Skip to content

Commit e1cb98a

Browse files
committed
TechNet topic updates
Updates done in the TechNet versions (bugs) that needed to be synced to GitHub.
1 parent a6354d9 commit e1cb98a

15 files changed

+63
-57
lines changed

exchange/exchange-ps/exchange/Get-ClientAccessRule.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ schema: 2.0.0
66
# Get-ClientAccessRule
77

88
## SYNOPSIS
9+
This cmdlet is available in on-premises Exchange and in the cloud-based service. Some parameters and settings may be exclusive to one environment or the other.
10+
911
Use the Get-ClientAccessRule cmdlet to view client access rules. Client access rules help you control access to your cloud-based organization based on the properties of the connection.
1012

1113
For information about the parameter sets in the Syntax section below, see Exchange cmdlet syntax (https://technet.microsoft.com/library/bb123552.aspx).
@@ -18,20 +20,20 @@ Get-ClientAccessRule [[-Identity] <ClientAccessRuleIdParameter>] [-Confirm] [-Do
1820
```
1921

2022
## DESCRIPTION
21-
Client access rules are like transport rules for client connections to your organization. You use conditions and exceptions to identify the connections based on the user or properties of the client or the connection, and actions that define what to do with those connections.
23+
Client access rules are like mail flow rules (also known as transport rules) for client connections to your organization. You use conditions and exceptions to identify the connections based on their properties, and actions that allow or block the connections.
2224

2325
You need to be assigned permissions before you can run this cmdlet. Although this topic lists all parameters for the cmdlet, you may not have access to some parameters if they're not included in the permissions assigned to you. To find the permissions required to run any cmdlet or parameter in your organization, see Find the permissions required to run any Exchange cmdlet (https://technet.microsoft.com/library/mt432940.aspx).
2426

2527
## EXAMPLES
2628

27-
### Example 1 -------------------------- (Exchange Online)
29+
### Example 1
2830
```
2931
Get-ClientAccessRule
3032
```
3133

3234
This example shows a summary list of all client access rules.
3335

34-
### Example 2 -------------------------- (Exchange Online)
36+
### Example 2
3537
```
3638
Get-ClientAccessRule "Block Client Connections from 192.168.1.0/24" | Format-List
3739
```
@@ -61,7 +63,9 @@ Accept wildcard characters: False
6163
```
6264
6365
### -DomainController
64-
This parameter is reserved for internal Microsoft use.
66+
This parameter is available only in on-premises Exchange.
67+
68+
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
6569
6670
```yaml
6771
Type: Fqdn

exchange/exchange-ps/exchange/Get-DynamicDistributionGroup.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,11 +67,12 @@ This example returns all dynamic distribution groups whose names contain the str
6767

6868
### Example 4
6969
```
70-
$FTE = Get-DynamicDistributionGroup "Full Time Employees"; Get-Recipient -RecipientPreviewFilter $FTE.RecipientFilter
70+
$FTE = Get-DynamicDistributionGroup "Full Time Employees"; Get-Recipient -RecipientPreviewFilter $FTE.RecipientFilter -OrganizationalUnit $FTE.RecipientContainer
7171
```
7272

7373
This example returns the members for the dynamic distribution group named Full Time Employees. The first command stores the dynamic distribution group object in the variable $FTE. The second command uses the Get-Recipient cmdlet to list the recipients that match the criteria defined for the dynamic distribution group.
7474

75+
7576
## PARAMETERS
7677

7778
### -Anr

exchange/exchange-ps/exchange/Get-MailboxExportRequest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -261,10 +261,10 @@ The Status parameter filters the results based on status. You can use the follow
261261
262262
- InProgress
263263
264-
- None
265-
266264
- Queued
267265
266+
- Retrying
267+
268268
- Suspended
269269
270270
- Synced

exchange/exchange-ps/exchange/Get-MailboxImportRequest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -262,10 +262,10 @@ The Status parameter filters the results based on status. You can use the follow
262262
263263
- InProgress
264264
265-
- None
266-
267265
- Queued
268266
267+
- Retrying
268+
269269
- Suspended
270270
271271
- Synced

exchange/exchange-ps/exchange/Get-MailboxRestoreRequest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -238,10 +238,10 @@ The Status parameter filters the results based on status. You can use the follow
238238
239239
- InProgress
240240
241-
- None
242-
243241
- Queued
244242
243+
- Retrying
244+
245245
- Suspended
246246
247247
- Synced

exchange/exchange-ps/exchange/Get-MoveRequest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -219,10 +219,10 @@ The MoveStatus parameter returns move requests in the specified status. You can
219219
220220
- InProgress
221221
222-
- None
223-
224222
- Queued
225223
224+
- Retrying
225+
226226
- Suspended
227227
228228
You can't use this parameter with the Identity parameter.

exchange/exchange-ps/exchange/Get-PublicFolderMailboxMigrationRequest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -221,10 +221,10 @@ The Status parameter filters the results based on status. You can use the follow
221221
222222
- InProgress
223223
224-
- None
225-
226224
- Queued
227225
226+
- Retrying
227+
228228
- Suspended
229229
230230
- Synced

exchange/exchange-ps/exchange/Get-PublicFolderMigrationRequest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -211,10 +211,10 @@ The Status parameter filters the results based on status. You can use the follow
211211
212212
- InProgress
213213
214-
- None
215-
216214
- Queued
217215
216+
- Retrying
217+
218218
- Suspended
219219
220220
- Synced

exchange/exchange-ps/exchange/Get-PublicFolderMoveRequest.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -208,10 +208,10 @@ The Status parameter filters the results based on status. You can use the follow
208208
209209
- InProgress
210210
211-
- None
212-
213211
- Queued
214212
213+
- Retrying
214+
215215
- Suspended
216216
217217
- Synced

exchange/exchange-ps/exchange/New-ClientAccessRule.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ schema: 2.0.0
66
# New-ClientAccessRule
77

88
## SYNOPSIS
9+
This cmdlet is available in on-premises Exchange and in the cloud-based service. Some parameters and settings may be exclusive to one environment or the other.
10+
911
Use the New-ClientAccessRule cmdlet to create client access rules. Client access rules help you control access to your cloud-based organization based on the properties of the connection.
1012

1113
For information about the parameter sets in the Syntax section below, see Exchange cmdlet syntax (https://technet.microsoft.com/library/bb123552.aspx).
@@ -24,7 +26,7 @@ New-ClientAccessRule [-Name] <String> -Action <AllowAccess | DenyAccess>
2426
```
2527

2628
## DESCRIPTION
27-
Client access rules are like transport rules for client connections to your organization. You use conditions and exceptions to identify the connections based on the user or properties of the client or the connection, and actions that define what to do with those connections.
29+
Client access rules are like mail flow rules (also known as transport rules) for client connections to your organization. You use conditions and exceptions to identify the connections based on their properties, and actions that allow or block the connections.
2830

2931
Note: Currently, not all authentication types are supported for all protocols. The supported authentication types per protocol are described in this list:
3032

@@ -40,14 +42,14 @@ You need to be assigned permissions before you can run this cmdlet. Although thi
4042

4143
## EXAMPLES
4244

43-
### Example 1 -------------------------- (Exchange Online)
45+
### Example 1
4446
```
4547
New-ClientAccessRule -Name AllowRemotePS -Action Allow -AnyOfProtocols RemotePowerShell -Priority 1
4648
```
4749

4850
This example creates a highest priority rule that allows access to remote PowerShell. This rule is an important safeguard to preserve access to your organization. Without this rule, if you create rules that block your access to remote PowerShell, or that block all protocols for everyone, you'll lose the ability to fix the rules yourself (you'll need to call Microsoft Customer Service and Support).
4951

50-
### Example 2 -------------------------- (Exchange Online)
52+
### Example 2
5153
```
5254
New-ClientAccessRule -Name "Block ActiveSync" -Action DenyAccess -AnyOfProtocols ExchangeActiveSync -ExceptAnyOfClientIPAddressesOrRanges 192.168.10.1/24
5355
```
@@ -221,7 +223,9 @@ Accept wildcard characters: False
221223
```
222224
223225
### -DomainController
224-
This parameter is reserved for internal Microsoft use.
226+
This parameter is available only in on-premises Exchange.
227+
228+
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
225229
226230
```yaml
227231
Type: Fqdn

0 commit comments

Comments
 (0)