diff --git a/docset/docfx.json b/docset/docfx.json index 9e769dcb50..c6034818fa 100644 --- a/docset/docfx.json +++ b/docset/docfx.json @@ -85,7 +85,10 @@ "AngelaMotherofDragons", "dstrome", "v-dihans", - "sdwheeler" + "sdwheeler", + "Stacyrch140", + "v-stsavell", + "American-Dipper" ], "_op_documentIdPathDepotMapping": { "./": { diff --git a/docset/mdop/appvclient/add-appvclientconnectiongroup.md b/docset/mdop/appvclient/add-appvclientconnectiongroup.md index b756d72edb..d8dc22a9bb 100644 --- a/docset/mdop/appvclient/add-appvclientconnectiongroup.md +++ b/docset/mdop/appvclient/add-appvclientconnectiongroup.md @@ -19,7 +19,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/mdop/appvclient/get-appvpublishingserver.md b/docset/mdop/appvclient/get-appvpublishingserver.md index 83173f798b..c3b1a53495 100644 --- a/docset/mdop/appvclient/get-appvpublishingserver.md +++ b/docset/mdop/appvclient/get-appvpublishingserver.md @@ -25,7 +25,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/mdop/appvsequencer/expand-appvsequencerpackage.md b/docset/mdop/appvsequencer/expand-appvsequencerpackage.md index 69b594a8d5..c25df39302 100644 --- a/docset/mdop/appvsequencer/expand-appvsequencerpackage.md +++ b/docset/mdop/appvsequencer/expand-appvsequencerpackage.md @@ -19,7 +19,7 @@ Expand-AppvSequencerPackage [-AppvPackagePath] [] ``` ## DESCRIPTION -The **Expand-AppvSequencerPackage** cmdlet expands an Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer. +The **Expand-AppvSequencerPackage** cmdlet expands a Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer. You can more easily add prerequisites or dependent applications to the sequencer before generating the package. Run this cmdlet each time to expand a new package onto the computer running the sequencer. diff --git a/docset/winserver2012-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md b/docset/winserver2012-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md index cb5bcaad7b..e0bade6052 100644 --- a/docset/winserver2012-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md +++ b/docset/winserver2012-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md @@ -208,12 +208,23 @@ Accept wildcard characters: False ### -Type Specifies the data type of the values for this option. -The acceptable values for this parameter are: Byte, Word, DWord, DWordDword, IPAddress, String, BinaryData, EncapsulatedData or IPv6Address. +The acceptable values for this parameter are: + +- Byte +- Word +- DWord +- DWordDword +- IPAddress +- String +- BinaryData +- EncapsulatedData +- IPv6Address ```yaml Type: String Parameter Sets: (All) Aliases: +Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, IPv6Address, String, BinaryData, EncapsulatedData Required: True Position: 3 diff --git a/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md index fb31a109f3..c6b1566b72 100644 --- a/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -17,7 +17,7 @@ Enable-MSDSMAutomaticClaim [-BusType] ``` ## DESCRIPTION -The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. +The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI). You can enable MSDSM to automatically claim both SAS and iSCSI disks. diff --git a/docset/winserver2012r2-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md b/docset/winserver2012r2-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md index 4e23494283..78e887e718 100644 --- a/docset/winserver2012r2-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md +++ b/docset/winserver2012r2-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md @@ -226,13 +226,23 @@ Accept wildcard characters: False ### -Type Specifies the data type of the values for this option. -The acceptable values for this parameter are: Byte, Word, DWord, DWordDword, IPAddress, String, BinaryData, EncapsulatedData or IPv6Address. +The acceptable values for this parameter are: + +- Byte +- Word +- DWord +- DWordDword +- IPAddress +- String +- BinaryData +- EncapsulatedData +- IPv6Address ```yaml Type: String Parameter Sets: (All) Aliases: -Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, String, BinaryData, EncapsulatedData +Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, IPv6Address, String, BinaryData, EncapsulatedData Required: True Position: 3 diff --git a/docset/winserver2012r2-ps/hpc/HPC.md b/docset/winserver2012r2-ps/hpc/HPC.md index 4efbd0df30..74a089557a 100644 --- a/docset/winserver2012r2-ps/hpc/HPC.md +++ b/docset/winserver2012r2-ps/hpc/HPC.md @@ -267,7 +267,7 @@ Clears the cached credentials that the HPC Diagnostics Service uses to run diagn Clears the alert icon for diagnostic test runs. ### [Remove-HpcTokenCache](./Remove-HpcTokenCache.md) -Removes the client Azure Active Directory token cache used for job submission. +Removes the client Microsoft Entra token cache used for job submission. ### [Replicate-HpcImage](./Replicate-HpcImage.md) Copies a base-node operating system image from a Windows image (.wim) file to an Internet SCSI (iSCSI) storage array. @@ -321,7 +321,7 @@ Sets the properties for a task. Sets the credentials for running diagnostic tests. ### [Set-HpcTokenCache](./Set-HpcTokenCache.md) -Sets the client Azure Active Directory token cache for job submission. +Sets the client Microsoft Entra token cache for job submission. ### [Shutdown-HpcNode](./Shutdown-HpcNode.md) Turns off one or more nodes. diff --git a/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md index ec5f420287..07295cc07e 100644 --- a/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -19,7 +19,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [] ``` ## DESCRIPTION -The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. +The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI). You can enable MSDSM to automatically claim both SAS and iSCSI disks. diff --git a/docset/winserver2012r2-ps/netqos/New-NetQosPolicy.md b/docset/winserver2012r2-ps/netqos/New-NetQosPolicy.md index d0969549ee..0a7fc945ce 100644 --- a/docset/winserver2012r2-ps/netqos/New-NetQosPolicy.md +++ b/docset/winserver2012r2-ps/netqos/New-NetQosPolicy.md @@ -262,7 +262,7 @@ Accept wildcard characters: False ``` ### -Cluster -Specifies Microsoft's cluster service, which uses the default SQL server TCP/UDP port 3343. +Specifies the Microsoft Windows Cluster service, which uses the Cluster network driver TCP/UDP port 3343. ```yaml Type: SwitchParameter diff --git a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 88f4449005..c2dc606fbf 100644 --- a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref +ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2016-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: New-AdfsAzureMfaTenantCertificate @@ -43,7 +43,7 @@ PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f4 These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm. > [!NOTE] -> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0). +> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module. ### Example 2: Determine which certificate Azure MFA is using ``` @@ -72,8 +72,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of the Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` +Specifies the GUID representation of the Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID. diff --git a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md index 7579d96ac1..1adb2c053a 100644 --- a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId -ClientId [-WhatIf] [-Confirm ``` ## DESCRIPTION -The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant. +The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant. ## EXAMPLES @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer ## PARAMETERS ### -ClientId -Specifies the well-known ID of the Azure MFA application in Azure AD. +Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID. ```yaml Type: String @@ -60,8 +60,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of an Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: +Specifies the GUID representation of a Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\/directoryQuickStart` diff --git a/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md b/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md index f55491eeba..023eae659a 100644 --- a/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md +++ b/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying ### Example 2: Create a custom message on the Sign in page ``` -PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Azure AD self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" +PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Microsoft Entra self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" ``` The command creates a custom message on the Sign in page for the Office 365 relying party. diff --git a/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md b/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md index 4653a75d53..c9b4e0d8ef 100644 --- a/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md +++ b/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md b/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md index b4ec42481f..eda6e55cf7 100644 --- a/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md +++ b/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/winserver2016-ps/defender/Set-MpPreference.md b/docset/winserver2016-ps/defender/Set-MpPreference.md index bfda725fa7..5d02786e59 100644 --- a/docset/winserver2016-ps/defender/Set-MpPreference.md +++ b/docset/winserver2016-ps/defender/Set-MpPreference.md @@ -29,7 +29,7 @@ Set-MpPreference [-ExclusionPath ] [-ExclusionExtension ] [- [-SignatureDisableUpdateOnStartupWithoutEngine ] [-SignatureFallbackOrder ] [-SignatureScheduleDay ] [-SignatureScheduleTime ] [-SignatureUpdateCatchupInterval ] [-SignatureUpdateInterval ] [-MAPSReporting ] - [-SubmitSamplesConsent ] [-DisableAutoExclusions ] + [-SubmitSamplesConsent ] [-DisableAutoExclusions ] [-DisableCacheMaintenance ] [-DisablePrivacyMode ] [-RandomizeScheduleTaskTimes ] [-DisableBehaviorMonitoring ] [-DisableIntrusionPreventionSystem ] [-DisableIOAVProtection ] [-DisableRealtimeMonitoring ] [-DisableScriptScanning ] [-DisableArchiveScanning ] @@ -239,6 +239,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -DisableCacheMaintenance +Defines whether the cache maintenance idle task will perform the cache maintenance or not. Allowed values are 1 - cache maintenance is disabled, and 0 - cache maintenance is enabled (default). + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: dcm + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisableCatchupQuickScan Indicates whether Windows Defender runs catch-up scans for scheduled quick scans. A computer can miss a scheduled scan, usually because the computer is off at the scheduled time. diff --git a/docset/winserver2016-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md b/docset/winserver2016-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md index d5a08a35e1..fdc53e6f4a 100644 --- a/docset/winserver2016-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md +++ b/docset/winserver2016-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md @@ -249,7 +249,7 @@ The acceptable values for this parameter are: Type: String Parameter Sets: (All) Aliases: -Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, String, BinaryData, EncapsulatedData +Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, IPv6Address, String, BinaryData, EncapsulatedData Required: True Position: 3 diff --git a/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md index c9fa20b9ef..929edfd47c 100644 --- a/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [-WhatIf] [-Confirm] [ Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f4 These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm. > [!NOTE] -> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0). +> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module. ### Example 2: Determine which certificate Azure MFA is using ``` @@ -71,8 +71,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of the Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` +Specifies the GUID representation of the Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID. diff --git a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md index 5563a15d78..35eea27491 100644 --- a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId -ClientId [-WhatIf] [-Confirm ``` ## DESCRIPTION -The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant. +The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant. ## EXAMPLES @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer ## PARAMETERS ### -ClientId -Specifies the well-known ID of the Azure MFA application in Azure AD. +Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID. ```yaml Type: String @@ -60,8 +60,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of an Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: +Specifies the GUID representation of a Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\/directoryQuickStart` diff --git a/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md b/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md index 6657a2f6ee..390dc45a45 100644 --- a/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md +++ b/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying ### Example 2: Create a custom message on the Sign in page ``` -PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Azure AD self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" +PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Microsoft Entra self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" ``` The command creates a custom message on the Sign in page for the Office 365 relying party. diff --git a/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md b/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md index 59e1bf2c32..cadf750e95 100644 --- a/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md +++ b/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md b/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md index f3b38f1fbb..40f03a580c 100644 --- a/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md +++ b/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/winserver2019-ps/defender/Set-MpPreference.md b/docset/winserver2019-ps/defender/Set-MpPreference.md index 68b7bf52d2..01792e75e5 100644 --- a/docset/winserver2019-ps/defender/Set-MpPreference.md +++ b/docset/winserver2019-ps/defender/Set-MpPreference.md @@ -33,7 +33,7 @@ Set-MpPreference [-ExclusionPath ] [-ExclusionExtension ] [- [-SubmitSamplesConsent ] [-DisableAutoExclusions ] [-DisablePrivacyMode ] [-RandomizeScheduleTaskTimes ] [-DisableBehaviorMonitoring ] [-DisableIntrusionPreventionSystem ] [-DisableIOAVProtection ] - [-DisableRealtimeMonitoring ] [-DisableScriptScanning ] [-DisableArchiveScanning ] + [-DisableRealtimeMonitoring ] [-DisableScriptScanning ] [-DisableArchiveScanning ] [-DisableCacheMaintenance ] [-DisableCatchupFullScan ] [-DisableCatchupQuickScan ] [-DisableCpuThrottleOnIdleScans ] [-DisableEmailScanning ] [-DisableEmailScanning ] [-DisableRemovableDriveScanning ] [-DisableRestorePoint ] @@ -275,6 +275,22 @@ Accept pipeline input: False Accept wildcard characters: False ``` + +### -DisableCacheMaintenance +Defines whether the cache maintenance idle task will perform the cache maintenance or not. Allowed values are 1 - cache maintenance is disabled, and 0 - cache maintenance is enabled (default). + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: dcm + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisableCatchupFullScan Indicates whether Windows Defender runs catch-up scans for scheduled full scans. A computer can miss a scheduled scan, usually because the computer is turned off at the scheduled time. diff --git a/docset/winserver2019-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md b/docset/winserver2019-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md index 9f16f7c18b..55c1bc2a0d 100644 --- a/docset/winserver2019-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md +++ b/docset/winserver2019-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md @@ -249,7 +249,7 @@ The acceptable values for this parameter are: Type: String Parameter Sets: (All) Aliases: -Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, String, BinaryData, EncapsulatedData +Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, IPv6Address, String, BinaryData, EncapsulatedData Required: True Position: 3 diff --git a/docset/winserver2019-ps/languagepackmanagement/Get-SystemPreferredUILanguage.md b/docset/winserver2019-ps/languagepackmanagement/Get-SystemPreferredUILanguage.md index 03b9f584a6..ec8952cb82 100644 --- a/docset/winserver2019-ps/languagepackmanagement/Get-SystemPreferredUILanguage.md +++ b/docset/winserver2019-ps/languagepackmanagement/Get-SystemPreferredUILanguage.md @@ -2,7 +2,7 @@ description: The Get-SystemPreferredUILanguage cmdlet lets you see which language is set as the System Preferred UI Language in a running Windows installation external help file: Microsoft.LanguagePackManagement.Powershell.Commands.dll-Help.xml Module Name: LanguagePackManagement -ms.date: 08/15/2022 +ms.date: 06/21/2023 online version: https://learn.microsoft.com/powershell/module/languagepackmanagement/get-systempreferreduilanguage?view=windowsserver2019-ps schema: 2.0.0 title: Get-SystemPreferredUILanguage @@ -28,7 +28,7 @@ Returns the language that is set as the System Preferred Language ### Example 1 ```powershell -Get-SystemPrefferedUILanguage +Get-SystemPreferredUILanguage ``` This command returns the language that's currently set as the System Preferred UI Language @@ -48,4 +48,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Set-SystemPreferredUILanguage](set-systempreferreduilanguage.md) [InstallLanguage](install-language.md) - diff --git a/docset/winserver2019-ps/laps/Get-LapsAADPassword.md b/docset/winserver2019-ps/laps/Get-LapsAADPassword.md index 480ba0bc76..98c9b8ada5 100644 --- a/docset/winserver2019-ps/laps/Get-LapsAADPassword.md +++ b/docset/winserver2019-ps/laps/Get-LapsAADPassword.md @@ -1,5 +1,5 @@ --- -description: Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Azure AD device. +description: Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Microsoft Entra device. external help file: LAPS-help.xml Module Name: LAPS online version: https://learn.microsoft.com/powershell/module/laps/get-lapsaadpassword?view=windowsserver2019-ps&wt.mc_id=ps-gethelp @@ -12,8 +12,8 @@ title: Get-LapsAADPassword # Get-LapsAADPassword ## SYNOPSIS -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ## SYNTAX @@ -25,7 +25,7 @@ Get-LapsAADPassword -DeviceIds [-IncludePasswords] [-IncludeHistory] ## DESCRIPTION The `Get-LapsAADPassword` cmdlet allows administrators to retrieve LAPS passwords and password -history for an AAD-joined device. This is implemented by sending queries to Microsoft Graph over the +history for a Microsoft Entra joined device. This is implemented by sending queries to Microsoft Graph over the deviceLocalCredentials collection. The `Get-LapsAADPassword` cmdlet supports two basic modes when querying LAPS passwords: @@ -51,9 +51,9 @@ device, the `DeviceManagementManagedDevices.Read.All` permission may also be req > [!IMPORTANT] > The `Get-LapsAADPassword` cmdlet is implemented as a wrapper around the Microsoft Graph PowerShell > library, which must be manually installed on the device before `Get-LapsAADPassword` can work. -> Additional configuration steps are required in your AAD tenant to enable authentication to +> Additional configuration steps are required in your Microsoft Entra tenant to enable authentication to > Microsoft Graph and to grant the necessary Microsoft Graph permissions. For more information, see -> [Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) +> [Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) The **Verbose** parameter may be used to get additional information about the cmdlet's operation. @@ -240,4 +240,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Windows LAPS Overview](https://go.microsoft.com/fwlink/?linkid=2233901) -[Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) \ No newline at end of file +[Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) diff --git a/docset/winserver2019-ps/laps/LAPS.md b/docset/winserver2019-ps/laps/LAPS.md index 902661693d..8f2d4ee052 100644 --- a/docset/winserver2019-ps/laps/LAPS.md +++ b/docset/winserver2019-ps/laps/LAPS.md @@ -25,8 +25,8 @@ Local Administrator Password Solution (LAPS) password attributes. ### [Get-LapsAADPassword](Get-LapsAADPassword.md) -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ### [Get-LapsADPassword](Get-LapsADPassword.md) diff --git a/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md index d24bb91303..a9ed25792d 100644 --- a/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [-WhatIf] [-Confirm] [/directoryQuickStart` +Specifies the GUID representation of the Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID. diff --git a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md index 292a669981..cb3d9cf62a 100644 --- a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId -ClientId [-WhatIf] [-Confirm ``` ## DESCRIPTION -The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant. +The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant. ## EXAMPLES @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer ## PARAMETERS ### -ClientId -Specifies the well-known ID of the Azure MFA application in Azure AD. +Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID. ```yaml Type: String @@ -60,8 +60,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of an Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: +Specifies the GUID representation of a Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\/directoryQuickStart` diff --git a/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md b/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md index 3847021a14..01350e6b67 100644 --- a/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md +++ b/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying ### Example 2: Create a custom message on the Sign in page ``` -PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Azure AD self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" +PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Microsoft Entra self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" ``` The command creates a custom message on the Sign in page for the Office 365 relying party. diff --git a/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md b/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md index 0d7a0da0dc..6d396893a3 100644 --- a/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md +++ b/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/winserver2022-ps/appvclient/Get-AppvPublishingServer.md b/docset/winserver2022-ps/appvclient/Get-AppvPublishingServer.md index b77f6ce54c..60731ded66 100644 --- a/docset/winserver2022-ps/appvclient/Get-AppvPublishingServer.md +++ b/docset/winserver2022-ps/appvclient/Get-AppvPublishingServer.md @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/winserver2022-ps/appx/Get-AppxPackage.md b/docset/winserver2022-ps/appx/Get-AppxPackage.md index cf1ab1795a..bd71b602af 100644 --- a/docset/winserver2022-ps/appx/Get-AppxPackage.md +++ b/docset/winserver2022-ps/appx/Get-AppxPackage.md @@ -47,6 +47,30 @@ Get-AppxPackage -Name "Package17" -User "Contoso\EvanNarvaez" This command displays information about `Package17` if it's installed in the specified user profile. +### Example 3: Get a particular app package information + +```powershell +Get-AppxPackage -Name Microsoft.ScreenSketch +``` + +This command displays information about the ScreenSketch app. + +### Example 4: Get all app packages for a particular Publisher + +```powershell +Get-AppxPackage -Publisher "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" +``` + +This command lists all the Microsoft app packages that are installed on the computer. + +### Example 5: Get all app packages with PackageTypeFilter + +```powershell +Get-AppxPackage -PackageTypeFilter Bundle,Framework,Main,Resource +``` + +This command lists all the app packages with PackageTypeFilter installed on the computer. + ## PARAMETERS ### -AllUsers diff --git a/docset/winserver2022-ps/appx/Get-AppxPackageAutoUpdateSettings.md b/docset/winserver2022-ps/appx/Get-AppxPackageAutoUpdateSettings.md index c70846fe05..cb299cd764 100644 --- a/docset/winserver2022-ps/appx/Get-AppxPackageAutoUpdateSettings.md +++ b/docset/winserver2022-ps/appx/Get-AppxPackageAutoUpdateSettings.md @@ -54,6 +54,14 @@ Get-AppxPackageAutoUpdateSettings -PackageFullName publisher.package1_1.0.0.0_ne This will return the Auto Update and Repair settings for a specific Windows App that has been installed and registered to the signed-in user. +### Example 4: Get App Package Auto Update settings for all installed Windows Apps + +```powershell +Get-AppxPackageAutoUpdateSettings -ShowUpdateAvailability +``` + +Displays available update information for all installed Windows Apps. + ## PARAMETERS ### -PackageFullName diff --git a/docset/winserver2022-ps/bitlocker/BackupToAAD-BitLockerKeyProtector.md b/docset/winserver2022-ps/bitlocker/BackupToAAD-BitLockerKeyProtector.md index f5ad8318a3..c0685321c2 100644 --- a/docset/winserver2022-ps/bitlocker/BackupToAAD-BitLockerKeyProtector.md +++ b/docset/winserver2022-ps/bitlocker/BackupToAAD-BitLockerKeyProtector.md @@ -7,7 +7,7 @@ schema: 2.0.0 # BackupToAAD-BitLockerKeyProtector ## SYNOPSIS -Saves a key protector for a BitLocker volume in Azure Active Directory. +Saves a key protector for a BitLocker volume in Microsoft Entra ID. ## SYNTAX @@ -17,7 +17,7 @@ BackupToAAD-BitLockerKeyProtector [-MountPoint] [-KeyProtectorId] BackupToAAD-BitLockerKeyProtector -MountPoint "C:" -KeyProtectorId "{E2611001E-6AD0-4A08-BAAA-C9c031DB2AA6}" ``` -This command saves a key protector for a specified BitLocker volume to Azure AD. The command specifies the key protector by using its ID. +This command saves a key protector for a specified BitLocker volume to Microsoft Entra ID. The command specifies the key protector by using its ID. ## PARAMETERS diff --git a/docset/winserver2022-ps/bitlocker/BitLocker.md b/docset/winserver2022-ps/bitlocker/BitLocker.md index 01d4143e1b..4c22b27630 100644 --- a/docset/winserver2022-ps/bitlocker/BitLocker.md +++ b/docset/winserver2022-ps/bitlocker/BitLocker.md @@ -18,7 +18,7 @@ This reference provides cmdlet descriptions and syntax for all BitLocker cmdlets Adds a key protector for a BitLocker volume. ### [BackupToAAD-BitLockerKeyProtector](./BackupToAAD-BitLockerKeyProtector.md) -Saves a key protector for a BitLocker volume in AAD. +Saves a key protector for a BitLocker volume in Microsoft Entra ID. ### [Backup-BitLockerKeyProtector](./Backup-BitLockerKeyProtector.md) Saves a key protector for a BitLocker volume in AD DS. diff --git a/docset/winserver2022-ps/defender/Set-MpPreference.md b/docset/winserver2022-ps/defender/Set-MpPreference.md index 052c3a5f05..26c5c9b90f 100644 --- a/docset/winserver2022-ps/defender/Set-MpPreference.md +++ b/docset/winserver2022-ps/defender/Set-MpPreference.md @@ -19,6 +19,7 @@ Configures preferences for Windows Defender scans and updates. ```powershell Set-MpPreference [-ExclusionPath ] [-ExclusionExtension ] [-ExclusionProcess ] [-ExclusionIpAddress ] [-RealTimeScanDirection ] + [-IntelTDTEnabled ] [-QuarantinePurgeItemsAfterDelay ] [-RemediationScheduleDay ] [-RemediationScheduleTime ] [-ReportingAdditionalActionTimeOut ] [-ReportingCriticalFailureTimeOut ] [-ReportingNonCriticalTimeOut ] @@ -37,7 +38,7 @@ Set-MpPreference [-ExclusionPath ] [-ExclusionExtension ] [- [-MAPSReporting ] [-SubmitSamplesConsent ] [-DisableAutoExclusions ] [-DisablePrivacyMode ] [-RandomizeScheduleTaskTimes ] [-SchedulerRandomizationTime ] [-DisableBehaviorMonitoring ] - [-DisableRealtimeMonitoring ] [-DisableScriptScanning ] [-DisableArchiveScanning ] + [-DisableRealtimeMonitoring ] [-DisableScriptScanning ] [-DisableArchiveScanning ] [-DisableCacheMaintenance ] [-DisableCatchupFullScan ] [-DisableCatchupQuickScan ] [-DisableEmailScanning ] [-DisableRemovableDriveScanning ] [-DisableRestorePoint ] [-DisableScanningMappedNetworkDrivesForFullScan ] [-DisableScanningNetworkFiles ] @@ -57,7 +58,9 @@ Set-MpPreference [-ExclusionPath ] [-ExclusionExtension ] [- [-ProxyServer ] [-ProxyBypass ] [-ForceUseProxyOnly ] [-OobeEnableRtpAndSigUpdate ] [-DisableTlsParsing ] [-DisableHttpParsing ] [-DisableDnsParsing ] + [-DisableFtpParsing ] [-DisableSmtpParsing ] [-DisableDnsOverTcpParsing ] [-DisableSshParsing ] + [-DisableNetworkProtectionPerfTelemetry ] [-PlatformUpdatesChannel ] [-EngineUpdatesChannel ] [-SignaturesUpdatesChannel ] [-DisableGradualRelease ] [-AllowNetworkProtectionDownLevel ] [-AllowDatagramProcessingOnWinServer ] @@ -398,6 +401,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -DisableCacheMaintenance +Defines whether the cache maintenance idle task will perform the cache maintenance or not. Allowed values are 1 - cache maintenance is disabled, and 0 - cache maintenance is enabled (default). + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: dcm + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisableCatchupFullScan Indicates whether Windows Defender runs catch-up scans for scheduled full scans. A computer can miss a scheduled scan, usually because the computer is turned off at the scheduled time. @@ -410,7 +428,7 @@ Aliases: dcfsc Required: False Position: Named -Default value: True +Default value: 0 Accept pipeline input: False Accept wildcard characters: False ``` @@ -492,6 +510,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -DisableFtpParsing +Specifies whether to disable FTP parsing for network protection. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: dfp + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisableEmailScanning Indicates whether Windows Defender parses the mailbox and mail files, according to their specific format, in order to analyze mail bodies and attachments. Windows Defender supports several formats, including .pst, .dbx, .mbx, .mime, and .binhex. @@ -582,6 +615,24 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -DisableNetworkProtectionPerfTelemetry +This setting disables the gathering and sending of performance telemetry from network protection. +The accepted values are 0 and 1. +- 1- Network protection telemetry is disabled. +- 0 (Default) - Network protection telemetry is enabled. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: dnpp + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisablePrivacyMode **This is a legacy setting that does not have any affect on current platforms**. The intent of this parameter was to disable privacy mode, which prevented users, other than administrators, from displaying threat history. When this parameter was in use, if you specified a value of $False or did not specify a value, privacy mode was enabled. @@ -723,6 +774,24 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -DisableSmtpParsing +This setting disables SMTP parsing for network protection. +The accepted values are 0 and 1. +- 1 - SMTP parsing is disabled. +- 0 (Default) - SMTP parsing is enabled. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: dsp + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisableTlsParsing Specifies whether to disable inspection of TLS traffic. Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, network protection inspects TLS traffic. @@ -971,6 +1040,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -IntelTDTEnabled +This policy setting configures the Intel TDT integration level for Intel TDT-capable devices. +The acceptable values for this parameter are: +- 0 (Default) - If you don't configure this setting, the default value will be applied. The default value is controlled by Microsoft security intelligence updates. Microsoft will enable Intel TDT if there is a known threat. +- 1 - If you configure this setting to enabled, Intel TDT integration will turn on. +- 2 - If you configure this setting to disabled, Intel TDT integration will turn off. + +```yaml +Type: UInt32 +Parameter Sets: (All) +Aliases: itdte +Accepted values: 0,1 and 2 + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -LowThreatDefaultAction Specifies which automatic remediation action to take for a low level threat. The acceptable values for this parameter are: @@ -1853,6 +1942,25 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ThrottleForScheduledScanOnly +A CPU usage limit can be applied to scheduled scans only, or to scheduled and custom scans. The default value applies a CPU usage limit to scheduled scans only. +The acceptable values for this parameter are: +- 1 (Default) - If you enable this setting, CPU throttling will apply only to scheduled scans. +- 0 - If you disable this setting, CPU throttling will apply to scheduled and custom scans. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: 1 +Accept pipeline input: False +Accept wildcard characters: False +``` + + ### -UILockdown Indicates whether to disable UI lockdown mode. If you specify a value of $True, Windows Defender disables UI lockdown mode. diff --git a/docset/winserver2022-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md b/docset/winserver2022-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md index baf86f8530..56135ee6b2 100644 --- a/docset/winserver2022-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md +++ b/docset/winserver2022-ps/dhcpserver/Add-DhcpServerv4OptionDefinition.md @@ -249,7 +249,7 @@ The acceptable values for this parameter are: Type: String Parameter Sets: (All) Aliases: -Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, String, BinaryData, EncapsulatedData +Accepted values: Byte, Word, DWord, DWordDWord, IPv4Address, IPv6Address, String, BinaryData, EncapsulatedData Required: True Position: 3 diff --git a/docset/winserver2022-ps/grouppolicy/Get-GPResultantSetOfPolicy.md b/docset/winserver2022-ps/grouppolicy/Get-GPResultantSetOfPolicy.md index a55135575c..8785cc04de 100644 --- a/docset/winserver2022-ps/grouppolicy/Get-GPResultantSetOfPolicy.md +++ b/docset/winserver2022-ps/grouppolicy/Get-GPResultantSetOfPolicy.md @@ -48,7 +48,7 @@ report is generated in XML format, and is written to the specified file. ### Example 2: Generate a report for the specified computer ```powershell -@params = @{ +$params = @{ ReportType = 'Xml' Path = 'c:\reports\computer-08.xml' Computer = 'computer-08.contso.com' @@ -71,9 +71,9 @@ and is written to the specified file. ### Example 3: Generate a report for the specified user in HTML format and save it to the specified file ```powershell -@params = @{ +$params = @{ ReportType = 'HTML' - Path = 'c:\reports\UserReport.xml' + Path = 'c:\reports\UserReport.html' User = 'Contoso\PattiFul' } Get-GPResultantSetOfPolicy @params @@ -93,7 +93,7 @@ it to the specified file. ### Example 4: Generate a report for the specified computer and user in HTML format and save it to the specified file ```powershell -@params = @{ +$params = @{ ReportType = 'HTML' Path = 'c:\reports\UserAndComputerReport.xml' User = 'SomeUser' diff --git a/docset/winserver2022-ps/languagepackmanagement/Get-SystemPreferredUILanguage.md b/docset/winserver2022-ps/languagepackmanagement/Get-SystemPreferredUILanguage.md index 9020ba0b24..a92e5d9d86 100644 --- a/docset/winserver2022-ps/languagepackmanagement/Get-SystemPreferredUILanguage.md +++ b/docset/winserver2022-ps/languagepackmanagement/Get-SystemPreferredUILanguage.md @@ -2,7 +2,7 @@ description: The Get-SystemPreferredUILanguage cmdlet lets you see which language is set as the System Preferred UI Language in a running Windows installation external help file: Microsoft.LanguagePackManagement.Powershell.Commands.dll-Help.xml Module Name: LanguagePackManagement -ms.date: 08/15/2022 +ms.date: 06/21/2023 online version: https://learn.microsoft.com/powershell/module/languagepackmanagement/get-systempreferreduilanguage?view=windowsserver2022-ps schema: 2.0.0 title: Get-SystemPreferredUILanguage @@ -28,7 +28,7 @@ Returns the language that is set as the System Preferred Language ### Example 1 ```powershell -Get-SystemPrefferedUILanguage +Get-SystemPreferredUILanguage ``` This command returns the language that's currently set as the System Preferred UI Language diff --git a/docset/winserver2022-ps/laps/Get-LapsAADPassword.md b/docset/winserver2022-ps/laps/Get-LapsAADPassword.md index dbe3857fd4..14d94a73ee 100644 --- a/docset/winserver2022-ps/laps/Get-LapsAADPassword.md +++ b/docset/winserver2022-ps/laps/Get-LapsAADPassword.md @@ -1,5 +1,5 @@ --- -description: Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Azure AD device. +description: Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Microsoft Entra device. external help file: LAPS-help.xml Module Name: LAPS online version: https://learn.microsoft.com/powershell/module/laps/get-lapsaadpassword?view=windowsserver2022-ps&wt.mc_id=ps-gethelp @@ -12,8 +12,8 @@ title: Get-LapsAADPassword # Get-LapsAADPassword ## SYNOPSIS -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ## SYNTAX @@ -25,7 +25,7 @@ Get-LapsAADPassword -DeviceIds [-IncludePasswords] [-IncludeHistory] ## DESCRIPTION The `Get-LapsAADPassword` cmdlet allows administrators to retrieve LAPS passwords and password -history for an AAD-joined device. This is implemented by sending queries to Microsoft Graph over the +history for a Microsoft Entra joined device. This is implemented by sending queries to Microsoft Graph over the deviceLocalCredentials collection. The `Get-LapsAADPassword` cmdlet supports two basic modes when querying LAPS passwords: @@ -51,9 +51,9 @@ device, the `DeviceManagementManagedDevices.Read.All` permission may also be req > [!IMPORTANT] > The `Get-LapsAADPassword` cmdlet is implemented as a wrapper around the Microsoft Graph PowerShell > library, which must be manually installed on the device before `Get-LapsAADPassword` can work. -> Additional configuration steps are required in your AAD tenant to enable authentication to +> Additional configuration steps are required in your Microsoft Entra tenant to enable authentication to > Microsoft Graph and to grant the necessary Microsoft Graph permissions. For more information, see -> [Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) +> [Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) The **Verbose** parameter may be used to get additional information about the cmdlet's operation. @@ -240,4 +240,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Windows LAPS Overview](https://go.microsoft.com/fwlink/?linkid=2233901) -[Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) \ No newline at end of file +[Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) diff --git a/docset/winserver2022-ps/laps/LAPS.md b/docset/winserver2022-ps/laps/LAPS.md index 84b98e43a0..74eec7556e 100644 --- a/docset/winserver2022-ps/laps/LAPS.md +++ b/docset/winserver2022-ps/laps/LAPS.md @@ -25,8 +25,8 @@ Local Administrator Password Solution (LAPS) password attributes. ### [Get-LapsAADPassword](Get-LapsAADPassword.md) -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ### [Get-LapsADPassword](Get-LapsADPassword.md) diff --git a/docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md index e8a1313df7..b432ebd528 100644 --- a/docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [-WhatIf] [-Confirm] [ Rename-NetAdapter -Name "E*t" -NewName "ManagementAdapter" ``` -This command renames a network adapter from the current name, by matching the pattern e*t, to the new name ManagementAdapter. -A typical match of e*t is the default name Ethernet. +This command renames a network adapter from the current name, by matching the pattern e\*t, to the new name ManagementAdapter. +A typical match of e\*t is the default name Ethernet. ## PARAMETERS diff --git a/docset/winserver2022-ps/netqos/New-NetQosPolicy.md b/docset/winserver2022-ps/netqos/New-NetQosPolicy.md index 30d124734c..d5dfd20081 100644 --- a/docset/winserver2022-ps/netqos/New-NetQosPolicy.md +++ b/docset/winserver2022-ps/netqos/New-NetQosPolicy.md @@ -262,7 +262,7 @@ Accept wildcard characters: False ``` ### -Cluster -Specifies the Microsoft cluster service, which uses the default SQL server TCP/UDP port 3343. +Specifies the Microsoft Windows Cluster service, which uses the Cluster network driver TCP/UDP port 3343. ```yaml Type: SwitchParameter diff --git a/docset/winserver2022-ps/smbshare/New-SmbGlobalMapping.md b/docset/winserver2022-ps/smbshare/New-SmbGlobalMapping.md index 9f3fdf6993..197fc75ea0 100644 --- a/docset/winserver2022-ps/smbshare/New-SmbGlobalMapping.md +++ b/docset/winserver2022-ps/smbshare/New-SmbGlobalMapping.md @@ -29,7 +29,8 @@ The **New-SmbGlobalMapping** cmdlet creates an SMB global mapping on the SMB cli ### Example 1 ```powershell -$creds = Get-Credential New-SmbGlobalMapping -RemotePath \\fs1.contoso.com\public -Credential $creds -LocalPath G: +$creds = Get-Credential +New-SmbGlobalMapping -RemotePath \\fs1.contoso.com\public -Credential $creds -LocalPath G: ``` ```output diff --git a/docset/winserver2022-ps/windowssearch/Set-WindowsSearchSetting.md b/docset/winserver2022-ps/windowssearch/Set-WindowsSearchSetting.md index 85de5df5db..60d30e5a48 100644 --- a/docset/winserver2022-ps/windowssearch/Set-WindowsSearchSetting.md +++ b/docset/winserver2022-ps/windowssearch/Set-WindowsSearchSetting.md @@ -33,7 +33,7 @@ You can also specify SafeSearch settings. PS C:\> Set-WindowsSearchSetting -SearchExperienceSetting "Personalized" ``` -This command allows Windows Search to use search history, but not specific location of the user, to personalize results. +This command allows Windows Search to use search history, but not the specific location of the user, to personalize results. ### Example 2: Modify Windows Search settings ``` @@ -41,9 +41,16 @@ PS C:\> Set-WindowsSearchSetting -EnableWebResultsSetting $True -SafeSearchSetti ``` This command modifies Windows Search settings. -The command enables the use of search history and specific location of the user by specifying a value of PersonalizedAndLocation for the *SearchExperienceSetting* parameter. +The command enables the use of search history and the specific location of the user by specifying a value of PersonalizedAndLocation for the *SearchExperienceSetting* parameter. The command enables web results and sets SafeSearch to a value of Strict. +### Example 3: Enable metered web search +``` +PS C:\> Set-WindowsSearchSetting -EnableMeteredWebResultsSetting $True +``` + +This command enables Windows Search to display web results and suggestions while using metered connections. + ## PARAMETERS ### -EnableMeteredWebResultsSetting diff --git a/docset/winserver2022-ps/windowsupdate/Get-WindowsUpdateLog.md b/docset/winserver2022-ps/windowsupdate/Get-WindowsUpdateLog.md index 8f9e914656..87dbb167c3 100644 --- a/docset/winserver2022-ps/windowsupdate/Get-WindowsUpdateLog.md +++ b/docset/winserver2022-ps/windowsupdate/Get-WindowsUpdateLog.md @@ -1,8 +1,8 @@ --- -description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. +description: Use this article to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: WindowsUpdateLog.psm1-help.xml Module Name: WindowsUpdate -ms.date: 12/20/2016 +ms.date: 10/31/2023 online version: https://learn.microsoft.com/powershell/module/windowsupdate/get-windowsupdatelog?view=windowsserver2022-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Get-WindowsUpdateLog @@ -16,21 +16,28 @@ Merges Windows Update `.etl` files into a single log file. ## SYNTAX +### ParameterSetDefault ``` Get-WindowsUpdateLog [[-ETLPath] ] [[-LogPath] ] [-ProcessingType ] [-ForceFlush] [-WhatIf] [-Confirm] [] ``` + +### ParameterSetIncludeAllLogs +``` +Get-WindowsUpdateLog [-IncludeAllLogs] [] +``` + ## DESCRIPTION The `Get-WindowsUpdateLog` cmdlet merges and converts Windows Update `.etl` files into a single readable `WindowsUpdate.log` file. Windows Update Agent uses Event Tracing for Windows (ETW) to generate diagnostic logs. Windows Update no longer directly produces a `WindowsUpdate.log` file. -Instead, it produces `.etl` files that are not immediately readable as written. +Instead, it produces `.etl` files that aren't immediately readable as written. For Windows 10 versions prior to 1709 (OS Build 16299), this cmdlet requires access to a Microsoft symbol server, and log decoding must be run from a Windows 10 version earlier than 1709. Logs from -Windows 10, version 1709 onward do not require a Microsoft symbol server, and need to be decoded +Windows 10, version 1709 onward don't require a Microsoft symbol server, and need to be decoded from Windows 10, versions 1709 or higher. ## EXAMPLES @@ -90,7 +97,7 @@ Prompts you for confirmation before running the cmdlet. ```yaml Type: SwitchParameter -Parameter Sets: (All) +Parameter Sets: Default Aliases: cf Required: False @@ -112,7 +119,7 @@ The acceptable values for this parameter are: ```yaml Type: String[] -Parameter Sets: (All) +Parameter Sets: Default Aliases: PsPath Required: False @@ -131,7 +138,7 @@ PowerShell with administrative credentials by using the Run as administrator com ```yaml Type: SwitchParameter -Parameter Sets: (All) +Parameter Sets: Default Aliases: Required: False @@ -141,6 +148,24 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -IncludeAllLogs + +Decodes all update-related logs: Windows Update, Update Session Orchestrator (USO), and the update user interface (UX). This parameter is mutually exclusive of all other parameters of this cmdlet. Specifying this parameter uses defaults for all other parameters. This parameter causes a folder to be created on the desktop and readable WindowsUpdate.log, USO.log, and UX.log files are written to it. + + +```yaml +Type: SwitchParameter +Parameter Sets: IncludeAllLogs +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + + ### -LogPath Specifies the full path to which `Get-WindowsUpdateLog` writes `WindowsUpdate.log`. @@ -148,7 +173,7 @@ The default value is `WindowsUpdate.log` in the Desktop folder of the current us ```yaml Type: String -Parameter Sets: (All) +Parameter Sets: Default Aliases: Required: False @@ -171,7 +196,7 @@ The temporary files are in `$env:TEMP\WindowsUpdateLog`. ```yaml Type: String -Parameter Sets: (All) +Parameter Sets: Default Aliases: Accepted values: CSV, XML @@ -185,11 +210,11 @@ Accept wildcard characters: False ### -WhatIf Shows what would happen if the cmdlet runs. -The cmdlet is not run. +The cmdlet isn't run. ```yaml Type: SwitchParameter -Parameter Sets: (All) +Parameter Sets: Default Aliases: wi Required: False