Skip to content

Commit 42f2f21

Browse files
authored
Fixes #2440 - add note about core/nano (#4919)
* Fixes #2440 - add note about core/nano * minor edits
1 parent f9e2418 commit 42f2f21

File tree

6 files changed

+154
-102
lines changed

6 files changed

+154
-102
lines changed

reference/3.0/Microsoft.PowerShell.Core/About/about_Execution_Policies.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Describes the PowerShell execution policies and explains how to manage them.
1717

1818
PowerShell's execution policy is a safety feature that controls the conditions
1919
under which PowerShell loads configuration files and runs scripts. This feature
20-
helps prevent the the execution of malicious scripts.
20+
helps prevent the execution of malicious scripts.
2121

2222
On a Windows computer you can set an execution policy for the local computer,
2323
for the current user, or for a particular session. You can also use a Group
@@ -34,7 +34,7 @@ the command line when they cannot run a script. Instead, the execution policy
3434
helps users to set basic rules and prevents them from violating them
3535
unintentionally.
3636

37-
## PowerShell Execution Policies
37+
## PowerShell execution policies
3838

3939
The PowerShell execution policies are as follows:
4040

@@ -77,7 +77,7 @@ The PowerShell execution policies are as follows:
7777
### Restricted
7878

7979
- The default execution policy for Windows client computers.
80-
- Permits individual commands, but will not run scripts.
80+
- Permits individual commands, but does not allow scripts.
8181
- Prevents running of all script files, including formatting and configuration
8282
files (`.ps1xml`), module script files (`.psm1`), and PowerShell profiles
8383
(`.ps1`).
@@ -92,14 +92,14 @@ The PowerShell execution policies are as follows:
9292

9393
- Unsigned scripts can run. There is a risk of running malicious scripts.
9494
- Warns the user before running scripts and configuration files that are
95-
downloaded from the internet.
95+
not from the local intranet zone.
9696

9797
> [!NOTE]
9898
> On systems that do not distinguish Universal Naming Convention (UNC) paths
9999
> from internet paths, scripts that are identified by a UNC path might not be
100100
> permitted to run with the **RemoteSigned** execution policy.
101101
102-
## Execution Policy Scope
102+
## Execution policy scope
103103

104104
You can set an execution policy that is effective only in a particular scope.
105105

@@ -138,7 +138,7 @@ The execution policy affects only the current user. It's stored in the
138138
The execution policy affects all users on the current computer. It's stored in
139139
the **HKEY_LOCAL_MACHINE** registry subkey.
140140

141-
## Get Your Execution Policy
141+
## Managing the execution policy with PowerShell
142142

143143
To get the effective execution policy for the current PowerShell session, use
144144
the `Get-ExecutionPolicy` cmdlet.
@@ -156,7 +156,7 @@ display them in precedence order:
156156
Get-ExecutionPolicy -List
157157
```
158158

159-
The result will look similar to the following sample output:
159+
The result looks similar to the following sample output:
160160

161161
```Output
162162
Scope ExecutionPolicy
@@ -182,7 +182,7 @@ For example, the following command gets the execution policy for the
182182
Get-ExecutionPolicy -Scope CurrentUser
183183
```
184184

185-
## Change Your Execution Policy
185+
### Change the execution policy
186186

187187
To change the PowerShell execution policy on your Windows computer, use the
188188
`Set-ExecutionPolicy` cmdlet. The change is effective immediately. You don't
@@ -231,7 +231,7 @@ effective execution policy.
231231
For example, a command that sets the execution policy for the local computer
232232
can succeed but be overridden by the execution policy for the current user.
233233

234-
## Remove Your Execution Policy
234+
### Remove the execution policy
235235

236236
To remove the execution policy for a particular scope, set the execution policy
237237
to **Undefined**.
@@ -252,7 +252,7 @@ Set-ExecutionPolicy -ExecutionPolicy Undefined -Scope CurrentUser
252252
If no execution policy is set in any scope, the effective execution policy is
253253
**Restricted**, which is the default for Windows clients.
254254

255-
## Set a Different Execution Policy for One Session
255+
### Set a different policy for one session
256256

257257
You can use the **ExecutionPolicy** parameter of **powershell.exe** to set an
258258
execution policy for a new PowerShell session. The policy affects only the
@@ -293,11 +293,11 @@ The **Turn on Script Execution** policy settings are as follows:
293293
policy. The Group Policy settings are equivalent to the following execution
294294
policy settings:
295295

296-
| Group Policy | Execution Policy |
297-
| ---------------------------------------------- | ---------------- |
298-
| Allow all scripts. | Unrestricted |
299-
| Allow local scripts and remote signed scripts. | RemoteSigned |
300-
| Allow only signed scripts. | AllSigned |
296+
| Group Policy | Execution Policy |
297+
| --------------------------------------------- | ---------------- |
298+
| Allow all scripts | Unrestricted |
299+
| Allow local scripts and remote signed scripts | RemoteSigned |
300+
| Allow only signed scripts | AllSigned |
301301

302302
- If **Turn on Script Execution** is not configured, it has no effect. The
303303
execution policy set in PowerShell is effective.
@@ -320,7 +320,7 @@ set in the User Configuration node.
320320

321321
For more information, see [about_Group_Policy_Settings](about_Group_Policy_Settings.md).
322322

323-
## Execution Policy Precedence
323+
### Execution policy precedence
324324

325325
When determining the effective execution policy for a session, PowerShell
326326
evaluates the execution policies in the following precedence order:
@@ -331,7 +331,7 @@ evaluates the execution policies in the following precedence order:
331331
- Execution Policy: CurrentUser
332332
- Execution Policy: LocalMachine
333333

334-
## Manage Signed and Unsigned Scripts
334+
## Manage signed and unsigned scripts
335335

336336
If your PowerShell execution policy is **RemoteSigned**, PowerShell won't run
337337
unsigned scripts that are downloaded from the internet which includes email and

reference/4.0/Microsoft.PowerShell.Core/About/about_Execution_Policies.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Describes the PowerShell execution policies and explains how to manage them.
1717

1818
PowerShell's execution policy is a safety feature that controls the conditions
1919
under which PowerShell loads configuration files and runs scripts. This feature
20-
helps prevent the the execution of malicious scripts.
20+
helps prevent the execution of malicious scripts.
2121

2222
On a Windows computer you can set an execution policy for the local computer,
2323
for the current user, or for a particular session. You can also use a Group
@@ -34,7 +34,7 @@ the command line when they cannot run a script. Instead, the execution policy
3434
helps users to set basic rules and prevents them from violating them
3535
unintentionally.
3636

37-
## PowerShell Execution Policies
37+
## PowerShell execution policies
3838

3939
The PowerShell execution policies are as follows:
4040

@@ -77,7 +77,7 @@ The PowerShell execution policies are as follows:
7777
### Restricted
7878

7979
- The default execution policy for Windows client computers.
80-
- Permits individual commands, but will not run scripts.
80+
- Permits individual commands, but does not allow scripts.
8181
- Prevents running of all script files, including formatting and configuration
8282
files (`.ps1xml`), module script files (`.psm1`), and PowerShell profiles
8383
(`.ps1`).
@@ -92,14 +92,14 @@ The PowerShell execution policies are as follows:
9292

9393
- Unsigned scripts can run. There is a risk of running malicious scripts.
9494
- Warns the user before running scripts and configuration files that are
95-
downloaded from the internet.
95+
not from the local intranet zone.
9696

9797
> [!NOTE]
9898
> On systems that do not distinguish Universal Naming Convention (UNC) paths
9999
> from internet paths, scripts that are identified by a UNC path might not be
100100
> permitted to run with the **RemoteSigned** execution policy.
101101
102-
## Execution Policy Scope
102+
## Execution policy scope
103103

104104
You can set an execution policy that is effective only in a particular scope.
105105

@@ -138,7 +138,7 @@ The execution policy affects only the current user. It's stored in the
138138
The execution policy affects all users on the current computer. It's stored in
139139
the **HKEY_LOCAL_MACHINE** registry subkey.
140140

141-
## Get Your Execution Policy
141+
## Managing the execution policy with PowerShell
142142

143143
To get the effective execution policy for the current PowerShell session, use
144144
the `Get-ExecutionPolicy` cmdlet.
@@ -156,7 +156,7 @@ display them in precedence order:
156156
Get-ExecutionPolicy -List
157157
```
158158

159-
The result will look similar to the following sample output:
159+
The result looks similar to the following sample output:
160160

161161
```Output
162162
Scope ExecutionPolicy
@@ -182,7 +182,7 @@ For example, the following command gets the execution policy for the
182182
Get-ExecutionPolicy -Scope CurrentUser
183183
```
184184

185-
## Change Your Execution Policy
185+
### Change the execution policy
186186

187187
To change the PowerShell execution policy on your Windows computer, use the
188188
`Set-ExecutionPolicy` cmdlet. The change is effective immediately. You don't
@@ -231,7 +231,7 @@ effective execution policy.
231231
For example, a command that sets the execution policy for the local computer
232232
can succeed but be overridden by the execution policy for the current user.
233233

234-
## Remove Your Execution Policy
234+
### Remove the execution policy
235235

236236
To remove the execution policy for a particular scope, set the execution policy
237237
to **Undefined**.
@@ -252,7 +252,7 @@ Set-ExecutionPolicy -ExecutionPolicy Undefined -Scope CurrentUser
252252
If no execution policy is set in any scope, the effective execution policy is
253253
**Restricted**, which is the default for Windows clients.
254254

255-
## Set a Different Execution Policy for One Session
255+
### Set a different policy for one session
256256

257257
You can use the **ExecutionPolicy** parameter of **powershell.exe** to set an
258258
execution policy for a new PowerShell session. The policy affects only the
@@ -293,11 +293,11 @@ The **Turn on Script Execution** policy settings are as follows:
293293
policy. The Group Policy settings are equivalent to the following execution
294294
policy settings:
295295

296-
| Group Policy | Execution Policy |
297-
| ---------------------------------------------- | ---------------- |
298-
| Allow all scripts. | Unrestricted |
299-
| Allow local scripts and remote signed scripts. | RemoteSigned |
300-
| Allow only signed scripts. | AllSigned |
296+
| Group Policy | Execution Policy |
297+
| --------------------------------------------- | ---------------- |
298+
| Allow all scripts | Unrestricted |
299+
| Allow local scripts and remote signed scripts | RemoteSigned |
300+
| Allow only signed scripts | AllSigned |
301301

302302
- If **Turn on Script Execution** is not configured, it has no effect. The
303303
execution policy set in PowerShell is effective.
@@ -320,7 +320,7 @@ set in the User Configuration node.
320320

321321
For more information, see [about_Group_Policy_Settings](about_Group_Policy_Settings.md).
322322

323-
## Execution Policy Precedence
323+
### Execution policy precedence
324324

325325
When determining the effective execution policy for a session, PowerShell
326326
evaluates the execution policies in the following precedence order:
@@ -331,7 +331,7 @@ evaluates the execution policies in the following precedence order:
331331
- Execution Policy: CurrentUser
332332
- Execution Policy: LocalMachine
333333

334-
## Manage Signed and Unsigned Scripts
334+
## Manage signed and unsigned scripts
335335

336336
If your PowerShell execution policy is **RemoteSigned**, PowerShell won't run
337337
unsigned scripts that are downloaded from the internet which includes email and

reference/5.0/Microsoft.PowerShell.Core/About/about_Execution_Policies.md

Lines changed: 19 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ Describes the PowerShell execution policies and explains how to manage them.
1717

1818
PowerShell's execution policy is a safety feature that controls the conditions
1919
under which PowerShell loads configuration files and runs scripts. This feature
20-
helps prevent the the execution of malicious scripts.
20+
helps prevent the execution of malicious scripts.
2121

2222
On a Windows computer you can set an execution policy for the local computer,
2323
for the current user, or for a particular session. You can also use a Group
@@ -34,7 +34,7 @@ the command line when they cannot run a script. Instead, the execution policy
3434
helps users to set basic rules and prevents them from violating them
3535
unintentionally.
3636

37-
## PowerShell Execution Policies
37+
## PowerShell execution policies
3838

3939
The PowerShell execution policies are as follows:
4040

@@ -77,7 +77,7 @@ The PowerShell execution policies are as follows:
7777
### Restricted
7878

7979
- The default execution policy for Windows client computers.
80-
- Permits individual commands, but will not run scripts.
80+
- Permits individual commands, but does not allow scripts.
8181
- Prevents running of all script files, including formatting and configuration
8282
files (`.ps1xml`), module script files (`.psm1`), and PowerShell profiles
8383
(`.ps1`).
@@ -90,16 +90,18 @@ The PowerShell execution policies are as follows:
9090

9191
### Unrestricted
9292

93+
- The default execution policy for non-Windows computers and cannot be
94+
changed.
9395
- Unsigned scripts can run. There is a risk of running malicious scripts.
9496
- Warns the user before running scripts and configuration files that are
95-
downloaded from the internet.
97+
not from the local intranet zone.
9698

9799
> [!NOTE]
98100
> On systems that do not distinguish Universal Naming Convention (UNC) paths
99101
> from internet paths, scripts that are identified by a UNC path might not be
100102
> permitted to run with the **RemoteSigned** execution policy.
101103
102-
## Execution Policy Scope
104+
## Execution policy scope
103105

104106
You can set an execution policy that is effective only in a particular scope.
105107

@@ -138,7 +140,7 @@ The execution policy affects only the current user. It's stored in the
138140
The execution policy affects all users on the current computer. It's stored in
139141
the **HKEY_LOCAL_MACHINE** registry subkey.
140142

141-
## Get Your Execution Policy
143+
## Managing the execution policy with PowerShell
142144

143145
To get the effective execution policy for the current PowerShell session, use
144146
the `Get-ExecutionPolicy` cmdlet.
@@ -156,7 +158,7 @@ display them in precedence order:
156158
Get-ExecutionPolicy -List
157159
```
158160

159-
The result will look similar to the following sample output:
161+
The result looks similar to the following sample output:
160162

161163
```Output
162164
Scope ExecutionPolicy
@@ -182,7 +184,7 @@ For example, the following command gets the execution policy for the
182184
Get-ExecutionPolicy -Scope CurrentUser
183185
```
184186

185-
## Change Your Execution Policy
187+
### Change the execution policy
186188

187189
To change the PowerShell execution policy on your Windows computer, use the
188190
`Set-ExecutionPolicy` cmdlet. The change is effective immediately. You don't
@@ -231,7 +233,7 @@ effective execution policy.
231233
For example, a command that sets the execution policy for the local computer
232234
can succeed but be overridden by the execution policy for the current user.
233235

234-
## Remove Your Execution Policy
236+
### Remove the execution policy
235237

236238
To remove the execution policy for a particular scope, set the execution policy
237239
to **Undefined**.
@@ -252,7 +254,7 @@ Set-ExecutionPolicy -ExecutionPolicy Undefined -Scope CurrentUser
252254
If no execution policy is set in any scope, the effective execution policy is
253255
**Restricted**, which is the default for Windows clients.
254256

255-
## Set a Different Execution Policy for One Session
257+
### Set a different policy for one session
256258

257259
You can use the **ExecutionPolicy** parameter of **powershell.exe** to set an
258260
execution policy for a new PowerShell session. The policy affects only the
@@ -293,11 +295,11 @@ The **Turn on Script Execution** policy settings are as follows:
293295
policy. The Group Policy settings are equivalent to the following execution
294296
policy settings:
295297

296-
| Group Policy | Execution Policy |
297-
| ---------------------------------------------- | ---------------- |
298-
| Allow all scripts. | Unrestricted |
299-
| Allow local scripts and remote signed scripts. | RemoteSigned |
300-
| Allow only signed scripts. | AllSigned |
298+
| Group Policy | Execution Policy |
299+
| --------------------------------------------- | ---------------- |
300+
| Allow all scripts | Unrestricted |
301+
| Allow local scripts and remote signed scripts | RemoteSigned |
302+
| Allow only signed scripts | AllSigned |
301303

302304
- If **Turn on Script Execution** is not configured, it has no effect. The
303305
execution policy set in PowerShell is effective.
@@ -320,7 +322,7 @@ set in the User Configuration node.
320322

321323
For more information, see [about_Group_Policy_Settings](about_Group_Policy_Settings.md).
322324

323-
## Execution Policy Precedence
325+
### Execution policy precedence
324326

325327
When determining the effective execution policy for a session, PowerShell
326328
evaluates the execution policies in the following precedence order:
@@ -331,7 +333,7 @@ evaluates the execution policies in the following precedence order:
331333
- Execution Policy: CurrentUser
332334
- Execution Policy: LocalMachine
333335

334-
## Manage Signed and Unsigned Scripts
336+
## Manage signed and unsigned scripts
335337

336338
If your PowerShell execution policy is **RemoteSigned**, PowerShell won't run
337339
unsigned scripts that are downloaded from the internet which includes email and

0 commit comments

Comments
 (0)