWatermarkingEnabled parameter value is $true.
725
+
726
+
```yaml
727
+
Type: String
728
+
Parameter Sets: (All)
729
+
Aliases:
730
+
Applicable: Security & Compliance
731
+
732
+
Required: False
733
+
Position: Named
734
+
Default value: None
735
+
Accept pipeline input: False
736
+
Accept wildcard characters: False
737
+
```
738
+
692
739
### -EncryptionContentExpiredOnDateInDaysOrNever
693
740
The EncryptionContentExpiredOnDateInDaysOrNever parameter specifies when the encrypted content expires. Valid values are:
This parameter is available only in the cloud-based service.
3111
3111
3112
-
**Note**: This parameter is in the process of being rolled out. The rollout is expected to be completed by mid-November 2023.
3113
-
3114
3112
The PostponeRoamingSignaturesUntilLater parameter controls whether roaming signatures are enabled or disabled in Outlook on the web (formerly known as Outlook Web App or OWA) and the new Outlook for Windows. Valid values are:
3115
3113
3116
-
- $true: Roaming signatures are temporarily disabled for Outlook on the web and the new Outlook for Windows. For Windows, the registry setting to disable roaming signatures still works. For more information, see [Outlook roaming signatures](https://support.microsoft.com/office/420c2995-1f57-4291-9004-8f6f97c54d15). When roaming signatures are disabled, admins can use the signature-related parameters on the Set-MailboxMessageConfiguration cmdlet (for example, AutoAddSignature, AutoAddSignatureOnReply, and SignatureHtml) to configure email signatures.
3117
-
- $false: This is the default value.
3114
+
- $true: Roaming signatures are disabled for Outlook on the web and the new Outlook for Windows. For Windows clients, the registry setting to disable roaming signatures still works. For more information, see [Outlook roaming signatures](https://support.microsoft.com/office/420c2995-1f57-4291-9004-8f6f97c54d15). When roaming signatures are disabled, admins can use the signature-related parameters on the Set-MailboxMessageConfiguration cmdlet (for example, AutoAddSignature, AutoAddSignatureOnReply, and SignatureHtml) to configure email signatures.
3115
+
3116
+
Previously, the only way to disable roaming signatures in Outlook on the web was to open a support ticket. With the introduction of this parameter and value, admins can disable roaming signatures themselves.
3117
+
3118
+
- $false: Roaming signatures are enabled for Outlook on the web and the new Outlook for Windows. This is the default value.
3118
3119
3119
-
We're working on API support so admins and ISVs can configure roaming signatures directly. When the new API is available (and after plenty of warning), this parameter will be deprecated. Admins will no longer need to disable roaming signatures or use the parameters on Set-MailboxMessageConfiguration to configure email signatures in Outlook on the web.
3120
+
We recommend that independent software vendors (ISVs) onboard to the [signature API](https:///javascript/api/outlook/office.body?view=outlook-js-preview#outlook-office-body-setsignatureasync-member(1) based on [event-based hooks
3121
+
](/office/dev/add-ins/outlook/autolaunch).
3120
3122
3121
-
Previously, the only way to disable roaming signatures in Outlook on the web was to open a support ticket. With the introduction of this parameter, that process is discontinued as admins can now use this parameter to disable roaming signatures themselves.
3123
+
We have no plans to support roaming signature management in the Microsoft Graph API.
Copy file name to clipboardExpand all lines: exchange/exchange-ps/exchange/Set-TransportRule.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -674,6 +674,8 @@ The ApplyHtmlDisclaimerFallbackAction parameter specifies what to do if the HTML
674
674
675
675
If the process of inserting the original message as an attachment in the new message fails, the original message isn't delivered. The original message is returned to the sender in an NDR.
676
676
677
+
In Microsoft 365, don't use this value in rules that affect incoming messages from external senders. Use the value Reject instead. The effects of the value Wrap interfere with Safe Attachments scanning of messages from external senders.
678
+
677
679
- Ignore: The rule is ignored and the original message is delivered without the disclaimer.
678
680
- Reject: The original message is returned to the sender in an NDR.
This example updates the name of the specified policy, makes it so the policy enables the feature, and updates who the policy applies to. The policy now applies **only** to the specified users and groups, overwriting the users and groups the policy used to apply to.
@@ -126,7 +126,7 @@ This example updates the name of the specified policy and makes it so the policy
This example updates who the specified policy applies to. The policy now applies **only** to the specified groups, overwriting the users and groups the policy used to apply to.
@@ -140,7 +140,7 @@ This example updates who the specified policy applies to. The policy now applies
This example updates the name of the specified policy, makes it so the policy enables the category (effectively all features under the category), and updates who the policy applies to. The policy now applies **only** to the specified users and groups, overwriting the users and groups the policy used to apply to.
The GroupIds parameter specifies the email addresses of groups that the updated policy applies to. [Mail-enabled Microsoft Entra groups](https://docs.microsoft.com/graph/api/resources/groups-overview#group-types-in-azure-ad-and-microsoft-graph) are supported. You can enter multiple values separated by commas.
267
+
The GroupIds parameter specifies the email addresses or security group object IDs (GUIDs) of groups that the updated policy applies to. Both [Mail-enabled and non-mail-enabled Microsoft Entra groups](https://docs.microsoft.com/graph/api/resources/groups-overview#group-types-in-azure-ad-and-microsoft-graph) are supported. You can enter multiple values separated by commas.
268
268
269
269
If you don't want to update who the policy applies to, don't use this parameter.
270
270
@@ -274,6 +274,8 @@ You can specify a maximum of 20 total users or groups (20 users and no groups, 1
274
274
275
275
To have the updated policy apply to all users in the organization, use the Everyone parameter with the value $true.
276
276
277
+
**Note**: In v3.5.1-Preview2 or later of the module, this parameter supports security group object IDs (GUIDs). Previous versions of the module accept only email addresses for this parameter.
0 commit comments