Skip to content

Commit e8f3ea7

Browse files
authored
Merge branch 'master' into patricka-appx
2 parents 2820832 + 376f133 commit e8f3ea7

File tree

126 files changed

+964
-94
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

126 files changed

+964
-94
lines changed

docset/winserver2012r2-ps/adfs/Test-AdfsFarmJoin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The command specifies the credentials that are stored in the **$FScred** variabl
5858
### Example 2: Test the overwrites of an existing AD FS configuration database
5959
```
6060
PS C:\> $FScred = Get-Credential
61-
PS C:\> Test-AdfsFarmJoin -OverwriteConfiguration -PrimaryComputerName "PrimaryWIDHost" -PrimaryComputerPort 80 -ServiceAccountCredential $FScred -CertificateThumbprint 8169c52b4ec6e77eb2ae17f028fe5da4e35c0bed
61+
PS C:\> Test-AdfsFarmJoin -PrimaryComputerName "PrimaryWIDHost" -PrimaryComputerPort 80 -ServiceAccountCredential $FScred -CertificateThumbprint 8169c52b4ec6e77eb2ae17f028fe5da4e35c0bed
6262
```
6363

6464
The first command uses the **Get-Credential** cmdlet to create a credential object for the Active Directory account under which the AD FS service runs.

docset/winserver2016-ps/adfs/Test-AdfsFarmJoin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The command specifies the credentials that are stored in the $FScred variable fo
5959
### Example 2: Test the overwrites of an existing AD FS configuration database
6060
```
6161
PS C:\> $FScred = Get-Credential
62-
PS C:\> Test-AdfsFarmJoin -OverwriteConfiguration -PrimaryComputerName "PrimaryWIDHost" -PrimaryComputerPort 80 -ServiceAccountCredential $FScred -CertificateThumbprint 8169c52b4ec6e77eb2ae17f028fe5da4e35c0bed
62+
PS C:\> Test-AdfsFarmJoin -PrimaryComputerName "PrimaryWIDHost" -PrimaryComputerPort 80 -ServiceAccountCredential $FScred -CertificateThumbprint 8169c52b4ec6e77eb2ae17f028fe5da4e35c0bed
6363
```
6464

6565
The first command uses the **Get-Credential** cmdlet to create a credential object for the Active Directory account under which the AD FS service runs.

docset/winserver2019-ps/adfs/Test-AdfsFarmJoin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The command specifies the credentials that are stored in the $FScred variable fo
5959
### Example 2: Test the overwrites of an existing AD FS configuration database
6060
```
6161
PS C:\> $FScred = Get-Credential
62-
PS C:\> Test-AdfsFarmJoin -OverwriteConfiguration -PrimaryComputerName "PrimaryWIDHost" -PrimaryComputerPort 80 -ServiceAccountCredential $FScred -CertificateThumbprint 8169c52b4ec6e77eb2ae17f028fe5da4e35c0bed
62+
PS C:\> Test-AdfsFarmJoin -PrimaryComputerName "PrimaryWIDHost" -PrimaryComputerPort 80 -ServiceAccountCredential $FScred -CertificateThumbprint 8169c52b4ec6e77eb2ae17f028fe5da4e35c0bed
6363
```
6464

6565
The first command uses the **Get-Credential** cmdlet to create a credential object for the Active Directory account under which the AD FS service runs.

docset/winserver2022-ps/adfs/Test-AdfsFarmJoin.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ The command specifies the credentials that are stored in the $FScred variable fo
5959
### Example 2: Test the overwrites of an existing AD FS configuration database
6060
```
6161
PS C:\> $FScred = Get-Credential
62-
PS C:\> Test-AdfsFarmJoin -OverwriteConfiguration -PrimaryComputerName "PrimaryWIDHost" -PrimaryComputerPort 80 -ServiceAccountCredential $FScred -CertificateThumbprint 8169c52b4ec6e77eb2ae17f028fe5da4e35c0bed
62+
PS C:\> Test-AdfsFarmJoin -PrimaryComputerName "PrimaryWIDHost" -PrimaryComputerPort 80 -ServiceAccountCredential $FScred -CertificateThumbprint 8169c52b4ec6e77eb2ae17f028fe5da4e35c0bed
6363
```
6464

6565
The first command uses the **Get-Credential** cmdlet to create a credential object for the Active Directory account under which the AD FS service runs.
Lines changed: 122 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,122 @@
1+
---
2+
external help file: BitLocker-help.xml
3+
Module Name: bitlocker
4+
online version:
5+
schema: 2.0.0
6+
---
7+
8+
# BackupToAAD-BitLockerKeyProtector
9+
10+
## SYNOPSIS
11+
Saves a key protector for a BitLocker volume in Azure Active Directory.
12+
13+
## SYNTAX
14+
15+
```
16+
BackupToAAD-BitLockerKeyProtector [-MountPoint] <String[]> [-KeyProtectorId] <String> [-WhatIf] [-Confirm]
17+
[<CommonParameters>]
18+
```
19+
20+
## DESCRIPTION
21+
The **BackupToAAD-BitLockerKeyProtector** cmdlet saves a recovery password key protector for a volume protected by BitLocker Drive Encryption to Azure Active Directory (AAD). Specify a key to be saved by ID.
22+
23+
## EXAMPLES
24+
25+
### Example 1
26+
```powershell
27+
PS C:\> $BLV = Get-BitLockerVolume -MountPoint "C:"
28+
PS C:\> BackupToAAD-BitLockerKeyProtector -MountPoint "C:" -KeyProtectorId $BLV.KeyProtector[1].KeyProtectorId
29+
30+
```
31+
32+
This example saves a key protector for a specified BitLocker volume.
33+
34+
The first command uses **Get-BitLockerVolume** to obtain a BitLocker volume and store it in the $BLV variable.
35+
36+
The second command backs up the key protector for the BitLocker volume specified by the MountPoint parameter. The command specifies the key protector by using its ID, contained in the BitLocker object stored in $BLV.
37+
38+
### Example 2
39+
```powershell
40+
PS C:\> BackupToAAD-BitLockerKeyProtector -MountPoint "C:" -KeyProtectorId "{E2611001E-6AD0-4A08-BAAA-C9c031DB2AA6}"
41+
```
42+
This command saves a key protector for a specified BitLocker volume to Azure AD. The command specifies the key protector by using its ID.
43+
44+
## PARAMETERS
45+
46+
### -KeyProtectorId
47+
The **KeyProtector** attribute contains an array of key protectors associated to the volume. This command uses standard array syntax to index the KeyProtector object. The key protector that corresponds to the recovery password key protector can be identified by using the KeyProtectorType attribute in the KeyProtector object.
48+
49+
50+
```yaml
51+
Type: String
52+
Parameter Sets: (All)
53+
Aliases:
54+
55+
Required: True
56+
Position: 1
57+
Default value: None
58+
Accept pipeline input: True (ByPropertyName, ByValue)
59+
Accept wildcard characters: False
60+
```
61+
62+
### -MountPoint
63+
The volume to be used by **KeyProtector**.
64+
65+
```yaml
66+
Type: String[]
67+
Parameter Sets: (All)
68+
Aliases:
69+
70+
Required: True
71+
Position: 0
72+
Default value: None
73+
Accept pipeline input: True (ByPropertyName, ByValue)
74+
Accept wildcard characters: False
75+
```
76+
77+
### -Confirm
78+
Prompts you for confirmation before running the cmdlet.
79+
80+
```yaml
81+
Type: SwitchParameter
82+
Parameter Sets: (All)
83+
Aliases: cf
84+
85+
Required: False
86+
Position: Named
87+
Default value: None
88+
Accept pipeline input: False
89+
Accept wildcard characters: False
90+
```
91+
92+
### -WhatIf
93+
Shows what would happen if the cmdlet runs.
94+
The cmdlet is not run.
95+
96+
```yaml
97+
Type: SwitchParameter
98+
Parameter Sets: (All)
99+
Aliases: wi
100+
101+
Required: False
102+
Position: Named
103+
Default value: None
104+
Accept pipeline input: False
105+
Accept wildcard characters: False
106+
```
107+
108+
### CommonParameters
109+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
110+
111+
## INPUTS
112+
113+
### System.String[]
114+
115+
### System.String
116+
117+
## OUTPUTS
118+
119+
### System.Object
120+
## NOTES
121+
122+
## RELATED LINKS

docset/winserver2022-ps/bitlocker/BitLocker.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,9 @@ This reference provides cmdlet descriptions and syntax for all BitLocker cmdlets
1717
### [Add-BitLockerKeyProtector](./Add-BitLockerKeyProtector.md)
1818
Adds a key protector for a BitLocker volume.
1919

20+
### [BackupToAAD-BitLockerKeyProtector](./BackupToAAD-BitLockerKeyProtector.md)
21+
Saves a key protector for a BitLocker volume in AAD.
22+
2023
### [Backup-BitLockerKeyProtector](./Backup-BitLockerKeyProtector.md)
2124
Saves a key protector for a BitLocker volume in AD DS.
2225

docset/winserver2022-ps/msdtc/Test-Dtc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
3-
external help file: TestDtc-help.xml
3+
external help file: TestDtc.psm1-help.xml
44
Module Name: MsDtc
55
ms.date: 12/20/2016
66
online version: https://docs.microsoft.com/powershell/module/msdtc/test-dtc?view=windowsserver2022-ps&wt.mc_id=ps-gethelp

docset/winserver2022-ps/remoteaccess/Add-BgpCustomRoute.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -191,8 +191,14 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
191191

192192
## INPUTS
193193

194+
### System.String
195+
196+
### System.String[]
197+
194198
## OUTPUTS
195199

200+
### Microsoft.Management.Infrastructure.CimInstance
201+
196202
### Microsoft.Management.Infrastructure.CimInstance#BgpCustomNetworkInfo
197203

198204
## NOTES

docset/winserver2022-ps/remoteaccess/Add-BgpPeer.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -346,8 +346,26 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
346346
347347
## INPUTS
348348
349+
### System.String
350+
351+
### System.Net.IPAddress
352+
353+
### System.Nullable`1[[System.UInt32, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]]
354+
355+
### System.UInt32
356+
357+
### Microsoft.PowerShell.Cmdletization.GeneratedTypes.Bgp.OperationMode
358+
359+
### Microsoft.PowerShell.Cmdletization.GeneratedTypes.Bgp.PeeringMode
360+
361+
### System.UInt16
362+
363+
### System.Nullable`1[[System.Boolean, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089]]
364+
349365
## OUTPUTS
350366

367+
### Microsoft.Management.Infrastructure.CimInstance
368+
351369
### Microsoft.Management.Infrastructure.CimInstance#BgpPeerConfig
352370

353371
## NOTES

docset/winserver2022-ps/remoteaccess/Add-BgpRouteAggregate.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -229,8 +229,18 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
229229
230230
## INPUTS
231231
232+
### System.String
233+
234+
### System.Nullable`1[[Microsoft.PowerShell.Cmdletization.GeneratedTypes.BgpRouteAggregate.SummaryOnly, Microsoft.PowerShell.Cmdletization.GeneratedTypes, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null]]
235+
236+
### System.String[]
237+
238+
### System.Nullable`1[[Microsoft.PowerShell.Cmdletization.GeneratedTypes.BgpRouteAggregate.PreserveASPath, Microsoft.PowerShell.Cmdletization.GeneratedTypes, Version=0.0.0.0, Culture=neutral, PublicKeyToken=null]]
239+
232240
## OUTPUTS
233241

242+
### Microsoft.Management.Infrastructure.CimInstance
243+
234244
### Microsoft.Management.Infrastructure.CimInstance#BgpRouteAggregateInfo
235245

236246
## NOTES

0 commit comments

Comments
 (0)