Skip to content

Commit 8ebeadf

Browse files
authored
Merge branch 'master' into patricka-assignedaccess
2 parents 71eac63 + f87333c commit 8ebeadf

File tree

365 files changed

+11037
-1478
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

365 files changed

+11037
-1478
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5354,6 +5354,11 @@
53545354
"source_path": "docset/winserver2022-ps/WindowsUpdate/WindowsUpdate.md",
53555355
"redirect_url": "/powershell/module/windowsupdate/WindowsUpdate.md?view=windowsserver2022-ps",
53565356
"redirect_document_id": false
5357+
},
5358+
{
5359+
"source_path": "docset/winserver2022-ps/EventTracingManagement/Set-AutologgerConfig.md",
5360+
"redirect_url": "/powershell/module/eventtracingmanagement/Update-AutologgerConfig.md?view=windowsserver2022-ps",
5361+
"redirect_document_id": false
53575362
}
53585363
]
53595364
}

docset/winserver2012r2-ps/nettcpip/Set-NetIPv4Protocol.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ This command enables the DHCP Media Sense event log.
4343
PS C:\>Set-NetIPv4Protocol -NeighborCacheLimitEntries 1000
4444
```
4545

46-
This command increases the size of the cache of on-link neighbors on the subnet to 1,000.
46+
This command increases the size of the cache of on-link neighbors on the subnet that are no longer referenced to 1,000.
4747
The default value is 256.
4848

4949
## PARAMETERS
@@ -330,7 +330,7 @@ Accept wildcard characters: False
330330
```
331331
332332
### -NeighborCacheLimitEntries
333-
Specifies the maximum number of neighbor cache entries.
333+
Specifies the maximum number of entries in the neighbor cache, which consists of all dynamic neighbors no longer referenced.
334334
The cmdlet modifies the value for this setting.
335335
336336
The default value is 256.

docset/winserver2012r2-ps/nettcpip/Set-NetIPv6Protocol.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This command enables the DHCP Media Sense event log.
4545
PS C:\>Set-NetIPv6Protocol -NeighborCacheLimitEntries 1000
4646
```
4747

48-
This command increases the size of the cache of on-link neighbors on the subnet to 1,000.
48+
This command increases the size of the cache of on-link neighbors on the subnet that are no longer referenced to 1,000.
4949
The default value is 256.
5050

5151
## PARAMETERS
@@ -398,7 +398,7 @@ Accept wildcard characters: False
398398
```
399399

400400
### -NeighborCacheLimitEntries
401-
Specifies the maximum number of neighbor cache entries.
401+
Specifies the maximum number of entries in the neighbor cache, which consists of all dynamic neighbors no longer referenced.
402402
The cmdlet modifies the value for this setting.
403403

404404
The default value is 256.

docset/winserver2012r2-ps/wsscmdlets/Set-HostedEmailAccount.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,10 @@ A hosted email service provides a hosted email account.
2626

2727
### Example 1: Assign a hosted email account to a local user account
2828
```
29-
PS C:\> Set-HostedEmailAccount -LocalAccountName "PattiFuller" -EmailAccount "PattiFuller@Constoso.com"
29+
PS C:\> Set-HostedEmailAccount -LocalAccountName "PattiFuller" -EmailAccount "PattiFuller@Contoso.com"
3030
```
3131

32-
This command assigns the hosted email account named PattiFuller@Constoso.com to the local user account named PattiFuller.
32+
This command assigns the hosted email account named PattiFuller@Contoso.com to the local user account named PattiFuller.
3333

3434
## PARAMETERS
3535

docset/winserver2016-ps/nettcpip/Set-NetIPv4Protocol.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ This command enables the DHCP Media Sense event log.
4444
PS C:\>Set-NetIPv4Protocol -NeighborCacheLimitEntries 1000
4545
```
4646

47-
This command increases the size of the cache of on-link neighbors on the subnet to 1,000.
47+
This command increases the size of the cache of on-link neighbors on the subnet that are no longer referenced to 1,000.
4848
The default value is 256.
4949

5050
## PARAMETERS
@@ -349,7 +349,7 @@ Accept wildcard characters: False
349349
```
350350
351351
### -NeighborCacheLimitEntries
352-
Specifies the maximum number of neighbor cache entries.
352+
Specifies the maximum number of entries in the neighbor cache, which consists of all dynamic neighbors no longer referenced.
353353
The cmdlet modifies the value for this setting.
354354
355355
The default value is 256.

docset/winserver2016-ps/nettcpip/Set-NetIPv6Protocol.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ This command enables the DHCP Media Sense event log.
4747
PS C:\>Set-NetIPv6Protocol -NeighborCacheLimitEntries 1000
4848
```
4949

50-
This command increases the size of the cache of on-link neighbors on the subnet to 1,000.
50+
This command increases the size of the cache of on-link neighbors on the subnet that are no longer referenced to 1,000.
5151
The default value is 256.
5252

5353
## PARAMETERS
@@ -396,7 +396,7 @@ Accept wildcard characters: False
396396
```
397397
398398
### -NeighborCacheLimitEntries
399-
Specifies the maximum number of neighbor cache entries.
399+
Specifies the maximum number of entries in the neighbor cache, which consists of all dynamic neighbors no longer referenced.
400400
The cmdlet modifies the value for this setting.
401401
402402
The default value is 256.

docset/winserver2016-ps/provisioning/Install-TrustedProvisioningCertificate.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ title: Install-TrustedProvisioningCertificate
1111
# Install-TrustedProvisioningCertificate
1212

1313
## SYNOPSIS
14-
{{Fill in the Synopsis}}
14+
Adds a certificate to the Trusted Certificate Store.
1515

1616
## SYNTAX
1717

@@ -21,16 +21,16 @@ Install-TrustedProvisioningCertificate [-CertificatePath] <String> [-ForceInstal
2121
```
2222

2323
## DESCRIPTION
24-
{{Fill in the Description}}
24+
Installs the specified certificate to the Trusted Certificate Store.
2525

2626
## EXAMPLES
2727

28-
### Example 1
29-
```
30-
PS C:\> {{ Add example code here }}
28+
### Example 1: Install Trusted Provisioning Certificate
29+
```powershell
30+
PS C:\> Install-TrustedProvisioningCertificate -CertificatePath trustedCert.cer
3131
```
3232

33-
{{ Add example description here }}
33+
Installs the specified certificate as a trusted provisioning certificate.
3434

3535
## PARAMETERS
3636

@@ -50,7 +50,7 @@ Accept wildcard characters: False
5050
```
5151
5252
### -ConnectedDevice
53-
{{Fill ConnectedDevice Description}}
53+
If enabled, specifies that the device type is mobile.
5454
5555
```yaml
5656
Type: SwitchParameter
@@ -65,7 +65,7 @@ Accept wildcard characters: False
6565
```
6666
6767
### -ForceInstall
68-
{{Fill ForceInstall Description}}
68+
Specifies whether, if the certificate already exists, it will be overwritten.
6969
7070
```yaml
7171
Type: SwitchParameter
@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
```
8181
8282
### -LogsDirectoryPath
83-
{{Fill LogsDirectoryPath Description}}
83+
Specifies the logs directory path.
8484
8585
```yaml
8686
Type: String
@@ -95,7 +95,7 @@ Accept wildcard characters: False
9595
```
9696
9797
### -WprpFile
98-
{{Fill WprpFile Description}}
98+
Specifies the location of the WPR profile file.
9999
100100
```yaml
101101
Type: String

docset/winserver2016-ps/provisioning/Uninstall-TrustedProvisioningCertificate.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ title: Uninstall-TrustedProvisioningCertificate
1111
# Uninstall-TrustedProvisioningCertificate
1212

1313
## SYNOPSIS
14-
{{Fill in the Synopsis}}
14+
Removes a previously installed provisioning certificate.
1515

1616
## SYNTAX
1717

@@ -21,21 +21,21 @@ Uninstall-TrustedProvisioningCertificate [-Thumbprint] <String> [-LogsDirectoryP
2121
```
2222

2323
## DESCRIPTION
24-
{{Fill in the Description}}
24+
Removes a previously installed provisioning certificate.
2525

2626
## EXAMPLES
2727

28-
### Example 1
29-
```
30-
PS C:\> {{ Add example code here }}
28+
### Example 1: Uninstall a trusted provisioning certificate
29+
```powershell
30+
PS C:\> Uninstall-TrustedProvisioningCertificate -Thumbprint ‎fedd995b45e633d4ef30fcbc8f3a48b627e9a28b
3131
```
3232

33-
{{ Add example description here }}
33+
Uninstall a trusted provisioning certificate with the specified thumbprint.
3434

3535
## PARAMETERS
3636

3737
### -ConnectedDevice
38-
{{Fill ConnectedDevice Description}}
38+
If enabled, specifies that the device type is mobile.
3939

4040
```yaml
4141
Type: SwitchParameter
@@ -50,7 +50,7 @@ Accept wildcard characters: False
5050
```
5151
5252
### -LogsDirectoryPath
53-
{{Fill LogsDirectoryPath Description}}
53+
Specifies the logs directory path.
5454
5555
```yaml
5656
Type: String
@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
```
8181
8282
### -WprpFile
83-
{{Fill WprpFile Description}}
83+
Specifies the location of the WPR profile file.
8484
8585
```yaml
8686
Type: String

docset/winserver2019-ps/defender/Set-MpPreference.md

Lines changed: 50 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: MSFT_MpPreference.cdxml-help.xml
44
Module Name: Defender
5-
ms.date: 06/23/2021
5+
ms.date: 11/04/2021
66
online version: https://docs.microsoft.com/powershell/module/defender/set-mppreference?view=windowsserver2019-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Set-MpPreference
@@ -41,7 +41,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
4141
[-LowThreatDefaultAction <ThreatAction>] [-ModerateThreatDefaultAction <ThreatAction>]
4242
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
4343
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
44-
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-SignaturesUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>]
44+
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>][-CloudBlockLevel <CloudBlockLevelType>]
4545
```
4646

4747
## DESCRIPTION
@@ -138,6 +138,48 @@ Accept pipeline input: False
138138
Accept wildcard characters: False
139139
```
140140
141+
### -CloudBlockLevel
142+
Configure this policy to specify the level of cloud protection to your endpoint.
143+
144+
Default (0): provides strong detection without increasing risk of detecting legitamate files
145+
Moderate (1): provides moderate detection only for high confidence detections
146+
High (2): applies a strong level of detection while optimizing client performance
147+
HighPlus (4): applies extra protection measures (might affect client peformance and increase your chance of false positives)
148+
ZeroTolerance (6): blocks all unknown executables
149+
150+
```yaml
151+
Type: CloudBlockLevelType
152+
Accepted values: Default|Moderate|High|HighPlus|ZeroTolerance
153+
Position: Named
154+
Default value: None
155+
Accept pipeline input: False
156+
Accept wildcard characters: False
157+
```
158+
159+
160+
### -DefinitionUpdatesChannel
161+
Enable this policy to specify when devices receive daily Microsoft Defender security intelligence (definition/signature) updates during the daily gradual rollout.
162+
163+
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
164+
165+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
166+
167+
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
168+
169+
Supported OS versions: Windows 10
170+
171+
Note: This policy is available starting with platform version 4.18.2106.5 and later
172+
173+
```yaml
174+
Type: UpdatesChannelType
175+
Aliases: suc
176+
Accepted values: Staged|Broad|Not Configured
177+
Position: Named
178+
Default value: None
179+
Accept pipeline input: False
180+
Accept wildcard characters: False
181+
```
182+
141183
### -DisableArchiveScanning
142184
Indicates whether to scan archive files, such as .zip and .cab files, for malicious and unwanted software.
143185
If you specify a value of $False or do not specify a value, Windows Defender scans archive files.
@@ -446,6 +488,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad
446488
447489
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
448490
491+
Critical- Time Delay: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only.
492+
449493
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
450494
451495
Supported OS versions: Windows 10
@@ -454,7 +498,7 @@ Note: This policy is available starting with platform version 4.18.2106.5 and la
454498
```yaml
455499
Type: UpdatesChannelType
456500
Aliases: euc
457-
Accepted values:Beta|Preview|Staged|Broad|NotConfigured
501+
Accepted values:Beta|Preview|Staged|Broad|Delayed|NotConfigured
458502
Position: Named
459503
Default value: None
460504
Accept pipeline input: False
@@ -648,6 +692,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad
648692
649693
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
650694
695+
Critical- Time Delay: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only.
696+
651697
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
652698
653699
Supported OS versions: Windows 10
@@ -657,7 +703,7 @@ Note: This policy is available starting with platform version 4.18.2106.5 and la
657703
```yaml
658704
Type: UpdatesChannelType
659705
Aliases: puc
660-
Accepted values: Beta|Preview|Staged|Broad|NotConfigured
706+
Accepted values: Beta|Preview|Staged|Broad|Delayed|NotConfigured
661707
Position: Named
662708
Default value: None
663709
Accept pipeline input: False
@@ -1143,28 +1189,6 @@ Accept pipeline input: False
11431189
Accept wildcard characters: False
11441190
```
11451191
1146-
### -SignaturesUpdatesChannel
1147-
Enable this policy to specify when devices receive daily Microsoft Defender definition updates during the daily gradual rollout.
1148-
1149-
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
1150-
1151-
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
1152-
1153-
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
1154-
1155-
Supported OS versions: Windows 10
1156-
1157-
Note: This policy is available starting with platform version 4.18.2106.5 and later
1158-
1159-
```yaml
1160-
Type: UpdatesChannelType
1161-
Aliases: suc
1162-
Accepted values: Staged|Broad|Not Configured
1163-
Position: Named
1164-
Default value: None
1165-
Accept pipeline input: False
1166-
Accept wildcard characters: False
1167-
```
11681192
11691193
### -SignatureUpdateInterval
11701194
Specifies the interval, in hours, at which to check for definition updates.

docset/winserver2019-ps/nettcpip/Set-NetIPv4Protocol.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ This command enables the DHCP Media Sense event log.
4444
PS C:\>Set-NetIPv4Protocol -NeighborCacheLimitEntries 1000
4545
```
4646

47-
This command increases the size of the cache of on-link neighbors on the subnet to 1,000.
47+
This command increases the size of the cache of on-link neighbors on the subnet that are no longer referenced to 1,000.
4848
The default value is 256.
4949

5050
## PARAMETERS
@@ -349,7 +349,7 @@ Accept wildcard characters: False
349349
```
350350
351351
### -NeighborCacheLimitEntries
352-
Specifies the maximum number of neighbor cache entries.
352+
Specifies the maximum number of entries in the neighbor cache, which consists of all dynamic neighbors no longer referenced.
353353
The cmdlet modifies the value for this setting.
354354
355355
The default value is 256.

0 commit comments

Comments
 (0)