Skip to content

Commit 8e44d9b

Browse files
authored
Merge branch 'main' into patch-170
2 parents 19140d6 + 1404de2 commit 8e44d9b

File tree

6 files changed

+61
-18
lines changed

6 files changed

+61
-18
lines changed

docset/docfx.json

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,10 @@
8585
"AngelaMotherofDragons",
8686
"dstrome",
8787
"v-dihans",
88-
"sdwheeler"
88+
"sdwheeler",
89+
"Stacyrch140",
90+
"v-stsavell",
91+
"American-Dipper"
8992
],
9093
"_op_documentIdPathDepotMapping": {
9194
"./": {

docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi
33
external help file: Microsoft.IdentityServer.Management.dll-Help.xml
44
Module Name: ADFS
55
ms.date: 12/20/2016
6-
ms.custom: has-azure-ad-ps-ref
6+
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
77
online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2016-ps&wt.mc_id=ps-gethelp
88
schema: 2.0.0
99
title: New-AdfsAzureMfaTenantCertificate
@@ -43,7 +43,7 @@ PS C:\> Set-AdfsAzureMfaTenant -TenantId <your tenant ID> -ClientId 981f26a1-7f4
4343
These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm.
4444

4545
> [!NOTE]
46-
> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0).
46+
> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module.
4747
4848
### Example 2: Determine which certificate Azure MFA is using
4949
```

docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi
33
external help file: Microsoft.IdentityServer.Management.dll-Help.xml
44
Module Name: ADFS
55
ms.date: 12/20/2016
6-
ms.custom: has-azure-ad-ps-ref
6+
ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done
77
online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2019-ps&wt.mc_id=ps-gethelp
88
schema: 2.0.0
99
title: New-AdfsAzureMfaTenantCertificate
@@ -43,7 +43,7 @@ PS C:\> Set-AdfsAzureMfaTenant -TenantId <your tenant ID> -ClientId 981f26a1-7f4
4343
These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm.
4444

4545
> [!NOTE]
46-
> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0).
46+
> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module.
4747
4848
### Example 2: Determine which certificate Azure MFA is using
4949
```

docset/winserver2022-ps/appx/Get-AppxPackageAutoUpdateSettings.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,14 @@ Get-AppxPackageAutoUpdateSettings -PackageFullName publisher.package1_1.0.0.0_ne
5454
This will return the Auto Update and Repair settings for a specific Windows App that has been
5555
installed and registered to the signed-in user.
5656

57+
### Example 4: Get App Package Auto Update settings for all installed Windows Apps
58+
59+
```powershell
60+
Get-AppxPackageAutoUpdateSettings -ShowUpdateAvailability
61+
```
62+
63+
Displays available update information for all installed Windows Apps.
64+
5765
## PARAMETERS
5866

5967
### -PackageFullName

docset/winserver2022-ps/windowssearch/Set-WindowsSearchSetting.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,17 +33,24 @@ You can also specify SafeSearch settings.
3333
PS C:\> Set-WindowsSearchSetting -SearchExperienceSetting "Personalized"
3434
```
3535

36-
This command allows Windows Search to use search history, but not specific location of the user, to personalize results.
36+
This command allows Windows Search to use search history, but not the specific location of the user, to personalize results.
3737

3838
### Example 2: Modify Windows Search settings
3939
```
4040
PS C:\> Set-WindowsSearchSetting -EnableWebResultsSetting $True -SafeSearchSetting "Strict" -SearchExperienceSetting "PersonalizedAndLocation"
4141
```
4242

4343
This command modifies Windows Search settings.
44-
The command enables the use of search history and specific location of the user by specifying a value of PersonalizedAndLocation for the *SearchExperienceSetting* parameter.
44+
The command enables the use of search history and the specific location of the user by specifying a value of PersonalizedAndLocation for the *SearchExperienceSetting* parameter.
4545
The command enables web results and sets SafeSearch to a value of Strict.
4646

47+
### Example 3: Enable metered web search
48+
```
49+
PS C:\> Set-WindowsSearchSetting -EnableMeteredWebResultsSetting $True
50+
```
51+
52+
This command enables Windows Search to display web results and suggestions while using metered connections.
53+
4754
## PARAMETERS
4855

4956
### -EnableMeteredWebResultsSetting

docset/winserver2022-ps/windowsupdate/Get-WindowsUpdateLog.md

Lines changed: 36 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
2-
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
2+
description: Use this article to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: WindowsUpdateLog.psm1-help.xml
44
Module Name: WindowsUpdate
5-
ms.date: 12/20/2016
5+
ms.date: 10/31/2023
66
online version: https://learn.microsoft.com/powershell/module/windowsupdate/get-windowsupdatelog?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Get-WindowsUpdateLog
@@ -16,21 +16,28 @@ Merges Windows Update `.etl` files into a single log file.
1616

1717
## SYNTAX
1818

19+
### ParameterSetDefault
1920
```
2021
Get-WindowsUpdateLog [[-ETLPath] <String[]>] [[-LogPath] <String>]
2122
[-ProcessingType <String>] [-ForceFlush] [-WhatIf] [-Confirm] [<CommonParameters>]
2223
```
2324

25+
26+
### ParameterSetIncludeAllLogs
27+
```
28+
Get-WindowsUpdateLog [-IncludeAllLogs] [<CommonParameters>]
29+
```
30+
2431
## DESCRIPTION
2532

2633
The `Get-WindowsUpdateLog` cmdlet merges and converts Windows Update `.etl` files into a single
2734
readable `WindowsUpdate.log` file. Windows Update Agent uses Event Tracing for Windows (ETW) to
2835
generate diagnostic logs. Windows Update no longer directly produces a `WindowsUpdate.log` file.
29-
Instead, it produces `.etl` files that are not immediately readable as written.
36+
Instead, it produces `.etl` files that aren't immediately readable as written.
3037

3138
For Windows 10 versions prior to 1709 (OS Build 16299), this cmdlet requires access to a Microsoft
3239
symbol server, and log decoding must be run from a Windows 10 version earlier than 1709. Logs from
33-
Windows 10, version 1709 onward do not require a Microsoft symbol server, and need to be decoded
40+
Windows 10, version 1709 onward don't require a Microsoft symbol server, and need to be decoded
3441
from Windows 10, versions 1709 or higher.
3542

3643
## EXAMPLES
@@ -90,7 +97,7 @@ Prompts you for confirmation before running the cmdlet.
9097

9198
```yaml
9299
Type: SwitchParameter
93-
Parameter Sets: (All)
100+
Parameter Sets: Default
94101
Aliases: cf
95102

96103
Required: False
@@ -112,7 +119,7 @@ The acceptable values for this parameter are:
112119

113120
```yaml
114121
Type: String[]
115-
Parameter Sets: (All)
122+
Parameter Sets: Default
116123
Aliases: PsPath
117124
118125
Required: False
@@ -131,7 +138,7 @@ PowerShell with administrative credentials by using the Run as administrator com
131138

132139
```yaml
133140
Type: SwitchParameter
134-
Parameter Sets: (All)
141+
Parameter Sets: Default
135142
Aliases:
136143
137144
Required: False
@@ -141,14 +148,32 @@ Accept pipeline input: False
141148
Accept wildcard characters: False
142149
```
143150

151+
### -IncludeAllLogs
152+
153+
Decodes all update-related logs: Windows Update, Update Session Orchestrator (USO), and the update user interface (UX). This parameter is mutually exclusive of all other parameters of this cmdlet. Specifying this parameter uses defaults for all other parameters. This parameter causes a folder to be created on the desktop and readable WindowsUpdate.log, USO.log, and UX.log files are written to it.
154+
155+
156+
```yaml
157+
Type: SwitchParameter
158+
Parameter Sets: IncludeAllLogs
159+
Aliases:
160+
161+
Required: False
162+
Position: Named
163+
Default value: None
164+
Accept pipeline input: False
165+
Accept wildcard characters: False
166+
```
167+
168+
144169
### -LogPath
145170

146171
Specifies the full path to which `Get-WindowsUpdateLog` writes `WindowsUpdate.log`.
147172
The default value is `WindowsUpdate.log` in the Desktop folder of the current user.
148173

149174
```yaml
150175
Type: String
151-
Parameter Sets: (All)
176+
Parameter Sets: Default
152177
Aliases:
153178
154179
Required: False
@@ -171,7 +196,7 @@ The temporary files are in `$env:TEMP\WindowsUpdateLog`.
171196

172197
```yaml
173198
Type: String
174-
Parameter Sets: (All)
199+
Parameter Sets: Default
175200
Aliases:
176201
Accepted values: CSV, XML
177202
@@ -185,11 +210,11 @@ Accept wildcard characters: False
185210
### -WhatIf
186211

187212
Shows what would happen if the cmdlet runs.
188-
The cmdlet is not run.
213+
The cmdlet isn't run.
189214

190215
```yaml
191216
Type: SwitchParameter
192-
Parameter Sets: (All)
217+
Parameter Sets: Default
193218
Aliases: wi
194219
195220
Required: False

0 commit comments

Comments
 (0)