Connect to Security & Compliance PowerShell
This article contains instructions for how to connect to Security & Compliance PowerShell using the Exchange Online PowerShell module with or without multi-factor authentication (MFA).
The Exchange Online PowerShell module uses modern authentication for connecting to all Exchange-related PowerShell environments in Microsoft 365: Exchange Online PowerShell, Security & Compliance PowerShell, and standalone Exchange Online Protection (EOP) PowerShell. For more information about the Exchange Online PowerShell module, see About the Exchange Online PowerShell module.
Version 2.0.5 and earlier is known as the Exchange Online PowerShell V2 module (abbreviated as the EXO V2 module). Version 3.0.0 and later is known as the Exchange Online PowerShell V3 module (abbreviated as the EXO V3 module).
To connect to Security & Compliance PowerShell for automation, see App-only authentication for unattended scripts.
To use the older, less secure remote PowerShell connection instructions that will eventually be deprecated, see Basic auth - Connect to Security & Compliance PowerShell.
To use the older Exchange Online Remote PowerShell Module to connect to Security & Compliance PowerShell using MFA, see V1 module - Connect to Security & Compliance PowerShell using MFA. Note that this older version of the module will eventually be retired.
What do you need to know before you begin?
The requirements for installing and using the module are described in Install and maintain the Exchange Online PowerShell module.
Security & Compliance PowerShell still requires Basic authentication in WinRM as described Prerequisites for the Exchange Online PowerShell module. REST API cmdlets that allow you to turn off Basic authentication in WinRM are not yet available for the Connect-IPPSSession cmdlet. For more information, see Updates for version 3.0.0 (the EXO V3 module).
After you connect, the cmdlets and parameters that you have or don't have access to is controlled by role-based access control (RBAC). For more information, see Permissions in the Microsoft 365 Defender portal and Permissions in the Microsoft Purview compliance portal.
Step 1: Load the Exchange Online PowerShell module
If the module is already installed, you can typically skip this step and run Connect-IPPSSession without manually loading the module first.
After you've installed the module, open a PowerShell window and load the module by running the following command:
Step 2: Connect and authenticate
The command that you need to run uses the following syntax:
Connect-IPPSSession -UserPrincipalName <UPN> [-ConnectionUri <URL>] [-AzureADAuthorizationEndpointUri <URL>] [-DelegatedOrganization <String>] [-PSSessionOption $ProxyOptions]
For detailed syntax and parameter information, see Connect-IPPSSession.
<UPN> is your account in user principal name format (for example,
The required ConnectionUri and AzureADAuthorizationEndpointUri values depend on the nature of your Microsoft 365 organization. Common values are described in the following table:
Environment ConnectionUri AzureADAuthorizationEndpointUri Microsoft 365 or Microsoft 365 GCC n/a* n/a** Microsoft 365 GCC High
Microsoft 365 DoD
Office 365 operated by 21Vianet
* The required value
https://ps.compliance.protection.outlook.com/powershell-liveid/is also the default value, so you don't need to use the ConnectionUri parameter in Microsoft 365 or Microsoft 365 GCC environments.
** The required value
https://login.microsoftonline.com/commonis also the default value, so you don't need to use the AzureADAuthorizationEndpointUri parameter in Microsoft 365 or Microsoft 365 GCC environments.
If you're behind a proxy server, you can use the PSSessionOption parameter in the connection command. First, run this command:
$ProxyOptions = New-PSSessionOption -ProxyAccessType <Value>, where <Value> is
AutoDetect. Then, use the value
$ProxyOptionsfor the PSSessionOption parameter. For more information, see New-PSSessionOption.
Depending on the nature of your organization, you might be able to omit the UserPrincipalName parameter in the next step. Instead, you enter the username and password or select stored credentials after you run the Connect-IPPSSession command. If it doesn't work, then you need to use the UserPrincipalName parameter.
If you aren't using MFA, you should be able to use the Credential parameter instead of the UserPrincipalName parameter. First, run the command
$Credential = Get-Credential, enter your username and password, and then use the variable name for the Credential parameter (
-Credential $Credential). If it doesn't work, then you need to use the UserPrincipalName parameter.
Connect to Security & Compliance PowerShell with an interactive login prompt
The following examples work in Windows PowerShell 5.1 and PowerShell 7 for accounts with or without MFA:
This example connects to Security & Compliance PowerShell in a Microsoft 365 or Microsoft 365 GCC organization:
Connect-IPPSSession -UserPrincipalName email@example.com
This example connects to Security & Compliance PowerShell in a Microsoft GCC High organization:
Connect-IPPSSession -UserPrincipalName firstname.lastname@example.org -ConnectionUri https://ps.compliance.protection.office365.us/powershell-liveid/ -AzureADAuthorizationEndpointUri https://login.microsoftonline.us/common
This example connects to Security & Compliance PowerShell in a Microsoft 365 DoD organization:
Connect-IPPSSession -UserPrincipalName email@example.com -ConnectionUri https://l5.ps.compliance.protection.office365.us/powershell-liveid/ -AzureADAuthorizationEndpointUri https://login.microsoftonline.us/common
This example connects to Security & Compliance PowerShell in an Office 365 operated by 21Vianet organization:
Connect-IPPSSession -UserPrincipalName firstname.lastname@example.org -ConnectionUri https://ps.compliance.protection.partner.outlook.cn/powershell-liveid
In the sign-in window that opens, enter your password, and then click Sign in.
In PowerShell 7, browser-based single sign-on (SSO) is used by default, so the sign in prompt opens in your default web browser instead of a standalone dialog.
MFA only: A verification code is generated and delivered based on the response option that's configured for your account (for example, a text message or the Microsoft Authenticator app on your device).
In the verification window that opens, enter the verification code, and then click Verify.
Connect to Security & Compliance PowerShell without a login prompt (unattended scripts)
For complete instructions, see App-only authentication for unattended scripts in Exchange Online PowerShell and Security & Compliance PowerShell.
The following example also connects without a login prompt, but the credentials are stored locally, so this method is not secure. Consider using this method only for brief testing purposes.
$secpasswd = ConvertTo-SecureString -String '<YourPasswordHere>' -AsPlainText -Force $o365cred = New-Object System.Management.Automation.PSCredential ("email@example.com", $secpasswd) Connect-IPPSSession -Credential $o365cred
Connect to Security & Compliance PowerShell in customer organizations
The procedures in this section require version 3.0.0 or later of the module.
In Security & Compliance PowerShell, you need to use the AzureADAuthorizationEndpointUri with the DelegatedOrganization parameter.
For more information, about partners and customer organizations, see the following topics:
- What is the Cloud Solution Provider (CSP) program?.
- Introduction to granular delegated admin privileges (GDAP)
This example connects to customer organizations in the following scenarios:
Connect to a customer organization using a CSP account.
Connect to a customer organization using a GDAP.
Connect to a customer organization as a guest user.
Connect-IPPSSession -UserPrincipalName firstname.lastname@example.org -DelegatedOrganization adatum.onmicrosoft.com -AzureADAuthorizationEndpointUri https://ps.compliance.protection.outlook.com/powershell-liveid/
Step 3: Disconnect when you're finished
Be sure to disconnect the session when you're finished. If you close the PowerShell window without disconnecting the session, you could use up all the sessions available to you, and you'll need to wait for the sessions to expire. To disconnect the session, run the following command.
To silently disconnect without a confirmation prompt, run the following command:
How do you know you've connected successfully?
The Security & Compliance PowerShell cmdlets are imported into your local Windows PowerShell session and tracked by a progress bar. If you don't receive any errors, you've connected successfully. A quick test is to run a Security & Compliance PowerShell cmdlet, for example, Get-RetentionCompliancePolicy, and see the results.
If you receive errors, check the following requirements:
A common problem is an incorrect password. Run the three steps again and pay close attention to the username and password that you use.
To help prevent denial-of-service (DoS) attacks, you're limited to five open remote PowerShell connections to Security & Compliance PowerShell.
The account that you use to connect must be enabled for remote PowerShell. For more information, see Enable or disable access to Exchange Online PowerShell.
TCP port 80 traffic needs to be open between your local computer and Microsoft 365. It's probably open, but it's something to consider if your organization has a restrictive internet access policy.
You might fail to connect if your client IP address changes during the connection request. This can happen if your organization uses a source network address translation (SNAT) pool that contains multiple IP addresses. The connection error looks like this:
The request for the Windows Remote Shell with ShellId <ID> failed because the shell was not found on the server. Possible causes are: the specified ShellId is incorrect or the shell no longer exists on the server. Provide the correct ShellId or create a new shell and retry the operation.
To fix the issue, use an SNAT pool that contains a single IP address, or force the use of a specific IP address for connections to the Security & Compliance PowerShell endpoint.
Submit and view feedback for