Skip to content

Commit bf0c8e5

Browse files
authored
Merge pull request MicrosoftDocs#2492 from velkovb/fix/2446-example-title
Resolves MicrosoftDocs#2446
2 parents 0e399bb + 2508ac1 commit bf0c8e5

File tree

4 files changed

+73
-77
lines changed

4 files changed

+73
-77
lines changed

docset/winserver2012r2-ps/activedirectory/Get-ADDomainController.md

Lines changed: 19 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ You can get domain controllers by setting the **Identity**, **Filter** or **Disc
3939

4040
The **Identity** parameter specifies the domain controller to get.
4141
You can identify a domain controller by its GUID, IPV4Address, global IPV6Address, or DNS host name.
42-
You can also identify a domain controller by the name of the server object that represents the domain controller, the distinguished name of the NTDS settings object or the server object, the GUID of the NTDS settings object or the server object under the configuration partition, or the distinguished name of the computer object that represents the domain controller.
42+
You can also identify a domain controller by the name of the server object that represents the domain controller, the distinguished name of the NTDS settings object or the server object, the GUID of the NTDS settings object or the server object under the configuration partition, or the distinguished name of the computer object that represents the domain controller.
4343
You can also set the **Identity** parameter to a domain controller object variable, such as **$\<localDomainControllerObject\>**, or pass a domain controller object through the pipeline to the **Identity** parameter.
4444

4545
To search for and retrieve more than one domain controller, use the **Filter** parameter.
@@ -89,7 +89,7 @@ PS C:\>Get-ADDomainController -Discover -Domain "user01.com"
8989

9090
This command gets one available domain controller in a given domain using Discovery.
9191

92-
### Example 6: Get the primary domain controller using discovery and set it up as time server
92+
### Example 6: Get the primary domain controller that is advertising as a time server using discovery
9393
```
9494
PS C:\>Get-ADDomainController -Discover -Domain "corp.contoso.com" -Service "PrimaryDC","TimeService"
9595
```
@@ -126,7 +126,7 @@ A Secure Sockets Layer (SSL) connection is required for the Basic authentication
126126
```yaml
127127
Type: ADAuthType
128128
Parameter Sets: (All)
129-
Aliases:
129+
Aliases:
130130
Accepted values: Negotiate, Basic
131131

132132
Required: False
@@ -144,7 +144,7 @@ You can specify this parameter when you want to get the name of another domain c
144144
```yaml
145145
Type: SwitchParameter
146146
Parameter Sets: DiscoverByService
147-
Aliases:
147+
Aliases:
148148

149149
Required: False
150150
Position: Named
@@ -169,7 +169,7 @@ If the acting credentials do not have directory-level permission to perform the
169169
```yaml
170170
Type: PSCredential
171171
Parameter Sets: Identity, Filter
172-
Aliases:
172+
Aliases:
173173

174174
Required: False
175175
Position: Named
@@ -187,7 +187,7 @@ Along with this parameter, you can provide search criteria by setting parameters
187187
```yaml
188188
Type: SwitchParameter
189189
Parameter Sets: DiscoverByService
190-
Aliases:
190+
Aliases:
191191

192192
Required: True
193193
Position: Named
@@ -204,7 +204,7 @@ Specify the domain by using the NetBIOS name or Fully Qualified Domain Name (FQD
204204
```yaml
205205
Type: String
206206
Parameter Sets: DiscoverByService
207-
Aliases:
207+
Aliases:
208208

209209
Required: False
210210
Position: Named
@@ -249,7 +249,7 @@ Note: To query using LDAP query strings, use the **LDAPFilter** parameter.
249249
```yaml
250250
Type: String
251251
Parameter Sets: Filter
252-
Aliases:
252+
Aliases:
253253
254254
Required: True
255255
Position: Named
@@ -259,13 +259,13 @@ Accept wildcard characters: False
259259
```
260260

261261
### -ForceDiscover
262-
Indicates that the cmdlet to clears any cached domain controller information and perform a new discovery.
262+
Indicates to the cmdlet to clear any cached domain controller information and perform a new discovery.
263263
If this parameter is not specified the cmdlet may return cached domain controller information.
264264

265265
```yaml
266266
Type: SwitchParameter
267267
Parameter Sets: DiscoverByService
268-
Aliases:
268+
Aliases:
269269
270270
Required: False
271271
Position: Named
@@ -299,7 +299,7 @@ This parameter can also get this object through the pipeline or you can set this
299299
```yaml
300300
Type: ADDomainController
301301
Parameter Sets: Identity
302-
Aliases:
302+
Aliases:
303303
304304
Required: False
305305
Position: 0
@@ -318,7 +318,7 @@ The acceptable values for this parameter are:
318318
```yaml
319319
Type: ADMinimumDirectoryServiceVersion
320320
Parameter Sets: DiscoverByService
321-
Aliases:
321+
Aliases:
322322
Accepted values: Windows2000, Windows2008, Windows2012, Windows2012R2
323323
324324
Required: False
@@ -336,7 +336,7 @@ Costs between sites are based on factors such as bandwidth, as well as physical
336336
```yaml
337337
Type: SwitchParameter
338338
Parameter Sets: DiscoverByService
339-
Aliases:
339+
Aliases:
340340
341341
Required: False
342342
Position: Named
@@ -349,14 +349,14 @@ Accept wildcard characters: False
349349
Specifies the Active Directory Domain Services instance to connect to, by providing one of the following values for a corresponding domain name or directory server.
350350
The service may be any of the following: Active Directory Lightweight Domain Services, Active Directory Domain Services or Active Directory snapshot instance.
351351

352-
Specify the Active Directory Domain Services instance in one of the following ways:
352+
Specify the Active Directory Domain Services instance in one of the following ways:
353353

354354
Domain name values:
355355

356356
- Fully qualified domain name
357357
- NetBIOS name
358358

359-
Directory server values:
359+
Directory server values:
360360

361361
- Fully qualified directory server name
362362
- NetBIOS name
@@ -371,7 +371,7 @@ The default value for this parameter is determined by one of the following metho
371371
```yaml
372372
Type: String
373373
Parameter Sets: Identity, Filter
374-
Aliases:
374+
Aliases:
375375
376376
Required: False
377377
Position: Named
@@ -395,7 +395,7 @@ The acceptable values for this parameter are:
395395
```yaml
396396
Type: ADDiscoverableService[]
397397
Parameter Sets: DiscoverByService
398-
Aliases:
398+
Aliases:
399399
Accepted values: PrimaryDC, GlobalCatalog, KDC, TimeService, ReliableTimeService, ADWS
400400
401401
Required: False
@@ -413,7 +413,7 @@ The name of the site is defined by the **Name** property of the site object.
413413
```yaml
414414
Type: String
415415
Parameter Sets: DiscoverByService
416-
Aliases:
416+
Aliases:
417417
418418
Required: False
419419
Position: Named
@@ -428,7 +428,7 @@ Specifies whether this is a writable domain controller.
428428
```yaml
429429
Type: SwitchParameter
430430
Parameter Sets: DiscoverByService
431-
Aliases:
431+
Aliases:
432432
433433
Required: False
434434
Position: Named
@@ -478,4 +478,3 @@ With the **Identity** or the **Filter** parameter, the **HostName** property wil
478478
[Get-ADDomainControllerPasswordReplicationPolicy](./Get-ADDomainControllerPasswordReplicationPolicy.md)
479479

480480
[Remove-ADDomainControllerPasswordReplicationPolicy](./Remove-ADDomainControllerPasswordReplicationPolicy.md)
481-

docset/winserver2016-ps/activedirectory/Get-ADDomainController.md

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ You can get domain controllers by setting the *Identity*, *Filter* or *Discover*
4040

4141
The *Identity* parameter specifies the domain controller to get.
4242
You can identify a domain controller by its GUID, IPV4Address, global IPV6Address, or DNS host name.
43-
You can also identify a domain controller by the name of the server object that represents the domain controller, the distinguished name of the NTDS settings object or the server object, the GUID of the NTDS settings object or the server object under the configuration partition, or the distinguished name of the computer object that represents the domain controller.
43+
You can also identify a domain controller by the name of the server object that represents the domain controller, the distinguished name of the NTDS settings object or the server object, the GUID of the NTDS settings object or the server object under the configuration partition, or the distinguished name of the computer object that represents the domain controller.
4444
You can also set the *Identity* parameter to a domain controller object variable, such as `$<localDomainControllerObject>`, or pass a domain controller object through the pipeline to the *Identity* parameter.
4545

4646
To search for and retrieve more than one domain controller, use the *Filter* parameter.
@@ -90,7 +90,7 @@ PS C:\> Get-ADDomainController -Discover -Domain "user01.com"
9090

9191
This command gets one available domain controller in a given domain using Discovery.
9292

93-
### Example 6: Get the primary domain controller using discovery and set it up as time server
93+
### Example 6: Get the primary domain controller that is advertising as a time server using discovery
9494
```
9595
PS C:\> Get-ADDomainController -Discover -Domain "corp.contoso.com" -Service "PrimaryDC","TimeService"
9696
```
@@ -127,7 +127,7 @@ A Secure Sockets Layer (SSL) connection is required for the Basic authentication
127127
```yaml
128128
Type: ADAuthType
129129
Parameter Sets: (All)
130-
Aliases:
130+
Aliases:
131131
Accepted values: Negotiate, Basic
132132

133133
Required: False
@@ -145,7 +145,7 @@ You can specify this parameter when you want to get the name of another domain c
145145
```yaml
146146
Type: SwitchParameter
147147
Parameter Sets: DiscoverByService
148-
Aliases:
148+
Aliases:
149149

150150
Required: False
151151
Position: Named
@@ -170,7 +170,7 @@ If the acting credentials do not have directory-level permission to perform the
170170
```yaml
171171
Type: PSCredential
172172
Parameter Sets: Identity, Filter
173-
Aliases:
173+
Aliases:
174174

175175
Required: False
176176
Position: Named
@@ -188,7 +188,7 @@ Along with this parameter, you can provide search criteria by setting parameters
188188
```yaml
189189
Type: SwitchParameter
190190
Parameter Sets: DiscoverByService
191-
Aliases:
191+
Aliases:
192192

193193
Required: True
194194
Position: Named
@@ -205,7 +205,7 @@ Specify the domain by using the NetBIOS name or Fully Qualified Domain Name (FQD
205205
```yaml
206206
Type: String
207207
Parameter Sets: DiscoverByService
208-
Aliases:
208+
Aliases:
209209

210210
Required: False
211211
Position: Named
@@ -250,7 +250,7 @@ Note: To query using LDAP query strings, use the *LDAPFilter* parameter.
250250
```yaml
251251
Type: String
252252
Parameter Sets: Filter
253-
Aliases:
253+
Aliases:
254254
255255
Required: True
256256
Position: Named
@@ -266,7 +266,7 @@ If this parameter is not specified the cmdlet may return cached domain controlle
266266
```yaml
267267
Type: SwitchParameter
268268
Parameter Sets: DiscoverByService
269-
Aliases:
269+
Aliases:
270270
271271
Required: False
272272
Position: Named
@@ -300,7 +300,7 @@ This parameter can also get this object through the pipeline or you can set this
300300
```yaml
301301
Type: ADDomainController
302302
Parameter Sets: Identity
303-
Aliases:
303+
Aliases:
304304
305305
Required: False
306306
Position: 0
@@ -319,7 +319,7 @@ The acceptable values for this parameter are:
319319
```yaml
320320
Type: ADMinimumDirectoryServiceVersion
321321
Parameter Sets: DiscoverByService
322-
Aliases:
322+
Aliases:
323323
Accepted values: Windows2000, Windows2008, Windows2012, Windows2012R2
324324
325325
Required: False
@@ -337,7 +337,7 @@ Costs between sites are based on factors such as bandwidth, as well as physical
337337
```yaml
338338
Type: SwitchParameter
339339
Parameter Sets: DiscoverByService
340-
Aliases:
340+
Aliases:
341341
342342
Required: False
343343
Position: Named
@@ -350,14 +350,14 @@ Accept wildcard characters: False
350350
Specifies the Active Directory Domain Services instance to connect to, by providing one of the following values for a corresponding domain name or directory server.
351351
The service may be any of the following: Active Directory Lightweight Domain Services, Active Directory Domain Services or Active Directory snapshot instance.
352352

353-
Specify the Active Directory Domain Services instance in one of the following ways:
353+
Specify the Active Directory Domain Services instance in one of the following ways:
354354

355355
Domain name values:
356356

357357
- Fully qualified domain name
358358
- NetBIOS name
359359

360-
Directory server values:
360+
Directory server values:
361361

362362
- Fully qualified directory server name
363363
- NetBIOS name
@@ -372,7 +372,7 @@ The default value for this parameter is determined by one of the following metho
372372
```yaml
373373
Type: String
374374
Parameter Sets: Identity, Filter
375-
Aliases:
375+
Aliases:
376376
377377
Required: False
378378
Position: Named
@@ -396,7 +396,7 @@ The acceptable values for this parameter are:
396396
```yaml
397397
Type: ADDiscoverableService[]
398398
Parameter Sets: DiscoverByService
399-
Aliases:
399+
Aliases:
400400
Accepted values: PrimaryDC, GlobalCatalog, KDC, TimeService, ReliableTimeService, ADWS
401401
402402
Required: False
@@ -414,7 +414,7 @@ The name of the site is defined by the **Name** property of the site object.
414414
```yaml
415415
Type: String
416416
Parameter Sets: DiscoverByService
417-
Aliases:
417+
Aliases:
418418
419419
Required: False
420420
Position: Named
@@ -429,7 +429,7 @@ Specifies whether this is a writable domain controller.
429429
```yaml
430430
Type: SwitchParameter
431431
Parameter Sets: DiscoverByService
432-
Aliases:
432+
Aliases:
433433
434434
Required: False
435435
Position: Named
@@ -479,4 +479,3 @@ With the *Identity* or the *Filter* parameter, the **HostName** property will no
479479
[Get-ADDomainControllerPasswordReplicationPolicy](./Get-ADDomainControllerPasswordReplicationPolicy.md)
480480

481481
[Remove-ADDomainControllerPasswordReplicationPolicy](./Remove-ADDomainControllerPasswordReplicationPolicy.md)
482-

0 commit comments

Comments
 (0)