Skip to content

Commit c8f6716

Browse files
authored
Merge pull request MicrosoftDocs#3679 from alexbuckgit/alexbuckgit/docutune-autopr-20231024-142017-3506371-ignore-build
[BULK] - DocuTune - Rebranding of Azure Active Directory to Microsoft Entra terminology (part 2)
2 parents df869c4 + 303aead commit c8f6716

File tree

8 files changed

+17
-17
lines changed

8 files changed

+17
-17
lines changed

docset/winserver2022-ps/appvclient/Get-AppvPublishingServer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] <String>] [[-URL] <String>] [<CommonParameters
2626
```
2727

2828
## DESCRIPTION
29-
The **Get-AppvPublishingServer** cmdlet returns an Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.
29+
The **Get-AppvPublishingServer** cmdlet returns a Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.
3030

3131
## EXAMPLES
3232

docset/winserver2022-ps/appvclient/Mount-AppvClientPackage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Mount-AppvClientPackage [-Name] <String> [[-Version] <String>] [<CommonParameter
3131
```
3232

3333
## DESCRIPTION
34-
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of an Microsoft Application Virtualization (App-V) package into the cache.
34+
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of a Microsoft Application Virtualization (App-V) package into the cache.
3535

3636
## EXAMPLES
3737

docset/winserver2022-ps/appvclient/Set-AppvClientPackage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Set-AppvClientPackage [-Path <String>] [-DynamicDeploymentConfiguration <String>
3434
```
3535

3636
## DESCRIPTION
37-
The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package.
37+
The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package.
3838

3939
## EXAMPLES
4040

docset/winserver2022-ps/bitlocker/BackupToAAD-BitLockerKeyProtector.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ schema: 2.0.0
77
# BackupToAAD-BitLockerKeyProtector
88

99
## SYNOPSIS
10-
Saves a key protector for a BitLocker volume in Azure Active Directory.
10+
Saves a key protector for a BitLocker volume in Microsoft Entra ID.
1111

1212
## SYNTAX
1313

@@ -17,7 +17,7 @@ BackupToAAD-BitLockerKeyProtector [-MountPoint] <String[]> [-KeyProtectorId] <St
1717
```
1818

1919
## DESCRIPTION
20-
The **BackupToAAD-BitLockerKeyProtector** cmdlet saves a recovery password key protector for a volume protected by BitLocker Drive Encryption to Azure Active Directory (AAD). Specify a key to be saved by ID.
20+
The **BackupToAAD-BitLockerKeyProtector** cmdlet saves a recovery password key protector for a volume protected by BitLocker Drive Encryption to Microsoft Entra ID. Specify a key to be saved by ID.
2121

2222
## EXAMPLES
2323

@@ -38,7 +38,7 @@ The second command backs up the key protector for the BitLocker volume specified
3838
```powershell
3939
PS C:\> BackupToAAD-BitLockerKeyProtector -MountPoint "C:" -KeyProtectorId "{E2611001E-6AD0-4A08-BAAA-C9c031DB2AA6}"
4040
```
41-
This command saves a key protector for a specified BitLocker volume to Azure AD. The command specifies the key protector by using its ID.
41+
This command saves a key protector for a specified BitLocker volume to Microsoft Entra ID. The command specifies the key protector by using its ID.
4242

4343
## PARAMETERS
4444

docset/winserver2022-ps/bitlocker/BitLocker.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ This reference provides cmdlet descriptions and syntax for all BitLocker cmdlets
1818
Adds a key protector for a BitLocker volume.
1919

2020
### [BackupToAAD-BitLockerKeyProtector](./BackupToAAD-BitLockerKeyProtector.md)
21-
Saves a key protector for a BitLocker volume in AAD.
21+
Saves a key protector for a BitLocker volume in Microsoft Entra ID.
2222

2323
### [Backup-BitLockerKeyProtector](./Backup-BitLockerKeyProtector.md)
2424
Saves a key protector for a BitLocker volume in AD DS.

docset/winserver2022-ps/laps/Get-LapsAADPassword.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
description: Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Azure AD device.
2+
description: Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Microsoft Entra device.
33
external help file: LAPS-help.xml
44
Module Name: LAPS
55
online version: https://learn.microsoft.com/powershell/module/laps/get-lapsaadpassword?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
@@ -12,8 +12,8 @@ title: Get-LapsAADPassword
1212
# Get-LapsAADPassword
1313

1414
## SYNOPSIS
15-
Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS)
16-
credentials on a specified Azure AD device.
15+
Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS)
16+
credentials on a specified Microsoft Entra device.
1717

1818
## SYNTAX
1919

@@ -25,7 +25,7 @@ Get-LapsAADPassword -DeviceIds <String[]> [-IncludePasswords] [-IncludeHistory]
2525
## DESCRIPTION
2626

2727
The `Get-LapsAADPassword` cmdlet allows administrators to retrieve LAPS passwords and password
28-
history for an AAD-joined device. This is implemented by sending queries to Microsoft Graph over the
28+
history for a Microsoft Entra joined device. This is implemented by sending queries to Microsoft Graph over the
2929
deviceLocalCredentials collection.
3030

3131
The `Get-LapsAADPassword` cmdlet supports two basic modes when querying LAPS passwords:
@@ -51,9 +51,9 @@ device, the `DeviceManagementManagedDevices.Read.All` permission may also be req
5151
> [!IMPORTANT]
5252
> The `Get-LapsAADPassword` cmdlet is implemented as a wrapper around the Microsoft Graph PowerShell
5353
> library, which must be manually installed on the device before `Get-LapsAADPassword` can work.
54-
> Additional configuration steps are required in your AAD tenant to enable authentication to
54+
> Additional configuration steps are required in your Microsoft Entra tenant to enable authentication to
5555
> Microsoft Graph and to grant the necessary Microsoft Graph permissions. For more information, see
56-
> [Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704)
56+
> [Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704)
5757
5858
The **Verbose** parameter may be used to get additional information about the cmdlet's operation.
5959

@@ -240,4 +240,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
240240
241241
[Windows LAPS Overview](https://go.microsoft.com/fwlink/?linkid=2233901)
242242
243-
[Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704)
243+
[Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704)

docset/winserver2022-ps/laps/LAPS.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ Local Administrator Password Solution (LAPS) password attributes.
2525

2626
### [Get-LapsAADPassword](Get-LapsAADPassword.md)
2727

28-
Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS)
29-
credentials on a specified Azure AD device.
28+
Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS)
29+
credentials on a specified Microsoft Entra device.
3030

3131
### [Get-LapsADPassword](Get-LapsADPassword.md)
3232

docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] <String> [-WhatIf] [-Confirm] [<CommonPara
2020
```
2121

2222
## DESCRIPTION
23-
The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
23+
The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
2424

2525
You must specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI).
2626
You can enable MSDSM to automatically claim both SAS and iSCSI disks.

0 commit comments

Comments
 (0)