Skip to content

Commit d4e84da

Browse files
committed
Added back ApplyBrandingTemplate and EnforcePortalAccess
Per PM request even thought they aren't visible to me in 2 different E5 tenants.
1 parent 11aa279 commit d4e84da

File tree

2 files changed

+78
-0
lines changed

2 files changed

+78
-0
lines changed

exchange/exchange-ps/exchange/New-DlpComplianceRule.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ New-DlpComplianceRule [-Name] <String> -Policy <PolicyIdParameter>
2929
[-AlertProperties <PswsHashtable>]
3030
[-AnyOfRecipientAddressContainsWords <MultiValuedProperty>]
3131
[-AnyOfRecipientAddressMatchesPatterns <MultiValuedProperty>]
32+
[-ApplyBrandingTemplate <String>]
3233
[-ApplyHtmlDisclaimer <PswsHashtable>]
3334
[-BlockAccess <Boolean>]
3435
[-BlockAccessScope <Microsoft.Office.CompliancePolicy.Tasks.BlockAccessScope>]
@@ -54,6 +55,7 @@ New-DlpComplianceRule [-Name] <String> -Policy <PolicyIdParameter>
5455
[-EncryptRMSTemplate <RmsTemplateIdParameter>]
5556
[-EndpointDlpBrowserRestrictions <PswsHashtable[]>]
5657
[-EndpointDlpRestrictions <PswsHashtable[]>]
58+
[-EnforcePortalAccess <Boolean>]
5759
[-ExceptIfAccessScope <Microsoft.Office.CompliancePolicy.Tasks.AccessScope>]
5860
[-ExceptIfAnyOfRecipientAddressContainsWords <MultiValuedProperty>]
5961
[-ExceptIfAnyOfRecipientAddressMatchesPatterns <MultiValuedProperty>]
@@ -470,6 +472,24 @@ Accept pipeline input: False
470472
Accept wildcard characters: False
471473
```
472474

475+
### -ApplyBrandingTemplate
476+
The ApplyBrandingTemplate parameter specifies an action for the DLP rule that applies a custom branding template for messages encrypted by Microsoft Purview Message Encryption. You identify the custom branding template by name. If the name contains spaces, enclose the name in quotation marks (").
477+
478+
Use the EnforcePortalAccess parameter to control whether external users are required to use the encrypted message portal to view encrypted messages.
479+
480+
```yaml
481+
Type: String
482+
Parameter Sets: (All)
483+
Aliases:
484+
Applicable: Security & Compliance
485+
486+
Required: False
487+
Position: Named
488+
Default value: None
489+
Accept pipeline input: False
490+
Accept wildcard characters: False
491+
```
492+
473493
### -ApplyHtmlDisclaimer
474494
The ApplyHtmlDisclaimer parameter specifies an action for the rule that adds disclaimer text to messages.This parameter uses the syntax: `@{Text = "Disclaimer text"; Location = <Append | Prepend>; FallbackAction = <Wrap | Ignore | Reject> }`.
475495

@@ -957,6 +977,25 @@ Accept pipeline input: False
957977
Accept wildcard characters: False
958978
```
959979

980+
### -EnforcePortalAccess
981+
The EnforcePortalAccess parameter specifies whether external recipients are required to view encrypted mail using the encrypted message portal when the ApplyBrandingTemplate action is also specified. Valid values are:
982+
983+
- $true: External recipients are required to use the encrypted message portal to view encrypted messages.
984+
- $false: External recipients aren't required to use the encrypted message portal. Outlook can decrypt messages inline.
985+
986+
```yaml
987+
Type: Boolean
988+
Parameter Sets: (All)
989+
Aliases:
990+
Applicable: Security & Compliance
991+
992+
Required: False
993+
Position: Named
994+
Default value: None
995+
Accept pipeline input: False
996+
Accept wildcard characters: False
997+
```
998+
960999
### -ExceptIfAccessScope
9611000
The ExceptIfAccessScopeAccessScope parameter specifies an exception for the DLP rule that's based on the access scope of the content. The rule isn't applied to content that matches the specified access scope. Valid values are:
9621001

exchange/exchange-ps/exchange/Set-DlpComplianceRule.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ Set-DlpComplianceRule [-Identity] <ComplianceRuleIdParameter>
2929
[-AlertProperties <PswsHashtable>]
3030
[-AnyOfRecipientAddressContainsWords <MultiValuedProperty>]
3131
[-AnyOfRecipientAddressMatchesPatterns <MultiValuedProperty>]
32+
[-ApplyBrandingTemplate <String>]
3233
[-ApplyHtmlDisclaimer <PswsHashtable>]
3334
[-BlockAccess <Boolean>]
3435
[-BlockAccessScope <Microsoft.Office.CompliancePolicy.Tasks.BlockAccessScope>]
@@ -54,6 +55,7 @@ Set-DlpComplianceRule [-Identity] <ComplianceRuleIdParameter>
5455
[-EncryptRMSTemplate <RmsTemplateIdParameter>]
5556
[-EndpointDlpBrowserRestrictions <PswsHashtable[]>]
5657
[-EndpointDlpRestrictions <PswsHashtable[]>]
58+
[-EnforcePortalAccess <Boolean>]
5759
[-ExceptIfAccessScope <Microsoft.Office.CompliancePolicy.Tasks.AccessScope>]
5860
[-ExceptIfAnyOfRecipientAddressContainsWords <MultiValuedProperty>]
5961
[-ExceptIfAnyOfRecipientAddressMatchesPatterns <MultiValuedProperty>]
@@ -401,6 +403,24 @@ Accept pipeline input: False
401403
Accept wildcard characters: False
402404
```
403405

406+
### -ApplyBrandingTemplate
407+
The ApplyBrandingTemplate parameter specifies an action for the DLP rule that applies a custom branding template for messages encrypted by Microsoft Purview Message Encryption. You identify the custom branding template by name. If the name contains spaces, enclose the name in quotation marks (").
408+
409+
Use the EnforcePortalAccess parameter to control whether external users are required to use the encrypted message portal to view encrypted messages.
410+
411+
```yaml
412+
Type: String
413+
Parameter Sets: (All)
414+
Aliases:
415+
Applicable: Security & Compliance
416+
417+
Required: False
418+
Position: Named
419+
Default value: None
420+
Accept pipeline input: False
421+
Accept wildcard characters: False
422+
```
423+
404424
### -ApplyHtmlDisclaimer
405425
The ApplyHtmlDisclaimer parameter specifies an action for the rule that adds disclaimer text to messages.This parameter uses the syntax: `@{Text = "Disclaimer text"; Location = <Append | Prepend>; FallbackAction = <Wrap | Ignore | Reject> }`.
406426

@@ -888,6 +908,25 @@ Accept pipeline input: False
888908
Accept wildcard characters: False
889909
```
890910

911+
### -EnforcePortalAccess
912+
The EnforcePortalAccess parameter specifies whether external recipients are required to view encrypted mail using the encrypted message portal when the ApplyBrandingTemplate action is also specified. Valid values are:
913+
914+
- $true: External recipients are required to use the encrypted message portal to view encrypted messages.
915+
- $false: External recipients aren't required to use the encrypted message portal. Outlook can decrypt messages inline.
916+
917+
```yaml
918+
Type: Boolean
919+
Parameter Sets: (All)
920+
Aliases:
921+
Applicable: Security & Compliance
922+
923+
Required: False
924+
Position: Named
925+
Default value: None
926+
Accept pipeline input: False
927+
Accept wildcard characters: False
928+
```
929+
891930
### -ExceptIfAccessScope
892931
The ExceptIfAccessScopeAccessScope parameter specifies an exception for the DLP rule that's based on the access scope of the content. The rule isn't applied to content that matches the specified access scope. Valid values are:
893932

0 commit comments

Comments
 (0)