Skip to content

Commit

Permalink
Merge branch 'main' into patch-3
Browse files Browse the repository at this point in the history
  • Loading branch information
tiburd authored Nov 17, 2023
2 parents 50a569e + 3a61c51 commit cc4b137
Show file tree
Hide file tree
Showing 60 changed files with 338 additions and 111 deletions.
5 changes: 4 additions & 1 deletion docset/docfx.json
Original file line number Diff line number Diff line change
Expand Up @@ -85,7 +85,10 @@
"AngelaMotherofDragons",
"dstrome",
"v-dihans",
"sdwheeler"
"sdwheeler",
"Stacyrch140",
"v-stsavell",
"American-Dipper"
],
"_op_documentIdPathDepotMapping": {
"./": {
Expand Down
2 changes: 1 addition & 1 deletion docset/mdop/appvclient/add-appvclientconnectiongroup.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Add-AppvClientConnectionGroup [-Path] <String> [<CommonParameters>]
```

## DESCRIPTION
The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group.
The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group.
In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running.

This cmdlet can also be used to update an already existing connection group definition.
Expand Down
2 changes: 1 addition & 1 deletion docset/mdop/appvclient/get-appvpublishingserver.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Get-AppvPublishingServer [[-Name] <String>] [[-URL] <String>] [<CommonParameters
```

## DESCRIPTION
The **Get-AppvPublishingServer** cmdlet returns an Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.
The **Get-AppvPublishingServer** cmdlet returns a Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion docset/mdop/appvclient/mount-appvclientpackage.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ Mount-AppvClientPackage [-Name] <String> [[-Version] <String>] [<CommonParameter
```

## DESCRIPTION
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of an Microsoft Application Virtualization (App-V) package into the cache.
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of a Microsoft Application Virtualization (App-V) package into the cache.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion docset/mdop/appvclient/set-appvclientpackage.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ Set-AppvClientPackage [-Path <String>] [-DynamicDeploymentConfiguration <String>
```

## DESCRIPTION
The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package.
The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion docset/mdop/appvsequencer/expand-appvsequencerpackage.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Expand-AppvSequencerPackage [-AppvPackagePath] <String> [<CommonParameters>]
```

## DESCRIPTION
The **Expand-AppvSequencerPackage** cmdlet expands an Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer.
The **Expand-AppvSequencerPackage** cmdlet expands a Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer.
You can more easily add prerequisites or dependent applications to the sequencer before generating the package.

Run this cmdlet each time to expand a new package onto the computer running the sequencer.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -208,12 +208,23 @@ Accept wildcard characters: False

### -Type
Specifies the data type of the values for this option.
The acceptable values for this parameter are: Byte, Word, DWord, DWordDword, IPAddress, String, BinaryData, EncapsulatedData or IPv6Address.
The acceptable values for this parameter are:

- Byte
- Word
- DWord
- DWordDword
- IPAddress
- String
- BinaryData
- EncapsulatedData
- IPv6Address

```yaml
Type: String
Parameter Sets: (All)
Aliases:
Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, IPv6Address, String, BinaryData, EncapsulatedData
Required: True
Position: 3
Expand Down
2 changes: 1 addition & 1 deletion docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ Enable-MSDSMAutomaticClaim [-BusType] <String>
```

## DESCRIPTION
The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.

You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI).
You can enable MSDSM to automatically claim both SAS and iSCSI disks.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -226,13 +226,23 @@ Accept wildcard characters: False

### -Type
Specifies the data type of the values for this option.
The acceptable values for this parameter are: Byte, Word, DWord, DWordDword, IPAddress, String, BinaryData, EncapsulatedData or IPv6Address.
The acceptable values for this parameter are:

- Byte
- Word
- DWord
- DWordDword
- IPAddress
- String
- BinaryData
- EncapsulatedData
- IPv6Address

```yaml
Type: String
Parameter Sets: (All)
Aliases:
Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, String, BinaryData, EncapsulatedData
Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, IPv6Address, String, BinaryData, EncapsulatedData
Required: True
Position: 3
Expand Down
4 changes: 2 additions & 2 deletions docset/winserver2012r2-ps/hpc/HPC.md
Original file line number Diff line number Diff line change
Expand Up @@ -267,7 +267,7 @@ Clears the cached credentials that the HPC Diagnostics Service uses to run diagn
Clears the alert icon for diagnostic test runs.

### [Remove-HpcTokenCache](./Remove-HpcTokenCache.md)
Removes the client Azure Active Directory token cache used for job submission.
Removes the client Microsoft Entra token cache used for job submission.

### [Replicate-HpcImage](./Replicate-HpcImage.md)
Copies a base-node operating system image from a Windows image (.wim) file to an Internet SCSI (iSCSI) storage array.
Expand Down Expand Up @@ -321,7 +321,7 @@ Sets the properties for a task.
Sets the credentials for running diagnostic tests.

### [Set-HpcTokenCache](./Set-HpcTokenCache.md)
Sets the client Azure Active Directory token cache for job submission.
Sets the client Microsoft Entra token cache for job submission.

### [Shutdown-HpcNode](./Shutdown-HpcNode.md)
Turns off one or more nodes.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Enable-MSDSMAutomaticClaim [-BusType] <String> [<CommonParameters>]
```

## DESCRIPTION
The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.

You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI).
You can enable MSDSM to automatically claim both SAS and iSCSI disks.
Expand Down
2 changes: 1 addition & 1 deletion docset/winserver2012r2-ps/netqos/New-NetQosPolicy.md
Original file line number Diff line number Diff line change
Expand Up @@ -262,7 +262,7 @@ Accept wildcard characters: False
```
### -Cluster
Specifies Microsoft's cluster service, which uses the default SQL server TCP/UDP port 3343.
Specifies the Microsoft Windows Cluster service, which uses the Cluster network driver TCP/UDP port 3343.
```yaml
Type: SwitchParameter
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi
external help file: Microsoft.IdentityServer.Management.dll-Help.xml
Module Name: ADFS
ms.date: 12/20/2016
ms.custom: has-azure-ad-ps-ref
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2016-ps&wt.mc_id=ps-gethelp
schema: 2.0.0
title: New-AdfsAzureMfaTenantCertificate
Expand Down Expand Up @@ -43,7 +43,7 @@ PS C:\> Set-AdfsAzureMfaTenant -TenantId <your tenant ID> -ClientId 981f26a1-7f4
These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm.

> [!NOTE]
> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0).
> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module.
### Example 2: Determine which certificate Azure MFA is using
```
Expand Down Expand Up @@ -72,8 +72,8 @@ Accept wildcard characters: False
```
### -TenantId
Specifies the GUID representation of the Azure AD tenant ID.
This can be found in the URL bar of the Azure AD portal, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`
Specifies the GUID representation of the Microsoft Entra tenant ID.
This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`

Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID.

Expand Down
8 changes: 4 additions & 4 deletions docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId <String> -ClientId <String> [-WhatIf] [-Confirm
```

## DESCRIPTION
The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant.
The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant.

## EXAMPLES

Expand All @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer
## PARAMETERS

### -ClientId
Specifies the well-known ID of the Azure MFA application in Azure AD.
Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID.

```yaml
Type: String
Expand All @@ -60,8 +60,8 @@ Accept wildcard characters: False
```
### -TenantId
Specifies the GUID representation of an Azure AD tenant ID.
This can be found in the URL bar of the Azure AD portal, as in this example:
Specifies the GUID representation of a Microsoft Entra tenant ID.
This can be found in the URL bar of the Microsoft Entra admin center, as in this example:
`https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\<tenantID_GUID\>/directoryQuickStart`

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying

### Example 2: Create a custom message on the Sign in page
```
PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit <A href='https://passwordreset.microsoftonline.com/'>Azure AD self-service password reset</A>." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform"
PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit <A href='https://passwordreset.microsoftonline.com/'>Microsoft Entra self-service password reset</A>." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform"
```

The command creates a custom message on the Sign in page for the Office 365 relying party.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] <String> [<CommonParameters>]
```

## DESCRIPTION
The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group.
The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group.
In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running.

This cmdlet can also be used to update an already existing connection group definition.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] <String>] [[-URL] <String>] [<CommonParameters
```

## DESCRIPTION
The **Get-AppvPublishingServer** cmdlet returns an Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.
The **Get-AppvPublishingServer** cmdlet returns a Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ Mount-AppvClientPackage [-Name] <String> [[-Version] <String>] [<CommonParameter
```

## DESCRIPTION
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of an Microsoft Application Virtualization (App-V) package into the cache.
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of a Microsoft Application Virtualization (App-V) package into the cache.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Set-AppvClientPackage [-Path <String>] [-DynamicDeploymentConfiguration <String>
```

## DESCRIPTION
The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package.
The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package.

## EXAMPLES

Expand Down
17 changes: 16 additions & 1 deletion docset/winserver2016-ps/defender/Set-MpPreference.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
[-SignatureDisableUpdateOnStartupWithoutEngine <Boolean>] [-SignatureFallbackOrder <String>]
[-SignatureScheduleDay <Day>] [-SignatureScheduleTime <DateTime>] [-SignatureUpdateCatchupInterval <UInt32>]
[-SignatureUpdateInterval <UInt32>] [-MAPSReporting <MAPSReportingType>]
[-SubmitSamplesConsent <SubmitSamplesConsentType>] [-DisableAutoExclusions <Boolean>]
[-SubmitSamplesConsent <SubmitSamplesConsentType>] [-DisableAutoExclusions <Boolean>] [-DisableCacheMaintenance <UInt32>]
[-DisablePrivacyMode <Boolean>] [-RandomizeScheduleTaskTimes <Boolean>] [-DisableBehaviorMonitoring <Boolean>]
[-DisableIntrusionPreventionSystem <Boolean>] [-DisableIOAVProtection <Boolean>]
[-DisableRealtimeMonitoring <Boolean>] [-DisableScriptScanning <Boolean>] [-DisableArchiveScanning <Boolean>]
Expand Down Expand Up @@ -239,6 +239,21 @@ Accept pipeline input: False
Accept wildcard characters: False
```
### -DisableCacheMaintenance
Defines whether the cache maintenance idle task will perform the cache maintenance or not. Allowed values are 1 - cache maintenance is disabled, and 0 - cache maintenance is enabled (default).
```yaml
Type: Boolean
Parameter Sets: (All)
Aliases: dcm

Required: False
Position: Named
Default value: 0
Accept pipeline input: False
Accept wildcard characters: False
```
### -DisableCatchupQuickScan
Indicates whether Windows Defender runs catch-up scans for scheduled quick scans.
A computer can miss a scheduled scan, usually because the computer is off at the scheduled time.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -249,7 +249,7 @@ The acceptable values for this parameter are:
Type: String
Parameter Sets: (All)
Aliases:
Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, String, BinaryData, EncapsulatedData
Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, IPv6Address, String, BinaryData, EncapsulatedData
Required: True
Position: 3
Expand Down
2 changes: 1 addition & 1 deletion docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] <String> [-WhatIf] [-Confirm] [<CommonPara
```

## DESCRIPTION
The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.

You must specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI).
You can enable MSDSM to automatically claim both SAS and iSCSI disks.
Expand Down
2 changes: 1 addition & 1 deletion docset/winserver2016-ps/netqos/New-NetQosPolicy.md
Original file line number Diff line number Diff line change
Expand Up @@ -262,7 +262,7 @@ Accept wildcard characters: False
```
### -Cluster
Specifies the Microsoft cluster service, which uses the default SQL server TCP/UDP port 3343.
Specifies the Microsoft Windows Cluster service, which uses the Cluster network driver TCP/UDP port 3343.
```yaml
Type: SwitchParameter
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi
external help file: Microsoft.IdentityServer.Management.dll-Help.xml
Module Name: ADFS
ms.date: 12/20/2016
ms.custom: has-azure-ad-ps-ref
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2019-ps&wt.mc_id=ps-gethelp
schema: 2.0.0
title: New-AdfsAzureMfaTenantCertificate
Expand Down Expand Up @@ -43,7 +43,7 @@ PS C:\> Set-AdfsAzureMfaTenant -TenantId <your tenant ID> -ClientId 981f26a1-7f4
These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm.

> [!NOTE]
> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0).
> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module.
### Example 2: Determine which certificate Azure MFA is using
```
Expand Down Expand Up @@ -71,8 +71,8 @@ Accept wildcard characters: False
```
### -TenantId
Specifies the GUID representation of the Azure AD tenant ID.
This can be found in the URL bar of the Azure AD portal, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`
Specifies the GUID representation of the Microsoft Entra tenant ID.
This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`

Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID.

Expand Down
8 changes: 4 additions & 4 deletions docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId <String> -ClientId <String> [-WhatIf] [-Confirm
```

## DESCRIPTION
The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant.
The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant.

## EXAMPLES

Expand All @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer
## PARAMETERS

### -ClientId
Specifies the well-known ID of the Azure MFA application in Azure AD.
Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID.

```yaml
Type: String
Expand All @@ -60,8 +60,8 @@ Accept wildcard characters: False
```
### -TenantId
Specifies the GUID representation of an Azure AD tenant ID.
This can be found in the URL bar of the Azure AD portal, as in this example:
Specifies the GUID representation of a Microsoft Entra tenant ID.
This can be found in the URL bar of the Microsoft Entra admin center, as in this example:
`https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\<tenantID_GUID\>/directoryQuickStart`

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying

### Example 2: Create a custom message on the Sign in page
```
PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit <A href='https://passwordreset.microsoftonline.com/'>Azure AD self-service password reset</A>." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform"
PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit <A href='https://passwordreset.microsoftonline.com/'>Microsoft Entra self-service password reset</A>." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform"
```

The command creates a custom message on the Sign in page for the Office 365 relying party.
Expand Down
Loading

0 comments on commit cc4b137

Please sign in to comment.