Skip to content

Commit bbbdbca

Browse files
authored
Merge branch 'master' into patch-1
2 parents 490ab05 + 4d57076 commit bbbdbca

File tree

692 files changed

+20401
-3625
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

692 files changed

+20401
-3625
lines changed

.openpublishing.redirection.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5354,6 +5354,56 @@
53545354
"source_path": "docset/winserver2022-ps/WindowsUpdate/WindowsUpdate.md",
53555355
"redirect_url": "/powershell/module/windowsupdate/WindowsUpdate.md?view=windowsserver2022-ps",
53565356
"redirect_document_id": false
5357+
},
5358+
{
5359+
"source_path": "docset/winserver2022-ps/EventTracingManagement/Set-AutologgerConfig.md",
5360+
"redirect_url": "/powershell/module/eventtracingmanagement/Update-AutologgerConfig.md?view=windowsserver2022-ps",
5361+
"redirect_document_id": false
5362+
},
5363+
{
5364+
"source_path": "docset/winserver2016-ps/provisioning/Export-ProvisioningPackage.md",
5365+
"redirect_url": "/powershell/module/provisioning/Export-ProvisioningPackage.md",
5366+
"redirect_document_id": false
5367+
},
5368+
{
5369+
"source_path": "docset/winserver2016-ps/provisioning/Export-Trace.md",
5370+
"redirect_url": "/powershell/module/provisioning/Export-Trace.md",
5371+
"redirect_document_id": false
5372+
},
5373+
{
5374+
"source_path": "docset/winserver2016-ps/provisioning/Get-ProvisioningPackage.md",
5375+
"redirect_url": "/powershell/module/provisioning/Get-ProvisioningPackage.md",
5376+
"redirect_document_id": false
5377+
},
5378+
{
5379+
"source_path": "docset/winserver2016-ps/provisioning/Get-TrustedProvisioningCertificate.md",
5380+
"redirect_url": "/powershell/module/provisioning/Get-TrustedProvisioningCertificate.md",
5381+
"redirect_document_id": false
5382+
},
5383+
{
5384+
"source_path": "docset/winserver2016-ps/provisioning/Install-ProvisioningPackage.md",
5385+
"redirect_url": "/powershell/module/provisioning/Install-ProvisioningPackage.md",
5386+
"redirect_document_id": false
5387+
},
5388+
{
5389+
"source_path": "docset/winserver2016-ps/provisioning/Install-TrustedProvisioningCertificate.md",
5390+
"redirect_url": "/powershell/module/provisioning/Install-TrustedProvisioningCertificate.md",
5391+
"redirect_document_id": false
5392+
},
5393+
{
5394+
"source_path": "docset/winserver2016-ps/provisioning/Provisioning.md",
5395+
"redirect_url": "/powershell/module/provisioning/Provisioning.md",
5396+
"redirect_document_id": false
5397+
},
5398+
{
5399+
"source_path": "docset/winserver2016-ps/provisioning/Uninstall-ProvisioningPackage.md",
5400+
"redirect_url": "/powershell/module/provisioning/Uninstall-ProvisioningPackage.md",
5401+
"redirect_document_id": false
5402+
},
5403+
{
5404+
"source_path": "docset/winserver2016-ps/provisioning/Uninstall-TrustedProvisioningCertificate.md",
5405+
"redirect_url": "/powershell/module/provisioning/Uninstall-TrustedProvisioningCertificate.md",
5406+
"redirect_document_id": false
53575407
}
53585408
]
53595409
}

docset/winserver2012-ps/activedirectory/Get-ADGroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Get-ADGroup [-AuthType <ADAuthType>] [-Credential <PSCredential>] -LDAPFilter <S
3636
The Get-ADGroup cmdlet gets a group or performs a search to retrieve multiple groups from an Active Directory.
3737

3838
The Identity parameter specifies the Active Directory group to get.
39-
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), Security Accounts Manager (SAM) account name, or canonical name.
39+
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), or Security Accounts Manager (SAM) account name.
4040
You can also specify group object variable, such as $\<localGroupObject\>.
4141

4242
To search for and retrieve more than one group, use the Filter or LDAPFilter parameters.

docset/winserver2012-ps/adcsdeployment/install-adcsnetworkdeviceenrollmentservice.md

Lines changed: 16 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -43,47 +43,38 @@ Int is equivalent to Int32 in the .NET Frameworkhttp://msdn.microsoft.com/en-us/
4343

4444
## EXAMPLES
4545

46-
### -------------------------- EXAMPLE 1 --------------------------
46+
### Example 1: Display the default NDES settings
4747
```
48-
C:\PS>Install-AdcsNetworkDeviceEnrollmentService -ApplicationPoolIdentity -WhatIf
48+
PS C:\> Install-AdcsNetworkDeviceEnrollmentService -ApplicationPoolIdentity -WhatIf
4949
```
5050

51-
Description
52-
53-
-----------
54-
55-
This command displays the default Network Device Enrollment Service settings when the service is running as the default application identity without making any changes to the configuration.
51+
This command displays the default NDES settings that will be configured if it is installed.
5652

57-
### -------------------------- EXAMPLE 2 --------------------------
53+
### Example 2: Display the default NDES settings using a service account name and password
5854
```
59-
C:\PS>Install-AdcsNetworkDeviceEnrollmentService -ServiceAccountName <Domain>\<AccountName> -ServiceAccountPassword (read-host "Set user password" -assecurestring) -WhatIf
55+
PS C:\> Install-AdcsNetworkDeviceEnrollmentService -ServiceAccountName "CONTOSO\svcNDES" -ServiceAccountPassword (read-host "Set user password" -assecurestring) -WhatIf
6056
```
6157

62-
Description
63-
64-
-----------
65-
6658
This command displays the default settings when NDES is using a service account without making any changes to the configuration.
67-
This command assumes that the \<Domain\>\\\<AccountName\> service account is a member of the local machine's IIS_USRS group.
68-
Substitute the domain name for \<Domain\> and the user account name for \<AccountName\>.
59+
This command uses the service account named CONTOSO\svcNDES that is a member of the local computer's IIS_USRS group.
6960

70-
### -------------------------- EXAMPLE 3 --------------------------
61+
### Example 3: Install NDES using the application pool identity
7162
```
72-
C:\PS>Install-AdcsNetworkDeviceEnrollmentService -ApplicationPoolIdentity -CAConfig <CAComputerName>\<CACommonName>
63+
PS C:\> Install-AdcsNetworkDeviceEnrollmentService -ApplicationPoolIdentity -CAConfig "<CAComputerName>\<CACommonName>"
7364
```
7465

75-
Description
76-
77-
-----------
78-
79-
This command installs the Network Device Enrollment Service using the application pool identity to use a remote CA as specified by the CA computer \<CACompterName\>\\\<CACommonName\>.
80-
Substitute the appropriate CA computer name and common name for \<CAComputerName\> and \<CACommonName\>.
66+
This command installs NDES using the application pool identity to use a remote CA as specified by the CA computer `<CAComputerName>\<CACommonName>`.
67+
Substitute the appropriate CA computer name and common name for `<CAComputerName>` and `<CACommonName>`.
8168

82-
### -------------------------- EXAMPLE 4 --------------------------
69+
### Example 4: Install NDES using a specific service account
8370
```
84-
C:\PS>Install-AdcsNetworkDeviceEnrollmentService -ServiceAccountName MyDomain\AccountName -ServiceAccountPassword (read-host "Set user password" -assecurestring) -CAConfig "CAMachineName\CAName" -RAName "Contoso-NDES-RA" -RACountry "US" -RACompany "Contoso" -SigningProviderName "Microsoft Strong Cryptographic Provider" -SigningKeyLength 4096 -EncryptionProviderName "Microsoft Strong Cryptographic Provider" -EncryptionKeyLength 4096
71+
PS C:\> Install-AdcsNetworkDeviceEnrollmentService -ServiceAccountName "CONTOSO\svcNDES" -ServiceAccountPassword (read-host "Set user password" -assecurestring) -CAConfig "CAComputerName\CAName" -RAName "Contoso-NDES-RA" -RACountry "US" -RACompany "Contoso" -SigningProviderName "Microsoft Strong Cryptographic Provider" -SigningKeyLength 4096 -EncryptionProviderName "Microsoft Strong Cryptographic Provider" -EncryptionKeyLength 4096
8572
```
8673

74+
This command installs the NDES using a service account named CONTOSO\svcNDES that is a member of the local computer's IIS_USRS group.
75+
The command also specifies several non-default parameters.
76+
77+
8778
Description
8879

8980
-----------

docset/winserver2012-ps/dism/Get-WindowsImage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ Accepted values: Errors, Warnings, WarningsInfo
119119

120120
Required: False
121121
Position: Named
122-
Default value: None
122+
Default value: 3
123123
Accept pipeline input: True (ByPropertyName)
124124
Accept wildcard characters: False
125125
```

docset/winserver2012-ps/nfs/New-NfsNetgroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Because netgroups are a server-side setting, **New-NfsNetgroup** is not availabl
3535

3636
### Example 1: Create a netgroup and add a member
3737
```
38-
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
38+
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices" -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
3939
```
4040

4141
This command creates a netgroup that is named Contoso-PrintServices and adds one member that is named Contoso-PS02.

docset/winserver2012-ps/updateservices/Get-WsusUpdate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -132,11 +132,11 @@ The acceptable values for this parameter are:
132132
133133
-- FailedOrNeeded
134134
135-
-- InstalledNotApplicableOrNoStatus
135+
-- InstalledOrNotApplicableOrNoStatus
136136
137137
-- Failed
138138
139-
-- InstalledNotApplicable
139+
-- InstalledOrNotApplicable
140140
141141
-- NoStatus
142142

docset/winserver2012-ps/windowsserverbackup/New-WBFileSpec.md

Lines changed: 8 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -40,25 +40,21 @@ The WBFileSpec object that specifies the file C:\Sample\1.jpg for backup.
4040

4141
This command creates a file specification and adds the file named "C:\Sample\1.jpg" to it.
4242

43-
### Example 2: Add a volume recursively to a backup file specification
43+
### Example 2: Add a folder recursively to a backup file specification
4444
```
45-
PS C:\> $Filespec = New-WBFileSpec -FileSpec C:\Sample
46-
47-
The WBFileSpec object that specifies the folder C:\Sample for backup.
45+
PS C:\> $Filespec = New-WBFileSpec -FileSpec "C:\Sample"
4846
```
4947

50-
This command creates a file specification and adds the contents of the "C:\Sample" folder to it.
51-
Because the cmdlet does not include the **NonRecursive** parameter, the backup includes the contents of this folder and its subfolders.
48+
This command creates a file specification and adds the contents of the C:\Sample folder to it.
49+
Because the cmdlet does not include the *NonRecursive* parameter, the backup includes the contents of this folder and its subfolders.
5250

53-
### Example 3: Add a volume nonrecursively to a backup file specification
51+
### Example 3: Add a folder nonrecursively to a backup file specification
5452
```
55-
PS C:\> $Filespec = New-WBFileSpec -FileSpec C:\Sample -NonRecursive
56-
57-
The WBFileSpec object that specifies the folder C:\sample for backup non-recursively.
53+
PS C:\> $Filespec = New-WBFileSpec -FileSpec "C:\Sample" -NonRecursive
5854
```
5955

60-
This command creates a file specification and adds the contents of the "C:\Sample" folder to it.
61-
Because the cmdlet includes the **NonRecursive** parameter, the backup includes the contents of this folder but not the contents of its subfolders.
56+
This command creates a file specification and adds the contents of the C:\Sample folder to it.
57+
Because the cmdlet includes the *NonRecursive* parameter, the backup includes the contents of this folder but not the contents of its subfolders.
6258

6359
### Example 4: Exclude files from a backup file specification
6460
```

docset/winserver2012r2-ps/activedirectory/Get-ADGroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Get-ADGroup [-AuthType <ADAuthType>] [-Credential <PSCredential>] -LDAPFilter <S
3838
The **Get-ADGroup** cmdlet gets a group or performs a search to retrieve multiple groups from an Active Directory.
3939

4040
The **Identity** parameter specifies the Active Directory group to get.
41-
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), Security Accounts Manager (SAM) account name, or canonical name.
41+
You can identify a group by its distinguished name (DN), GUID, security identifier (SID), or Security Accounts Manager (SAM) account name.
4242
You can also specify group object variable, such as **$\<localGroupObject\>**.
4343

4444
To search for and retrieve more than one group, use the **Filter** or **LDAPFilter** parameters.

docset/winserver2012r2-ps/activedirectory/New-ADUser.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,6 +88,13 @@ PS C:\>New-ADUser -Name "ChewDavid" -Type iNetOrgPerson -Path "DC=AppNC" -Server
8888

8989
This command creates an **inetOrgPerson**-class user named ChewDavid on an AD LDS instance.
9090

91+
### Example 4: Create a user and set password
92+
```
93+
PS C:\> New-ADUser -Name "ChewDavid" -Accountpassword (Read-Host -AsSecureString "AccountPassword") -Enabled $true
94+
```
95+
96+
This command creates a new user named ChewDavid and sets the account password.
97+
9198
## PARAMETERS
9299

93100
### -AccountExpirationDate

docset/winserver2012r2-ps/adcsdeployment/install-adcsnetworkdeviceenrollmentservice.md

Lines changed: 15 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -45,47 +45,37 @@ Int is equivalent to Int32 in the .NET Frameworkhttp://msdn.microsoft.com/en-us/
4545

4646
## EXAMPLES
4747

48-
### -------------------------- EXAMPLE 1 --------------------------
48+
### Example 1: Display the default NDES settings
4949
```
50-
C:\PS>Install-AdcsNetworkDeviceEnrollmentService -ApplicationPoolIdentity -WhatIf
50+
PS C:\> Install-AdcsNetworkDeviceEnrollmentService -ApplicationPoolIdentity -WhatIf
5151
```
5252

53-
Description
54-
55-
-----------
56-
57-
This command displays the default Network Device Enrollment Service settings when the service is running as the default application identity without making any changes to the configuration.
53+
This command displays the default NDES settings that will be configured if it is installed.
5854

59-
### -------------------------- EXAMPLE 2 --------------------------
55+
### Example 2: Display the default NDES settings using a service account name and password
6056
```
61-
C:\PS>Install-AdcsNetworkDeviceEnrollmentService -ServiceAccountName <Domain>\<AccountName> -ServiceAccountPassword (read-host "Set user password" -assecurestring) -WhatIf
57+
PS C:\> Install-AdcsNetworkDeviceEnrollmentService -ServiceAccountName "CONTOSO\svcNDES" -ServiceAccountPassword (read-host "Set user password" -assecurestring) -WhatIf
6258
```
6359

64-
Description
65-
66-
-----------
67-
6860
This command displays the default settings when NDES is using a service account without making any changes to the configuration.
69-
This command assumes that the \<Domain\>\\\<AccountName\> service account is a member of the local machine's IIS_USRS group.
70-
Substitute the domain name for \<Domain\> and the user account name for \<AccountName\>.
61+
This command uses the service account named CONTOSO\svcNDES that is a member of the local computer's IIS_USRS group.
7162

72-
### -------------------------- EXAMPLE 3 --------------------------
63+
### Example 3: Install NDES using the application pool identity
7364
```
74-
C:\PS>Install-AdcsNetworkDeviceEnrollmentService -ApplicationPoolIdentity -CAConfig <CAComputerName>\<CACommonName>
65+
PS C:\> Install-AdcsNetworkDeviceEnrollmentService -ApplicationPoolIdentity -CAConfig "<CAComputerName>\<CACommonName>"
7566
```
7667

77-
Description
78-
79-
-----------
68+
This command installs NDES using the application pool identity to use a remote CA as specified by the CA computer `<CAComputerName>\<CACommonName>`.
69+
Substitute the appropriate CA computer name and common name for `<CAComputerName>` and `<CACommonName>`.
8070

81-
This command installs the Network Device Enrollment Service using the application pool identity to use a remote CA as specified by the CA computer \<CACompterName\>\\\<CACommonName\>.
82-
Substitute the appropriate CA computer name and common name for \<CAComputerName\> and \<CACommonName\>.
83-
84-
### -------------------------- EXAMPLE 4 --------------------------
71+
### Example 4: Install NDES using a specific service account
8572
```
86-
C:\PS>Install-AdcsNetworkDeviceEnrollmentService -ServiceAccountName MyDomain\AccountName -ServiceAccountPassword (read-host "Set user password" -assecurestring) -CAConfig "CAMachineName\CAName" -RAName "Contoso-NDES-RA" -RACountry "US" -RACompany "Contoso" -SigningProviderName "Microsoft Strong Cryptographic Provider" -SigningKeyLength 4096 -EncryptionProviderName "Microsoft Strong Cryptographic Provider" -EncryptionKeyLength 4096
73+
PS C:\> Install-AdcsNetworkDeviceEnrollmentService -ServiceAccountName "CONTOSO\svcNDES" -ServiceAccountPassword (read-host "Set user password" -assecurestring) -CAConfig "CAComputerName\CAName" -RAName "Contoso-NDES-RA" -RACountry "US" -RACompany "Contoso" -SigningProviderName "Microsoft Strong Cryptographic Provider" -SigningKeyLength 4096 -EncryptionProviderName "Microsoft Strong Cryptographic Provider" -EncryptionKeyLength 4096
8774
```
8875

76+
This command installs the NDES using a service account named CONTOSO\svcNDES that is a member of the local computer's IIS_USRS group.
77+
The command also specifies several non-default parameters.
78+
8979
Description
9080

9181
-----------

0 commit comments

Comments
 (0)