Skip to content

Commit 35814b8

Browse files
committed
Removed extra spaces and carriage returns
1 parent db8d834 commit 35814b8

25 files changed

+84
-93
lines changed

exchange/docs-conceptual/app-only-auth-powershell-v2.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -216,15 +216,15 @@ Choose **one** of the following methods in this section to assign API permission
216216
217217
![Find and select Office 365 Exchange Online on the APIs my organization uses tab.](media/exo-app-only-auth-api-permissions-select-o365-exo.png)
218218
219-
5. On the **What type of permissions does your application require?** flyout that appears, select **Application permissions**.
219+
4. On the **What type of permissions does your application require?** flyout that appears, select **Application permissions**.
220220
221-
6. In the permissions list that appears, expand **Exchange**, select **Exchange.ManageAsApp**, and then select **Add permissions**.
221+
5. In the permissions list that appears, expand **Exchange**, select **Exchange.ManageAsApp**, and then select **Add permissions**.
222222
223223
![Find and select Exchange.ManageAsApp permissions from the Application permission tab.](media/exo-app-only-auth-api-permissions-select-exchange-manageasapp.png)
224224
225-
7. Back on the app **API permissions** page, verify **Office 365 Exchange Online** \> **Exchange.ManageAsApp** is listed and contains the following values:
225+
6. Back on the app **API permissions** page, verify **Office 365 Exchange Online** \> **Exchange.ManageAsApp** is listed and contains the following values:
226226
- **Type**: **Application**.
227-
- **Admin consent required**: **Yes**.
227+
- **Admin consent required**: **Yes**.
228228
229229
- **Status**: The current incorrect value is **Not granted for \<Organization\>**.
230230
@@ -236,11 +236,11 @@ Choose **one** of the following methods in this section to assign API permission
236236
237237
![Admin consent granted for Exchange.ManageAsApp permissions.](media/exo-app-only-auth-admin-consent-granted.png)
238238
239-
8. For the default **Microsoft Graph** \> **User.Read** entry, select **...** \> **Revoke admin consent**, and then select **Yes** in the confirmation dialog that opens to return **Status** back to the default blank value.
239+
7. For the default **Microsoft Graph** \> **User.Read** entry, select **...** \> **Revoke admin consent**, and then select **Yes** in the confirmation dialog that opens to return **Status** back to the default blank value.
240240
241241
![Admin consent removed from default Microsoft Graph User.Read permissions.](media/exo-app-only-auth-admin-consent-removed-from-graph.png)
242242
243-
9. Close the current **API permissions** page (not the browser tab) to return to the **App registrations** page. You use the **App registrations** page in an upcoming step.
243+
8. Close the current **API permissions** page (not the browser tab) to return to the **App registrations** page. You use the **App registrations** page in an upcoming step.
244244
245245
#### Modify the app manifest to assign API permissions
246246
@@ -310,7 +310,7 @@ Choose **one** of the following methods in this section to assign API permission
310310
311311
4. On the **API permissions** page, verify **Office 365 Exchange Online** \> **Exchange.ManageAsApp** is listed and contains the following values:
312312
- **Type**: **Application**.
313-
- **Admin consent required**: **Yes**.
313+
- **Admin consent required**: **Yes**.
314314
315315
- **Status**: The current incorrect value is **Not granted for \<Organization\>** for the **Office 365 Exchange Online** \> **Exchange.ManageAsApp** entry.
316316

exchange/docs-conceptual/client-advanced-settings.md

Lines changed: 40 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.localizationpriority: high
1313
ms.collection:
1414
- tier3
1515
- purview-compliance
16-
search.appverid:
16+
search.appverid:
1717
description: "Security & Compliance PowerShell advanced settings for Microsoft Purview Information Protection client."
1818
---
1919

@@ -26,14 +26,13 @@ This article contains the [Security & Compliance PowerShell](/powershell/exchang
2626

2727
The advanced settings that are supported by sensitivity labels built into Microsoft 365 apps and services are included on the cmdlet page itself. You might also find useful [PowerShell tips for specifying the advanced settings](/purview/create-sensitivity-labels#powershell-tips-for-specifying-the-advanced-settings).
2828

29-
3029
|Advanced settings for labels|Description|
31-
|----------------|---------------|
32-
[Color](#color)|Specify a color for the label|
30+
|---|---|
31+
|[Color](#color)|Specify a color for the label|
3332
|[DefaultSubLabelId](#defaultsublabelid)|Specify a default sublabel for a parent label|
3433

3534
|Advanced settings for label policies|Description|
36-
|----------------|---------------|
35+
|---|---|
3736
|[AdditionalPPrefixExtensions](#additionalpprefixextensions)|Support for changing \<EXT>.PFILE to P\<EXT>|
3837
|[EnableAudit](#enableaudit)|Prevent audit data from being sent to Microsoft Purview|
3938
|[EnableContainerSupport](#enablecontainersupport)|Enable removal of encryption from PST, rar, 7zip, and MSG files|
@@ -53,24 +52,23 @@ The advanced settings that are supported by sensitivity labels built into Micros
5352
|[SharepointFileWebRequestTimeout](#sharepointfilewebrequesttimeout )|Configure SharePoint timeouts|
5453
|[UseCopyAndPreserveNTFSOwner](#usecopyandpreserventfsowner) |Preserve NTFS owners during labeling|
5554

56-
5755
## AdditionalPPrefixExtensions
5856

59-
This advanced property to change \<EXT>.PFILE to P\<EXT> is supported by File Explorer, PowerShell, and by the scanner. All apps have similar behavior.
57+
This advanced property to change \<EXT>.PFILE to P\<EXT> is supported by File Explorer, PowerShell, and by the scanner. All apps have similar behavior.
6058

6159
- Key: **AdditionalPPrefixExtensions**
6260

63-
- Value: **\<string value>**
61+
- Value: **\<string value>**
6462

6563
Use the following table to identify the string value to specify:
6664

6765
| String value| Client and scanner|
68-
|-------------|---------------|
66+
|---|---|
6967
|\*|All PFile extensions become P\<EXT>|
7068
|\<null value>| Default value behaves like the default encryption value.|
71-
|ConvertTo-Json(".dwg", ".zip")|In addition to the previous list, ".dwg" and ".zip" become P\<EXT>|
69+
|ConvertTo-Json(".dwg", ".zip")|In addition to the previous list, ".dwg" and ".zip" become P\<EXT>|
7270

73-
With this setting, the following extensions always become **P\<EXT>**: ".txt", ".xml", ".bmp", ".jt", ".jpg", ".jpeg", ".jpe", ".jif", ".jfif", ".jfi", ".png", ".tif", ".tiff", ".gif"). Notable exclusion is that "ptxt" does not become "txt.pfile".
71+
With this setting, the following extensions always become **P\<EXT>**: ".txt", ".xml", ".bmp", ".jt", ".jpg", ".jpeg", ".jpe", ".jif", ".jfif", ".jfi", ".png", ".tif", ".tiff", ".gif"). Notable exclusion is that "ptxt" does not become "txt.pfile".
7472

7573
This setting requires the advanced setting *PFileSupportedExtension* to be enabled.
7674

@@ -80,13 +78,13 @@ This setting requires the advanced setting *PFileSupportedExtension* to be enabl
8078
Set-LabelPolicy -AdvancedSettings @{ AdditionalPPrefixExtensions =""}
8179
```
8280

83-
**Example 2**: PowerShell command to change all PFile extensions from generic encryption to native encryption when the files are labeled and encrypted:
81+
**Example 2**: PowerShell command to change all PFile extensions from generic encryption to native encryption when the files are labeled and encrypted:
8482

8583
```PowerShell
8684
Set-LabelPolicy -AdvancedSettings @{ AdditionalPPrefixExtensions ="*"}
8785
```
8886

89-
**Example 3**: PowerShell command to change ".dwg" to ".pdwg" when using this service protect this file:
87+
**Example 3**: PowerShell command to change ".dwg" to ".pdwg" when using this service protect this file:
9088

9189
```PowerShell
9290
Set-LabelPolicy -AdvancedSettings @{ AdditionalPPrefixExtensions =ConvertTo-Json(".dwg")}
@@ -112,7 +110,7 @@ Set-Label -Identity Public -AdvancedSettings @{color="#40e0d0"}
112110

113111
## DefaultSubLabelId
114112

115-
When you add a sublabel to a label, users can no longer apply the parent label to a document or email. By default, users select the parent label to see the sublabels that they can apply, and then select one of those sublabels. If you configure this advanced setting, when users select the parent label, a sublabel is automatically selected and applied for them:
113+
When you add a sublabel to a label, users can no longer apply the parent label to a document or email. By default, users select the parent label to see the sublabels that they can apply, and then select one of those sublabels. If you configure this advanced setting, when users select the parent label, a sublabel is automatically selected and applied for them:
116114

117115
- Key: **DefaultSubLabelId**
118116

@@ -226,7 +224,7 @@ Set-LabelPolicy -Identity Global -AdvancedSettings @{JustificationTextForUserTex
226224

227225
By default, the information protection client doesn't send content matches for sensitive info types to Microsoft Purview, which can then be displayed in [activity explorer](/purview/data-classification-activity-explorer). The scanner always sends this information. For more information about this additional information that can be sent, see [Content matches for deeper analysis](/azure/information-protection/reports-aip#content-matches-for-deeper-analysis).
228226

229-
To send content matches when sensitive information types are sent, use the following advanced setting in a label policy:
227+
To send content matches when sensitive information types are sent, use the following advanced setting in a label policy:
230228

231229
- Key: **LogMatchedContent**
232230

@@ -246,10 +244,10 @@ If you have a complex Excel file with many sheets or rows, 3 seconds might not b
246244

247245
- Key: **OfficeContentExtractionTimeout**
248246

249-
- Value: Seconds, in the following format: `hh:mm:ss`.
247+
- Value: Seconds, in the following format: `hh:mm:ss`.
250248

251249
> [!IMPORTANT]
252-
> We recommend that you don't raise this timeout to higher than 15 seconds.
250+
> We recommend that you don't raise this timeout to higher than 15 seconds.
253251
254252
Example PowerShell command, where your label policy is named "Global":
255253

@@ -265,16 +263,16 @@ With this setting, you can change which file types are encrypted but you cannot
265263

266264
- Key: **PFileSupportedExtensions**
267265

268-
- Value: **\<string value>**
266+
- Value: **\<string value>**
269267

270268
Use the following table to identify the string value to specify:
271269

272-
| String value| Client| Scanner|
273-
|-------------|-------|--------|
270+
| String value|Client|Scanner|
271+
|---|---|---|
274272
|\*|Default value: Apply encryption to all file types|Apply encryption to all file types|
275273
|ConvertTo-Json(".jpg", ".png")|In addition to Office file types and PDF files, apply encryption to the specified file name extensions | In addition to Office file types and PDF files, apply encryption to the specified file name extensions
276274

277-
**Example 1**: PowerShell command for the scanner to encrypt all file types, where your label policy is named "Scanner":
275+
**Example 1**: PowerShell command for the scanner to encrypt all file types, where your label policy is named "Scanner":
278276

279277
```PowerShell
280278
Set-LabelPolicy -Identity Scanner -AdvancedSettings @{PFileSupportedExtensions="*"}
@@ -288,7 +286,7 @@ Set-LabelPolicy -Identity Scanner -AdvancedSettings @{PFileSupportedExtensions=C
288286

289287
## ReportAnIssueLink
290288

291-
When you specify the following advanced client setting, users see a **Report an Issue** option that they can select from the **Help and Feedback** client dialog box in the file labeler. Specify an HTTP string for the link. For example, a customized web page that you have for users to report issues, or an email address that goes to your help desk.
289+
When you specify the following advanced client setting, users see a **Report an Issue** option that they can select from the **Help and Feedback** client dialog box in the file labeler. Specify an HTTP string for the link. For example, a customized web page that you have for users to report issues, or an email address that goes to your help desk.
292290

293291
To configure this advanced setting, enter the following strings for the selected label policy:
294292

@@ -306,50 +304,48 @@ Example PowerShell command, where your label policy is named "Global":
306304
Set-LabelPolicy -Identity Global -AdvancedSettings @{ReportAnIssueLink="mailto:[email protected]"}
307305
```
308306

309-
310307
## ScannerMaxCPU
311308

312309
> [!IMPORTANT]
313310
> We recommend limiting CPU consumption by using the advanced settings *ScannerMaxCPU* and *ScannerMinCPU* instead of *ScannerConcurrencyLevel* that's supported for backwards compatibility.
314-
>
311+
>
315312
> If the older advanced setting is specified,*ScannerMaxCPU* and *ScannerMinCPU* advanced settings are ignored.
316313
317-
Use this advanced setting in conjunction with *ScannerMinCPU* to limit CPU consumption on the scanner computer.
314+
Use this advanced setting in conjunction with *ScannerMinCPU* to limit CPU consumption on the scanner computer.
318315

319316
- Key: **ScannerMaxCPU**
320317

321318
- Value: \<number>**
322319

323-
The value is set to **100** by default, which means there is no limit of maximum CPU consumption. In this case, the scanner process will try to use all available CPU time to maximize your scan rates.
320+
The value is set to **100** by default, which means there is no limit of maximum CPU consumption. In this case, the scanner process will try to use all available CPU time to maximize your scan rates.
324321

325-
If you set **ScannerMaxCPU** to less than 100, the scanner will monitor the CPU consumption over the last 30 minutes. If the average CPU crossed the limit you set, it will start to reduce the number of threads allocated for new files.
322+
If you set **ScannerMaxCPU** to less than 100, the scanner will monitor the CPU consumption over the last 30 minutes. If the average CPU crossed the limit you set, it will start to reduce the number of threads allocated for new files.
326323

327324
The limit on the number of threads will continue as long as CPU consumption is higher than the limit set for **ScannerMaxCPU**.
328325

329326
## ScannerMinCPU
330327

331328
> [!IMPORTANT]
332329
> We recommend limiting CPU consumption by using the advanced settings *ScannerMaxCPU* and *ScannerMinCPU* instead of *ScannerConcurrencyLevel* that's supported for backwards compatibility.
333-
>
330+
>
334331
> If the older advanced setting is specified,*ScannerMaxCPU* and *ScannerMinCPU* advanced settings are ignored.
335332
336-
Used only if *ScannerMaxCPU* is not equal to 100, and cannot be set to a number that is higher than the **ScannerMaxCPU** value.
333+
Used only if *ScannerMaxCPU* is not equal to 100, and cannot be set to a number that is higher than the **ScannerMaxCPU** value.
337334

338-
We recommend keeping **ScannerMinCPU** set at least 15 points lower than the value of *ScannerMaxCPU*.
339-
340-
The value is set to **50** by default, which means that if CPU consumption in the last 30 minutes when lower than this value, the scanner will start adding new threads to scan more files in parallel, until the CPU consumption reaches the level you have set for *ScannerMaxCPU*-15.
335+
We recommend keeping **ScannerMinCPU** set at least 15 points lower than the value of *ScannerMaxCPU*.
341336

337+
The value is set to **50** by default, which means that if CPU consumption in the last 30 minutes when lower than this value, the scanner will start adding new threads to scan more files in parallel, until the CPU consumption reaches the level you have set for *ScannerMaxCPU*-15.
342338

343339
## ScannerConcurrencyLevel
344340

345341
> [!IMPORTANT]
346342
> We recommend limiting CPU consumption by using the advanced settings *ScannerMaxCPU* and *ScannerMinCPU* instead of *ScannerConcurrencyLevel* that's supported for backwards compatibility.
347-
>
343+
>
348344
> When this older advanced setting is specified,*ScannerMaxCPU* and *ScannerMinCPU* advanced settings are ignored.
349345
350-
By default, the scanner uses all available processor resources on the computer running the scanner service. If you need to limit the CPU consumption while this service is scanning, specify the number of concurrent threads that the scanner can run in parallel. The scanner uses a separate thread for each file that it scans, so this throttling configuration also defines the number of files that can be scanned in parallel.
346+
By default, the scanner uses all available processor resources on the computer running the scanner service. If you need to limit the CPU consumption while this service is scanning, specify the number of concurrent threads that the scanner can run in parallel. The scanner uses a separate thread for each file that it scans, so this throttling configuration also defines the number of files that can be scanned in parallel.
351347

352-
When you first configure the value for testing, we recommend you specify 2 per core, and then monitor the results. For example, if you run the scanner on a computer that has 4 cores, first set the value to 8. If necessary, increase or decrease that number, according to the resulting performance you require for the scanner computer and your scanning rates.
348+
When you first configure the value for testing, we recommend you specify 2 per core, and then monitor the results. For example, if you run the scanner on a computer that has 4 cores, first set the value to 8. If necessary, increase or decrease that number, according to the resulting performance you require for the scanner computer and your scanning rates.
353349

354350
- Key: **ScannerConcurrencyLevel**
355351

@@ -363,7 +359,7 @@ Set-LabelPolicy -Identity Scanner -AdvancedSettings @{ScannerConcurrencyLevel="8
363359

364360
## ScannerFSAttributesToSkip
365361

366-
By default, the information protection scanner scans all relevant files. However, you might want to define specific files to be skipped, such as for archived files or files that have been moved.
362+
By default, the information protection scanner scans all relevant files. However, you might want to define specific files to be skipped, such as for archived files or files that have been moved.
367363

368364
Enable the scanner to skip specific files based on their file attributes by using the **ScannerFSAttributesToSkip** advanced setting. In the setting value, list the file attributes that will enable the file to be skipped when they are all set to **true**. This list of file attributes uses the AND logic.
369365

@@ -386,13 +382,14 @@ Set-LabelPolicy -Identity Global -AdvancedSettings @{ ScannerFSAttributesToSkip
386382

387383
> [!TIP]
388384
> We recommend that you consider enabling the scanner to skip files with the following attributes:
389-
> * FILE_ATTRIBUTE_SYSTEM
390-
> * FILE_ATTRIBUTE_HIDDEN
391-
> * FILE_ATTRIBUTE_DEVICE
392-
> * FILE_ATTRIBUTE_OFFLINE
393-
> * FILE_ATTRIBUTE_RECALL_ON_DATA_ACCESS
394-
> * FILE_ATTRIBUTE_RECALL_ON_OPEN
395-
> * FILE_ATTRIBUTE_TEMPORARY
385+
>
386+
> - FILE_ATTRIBUTE_SYSTEM
387+
> - FILE_ATTRIBUTE_HIDDEN
388+
> - FILE_ATTRIBUTE_DEVICE
389+
> - FILE_ATTRIBUTE_OFFLINE
390+
> - FILE_ATTRIBUTE_RECALL_ON_DATA_ACCESS
391+
> - FILE_ATTRIBUTE_RECALL_ON_OPEN
392+
> - FILE_ATTRIBUTE_TEMPORARY
396393
397394
For a list of all file attributes that can be defined in the **ScannerFSAttributesToSkip** advanced setting, see the [Win32 File Attribute Constants](/windows/win32/fileio/file-attribute-constants)
398395

@@ -437,4 +434,3 @@ Example PowerShell command, where your label policy is named "Scanner"
437434
```PowerShell
438435
Set-LabelPolicy -Identity Global -AdvancedSettings @{UseCopyAndPreserveNTFSOwner ="true"}
439436
```
440-

exchange/docs-conceptual/find-exchange-cmdlet-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ Otherwise, no results are likely caused by one of the following conditions:
8787
To find the roles in your environment (if any) that contain the cmdlet or parameters, replace `<Cmdlet>` and optionally, `<Parameter1>,<Parameter2>,...` with the values that you want to use and run the following command:
8888

8989
```powershell
90-
Get-ManagementRoleEntry -Identity *\<Cmdlet> [-Parameters <Parameter1>,<Parameter2>,...]
90+
Get-ManagementRoleEntry -Identity *\<Cmdlet> [-Parameters <Parameter1>,<Parameter2>,...]
9191
```
9292

9393
> [!TIP]
@@ -143,7 +143,7 @@ Get-ManagementRoleAssignment -Role "<Role name>" -GetEffectiveUsers -Delegating
143143
For example:
144144

145145
```powershell
146-
Get-ManagementRoleAssignment -Role "Mailbox Import Export" -GetEffectiveUsers -Delegating $false | Where-Object {$_.EffectiveUserName -ne "All Group Members"} | Format-Table -Auto EffectiveUserName,Role,RoleAssigneeName,AssignmentMethod
146+
Get-ManagementRoleAssignment -Role "Mailbox Import Export" -GetEffectiveUsers -Delegating $false | Where-Object {$_.EffectiveUserName -ne "All Group Members"} | Format-Table -Auto EffectiveUserName,Role,RoleAssigneeName,AssignmentMethod
147147
```
148148

149149
### Find the members of a role group

0 commit comments

Comments
 (0)