In This Article
- The April 30 PowerShell Cliff Most FI Compliance Teams Don't See Coming
- What Microsoft Changed: The 13 Cmdlets Affected and Why
- The One-Line Fix: -EnableSearchOnlySession on ExchangeOnlineManagement v3.9.0
- Five Migration Pitfalls That Will Break FI Compliance Automation
- The Records-Retention Compliance Lens: SEC, FINRA, NCUA, OCC
- What "Modern Authentication" Means for FI Purview Operations
- Frequently Asked Questions
If your bank, credit union, or mortgage company runs scheduled PowerShell jobs that touch Microsoft Purview retention policies, compliance tags, or retention events, you have one day to migrate. Microsoft 365 Message Center notification MC1213770, originally posted January 6, 2026 and updated April 20, 2026, set the enforcement date for April 30, 2026. Starting that day, scripts that connect to Security and Compliance PowerShell using older versions of the ExchangeOnlineManagement module, or that omit a single new switch parameter, will fail when they call any of thirteen specifically named cmdlets. The portal still works. The PowerShell automation does not.
The change is small in mechanical terms. It is large in operational terms. Most financial institutions have layered records-retention obligations under SEC Rule 17a-4, FINRA Rule 4511, NCUA's records preservation regulation in 12 CFR Part 749, and OCC examination expectations for federal banks. Many of those institutions automate Purview retention policy creation, compliance tagging, and event-driven retention scheduling using the exact PowerShell cmdlets named in MC1213770. The automation runs unattended, often on a server nobody has touched in eighteen months, and it works until tomorrow.
This article walks through what is actually changing, why Microsoft is changing it, the one-line fix that solves it, the operational pitfalls most likely to bite a financial institution during a rushed migration, and the records-retention compliance lens that explains why the deadline matters more for banks, credit unions, and mortgage companies than for most other Microsoft 365 customers.
-EnableSearchOnlySession parameter requirement on Connect-IPPSSession when calling any of thirteen Microsoft Purview Data Lifecycle Management cmdlets. Tomorrow.The April 30 PowerShell Cliff Most FI Compliance Teams Don't See Coming
The trap is set by how invisible the affected workflow is to executive leadership. The bank's CISO knows about the major Microsoft 365 changes that show up in Defender XDR alerts or in the Secure Score dashboard. The CFO sees the retention policy reports. The compliance officer reviews the eDiscovery case logs. None of those people typically sees the PowerShell scheduled job that runs on a domain-joined Windows server at 3:15 a.m. every Sunday and creates new retention compliance rules for the loan-origination archive based on the previous week's loan closures. The script has been running for two years. It has not failed once. It is also about to fail silently in less than 24 hours.
Microsoft has been moving away from legacy authentication patterns for several years. Remote PowerShell, the original protocol for connecting to Exchange Online and Security and Compliance PowerShell, was deprecated for Security and Compliance PowerShell in October 2023. The Exchange Online PowerShell V3 module replaced Remote PowerShell with REST API connectivity that supports modern authentication, multi-factor authentication, and certificate-based app-only authentication. Most financial institutions migrated their scripts to the V3 module during 2023 and 2024. The April 30, 2026 change is the next refinement in that modernization arc.
What MC1213770 changes is the audience claim on the OAuth access token issued during a Connect-IPPSSession session. Without the new -EnableSearchOnlySession switch, the token is scoped to the standard Security and Compliance endpoint. With the switch, the token is scoped to a narrower service audience that permits cross-service operations into Exchange Online, SharePoint Online, Microsoft Teams, and OneDrive. Retention policies that span multiple workloads need that broader audience because applying a single retention rule across an Exchange mailbox and a SharePoint site requires authentication that both services accept. The thirteen specifically named cmdlets are the ones that perform exactly those cross-service operations.
Hard Failure, No Grace Period
Microsoft has stated no grace period or fallback mode applies after April 30, 2026. Scripts that establish a Connect-IPPSSession session without the -EnableSearchOnlySession switch and then invoke any of the thirteen affected cmdlets will fail with authentication-scope errors. Sessions established before the cutoff and continuously held may complete in-flight operations, but new connections starting on or after April 30 require the parameter. There is no rollback, no grandfathering, and no "we will turn it back on for a week." Scripts either pass the new check or they do not run.
The reason this matters more for financial institutions than for most other Microsoft 365 customers is records retention. Banks, credit unions, and mortgage companies operate under retention rules that other industries do not face. SEC Rule 17a-4 requires broker-dealers to preserve specific books and records for three to six years, with some categories required for the life of the entity plus three years. FINRA Rule 4511 binds member firms to those same retention periods. NCUA's records preservation regulation in 12 CFR Part 749 requires federally insured credit unions to maintain a written records preservation program covering vital records and operational continuity. Manual policy enforcement at scale is impractical. Compliance teams script the work. They script it using exactly the cmdlets named in MC1213770. When the scripts fail tomorrow, the underlying policies still apply, but the institutions lose the automation that operationalizes them.
What Microsoft Changed: The 13 Cmdlets Affected and Why
MC1213770 lists the affected cmdlets explicitly. They fall into four functional groups: retention compliance policies, retention compliance rules, compliance tags (records management), and retention events with their associated event types. Each group corresponds to a different layer of how Microsoft Purview operationalizes records retention across the Microsoft 365 estate.
The first group, retention compliance policies, defines which Microsoft 365 locations are subject to which retention rules. A retention compliance policy can target Exchange mailboxes, SharePoint sites, Microsoft Teams channel messages, OneDrive accounts, Microsoft 365 Groups, or Yammer messages, with an inclusion list and an exclusion list at each location type. The cmdlets in this group create, update, and remove those policies.
The second group, retention compliance rules, defines the actual retention behavior associated with a policy: how long content is retained, what happens at the end of the retention period, and any conditions that trigger the rule. A single policy can have multiple rules that apply to different content types or different conditions.
The third group, compliance tags, defines records management classifications that users or automated processes apply to individual items. A compliance tag is what enables the records management capability in Purview, allowing items to be classified as records that require formal disposition review before deletion. Banks use compliance tags heavily for items subject to BSA five-year retention, OFAC sanctions records, and SEC books and records.
The fourth group, retention events and event types, defines event-driven retention. Instead of starting retention at the moment content is created, event-driven retention starts the clock when something happens in the business: a loan closes, an employee leaves, a customer relationship ends, a deposit account closes. Compliance teams configure event types, then create events that reference those types, and Purview applies the appropriate retention behavior across all locations covered by the relevant policies.
| Functional Group | Cmdlets | What It Does |
|---|---|---|
| Retention Policies | New-RetentionCompliancePolicy, Set-RetentionCompliancePolicy |
Defines which Microsoft 365 locations (Exchange, SharePoint, Teams, OneDrive, Groups) are subject to retention. |
| Retention Rules | New-RetentionComplianceRule, Set-RetentionComplianceRule |
Defines retention duration, end-of-retention action, and the conditions that trigger the rule. |
| Compliance Tags | New-ComplianceTag, Set-ComplianceTag, Remove-ComplianceTag |
Records management classifications for individual items, including disposition review requirements. |
| Retention Events | New-ComplianceRetentionEvent, Set-ComplianceRetentionEvent, Remove-ComplianceRetentionEvent |
Triggers event-driven retention (loan closed, account closed, employee separation) across locations. |
| Retention Event Types | New-ComplianceRetentionEventType, Set-ComplianceRetentionEventType, Remove-ComplianceRetentionEventType |
Defines the categories of events that retention rules can subscribe to. Foundation for event-driven retention at scale. |
All thirteen cmdlets share a common architectural property: they coordinate across multiple Microsoft 365 services to apply retention behavior. When a script invokes New-RetentionCompliancePolicy with parameters specifying both Exchange mailboxes and SharePoint sites, the Purview backend calls into both services to register the policy and apply enforcement. That cross-service coordination is what the new -EnableSearchOnlySession parameter authenticates. The audience claim in the access token tells Exchange Online and SharePoint Online that this PowerShell session is authorized to ask both services to enforce the same retention rule. Without that audience scope, the cross-service request is rejected as out of scope, and the cmdlet fails.
The EnableSearchOnlySession switch specifies whether to enable certain eDiscovery and related cmdlets that connect to other Microsoft 365 services. Microsoft Learn, Connect-IPPSSession reference, parameter documentation as of April 2026.
It is worth pausing on what is not changing. Cmdlets that operate entirely within Security and Compliance, such as Get-RetentionCompliancePolicy for read-only inventory, are not on the list. Sensitivity label cmdlets like Get-Label, New-Label, and New-LabelPolicy are not on the list. Data Loss Prevention policy cmdlets are not on the list. The change is targeted at the thirteen cmdlets that perform cross-service write operations against retention infrastructure. Read-only operations and within-service operations continue to work without the new parameter.
-EnableSearchOnlySession.
The One-Line Fix: -EnableSearchOnlySession on ExchangeOnlineManagement v3.9.0
The mechanical remediation has two parts. First, ensure the ExchangeOnlineManagement PowerShell module on the script-execution host is at version 3.9.0 or later, because the -EnableSearchOnlySession switch was introduced in that release. Second, add the switch to every Connect-IPPSSession invocation that runs scripts against the affected cmdlets. Both parts must be done; updating the module without adding the switch fails the same way as adding the switch on a module too old to recognize it.
The verification command for the module version is short. From an elevated PowerShell prompt on the script-execution host, run Get-Module ExchangeOnlineManagement -ListAvailable | Select-Object Version. If the highest version returned is below 3.9.0, run Update-Module ExchangeOnlineManagement -Force followed by a new PowerShell session. The new session will load the updated module. Modules updated mid-session do not always replace the loaded version; restarting the session is the safer pattern.
Before April 30, 2026 (Will Fail)
- ExchangeOnlineManagement module v3.8.x or earlier installed
Connect-IPPSSession -UserPrincipalName admin@bank.comwith no additional switch- Scripts call
New-RetentionCompliancePolicy,Set-RetentionComplianceRule, or any of the other 11 affected cmdlets - Worked correctly through April 29, 2026
- Returns authentication-scope error starting April 30, 2026
- Silent breakage in scheduled jobs unless monitoring is in place
After April 30, 2026 (Required Pattern)
- ExchangeOnlineManagement module v3.9.0 or later installed
Connect-IPPSSession -UserPrincipalName admin@bank.com -EnableSearchOnlySession- Same affected cmdlets execute successfully against the new audience-scoped token
- Works for interactive sign-in with multi-factor authentication
- Works for managed identity authentication in Azure Automation
- Continues to work for read-only and within-service cmdlets that did not require the switch
For interactive sign-in by a human compliance officer, the connection command becomes Connect-IPPSSession -UserPrincipalName admin@bank.com -EnableSearchOnlySession. The session opens a modern authentication dialog that supports multi-factor authentication and Conditional Access policies, then issues an access token with the broader audience. From that point, all retention and compliance-tag cmdlets execute against the token. The session behaves identically to a pre-April-30 session for any cmdlet that was not on the affected list.
For unattended scripts running in Azure Automation, Azure Functions, or Azure Logic Apps, the recommended pattern is managed identity authentication. The runbook or function code calls Connect-IPPSSession -ManagedIdentity -Organization bank.onmicrosoft.com -EnableSearchOnlySession. The platform issues the access token to the Azure-managed identity assigned to the runbook. The script executes without storing any credentials, certificates, or secrets in script files or configuration variables. This pattern is the most secure available option for long-running compliance automation.
Certificate-based authentication, which financial institutions have used for unattended scripts on on-premises servers since the deprecation of Remote PowerShell, has a complication. The thirteen affected cmdlets are not currently compatible with certificate-based authentication when used with the -EnableSearchOnlySession switch. Per Microsoft Learn documentation, the parameter set requires interactive or managed-identity authentication for the affected cmdlets. Scripts that previously used Connect-IPPSSession -CertificateThumbprint <thumbprint> -AppId <guid> -Organization bank.onmicrosoft.com for the affected cmdlets will need to migrate to a different authentication method. The most practical path for financial institutions running these scripts on on-premises servers is to migrate the workload to Azure Automation with a system-assigned managed identity, which eliminates the certificate management overhead and aligns with Microsoft's preferred long-term automation pattern.
Run Get-ScheduledTask on every server that hosts compliance automation. Search code repositories for the strings Connect-IPPSSession and New-Retention. Document every script, the cmdlets it invokes, the schedule it runs on, and the authentication method it uses. Mark anything using the affected cmdlets as priority for migration.
On every script-execution host, run Update-Module ExchangeOnlineManagement -Force and verify the new version with Get-Module ExchangeOnlineManagement -ListAvailable. Edit each affected script to add -EnableSearchOnlySession to the Connect-IPPSSession line. For certificate-based scripts on on-premises servers, plan the migration path to Azure Automation with managed identity.
Execute each updated script against a non-production tenant or a low-impact maintenance window. Confirm the affected cmdlets succeed with the new parameter. Add monitoring or alerting on script exit codes and on the existence of the expected output (the new retention policy, the new compliance tag) so a future authentication change does not silently break the workflow again.
The sequence above is intentionally compressed. Inventory in the morning. Module update and parameter addition by mid-afternoon. Test runs and monitoring instrumentation by end of day. For an institution with ten or fewer compliance scripts, the entire migration fits inside a normal change window, with most of the time spent on the inventory and the testing rather than the code edits. For institutions with extensive compliance automation distributed across multiple servers, the inventory step is the longest phase, and starting it before the deadline is the only practical path. Either way, the operational shape is the same: find every affected script, update every host, add the parameter, prove it runs, add the monitoring that catches the next change before it becomes a deadline scramble.
Key Takeaway
The fix is small in code: one switch on one cmdlet. The fix is large in operational discipline: every script-execution host must be updated, every affected script must be edited, and every certificate-based script must plan a migration to managed identity because certificate-based authentication is not compatible with the new parameter set for the affected cmdlets. Doing the inventory is the work; everything else follows from it.
Five Migration Pitfalls That Will Break FI Compliance Automation
Across financial-institution Microsoft 365 estates, five operational pitfalls account for most of the silent failures that show up after authentication changes like this one. Each has a specific remediation. Identifying them in advance turns a one-day deadline scramble into a planned change.
- Module updated on the wrong machine. Compliance scripts often run on a domain-joined Windows server that has not been logged into in months. The administrator updates the ExchangeOnlineManagement module on a workstation, edits the script, and tests it interactively. The test passes. The scheduled job continues to fail because the production server still has the old module loaded under the service account. The remedy is to update the module on every host that executes the script, not only on the developer's workstation. Use
Get-Module ExchangeOnlineManagement -ListAvailableon the production host to confirm. - Certificate-based scripts hitting an incompatibility wall. The affected cmdlets currently do not support certificate-based authentication when combined with
-EnableSearchOnlySession. Scripts that previously ran unattended on on-premises servers using-CertificateThumbprintand-AppIdcannot simply add the new switch. They must migrate to managed identity authentication in Azure Automation, or be rebuilt as interactive workflows behind a managed PowerShell desktop with a service identity. The remedy is to plan the migration to managed identity now, not after the deadline. Hybrid identity environments may need additional Azure Arc configuration to use managed identity for on-premises workloads. - One Connect-IPPSSession call serves multiple cmdlet types. A common pattern is a long-running script that connects once and then executes both affected cmdlets and unaffected cmdlets in the same session. The simplest remedy is to add
-EnableSearchOnlySessionto the single connection call. The switch does not break unaffected cmdlets; it only adds the broader audience scope. Including it unconditionally on every Connect-IPPSSession invocation is the safest pattern, eliminates the need to reason about which cmdlets need it, and is forward-compatible with potential future audience refinements. - PowerShell module version cached in scheduled-task agent. Scheduled-task hosts that run PowerShell jobs in long-lived agent processes (some monitoring systems, automation runners, and configuration-management agents) cache loaded PowerShell modules in the agent process. Updating the module on disk does not always force the agent to reload. The remedy is to restart the scheduling agent service after a module update, or restart the host. Confirming the version through the same execution path the scheduled job uses is the verification step that prevents this from being a silent failure.
- Logging and monitoring not in place. Most financial institutions discover the failure when a downstream artifact does not exist, not when the script reports an error. The retention policy that should have been created last Sunday is not in Purview, the compliance tag that should have been applied is missing, or an examiner asks for a report that never ran. The remedy is to add explicit success/failure logging to the script, route the logs to a central system, and add an alert on script exit codes and on the existence of expected outputs. Once in place, this monitoring catches not only this enforcement change but every future change that affects script behavior.
Get a security grade on your Microsoft 365 tenant before tomorrow's deadline
A Security Grade walks through your Microsoft 365 configuration in plain language, including the compliance and retention controls FFIEC, OCC, and NCUA examiners look for. The grade also surfaces the script-execution accounts and authentication methods most likely to be affected by changes like the April 30 Purview enforcement. No sales call required to see the result.
Get Your Security Grade Talk to an ExpertThe Records-Retention Compliance Lens: SEC, FINRA, NCUA, OCC
The reason a one-day cmdlet authentication change is a compliance event for banks, credit unions, and mortgage companies and a routine IT change for everyone else is records retention. Most industries have records-retention obligations measured in years. Financial institutions have records-retention obligations measured in decades, in non-rewriteable formats, with documentation requirements that examiners audit on a recurring schedule.
| Source | Reference | Why It Matters for Purview Automation |
|---|---|---|
| SEC | Rule 17a-4 (17 CFR § 240.17a-4) | Broker-dealers must preserve specific books and records for three to six years (some categories permanently or until termination plus three years), in non-rewriteable, non-erasable format. Microsoft Purview retention policies are commonly used to enforce immutability across Exchange and SharePoint. Script-driven retention policy creation must continue functioning. |
| FINRA | Rule 4511 (Books and Records Requirements) | Member firms must preserve books and records consistent with SEC and FINRA rules. Practical effect: the same retention durations and formats as SEC Rule 17a-4 apply. FINRA examinations frequently audit the documented retention enforcement program; broken automation is a finding in waiting. |
| NCUA | 12 CFR Part 749 (Records Preservation Program) | Federally insured credit unions must maintain a written records preservation program covering vital records and operational continuity. The current program guidelines and an Advance Notice of Proposed Rulemaking issued March 11, 2026 confirm NCUA's continued attention to records governance. Automated Purview retention is one of the practical ways credit unions operationalize the requirement. |
| OCC | OCC examination expectations and 12 CFR Part 30 (Safety and Soundness Standards) | Federal banks operate under OCC examination expectations that include written records retention policies, documented configuration management for IT systems that enforce them, and change-management discipline for compliance automation. Automated PowerShell scripts are part of the configuration baseline examiners review. |
| FinCEN | BSA Recordkeeping (31 CFR §§ 1010.410, 1010.430) | Bank Secrecy Act records (Currency Transaction Reports, Suspicious Activity Reports, customer identification program documentation) must be retained for five years. Many financial institutions implement the five-year retention through Purview retention compliance rules created by the same scripts MC1213770 affects. Our walkthrough of BSA/AML compliance in Microsoft 365 covers the broader retention pattern. |
| FFIEC | FFIEC IT Examination Handbook (Information Security and Operations booklets) | FFIEC guidance treats configuration management, automation script integrity, and documented change control as expected elements of a sound IT operations program. Examiners increasingly ask how institutions handle Microsoft 365 platform changes, including authentication enforcement deadlines like MC1213770. |
The compliance dimension turns this from "update a module and add a parameter" into "document the change, validate it, retest it, and demonstrate to your examiner that the underlying retention controls remained in continuous force across the transition." That documentation is part of the configuration management and change control evidence FFIEC examiners look for. Institutions that can produce a clean record showing the inventory, the migration, the test results, and the post-deployment monitoring satisfy the expectation. Institutions that handled it ad hoc, with no record beyond a Sunday-night chat message saying "I updated the script," typically end up redoing the work under examination pressure six months later.
Microsoft's published direction for unattended Microsoft 365 administration automation is managed identity authentication for workloads running in Azure, with on-premises workloads migrating to Azure Arc-enabled managed identity over time. The April 30, 2026 cmdlet authentication change is a step in that direction, not an isolated event. Financial institutions that plan migrations of compliance automation to managed identity now (rather than chasing each enforcement deadline as it arrives) gain audit-ready credential hygiene, eliminate certificate rotation overhead, and align with FFIEC IT Handbook expectations for least-privilege automation. Guardian's automation hardening baseline includes managed identity migration as a standard component for FI tenants.
What "Modern Authentication" Means for FI Purview Operations
Step back from the specific enforcement deadline and the trajectory becomes clear. Microsoft has been retiring legacy authentication patterns one workload at a time. Basic authentication for Exchange Online retired in 2022. Remote PowerShell for Exchange retired by the end of 2023. Remote PowerShell for Security and Compliance retired in 2023. The -Credential parameter on Connect-IPPSSession is on Microsoft's published deprecation roadmap with a target of June 2026, less than two months after the April 30 cmdlet enforcement. The direction is uniform: passwords stored in scripts, basic authentication endpoints, and any pattern that does not support multi-factor authentication or Conditional Access is being systematically removed.
For financial institutions, the implication is that compliance automation needs a target architecture, not a sequence of patch fixes. The target architecture for unattended Purview operations is managed identity in Azure Automation, with role-based access control (RBAC) granting the least privilege required for the specific cmdlets the runbook executes. Managed identity eliminates the certificate management problem, eliminates the password storage problem, and provides clean audit trails through Azure Activity Log. Institutions that have not started the migration to managed identity should not wait for the next enforcement deadline; the migration takes longer than a single change window because RBAC modeling and runbook testing both require careful work.
For interactive Purview operations, the target pattern is sign-in with the user account that has the appropriate Microsoft Purview RBAC roles, multi-factor authentication enforced through Conditional Access, and Web Account Manager handling the credential broker on Windows. This is the pattern Microsoft has been recommending since the V3 module shipped in 2022. Compliance officers running ad-hoc PowerShell sessions to query retention policies or apply compliance tags should be using Connect-IPPSSession -UserPrincipalName officer@bank.com -EnableSearchOnlySession after April 30. The interactive prompt handles MFA naturally; the user account scope provides accountability through Microsoft 365 audit logs.
A Note on Long-Running Sessions Across the April 30 Cutover
Sessions established before April 30, 2026 and held continuously may complete operations against the affected cmdlets after the enforcement date. New sessions established on or after April 30 require the new parameter. The practical implication: do not expect a long-running daemon process that connected last week to keep working past tomorrow. Establish new sessions, with the new parameter, for any compliance work that needs to continue. The grace for in-flight sessions is a graceful-degradation engineering choice, not an extended deadline.
The broader lesson for financial-institution IT teams is that Microsoft 365 platform changes affecting compliance automation deserve the same change-management treatment as production application releases. The MC1213770 enforcement is not the last one. The June 2026 deprecation of -Credential is already announced. Future changes to Microsoft Purview, Microsoft Defender, Entra ID, and Exchange Online will continue to arrive on roadmaps. Institutions that subscribe to Microsoft 365 Message Center notifications for the relevant categories, document the changes against their compliance automation inventory, and execute planned migrations on a normal change-window cadence avoid most of the pain. Institutions that wait for the deadline and respond reactively eat the deadline pressure every time.
The work for this specific deadline is small. Update the module. Add the parameter. Test the affected scripts. Document the change. Move on to planning the managed identity migration that will simplify the next two enforcement deadlines. For institutions that automate beyond just retention, our Copilot governance dashboard walkthrough covers the broader Purview operational posture, and the email-authentication enforcement roadmap covers the parallel infrastructure-hardening work that complements compliance automation. The institutions that handle this well treat platform-change enforcement as a normal IT operations cadence, not an emergency.
Key Takeaway
April 30, 2026 is a small mechanical change with a large operational signal. Update ExchangeOnlineManagement to v3.9.0 or later, add -EnableSearchOnlySession to every Connect-IPPSSession call that drives Purview retention or compliance-tag automation, and migrate certificate-based on-premises scripts to Azure Automation with managed identity. The fix is one switch on one cmdlet. The discipline is documenting the change, monitoring the result, and using this enforcement deadline as the trigger for a managed-identity migration that simplifies every future enforcement deadline. Banks, credit unions, and mortgage companies that handle this with normal change-management discipline turn a deadline scramble into routine operations. Our walkthrough of building a security program beyond Secure Score covers the broader posture this fits inside.
Frequently Asked Questions
Per Microsoft 365 Message Center notification MC1213770, starting April 30, 2026, scripts that connect to Security and Compliance PowerShell using Connect-IPPSSession must use Exchange Online PowerShell module version 3.9.0 or later and must include the new -EnableSearchOnlySession switch parameter when invoking any of thirteen Microsoft Purview Data Lifecycle Management cmdlets. The cmdlets affected are New-RetentionCompliancePolicy, Set-RetentionCompliancePolicy, New-RetentionComplianceRule, Set-RetentionComplianceRule, New-ComplianceTag, Set-ComplianceTag, Remove-ComplianceTag, New-ComplianceRetentionEvent, Set-ComplianceRetentionEvent, Remove-ComplianceRetentionEvent, New-ComplianceRetentionEventType, Set-ComplianceRetentionEventType, and Remove-ComplianceRetentionEventType. Without the new parameter, scripts that call these cmdlets fail with authentication-scope errors. The Microsoft Purview portal itself is unaffected; only PowerShell automation against the named cmdlets is affected.
No. Microsoft has stated no grace period or fallback mode applies after the enforcement date. Scripts that establish a Connect-IPPSSession session on or after April 30, 2026 without the -EnableSearchOnlySession switch and then invoke any of the thirteen affected cmdlets will fail with authentication-scope errors. There is one narrow exception: sessions established before April 30 and held continuously may complete in-flight operations after the cutoff, but new sessions starting on or after April 30 require the parameter. The practical guidance is to update scripts before the deadline rather than relying on continuous-session behavior, because most financial-institution scheduled jobs establish new sessions every run.
Yes, in a meaningful way for financial institutions. Per Microsoft Learn documentation, the affected cmdlets are not currently compatible with certificate-based authentication when combined with the -EnableSearchOnlySession parameter. Scripts that previously authenticated unattended using -CertificateThumbprint and -AppId on on-premises servers cannot simply add the new switch and continue working against the affected cmdlets. The recommended migration path is Azure Automation with managed identity authentication, using Connect-IPPSSession -ManagedIdentity -Organization <tenant> -EnableSearchOnlySession. Hybrid identity environments with workloads that must remain on-premises can use Azure Arc-enabled managed identity. Scripts that target only the unaffected cmdlets (read-only retention queries, sensitivity label management, DLP policy operations) can continue using certificate-based authentication.
From an elevated PowerShell prompt on the host that runs your compliance scripts, execute Get-Module ExchangeOnlineManagement -ListAvailable | Select-Object Version. If the highest version returned is below 3.9.0, run Update-Module ExchangeOnlineManagement -Force and start a new PowerShell session to load the updated module. Verify the new version by running the same Get-Module command in the new session. The verification must be done on every host that executes affected scripts, not only on a developer workstation, because the scheduled job runs against whatever module version is installed on the production host. Some scheduling agents cache loaded module versions in long-running processes; restart the agent service after the module update to force a reload.
Microsoft Purview retention policies, retention rules, compliance tags, and retention events coordinate behavior across multiple Microsoft 365 services in a single operation. A retention compliance policy that targets Exchange mailboxes, SharePoint sites, and Microsoft Teams channel messages requires the Purview backend to register and enforce the policy at all three services in a coordinated way. The OAuth access token issued for a standard Connect-IPPSSession session is scoped to Security and Compliance, which is not the right audience for cross-service write operations. The -EnableSearchOnlySession parameter changes the audience claim on the token to a broader scope that the destination services accept for cross-service retention enforcement. This is a security refinement, not a restriction; it provides more granular auditing of who can perform cross-service compliance writes and creates better separation between within-service and cross-service operations.
No, not directly. The April 30, 2026 enforcement targets thirteen specifically named cmdlets in the Data Lifecycle Management cmdlet family, covering retention policies, retention rules, compliance tags, and retention events. Sensitivity label cmdlets such as Get-Label, New-Label, Set-Label, New-LabelPolicy, and Get-LabelPolicy are not on the affected list. Data Loss Prevention policy cmdlets such as Get-DlpCompliancePolicy and New-DlpCompliancePolicy are not on the affected list. eDiscovery case and hold cmdlets are not on the announced list either, though Microsoft has indicated similar audience-scoping refinements may extend to other cmdlet families in future updates. Scripts that operate exclusively on sensitivity labels or DLP policies can continue using their existing authentication patterns. Scripts that mix retention cmdlets with sensitivity label or DLP cmdlets in the same session should add -EnableSearchOnlySession as a forward-compatibility measure since the switch does not affect the unaffected cmdlets.
Several regulatory regimes drive financial institutions to automate Microsoft Purview retention through PowerShell. SEC Rule 17a-4 requires broker-dealers to preserve specific books and records for three to six years, with some categories permanently or until termination plus three years, in non-rewriteable, non-erasable format. FINRA Rule 4511 binds member firms to those same retention periods. NCUA's records preservation regulation in 12 CFR Part 749 requires federally insured credit unions to maintain a written records preservation program. Bank Secrecy Act recordkeeping under 31 CFR §§ 1010.410 and 1010.430 requires five-year retention for Currency Transaction Reports, Suspicious Activity Reports, and customer identification program documentation. OCC examination expectations and FFIEC IT Examination Handbook guidance treat configuration management and automation script integrity as part of a sound IT operations program. Institutions automate retention enforcement to operationalize all of these obligations at scale; broken automation creates documentation gaps that examiners flag during examinations.
Need help mapping your Purview automation to the new authentication pattern?
ABT helps banks, credit unions, and mortgage companies migrate compliance automation from certificate-based on-premises scripts to managed-identity Azure Automation runbooks aligned with FFIEC examination expectations. Talk to an expert about scoping your inventory, mapping the RBAC model, and building the monitoring that catches future enforcement deadlines before they hit.
Talk to an Expert Get Your Security Grade