Skip to content

Commit 39b9619

Browse files
committed
Merge branch 'FeatureConfig-chrisda' of https://github.com/MicrosoftDocs/office-docs-powershell into FeatureConfig-chrisda
2 parents 5fb1e1e + 600344f commit 39b9619

File tree

3 files changed

+55
-21
lines changed

3 files changed

+55
-21
lines changed

exchange/exchange-ps/exchange/Get-FeatureConfiguration.md

+10-6
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,13 @@ schema: 2.0.0
99
# Get-FeatureConfiguration
1010

1111
## SYNOPSIS
12-
**Note**: Currently, this cmdlet is available only in Private Preview.
12+
**Note**: This cmdlet is available in Public Preview.
1313

1414
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
1515

16-
Use the Get-FeatureConfiguration cmdlet to view Discovery policies.
16+
Use the Get-FeatureConfiguration cmdlet to view Microsoft Purview feature configurations within your organization, including:
17+
- Collection policies
18+
- Endpoint DLP trust container
1719

1820
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
1921

@@ -39,19 +41,19 @@ To use this cmdlet in Security & Compliance PowerShell, you need to be assigned
3941
Get-FeatureConfiguration -FeatureScenario KnowYourData | Format-Table Name,Mode
4042
```
4143

42-
This example returns a summary list of all Discovery policies in the organization.
44+
This example returns a summary list of all collection policies in the organization.
4345

4446
### Example 2
4547
```powershell
4648
Get-FeatureConfiguration -FeatureScenario KnowYourData -Identity "Engineering Group"
4749
```
4850

49-
This example returns detailed information about the specified Discovery policy.
51+
This example returns detailed information about the specified collection policy.
5052

5153
## PARAMETERS
5254

5355
### -Identity
54-
The Identity policy specifies the Discovery policy that you want to view. You can use any value that uniquely identifies the policy. For example:
56+
The Identity policy specifies the feature configuration that you want to view. You can use any value that uniquely identifies the configuration. For example:
5557

5658
- Name
5759
- Distinguished name (DN)
@@ -71,7 +73,9 @@ Accept wildcard characters: False
7173
```
7274
7375
### -FeatureScenario
74-
The FeatureScenario parameter specifies the scenario for the Discovery policy. Currently, the only valid value is KnowYourData.
76+
The FeatureScenario parameter specifies the scenario for the feature configuration. Currently, the only valid values are:
77+
- `KnowYourData` for collection policies
78+
- `TrustContainer` for Endpoint DLP trust container
7579

7680
```yaml
7781
Type: PolicyScenario

exchange/exchange-ps/exchange/New-FeatureConfiguration.md

+39-11
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,13 @@ schema: 2.0.0
99
# New-FeatureConfiguration
1010

1111
## SYNOPSIS
12-
**Note**: Currently, this cmdlet is available only in Private Preview.
12+
**Note**: This cmdlet is available in Public Preview.
1313

1414
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
1515

16-
Use the New-FeatureConfiguration cmdlet to create Discovery policies.
16+
Use the New-FeatureConfiguration cmdlet to create Microsoft Purview feature configurations within your organization, including:
17+
- Collection policies
18+
- Endpoint DLP trust container
1719

1820
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
1921

@@ -37,15 +39,39 @@ To use this cmdlet in Security & Compliance PowerShell, you need to be assigned
3739

3840
### Example 1
3941
```powershell
40-
New-FeatureConfiguration -Name "Discovery policy for Contoso executives" -FeatureScenario KnowYourData -Mode Enable -ScenarioConfig '{"Activities": ["UploadText", "UploadFile"], "EnforcementPlanes": ["Browser"], "SensitiveTypeIds": ["a44669fe-0d48-453d-a9b1-2cc83f2cba77","50842eb7-edc8-4019-85dd-5a5c1f2bb085"]}' –Locations '[{"Workload": "Applications","Location": "51622","Inclusions": [{"Type": "Group","Identity": "[email protected]"}]},{"Workload": "Applications","Location": "51399","Inclusions": [{"Type": "Group","Identity": "[email protected]"}]},{"Workload": "Applications","Location": "51279","Inclusions": [{"Type": "Group","Identity": "[email protected]"}]}]'
42+
New-FeatureConfiguration -Name "Collection policy for supported Copilots" -FeatureScenario KnowYourData -Mode Enable -ScenarioConfig '{"Activities":["UploadText","DownloadText"],"EnforcementPlanes":["CopilotExperiences","Browser"],"SensitiveTypeIds":["All"],"IsIngestionEnabled":true}' –Locations '[{"Workload":"Applications","Location":"52655","LocationSource":"SaaS","LocationType":"Individual","Inclusions":[{"Type":"Tenant","Identity":"All","DisplayName":"All","Name":"All"}]},{"Workload":"Applications","Location":"49baeafd-1a6b-4c58-be55-75ae6d1dff6a","LocationSource":"PurviewConfig","LocationType":"Group","Inclusions":[{"Type":"Tenant","Identity":"All","DisplayName":"All","Name":"All"}]}]'
4143
```
4244

43-
This example displays a discovery policy that includes the group "Executives" and targets a specific set of sensitive information types.
45+
This example creates an enabled collection policy named "Collection policy for supported Copilots" that:
46+
- Includes UploadText & DownloadText activity for all supported classifiers
47+
- Captures all AI prompts
48+
- Includes Microsoft Copilot & Copilot Experiences locations, both scoped to all users & groups
49+
50+
### Example 2
51+
```powershell
52+
New-FeatureConfiguration -Name "Scoped browser collection policy for Microsoft Copilot" -FeatureScenario KnowYourData -Mode Enable -ScenarioConfig '{"Activities":["UploadText"],"EnforcementPlanes":["Browser"],"SensitiveTypeIds":["All"],"ExcludedSensitiveTypeIds":["50b8b56b-4ef8-44c2-a924-03374f5831ce","8548332d-6d71-41f8-97db-cc3b5fa544e6"],"IsIngestionEnabled":false}' –Locations '[{"Workload":"Applications","Location":"52655","LocationDisplayName":null,"LocationSource":"SaaS","LocationType":"Individual","Inclusions":[{"Type":"Tenant","Identity":"All","DisplayName":"All","Name":"All"}],"Exclusions":[{"Type":"Group","Identity":"db458ddb-4f56-4d88-a4f7-e29545560839","DisplayName":"Contoso Executives","Name":"[email protected]"}]}]'
53+
```
54+
55+
This example creates an enabled collection policy named "Scoped browser collection policy for Microsoft Copilot" that:
56+
- Includes UploadText activity for all supported classifiers except "All Full Names" and "All Physical Addresses"
57+
- Includes Microsoft Copilot location, for all users & groups except the "Contoso Executives Group"
58+
59+
### Example 3
60+
```powershell
61+
New-FeatureConfiguration -Name "Scoped collection policies for browser and devices" -FeatureScenario KnowYourData -Mode Disable -ScenarioConfig '{"Activities":["UploadText","filecreated","filedeleted","filemodified"],"EnforcementPlanes":["Devices","Browser"],"SensitiveTypeIds":["a44669fe-0d48-453d-a9b1-2cc83f2cba77","cb353f78-2b72-4c3c-8827-92ebe4f69fdf"],"FileExtensions":["pdf"],"IsIngestionEnabled":false}' –Locations '[{"Workload":"EndpointDevices","Location":"","Inclusions":[{"Type":"Group","Identity":"db458ddb-4f56-4d88-a4f7-e29545560839","DisplayName":"All Company","Name":"[email protected]"}],"Exclusions":[{"Type":"IndividualResource","Identity":"a828f25a-cede-4d0e-97e6-b0b0c913732a","DisplayName":"Alex Wilber","Name":"[email protected]"}]},{"Workload":"Applications","Location":"52655","LocationSource":"SaaS","LocationType":"Individual","Inclusions":[{"Type":"IndividualResource","Identity":"84f9af2e-b224-4cb8-b9cd-bc531bb07a48","DisplayName":"Adele Vance","Name":"[email protected]"}]}]'
62+
```
63+
64+
This example creates a disabled collection policy named "Scoped collection policies for browser and devices" that:
65+
- Includes UploadText (for browser) and filecreated, filedeleted, and filemodified activities (for devices)
66+
- Includes "U.S. Social Security Number (SSN)" and "ABA Routing Number" classifiers only
67+
- Detects files on devices with "pdf" file extension only
68+
- Includes devices location, scoped to the "All company" group, excluding the user "Alex Wilber"
69+
- Includes Microsoft Copilot location, scoped only to the user "Adele Vance"
4470

4571
## PARAMETERS
4672

4773
### -Name
48-
The Name parameter specifies the unique name for the Discovery policy. The maximum length is 64 characters. If the value contains spaces, enclose the value in quotation marks (").
74+
The Name parameter specifies the unique name for the feature configuration. The maximum length is 64 characters. If the value contains spaces, enclose the value in quotation marks (").
4975

5076
```yaml
5177
Type: String
@@ -61,7 +87,9 @@ Accept wildcard characters: False
6187
```
6288
6389
### -FeatureScenario
64-
The FeatureScenario parameter specifies the scenario for the Discovery policy. Currently, the only valid value is KnowYourData.
90+
The FeatureScenario parameter specifies the scenario for the feature configuration. Currently, the only valid values are:
91+
- `KnowYourData` for collection policies
92+
- `TrustContainer` for Endpoint DLP trust container
6593

6694
```yaml
6795
Type: PolicyScenario
@@ -77,10 +105,10 @@ Accept wildcard characters: False
77105
```
78106

79107
### -Mode
80-
The Mode parameter specifies the action and notification level of the Discovery policy. Valid values are:
108+
The Mode parameter specifies feature configuration mode. Valid values are:
81109

82-
- Enable: The policy is enabled for actions and notifications. This is the default value.
83-
- Disable: The policy is disabled.
110+
- Enable: The feature configuration is enabled.
111+
- Disable: The feature configuration is disabled.
84112

85113
```yaml
86114
Type: PolicyMode
@@ -96,7 +124,7 @@ Accept wildcard characters: False
96124
```
97125

98126
### -ScenarioConfig
99-
The ScenarioConfig parameter specifies additional information about the policy configuration.
127+
The ScenarioConfig parameter specifies additional information about the feature configuration.
100128

101129
```yaml
102130
Type: String
@@ -179,7 +207,7 @@ Accept wildcard characters: False
179207
```
180208

181209
### -Locations
182-
The locations parameter specifies where the policy applies.
210+
The locations parameter specifies where the feature configuration applies.
183211

184212
```yaml
185213
Type: String

exchange/exchange-ps/exchange/Remove-FeatureConfiguration.md

+6-4
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,13 @@ schema: 2.0.0
99
# Remove-FeatureConfiguration
1010

1111
## SYNOPSIS
12-
**Note**: Currently, this cmdlet is available only in Private Preview.
12+
**Note**: This cmdlet is available in Public Preview.
1313

1414
This cmdlet is available only in Security & Compliance PowerShell. For more information, see [Security & Compliance PowerShell](https://learn.microsoft.com/powershell/exchange/scc-powershell).
1515

16-
Use the Remove-FeatureConfiguration cmdlet to remove Discovery policies.
16+
Use the Remove-FeatureConfiguration cmdlet to remove Microsoft Purview feature configurations within your organization, including:
17+
- Collection policies
18+
- Endpoint DLP trust container
1719

1820
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
1921

@@ -38,12 +40,12 @@ To use this cmdlet in Security & Compliance PowerShell, you need to be assigned
3840
Remove-FeatureConfiguration -Identity "Engineering Group"
3941
```
4042

41-
This example removes the specified Discovery policy.
43+
This example removes the specified feature configuration.
4244

4345
## PARAMETERS
4446

4547
### -Identity
46-
The Identity policy specifies the Discovery policy that you want to remove. You can use any value that uniquely identifies the policy. For example:
48+
The Identity policy specifies the feature configuration that you want to remove. You can use any value that uniquely identifies the configuration. For example:
4749

4850
- Name
4951
- Distinguished name (DN)

0 commit comments

Comments
 (0)