Skip to content

Commit 12463a4

Browse files
authored
Merge pull request #13280 from MicrosoftDocs/chrisda
ClientAccessRule cmdlets to on-prem only
2 parents 72dd407 + 7e41e59 commit 12463a4

File tree

5 files changed

+51
-116
lines changed

5 files changed

+51
-116
lines changed

exchange/exchange-ps/ExchangePowerShell/Get-ClientAccessRule.md

Lines changed: 8 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
2+
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
33
author: chrisda
44
external help file: Microsoft.Exchange.WebClient-Help.xml
55
Locale: en-US
@@ -14,11 +14,11 @@ title: Get-ClientAccessRule
1414

1515
## SYNOPSIS
1616
> [!NOTE]
17-
> Beginning in October 2022, client access rules were deprecated for all Exchange Online organizations that weren't using them. Client access rules will be deprecated for all remaining organizations on September 1, 2025. If you choose to turn off client access rules before the deadline, the feature will be disabled in your organization. For more information, see [Update on Client Access Rules Deprecation in Exchange Online](https://techcommunity.microsoft.com/blog/exchange/update-on-client-access-rules-deprecation-in-exchange-online/4354809).
17+
> Client access rules were deprecated for all Exchange Online organizations in September 2025. For more information, see [Update on Client Access Rules Deprecation in Exchange Online](https://techcommunity.microsoft.com/blog/exchange/update-on-client-access-rules-deprecation-in-exchange-online/4354809).
1818
19-
This cmdlet is functional only in Exchange Server 2019 and in the cloud-based service. Some parameters and settings might be exclusive to one environment or the other.
19+
This cmdlet is functional only in Exchange Server 2019 or later.
2020

21-
Use the Get-ClientAccessRule cmdlet to view client access rules. Client access rules help you control access to your cloud-based organization based on the properties of the connection.
21+
Use the Get-ClientAccessRule cmdlet to view client access rules. Client access rules help you control access to your organization based on the properties of the connection.
2222

2323
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2424

@@ -57,7 +57,7 @@ This example retrieves details about the client access rule named "Block Client
5757

5858
### -Identity
5959

60-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
60+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
6161
6262
The Identity parameter specifies the client access rule that you want to view. You can use any value that uniquely identifies the client access rule. For example:
6363

@@ -79,7 +79,7 @@ Accept wildcard characters: False
7979
8080
### -Confirm
8181
82-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
82+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
8383
8484
The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding.
8585
@@ -100,9 +100,7 @@ Accept wildcard characters: False
100100

101101
### -DomainController
102102

103-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
104-
105-
This parameter is functional only in on-premises Exchange.
103+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
106104

107105
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
108106

@@ -120,7 +118,7 @@ Accept wildcard characters: False
120118

121119
### -WhatIf
122120

123-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
121+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
124122

125123
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
126124

exchange/exchange-ps/ExchangePowerShell/New-ClientAccessRule.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ title: New-ClientAccessRule
1414

1515
## SYNOPSIS
1616
> [!NOTE]
17-
> As of September 2025, Client Access Rules in Exchange Online are fully deprecated and no longer supported across all cloud organizations. Phased retirement began in October 2022 and is now complete. For historical context and details, see our original [announcement](https://techcommunity.microsoft.com/blog/exchange/deprecation-of-client-access-rules-in-exchange-online/3638563) and the [Update on Client Access Rules Deprecation in Exchange Online](https://techcommunity.microsoft.com/blog/exchange/update-on-client-access-rules-deprecation-in-exchange-online/4354809).
17+
> Client access rules were deprecated for all Exchange Online organizations in September 2025. For more information, see [Update on Client Access Rules Deprecation in Exchange Online](https://techcommunity.microsoft.com/blog/exchange/update-on-client-access-rules-deprecation-in-exchange-online/4354809).
1818
19-
This cmdlet is functional only in on-premises Exchange 2019 or later.
19+
This cmdlet is functional only in Exchange Server 2019 or later.
2020

2121
Use the New-ClientAccessRule cmdlet to create client access rules. Client access rules help you control access to your organization based on the properties of the connection.
2222

exchange/exchange-ps/ExchangePowerShell/Remove-ClientAccessRule.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
2+
applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
33
author: chrisda
44
external help file: Microsoft.Exchange.WebClient-Help.xml
55
Locale: en-US
@@ -14,11 +14,11 @@ title: Remove-ClientAccessRule
1414

1515
## SYNOPSIS
1616
> [!NOTE]
17-
> Beginning in October 2022, client access rules were deprecated for all Exchange Online organizations that weren't using them. Client access rules will be deprecated for all remaining organizations on September 1, 2025. If you choose to turn off client access rules before the deadline, the feature will be disabled in your organization. For more information, see [Update on Client Access Rules Deprecation in Exchange Online](https://techcommunity.microsoft.com/blog/exchange/update-on-client-access-rules-deprecation-in-exchange-online/4354809).
17+
> Client access rules were deprecated for all Exchange Online organizations in September 2025. For more information, see [Update on Client Access Rules Deprecation in Exchange Online](https://techcommunity.microsoft.com/blog/exchange/update-on-client-access-rules-deprecation-in-exchange-online/4354809).
1818
19-
This cmdlet is functional only in Exchange Server 2019 and in the cloud-based service. Some parameters and settings might be exclusive to one environment or the other.
19+
This cmdlet is functional only in Exchange Server 2019 or later.
2020

21-
Use the Remove-ClientAccessRule cmdlet to remove client access rules. Client access rules help you control access to your cloud-based organization based on the properties of the connection.
21+
Use the Remove-ClientAccessRule cmdlet to remove client access rules. Client access rules help you control access to your organization based on the properties of the connection.
2222

2323
For information about the parameter sets in the Syntax section below, see [Exchange cmdlet syntax](https://learn.microsoft.com/powershell/exchange/exchange-cmdlet-syntax).
2424

@@ -50,7 +50,7 @@ This example removes the existing client access rule named "Block Connections fr
5050

5151
### -Identity
5252

53-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
53+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
5454
5555
The Identity parameter specifies the client access rule that you want to remove. You can use any value that uniquely identifies the client access rule. For example:
5656

@@ -72,7 +72,7 @@ Accept wildcard characters: False
7272
7373
### -Confirm
7474
75-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
75+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
7676
7777
The Confirm switch specifies whether to show or hide the confirmation prompt. How this switch affects the cmdlet depends on if the cmdlet requires confirmation before proceeding.
7878
@@ -95,8 +95,6 @@ Accept wildcard characters: False
9595

9696
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
9797

98-
This parameter is available only in on-premises Exchange.
99-
10098
The DomainController parameter specifies the domain controller that's used by this cmdlet to read data from or write data to Active Directory. You identify the domain controller by its fully qualified domain name (FQDN). For example, dc01.contoso.com.
10199

102100
```yaml
@@ -113,7 +111,7 @@ Accept wildcard characters: False
113111

114112
### -WhatIf
115113

116-
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE, Exchange Online, Exchange Online Protection
114+
> Applicable: Exchange Server 2013, Exchange Server 2016, Exchange Server 2019, Exchange Server SE
117115

118116
The WhatIf switch simulates the actions of the command. You can use this switch to view the changes that would occur without actually applying those changes. You don't need to specify a value with this switch.
119117

0 commit comments

Comments
 (0)