Skip to content

Commit fcadfb4

Browse files
committed
Merge branch 'master' of https://github.com/MicrosoftDocs/windows-powershell-docs into patricka-dnsserver
2 parents 6fc63de + c2dede3 commit fcadfb4

File tree

1,139 files changed

+27082
-4850
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,139 files changed

+27082
-4850
lines changed

.openpublishing.redirection.json

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5354,6 +5354,56 @@
53545354
"source_path": "docset/winserver2022-ps/WindowsUpdate/WindowsUpdate.md",
53555355
"redirect_url": "/powershell/module/windowsupdate/WindowsUpdate.md?view=windowsserver2022-ps",
53565356
"redirect_document_id": false
5357+
},
5358+
{
5359+
"source_path": "docset/winserver2022-ps/EventTracingManagement/Set-AutologgerConfig.md",
5360+
"redirect_url": "/powershell/module/eventtracingmanagement/Update-AutologgerConfig.md?view=windowsserver2022-ps",
5361+
"redirect_document_id": false
5362+
},
5363+
{
5364+
"source_path": "docset/winserver2016-ps/provisioning/Export-ProvisioningPackage.md",
5365+
"redirect_url": "/powershell/module/provisioning/Export-ProvisioningPackage.md",
5366+
"redirect_document_id": false
5367+
},
5368+
{
5369+
"source_path": "docset/winserver2016-ps/provisioning/Export-Trace.md",
5370+
"redirect_url": "/powershell/module/provisioning/Export-Trace.md",
5371+
"redirect_document_id": false
5372+
},
5373+
{
5374+
"source_path": "docset/winserver2016-ps/provisioning/Get-ProvisioningPackage.md",
5375+
"redirect_url": "/powershell/module/provisioning/Get-ProvisioningPackage.md",
5376+
"redirect_document_id": false
5377+
},
5378+
{
5379+
"source_path": "docset/winserver2016-ps/provisioning/Get-TrustedProvisioningCertificate.md",
5380+
"redirect_url": "/powershell/module/provisioning/Get-TrustedProvisioningCertificate.md",
5381+
"redirect_document_id": false
5382+
},
5383+
{
5384+
"source_path": "docset/winserver2016-ps/provisioning/Install-ProvisioningPackage.md",
5385+
"redirect_url": "/powershell/module/provisioning/Install-ProvisioningPackage.md",
5386+
"redirect_document_id": false
5387+
},
5388+
{
5389+
"source_path": "docset/winserver2016-ps/provisioning/Install-TrustedProvisioningCertificate.md",
5390+
"redirect_url": "/powershell/module/provisioning/Install-TrustedProvisioningCertificate.md",
5391+
"redirect_document_id": false
5392+
},
5393+
{
5394+
"source_path": "docset/winserver2016-ps/provisioning/Provisioning.md",
5395+
"redirect_url": "/powershell/module/provisioning/Provisioning.md",
5396+
"redirect_document_id": false
5397+
},
5398+
{
5399+
"source_path": "docset/winserver2016-ps/provisioning/Uninstall-ProvisioningPackage.md",
5400+
"redirect_url": "/powershell/module/provisioning/Uninstall-ProvisioningPackage.md",
5401+
"redirect_document_id": false
5402+
},
5403+
{
5404+
"source_path": "docset/winserver2016-ps/provisioning/Uninstall-TrustedProvisioningCertificate.md",
5405+
"redirect_url": "/powershell/module/provisioning/Uninstall-TrustedProvisioningCertificate.md",
5406+
"redirect_document_id": false
53575407
}
53585408
]
53595409
}

docset/docfx.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@
7474
"manager": "femila",
7575
"feedback_system": "GitHub",
7676
"feedback_github_repo": "MicrosoftDocs/windows-powershell-docs",
77-
"feedback_product_url": "https://windowsserver.uservoice.com/forums/301869-powershell",
77+
"feedback_product_url": "https://support.microsoft.com/windows/send-feedback-to-microsoft-with-the-feedback-hub-app-f59187f8-8739-22d6-ba93-f66612949332",
7878
"contributors_to_exclude": [
7979
"rjagiewich",
8080
"traya1",

docset/winserver2012-ps/activedirectory/Get-ADUser.md

Lines changed: 32 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ PS C:\> Get-ADUser -Identity ChewDavid -Properties *
8181
```Output
8282
Surname : David
8383
Name : Chew David
84-
UserPrincipalName :
84+
UserPrincipalName :
8585
GivenName : David
8686
Enabled : False
8787
SamAccountName : ChewDavid
@@ -100,6 +100,13 @@ PS C:\> Get-ADUser -Filter "Name -eq 'ChewDavid'" -SearchBase "DC=AppNC" -Proper
100100

101101
This command gets the user with the name ChewDavid in the Active Directory Lightweight Directory Services (AD LDS) instance.
102102

103+
### Example 5: Get all enabled user accounts
104+
```powershell
105+
C:\PS> Get-ADUser -LDAPFilter '(!userAccountControl:1.2.840.113556.1.4.803:=2)'
106+
```
107+
108+
This command gets all enabled user accounts in Active Directory using an LDAP filter.
109+
103110
## PARAMETERS
104111

105112
### -AuthType
@@ -116,7 +123,7 @@ A Secure Sockets Layer (SSL) connection is required for the Basic authentication
116123
```yaml
117124
Type: ADAuthType
118125
Parameter Sets: (All)
119-
Aliases:
126+
Aliases:
120127
Accepted values: Negotiate, Basic
121128

122129
Required: False
@@ -142,7 +149,7 @@ If the acting credentials do not have directory-level permission to perform the
142149
```yaml
143150
Type: PSCredential
144151
Parameter Sets: (All)
145-
Aliases:
152+
Aliases:
146153

147154
Required: False
148155
Position: Named
@@ -190,7 +197,7 @@ Note: To query using LDAP query strings, use the *LDAPFilter* parameter.
190197
```yaml
191198
Type: String
192199
Parameter Sets: Filter
193-
Aliases:
200+
Aliases:
194201
195202
Required: True
196203
Position: Named
@@ -205,8 +212,8 @@ The identifier in parentheses is the LDAP display name for the attribute.
205212
The acceptable values for this parameter are:
206213

207214
- A distinguished name
208-
- A GUID (objectGUID)
209-
- A security identifier (objectSid)
215+
- A GUID (objectGUID)
216+
- A security identifier (objectSid)
210217
- A SAM account name (sAMAccountName)
211218

212219
The cmdlet searches the default naming context or partition to find the object.
@@ -217,7 +224,7 @@ This parameter can also get this object through the pipeline or you can set this
217224
```yaml
218225
Type: ADUser
219226
Parameter Sets: Identity
220-
Aliases:
227+
Aliases:
221228
222229
Required: True
223230
Position: 0
@@ -235,7 +242,7 @@ For more information, see the *Filter* parameter description or type `Get-Help a
235242
```yaml
236243
Type: String
237244
Parameter Sets: LdapFilter
238-
Aliases:
245+
Aliases:
239246
240247
Required: True
241248
Position: Named
@@ -251,26 +258,26 @@ The cmdlet searches this partition to find the object defined by the *Identity*
251258

252259
In many cases, a default value is used for the *Partition* parameter if no value is specified.
253260
The rules for determining the default value are given below.
254-
Note that rules listed first are evaluated first and when a default value can be determined, no further rules are evaluated.
261+
Note that rules listed first are evaluated first, and when a default value can be determined, no further rules are evaluated.
255262

256-
In AD DS environments, a default value for *Partition* are set in the following cases:
263+
In AD DS environments, a default value for *Partition* is set in the following cases:
257264

258265
- If the *Identity* parameter is set to a distinguished name, the default value of *Partition* is automatically generated from this distinguished name.
259-
- If running cmdlets from an Active Directory provider drive, the default value of *Partition* is automatically generated from the current path in the drive.
266+
- If running cmdlets from an Active Directory provider drive, the default value of *Partition* is automatically generated from the current path in the drive.
260267
- If none of the previous cases apply, the default value of *Partition* is set to the default partition or naming context of the target domain.
261268

262-
In AD LDS environments, a default value for *Partition* will be set in the following cases:
269+
In AD LDS environments, a default value for *Partition* is set in the following cases:
263270

264-
- If the *Identity* parameter is set to a distinguished name, the default value of *Partition* is automatically generated from this distinguished name.
265-
- If running cmdlets from an Active Directory provider drive, the default value of *Partition* is automatically generated from the current path in the drive.
271+
- If the *Identity* parameter is set to a distinguished name, the default value of *Partition* is automatically generated from this distinguished name.
272+
- If running cmdlets from an Active Directory provider drive, the default value of *Partition* is automatically generated from the current path in the drive.
266273
- If the target AD LDS instance has a default naming context, the default value of *Partition* is set to the default naming context.
267-
To specify a default naming context for an AD LDS environment, set the **msDS-defaultNamingContext** property of the Active Directory directory service agent object (**nTDSDSA**) for the AD LDS instance.
274+
To specify a default naming context for an AD LDS environment, set the **msDS-defaultNamingContext** property of the Active Directory directory service agent object (**nTDSDSA**) for the AD LDS instance.
268275
- If none of the previous cases apply, the *Partition* parameter does not take any default value.
269276

270277
```yaml
271278
Type: String
272279
Parameter Sets: Identity
273-
Aliases:
280+
Aliases:
274281
275282
Required: False
276283
Position: Named
@@ -311,7 +318,7 @@ The default is 256 objects per page.
311318
```yaml
312319
Type: Int32
313320
Parameter Sets: Filter, LdapFilter
314-
Aliases:
321+
Aliases:
315322
316323
Required: False
317324
Position: Named
@@ -330,7 +337,7 @@ The default is $Null.
330337
```yaml
331338
Type: Int32
332339
Parameter Sets: Filter, LdapFilter
333-
Aliases:
340+
Aliases:
334341
335342
Required: False
336343
Position: Named
@@ -349,13 +356,13 @@ When you run a cmdlet outside of an Active Directory provider drive against an A
349356
When you run a cmdlet outside of an Active Directory provider drive against an AD LDS target, the default value is the default naming context of the target LDS instance if one has been specified by setting the **msDS-defaultNamingContext** property of the Active Directory directory service agent (DSA) object (**nTDSDSA**) for the AD LDS instance.
350357
If no default naming context has been specified for the target AD LDS instance, then this parameter has no default value.
351358

352-
When the value of the *SearchBase* parameter is set to an empty string and you are connected to a GC port, all partitions will be searched.
353-
If the value of the *SearchBase* parameter is set to an empty string and you are not connected to a GC port, an error will be thrown.
359+
When the value of the *SearchBase* parameter is set to an empty string and you are connected to a GC port, all partitions are searched.
360+
If the value of the *SearchBase* parameter is set to an empty string and you are not connected to a GC port, an error is thrown.
354361

355362
```yaml
356363
Type: String
357364
Parameter Sets: Filter, LdapFilter
358-
Aliases:
365+
Aliases:
359366
360367
Required: False
361368
Position: Named
@@ -380,7 +387,7 @@ A Subtree query searches the current path or object and all children of that pat
380387
```yaml
381388
Type: ADSearchScope
382389
Parameter Sets: Filter, LdapFilter
383-
Aliases:
390+
Aliases:
384391
Accepted values: Base, OneLevel, Subtree
385392
386393
Required: False
@@ -407,14 +414,14 @@ Directory server values:
407414

408415
The default value for the *Server* parameter is determined by one of the following methods in the order that they are listed:
409416

410-
- By using *Server* value from objects passed through the pipeline.
411-
- By using the server information associated with the Active Directory PowerShell provider drive, when running under that drive.
417+
- By using *Server* value from objects passed through the pipeline.
418+
- By using the server information associated with the Active Directory PowerShell provider drive, when running under that drive.
412419
- By using the domain of the computer running PowerShell.
413420

414421
```yaml
415422
Type: String
416423
Parameter Sets: (All)
417-
Aliases:
424+
Aliases:
418425
419426
Required: False
420427
Position: Named

docset/winserver2012-ps/dnsserver/Add-DnsServerResourceRecord.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -165,7 +165,7 @@ Add-DnsServerResourceRecord [-ZoneName] <String> [-Wins] [-AsJob] [-CimSession <
165165
The **Add-DnsServerResourceRecord** cmdlet adds a resource record for a Domain Name System (DNS) zone on a DNS server.
166166
You can add different types of resource records.
167167
Use different switches for different record types.
168-
For more information about resource records, see Managing Resource Recordshttp://technet.microsoft.com/en-us/library/cc754308.aspx (http://technet.microsoft.com/en-us/library/cc754308.aspx).
168+
For more information about resource records, see [Managing Resource Records](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc754308(v=ws.11)).
169169

170170
By using this cmdlet, you can change a value for a record, configure whether a record has a time stamp, whether any authenticated user can update a record with the same owner name, and change lookup timeout values, Windows Internet Name Service (WINS) cache settings, and replication settings.
171171

@@ -389,7 +389,14 @@ Accept wildcard characters: False
389389
```
390390
391391
### -AsJob
392-
ps_cimcommon_asjob
392+
Runs the cmdlet as a background job. Use this parameter to run commands that take a long time to complete.
393+
394+
The cmdlet immediately returns an object that represents the job and then displays the command prompt.
395+
You can continue to work in the session while the job completes.
396+
To manage the job, use the `*-Job` cmdlets.
397+
To get the job results, use the [Receive-Job](https://go.microsoft.com/fwlink/?LinkID=113372) cmdlet.
398+
399+
For more information about Windows PowerShell background jobs, see [about_Jobs](https://go.microsoft.com/fwlink/?LinkID=113251).
393400

394401
```yaml
395402
Type: SwitchParameter
@@ -435,7 +442,7 @@ Accept wildcard characters: False
435442

436443
### -CimSession
437444
Runs the cmdlet in a remote session or on a remote computer.
438-
Enter a computer name or a session object, such as the output of a New-CimSessionhttp://go.microsoft.com/fwlink/p/?LinkId=227967 or Get-CimSessionhttp://go.microsoft.com/fwlink/p/?LinkId=227966 cmdlet.
445+
Enter a computer name or a session object, such as the output of a [New-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227967) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
439446
The default is the current session on the local computer.
440447

441448
```yaml

docset/winserver2012-ps/netsecurity/Set-NetFirewallRule.md

Lines changed: 18 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -522,27 +522,17 @@ Accept wildcard characters: False
522522
523523
### -LocalAddress
524524
Specifies that network packets with matching IP addresses match this rule.
525-
526525
This parameter value is the first end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule.
527-
528-
This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any.
529-
526+
This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any.
530527
The acceptable formats for this parameter are:
531-
532-
-- Single IPv4 Address: 1.2.3.4
533-
534-
-- Single IPv6 Address: fe80::1
535-
536-
-- IPv4 Subnet (by network bit count): 1.2.3.4/24
537-
538-
-- IPv6 Subnet (by network bit count): fe80::1/48
539-
540-
-- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0
541-
542-
-- IPv4 Range: 1.2.3.4 through 1.2.3.7
543-
544-
-- IPv6 Range: fe80::1 through fe80::9
545-
Note: Querying for rules with this parameter can only be performed using filter objects.
528+
- Single IPv4 Address: 1.2.3.4
529+
- Single IPv6 Address: fe80::1
530+
- IPv4 Subnet (by network bit count): 1.2.3.4/24
531+
- IPv6 Subnet (by network bit count): fe80::1/48
532+
- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0
533+
- IPv4 Range: 1.2.3.4 through 1.2.3.7
534+
- IPv6 Range: fe80::1 through fe80::9
535+
Querying for rules with this parameter can only be performed using filter objects.
546536
See the Get-NetFirewallAddressFilter cmdlet for more information.
547537
548538
```yaml
@@ -944,27 +934,17 @@ Accept wildcard characters: False
944934

945935
### -RemoteAddress
946936
Specifies that network packets with matching IP addresses match this rule.
947-
948937
This parameter value is the second end point of an IPsec rule and specifies the computers that are subject to the requirements of this rule.
949-
950-
This parameter value is an IPv4 or IPv6 address, hostname, subnet, range, or the following keyword: Any.
951-
938+
This parameter value is an IPv4 or IPv6 address, subnet, range, or the following keyword: Any.
952939
The acceptable formats for this parameter are:
953-
954-
-- Single IPv4 Address: 1.2.3.4
955-
956-
-- Single IPv6 Address: fe80::1
957-
958-
-- IPv4 Subnet (by network bit count): 1.2.3.4/24
959-
960-
-- IPv6 Subnet (by network bit count): fe80::1/48
961-
962-
-- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0
963-
964-
-- IPv4 Range: 1.2.3.4 through 1.2.3.7
965-
966-
-- IPv6 Range: fe80::1 through fe80::9
967-
Note: Querying for rules with this parameter can only be performed using filter objects.
940+
- Single IPv4 Address: 1.2.3.4
941+
- Single IPv6 Address: fe80::1
942+
- IPv4 Subnet (by network bit count): 1.2.3.4/24
943+
- IPv6 Subnet (by network bit count): fe80::1/48
944+
- IPv4 Subnet (by network mask): 1.2.3.4/255.255.255.0
945+
- IPv4 Range: 1.2.3.4 through 1.2.3.7
946+
- IPv6 Range: fe80::1 through fe80::9
947+
Querying for rules with this parameter can only be performed using filter objects.
968948
See the Get-NetFirewallAddressFilter cmdlet for more information.
969949

970950
```yaml

docset/winserver2012-ps/nfs/New-NfsNetgroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Because netgroups are a server-side setting, **New-NfsNetgroup** is not availabl
3535

3636
### Example 1: Create a netgroup and add a member
3737
```
38-
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
38+
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices" -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
3939
```
4040

4141
This command creates a netgroup that is named Contoso-PrintServices and adds one member that is named Contoso-PS02.

0 commit comments

Comments
 (0)