Skip to content

Commit d981f56

Browse files
Merge branch 'master' of https://github.com/MicrosoftDocs/windows-powershell-docs into configci-v-tishe
2 parents da23325 + 1975764 commit d981f56

File tree

130 files changed

+3247
-349
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

130 files changed

+3247
-349
lines changed

docset/docfx.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@
7474
"manager": "femila",
7575
"feedback_system": "GitHub",
7676
"feedback_github_repo": "MicrosoftDocs/windows-powershell-docs",
77-
"feedback_product_url": "https://windowsserver.uservoice.com/forums/301869-powershell",
77+
"feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332",
7878
"contributors_to_exclude": [
7979
"rjagiewich",
8080
"traya1",

docset/winserver2012r2-ps/wsscmdlets/Set-HostedEmailAccount.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,10 @@ A hosted email service provides a hosted email account.
2626

2727
### Example 1: Assign a hosted email account to a local user account
2828
```
29-
PS C:\> Set-HostedEmailAccount -LocalAccountName "PattiFuller" -EmailAccount "PattiFuller@Constoso.com"
29+
PS C:\> Set-HostedEmailAccount -LocalAccountName "PattiFuller" -EmailAccount "PattiFuller@Contoso.com"
3030
```
3131

32-
This command assigns the hosted email account named PattiFuller@Constoso.com to the local user account named PattiFuller.
32+
This command assigns the hosted email account named PattiFuller@Contoso.com to the local user account named PattiFuller.
3333

3434
## PARAMETERS
3535

docset/winserver2019-ps/defender/Set-MpPreference.md

Lines changed: 31 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: MSFT_MpPreference.cdxml-help.xml
44
Module Name: Defender
5-
ms.date: 06/23/2021
5+
ms.date: 10/05/2021
66
online version: https://docs.microsoft.com/powershell/module/defender/set-mppreference?view=windowsserver2019-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Set-MpPreference
@@ -41,7 +41,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
4141
[-LowThreatDefaultAction <ThreatAction>] [-ModerateThreatDefaultAction <ThreatAction>]
4242
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
4343
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
44-
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-SignaturesUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>]
44+
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>]
4545
```
4646

4747
## DESCRIPTION
@@ -138,6 +138,29 @@ Accept pipeline input: False
138138
Accept wildcard characters: False
139139
```
140140
141+
### -DefinitionUpdatesChannel
142+
Enable this policy to specify when devices receive daily Microsoft Defender security intelligence (definition/signature) updates during the daily gradual rollout.
143+
144+
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
145+
146+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
147+
148+
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
149+
150+
Supported OS versions: Windows 10
151+
152+
Note: This policy is available starting with platform version 4.18.2106.5 and later
153+
154+
```yaml
155+
Type: UpdatesChannelType
156+
Aliases: suc
157+
Accepted values: Staged|Broad|Not Configured
158+
Position: Named
159+
Default value: None
160+
Accept pipeline input: False
161+
Accept wildcard characters: False
162+
```
163+
141164
### -DisableArchiveScanning
142165
Indicates whether to scan archive files, such as .zip and .cab files, for malicious and unwanted software.
143166
If you specify a value of $False or do not specify a value, Windows Defender scans archive files.
@@ -446,6 +469,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad
446469
447470
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
448471
472+
Critical- Time Delay: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only.
473+
449474
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
450475
451476
Supported OS versions: Windows 10
@@ -454,7 +479,7 @@ Note: This policy is available starting with platform version 4.18.2106.5 and la
454479
```yaml
455480
Type: UpdatesChannelType
456481
Aliases: euc
457-
Accepted values:Beta|Preview|Staged|Broad|NotConfigured
482+
Accepted values:Beta|Preview|Staged|Broad|Delayed|NotConfigured
458483
Position: Named
459484
Default value: None
460485
Accept pipeline input: False
@@ -648,6 +673,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad
648673
649674
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
650675
676+
Critical- Time Delay: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only.
677+
651678
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
652679
653680
Supported OS versions: Windows 10
@@ -657,7 +684,7 @@ Note: This policy is available starting with platform version 4.18.2106.5 and la
657684
```yaml
658685
Type: UpdatesChannelType
659686
Aliases: puc
660-
Accepted values: Beta|Preview|Staged|Broad|NotConfigured
687+
Accepted values: Beta|Preview|Staged|Broad|Delayed|NotConfigured
661688
Position: Named
662689
Default value: None
663690
Accept pipeline input: False
@@ -1143,28 +1170,6 @@ Accept pipeline input: False
11431170
Accept wildcard characters: False
11441171
```
11451172
1146-
### -SignaturesUpdatesChannel
1147-
Enable this policy to specify when devices receive daily Microsoft Defender definition updates during the daily gradual rollout.
1148-
1149-
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
1150-
1151-
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
1152-
1153-
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
1154-
1155-
Supported OS versions: Windows 10
1156-
1157-
Note: This policy is available starting with platform version 4.18.2106.5 and later
1158-
1159-
```yaml
1160-
Type: UpdatesChannelType
1161-
Aliases: suc
1162-
Accepted values: Staged|Broad|Not Configured
1163-
Position: Named
1164-
Default value: None
1165-
Accept pipeline input: False
1166-
Accept wildcard characters: False
1167-
```
11681173
11691174
### -SignatureUpdateInterval
11701175
Specifies the interval, in hours, at which to check for definition updates.

docset/winserver2019-ps/storage/Get-StorageAdvancedProperty.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ The **Get-StorageAdvancedProperty** cmdlet gets the advanced properties of a sto
2424
For example, Get-PhysicalDisk gets the most commonly used attributes of a physical disk such as **CanPool**.
2525
To get the cache (**IsDeviceCacheEnabled**) and power protection (**IsPowerProtected**) settings for a physical disk, you can pass a **PhysicalDisk** object to the **Get-StorageAdvancedProperty** cmdlet.
2626

27+
The output of the cache (**IsDeviceCacheEnabled**) and power protection (**IsPowerProtected**) are collected from the user-defined settings of the physical disk. Power protection (**IsPowerProtected**) is not an indicator of the physical disk support for power loss protection (PLP). Refer to the physical disk vendor’s datasheet for PLP support details.
28+
2729
## EXAMPLES
2830

2931
### Example 1: Get advanced storage properties of a physical disk
@@ -82,4 +84,3 @@ The cmdlet gets the advanced properties for **PhysicalDisk** objects: **IsPowerP
8284
## RELATED LINKS
8385
8486
[Get-PhysicalDisk](./Get-PhysicalDisk.md)
85-

docset/winserver2022-ps/adcsadministration/ADCSAdministration.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,10 @@ Adds a certificate template to the CA.
2626
### [Backup-CARoleService](./Backup-CARoleService.md)
2727
Backs up the CA database and private key information.
2828

29-
### [Confirm-CAEndorsementKeyInfo](./Confirm-CAEndorsementKeyInfo.md)
29+
### [Confirm-CAAttestationIdentityKeyInfo](Confirm-CAAttestationIdentityKeyInfo.md)
30+
Checks whether the local CA trusts secure hardware for identity key attestation.
31+
32+
### [Confirm-CAEndorsementKeyInfo](Confirm-CAEndorsementKeyInfo.md)
3033
Checks whether the local CA trusts secure hardware for key attestation.
3134

3235
### [Get-CAAuthorityInformationAccess](./Get-CAAuthorityInformationAccess.md)

docset/winserver2022-ps/adcsadministration/Add-CAAuthorityInformationAccess.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -180,8 +180,12 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
180180
181181
## INPUTS
182182
183+
### Microsoft.CertificateServices.Administration.Commands.CA.AuthorityInformationAccess
184+
183185
### System.String
184186
187+
### System.Management.Automation.SwitchParameter
188+
185189
## OUTPUTS
186190
187191
### Microsoft.CertificateServices.Administration.Commands.CA.AuthorityInformationAccessResult

docset/winserver2022-ps/adcsadministration/Add-CACrlDistributionPoint.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,8 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
231231
232232
### System.String
233233
234+
### System.Management.Automation.SwitchParameter
235+
234236
## OUTPUTS
235237
236238
### Microsoft.CertificateServices.Administration.Commands.CA.CrlDistributionPointResult

docset/winserver2022-ps/adcsadministration/Add-CATemplate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ There is only one parameter for this cmdlet, *Name*, and it can only accept a si
114114
115115
## OUTPUTS
116116
117-
### None
117+
### System.Object
118118
119119
## NOTES
120120
* To perform this procedure, you must be a member of the Domain Admins group or the Enterprise Admins group in AD DS, or you must have been delegated the appropriate authority. As a security best practice, consider using Run as to perform this procedure.

docset/winserver2022-ps/adcsadministration/Backup-CARoleService.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -175,8 +175,16 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
175175

176176
## INPUTS
177177

178+
### System.String
179+
180+
### System.Management.Automation.SwitchParameter
181+
182+
### System.Security.SecureString
183+
178184
## OUTPUTS
179185

186+
### System.Void
187+
180188
## NOTES
181189

182190
## RELATED LINKS
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
description: Checks whether the local CA trusts secure hardware for identity key attestation.
3+
external help file: Microsoft.CertificateServices.Administration.Commands.dll-Help.xml
4+
Module Name: ADCSAdministration
5+
online version: https://docs.microsoft.com/powershell/module/adcsadministration/confirm-caattestationidentitykeyinfo?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
6+
schema: 2.0.0
7+
title: Confirm-CAAttestationIdentityKeyInfo
8+
---
9+
10+
# Confirm-CAAttestationIdentityKeyInfo
11+
12+
## SYNOPSIS
13+
Checks whether the local CA trusts secure hardware for identity key attestation.
14+
15+
## SYNTAX
16+
17+
### PublicKeyHash
18+
```
19+
Confirm-CAAttestationIdentityKeyInfo [-PublicKeyHash] <String> [<CommonParameters>]
20+
```
21+
22+
### Certificate
23+
```
24+
Confirm-CAAttestationIdentityKeyInfo [-Certificate] <X509Certificate2> [<CommonParameters>]
25+
```
26+
27+
## DESCRIPTION
28+
The **Confirm-CAAttestationIdentityKeyInfo** cmdlet checks whether the local certification authority (CA) trusts secure hardware, such as a Trusted Platform Module (TPM), for identity key attestation. The Attestation Identity Key (AIK) replaces the Endorsement Key as an identity for the TPM. An Attestation Identity Key is permanently embedded in the security hardware. The public portion of the key helps to recognize genuine security hardware.
29+
30+
This cmdlet verifies whether the AIK public certificate connects through a certificate chain to an anchor that the CA trusts. Specify an X509 certificate by using the **Certificate** parameter.
31+
32+
This cmdlet checks whether the AIK public key exists as a file in a folder configured at the local CA for key attestation. Specify the public key by using the **PublicKeyHash** parameter.
33+
34+
## EXAMPLES
35+
36+
### Example 1: Check certificate
37+
```
38+
Confirm-CAAttestationIdentityKeyInfo -Certificate Contoso87.cer
39+
40+
True
41+
```
42+
43+
This command checks whether the certificate `Contoso87.cer` connects, by using a certificate chain, to a trusted anchor.
44+
This example returns a value of `$True`.
45+
46+
### Example 2: Check a key
47+
```
48+
Confirm-CAAttestationIdentityKeyInfo -PublicKeyHash "0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"
49+
50+
False
51+
```
52+
53+
The command checks for the public certificate specified as an SHA-256 hash code.
54+
This example returns a value of `$False`.
55+
The CA does not have this public key.
56+
57+
## PARAMETERS
58+
59+
### -Certificate
60+
Specifies an X509 public key certificate issued to secure hardware.
61+
62+
```yaml
63+
Type: X509Certificate2
64+
Parameter Sets: Certificate
65+
Aliases:
66+
67+
Required: True
68+
Position: 1
69+
Default value: None
70+
Accept pipeline input: True (ByPropertyName, ByValue)
71+
Accept wildcard characters: False
72+
```
73+
74+
### -PublicKeyHash
75+
Specifies an Attestation Identity Key (AIK) public key of the secure hardware, as the result of the SHA-256 hash algorithm.
76+
This value is a 64 character hexadecimal string.
77+
78+
```yaml
79+
Type: String
80+
Parameter Sets: PublicKeyHash
81+
Aliases:
82+
83+
Required: True
84+
Position: 1
85+
Default value: None
86+
Accept pipeline input: True (ByPropertyName, ByValue)
87+
Accept wildcard characters: False
88+
```
89+
90+
### CommonParameters
91+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
92+
93+
## INPUTS
94+
95+
### System.String
96+
97+
### System.Security.Cryptography.X509Certificates.X509Certificate2
98+
99+
## OUTPUTS
100+
101+
### System.Boolean
102+
103+
## NOTES
104+
105+
## RELATED LINKS
106+
107+
[Confirm-CAEndorsementKeyInfo](Confirm-CAEndorsementKeyInfo.md)
108+
109+
[Add-CAAuthorityInformationAccess](Add-CAAuthorityInformationAccess.md)
110+
111+
[Add-CACrlDistributionPoint](Add-CACrlDistributionPoint.md)
112+
113+
[Backup-CARoleService](Backup-CARoleService.md)
114+
115+
[Confirm-CAEndorsementKeyInfo](Confirm-CAEndorsementKeyInfo.md)

0 commit comments

Comments
 (0)