- Added elevated access functions: Set-O365AzureElevatedAccess, Get-O365AzureElevatedRoleAssignments, Get-O365AzureElevatedDenyAssignments, Remove-O365AzureElevatedAccess
- Added -UserPrincipalName support for elevated access commands and new example script
- Set-O365AzureElevatedAccess can optionally elevate another user by UPN or principal ID
- Listing and removal cmdlets default to the current user when no principal is specified
- Azure connections now request tokens for
https://management.azure.comto ensure elevated access APIs work - Connect-O365Admin continues without an Azure token if acquisition fails, allowing non-Azure commands to run
- Fix Remove-O365AzureElevatedAccess when the role definition cannot be found
- Use principal filters only for elevated role and deny assignments and filter results to root scope
- Example script uses default connection and shows verbose confirmation
- Get commands emit a verbose message when no assignments are returned
- Handle role and deny assignment responses returned as arrays without a
valuewrapper
- Update docs
Set-O365OrgForms
- Update Set-O365OrgForms.ps1 added ResponderEditResponse parameter by @SaschaLac in #32
- Added help to 146 functions by @neztach in #30
- Added
Get-O365CopilotPin
Full Changelog: https://github.com/EvotecIT/O365Essentials/compare/v0.0.14...v0.0.15
- Downgraded
Az.Accountsto minimal2.12.1.3.0.0is kind of broken and PS 5 has issues, you can still use newest one - Added
Get-O365OrgSendEmailNotificationandSet-O365OrgSendEmailNotificationwhich allows configuring SenderFromAddressSettings for email notifications - Fixed
Get-O365OrgUserConsentAppsandSet-O365OrgUserConsentApps- but it changes how things work, so requires code changes. This configures User consent settings. You should probably utilize native Graphhttps://graph.microsoft.com/v1.0/policies/authorizationPolicyinstead, but for the sake of fixing it, it's here.
- Docs updates / Bump dependencies
- Add
Get-O365OrgAccountLinkingandSet-O365OrgAccountLinkingto manage "Users who connect their Azure AD account with their MSA account can earn rewards points when they search on Bing. User searches are never shared." - Added
Get-O365OrgAdoptionScore,Get-O365OrgAdoptionScoreConfigandSet-O365OrgAdoptionScoreto manage Microsoft 365 Adoption Score
- Added
Get-O365OrgMicrosoftEdgeSiteLists - Added
Get-O365OrgVivaLearningandSet-O365OrgVivaLearning - Added
Get-O365AzureExternalCollaborationRestrictions - Added
Set-O365AzureExternalCollaborationRestrictions - Added
Disconnect-O365Admin
- Added
Get-O365AzurePropertiesfrom URL https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Properties - Added
Set-O365AzurePropertiesfrom URL https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Properties - Added
Get-O365AzurePropertiesSecurityfrom URL https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Properties - Added
Set-O365AzurePropertiesSecurityfrom URL https://aad.portal.azure.com/#blade/Microsoft_AAD_IAM/ActiveDirectoryMenuBlade/Properties
- Improved some commands
- Added more commands
- Improved some commands
- Cleaned up some duplicates
- Added more commands
- Improved some commands
- Added more commands
- Added new cmdlets
- Fixes some bugs
- Something went wrong during publish of 0.0.3 - this release fixes it
- Renamed most of commands to be more descriptive
- Added new commands
- Fixed some bugs
- Fixes support for PowerShell 5.1
- Added more commands
- First version