Skip to content

Commit 6cfe47a

Browse files
davidsmatlaksdwheeler
authored andcommitted
issue 4499 (#4873)
1 parent 6e147e9 commit 6cfe47a

File tree

6 files changed

+366
-229
lines changed

6 files changed

+366
-229
lines changed

reference/3.0/Microsoft.WsMan.Management/Set-WSManQuickConfig.md

Lines changed: 55 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,62 +1,70 @@
11
---
2-
ms.date: 06/09/2017
2+
ms.date: 10/02/2019
33
schema: 2.0.0
44
locale: en-us
55
keywords: powershell,cmdlet
66
online version: https://go.microsoft.com/fwlink/?linkid=141463
77
external help file: Microsoft.WSMan.Management.dll-Help.xml
88
title: Set-WSManQuickConfig
99
---
10+
1011
# Set-WSManQuickConfig
1112

1213
## SYNOPSIS
13-
1414
Configures the local computer for remote management.
1515

1616
## SYNTAX
1717

18+
### All
19+
1820
```
1921
Set-WSManQuickConfig [-UseSSL] [-Force] [-SkipNetworkProfileCheck] [<CommonParameters>]
2022
```
2123

2224
## DESCRIPTION
2325

24-
The Set-WSManQuickConfig cmdlet configures the computer to receive Windows PowerShell remote commands that are sent by using the Web Services for Management (WS-Management) technology.
26+
The `Set-WSManQuickConfig` cmdlet configures the computer to receive PowerShell remote commands that
27+
are sent by using the Web Services for Management (WS-Management) technology.
2528

26-
The cmdlet performs the following:
29+
`Set-WSManQuickConfig` performs the following actions:
2730

28-
- Checks whether the WinRM service is running. If the WinRM service is not running, the service is started.
31+
- Checks whether the WinRM service is running. If the WinRM service isn't running, the service is
32+
started.
2933
- Sets the WinRM service startup type to automatic.
30-
- Creates a listener to accept requests on any IP address. By default, the transport is HTTP.
31-
- Enables a firewall exception for WinRM traffic .
34+
- Creates a listener to accept requests on any IP address. The default transport is **HTTP**.
35+
- Enables a firewall exception for WinRM traffic.
3236

33-
To run this cmdlet, start Windows PowerShell with the "Run as administrator" option.
37+
To run `Set-WSManQuickConfig`, start PowerShell with the **Run as Administrator** option.
3438

3539
## EXAMPLES
3640

37-
### Example 1
41+
### Example 1: Enable remote management of the local computer over HTTP
42+
43+
This example sets the required configuration to enable remote management of the local computer. By
44+
default, this command creates a WS-Management listener on **HTTP**.
3845

3946
```powershell
4047
Set-WSManQuickConfig
4148
```
4249

43-
This command sets the required configuration to enable remote management of the local computer.
44-
By default, this command creates a WS-Management listener on HTTP.
50+
### Example 2: Enable remote management of the local computer over HTTPS
4551

46-
### Example 2
52+
This example sets the required configuration to enable remote management of the local computer. The
53+
**UseSSL** parameter specifies that **HTTPS** is used to communicate with the computer.
4754

4855
```powershell
4956
Set-WSManQuickConfig -UseSSL
5057
```
5158

52-
The command sets the required configuration to enable remote management of the local computer.
53-
The UseSSL parameter makes the command create a WS-Management listener on HTTPS.
59+
> [!NOTE]
60+
> **HTTPS** requires manual configuration. For more information, see the **UseSSL** parameter's
61+
> description.
5462
5563
## PARAMETERS
5664

5765
### -Force
5866

59-
Sets the configuration without first prompting the user.
67+
Forces the command to run without asking for user confirmation.
6068

6169
```yaml
6270
Type: SwitchParameter
@@ -65,22 +73,25 @@ Aliases:
6573

6674
Required: False
6775
Position: Named
68-
Default value: None
76+
Default value: False
6977
Accept pipeline input: False
7078
Accept wildcard characters: False
7179
```
7280
7381
### -SkipNetworkProfileCheck
7482
75-
Configures client versions of Windows for remoting when the computer is on a public network.
76-
This parameter enables a firewall rule for public networks that allows remote access only from computers in the same local subnet.
83+
Configures Windows client versions for remoting when the computer is on a public network. This
84+
parameter enables a firewall rule for public networks that allows remote access only from computers
85+
in the same local subnet.
7786
78-
This parameter has no effect on server versions of Windows, which, by default, have a local subnet firewall rule for public networks.
79-
If the local subnet firewall rule is disabled on a server version of Windows, **Enable-PSRemoting** re-enables it, regardless of the value of this parameter.
87+
This parameter has no effect on server versions of Windows, that by default, have a local subnet
88+
firewall rule for public networks. If the local subnet firewall rule is disabled on the server
89+
version of Windows, `Enable-PSRemoting` re-enables it, regardless of this parameter's value.
8090

81-
To remove the local subnet restriction and enable remote access from all locations on public networks, use the **Set-NetFirewallRule** cmdlet in the **NetSecurity** module.
91+
To remove the local subnet restriction and enable remote access from all locations on public
92+
networks, use the `Set-NetFirewallRule` cmdlet in the **NetSecurity** module.
8293

83-
This parameter is introduced in Windows PowerShell 3.0.
94+
This parameter was introduced in PowerShell 3.0.
8495

8596
```yaml
8697
Type: SwitchParameter
@@ -89,19 +100,23 @@ Aliases:
89100
90101
Required: False
91102
Position: Named
92-
Default value: None
103+
Default value: False
93104
Accept pipeline input: False
94105
Accept wildcard characters: False
95106
```
96107

97108
### -UseSSL
98109

99-
Specifies that the Secure Sockets Layer (SSL) protocol should be used to establish a connection to the remote computer.
100-
By default, SSL is not used.
110+
Specifies that the Secure Sockets Layer (SSL) protocol is used to establish a connection to the
111+
remote computer. By default, SSL isn't used.
101112

102-
WS-Management encrypts all Windows PowerShell content transmitted over the network.
103-
The UseSSL parameter lets you specify that the additional protection of using HTTPS instead of HTTP should be used.
104-
If you specify this parameter, but SSL is not available on the port used for the connection, the command fails.
113+
WS-Management encrypts all the PowerShell content that is transmitted over the network. The
114+
**UseSSL** parameter lets you specify the additional protection of HTTPS instead of HTTP. If you use
115+
this parameter and SSL isn't available on the port that's used for the connection, the command
116+
fails.
117+
118+
**HTTPS** requires manual configuration of WinRM and firewall rules. For more information, see
119+
[How To: Configure WINRM for HTTPS](https://support.microsoft.com/en-us/help/2019527/how-to-configure-winrm-for-https).
105120

106121
```yaml
107122
Type: SwitchParameter
@@ -110,53 +125,55 @@ Aliases:
110125
111126
Required: False
112127
Position: Named
113-
Default value: None
128+
Default value: False
114129
Accept pipeline input: False
115130
Accept wildcard characters: False
116131
```
117132

118133
### CommonParameters
119134

120-
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
135+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
136+
-InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose,
137+
-WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
121138

122139
## INPUTS
123140

124141
### None
125142

126-
This cmdlet does not accept any input.
143+
This cmdlet doesn't accept any input.
127144

128145
## OUTPUTS
129146

130147
### None
131148

132-
This cmdlet does not generate any output.
149+
This cmdlet doesn't generate any output.
133150

134151
## NOTES
135152

136153
## RELATED LINKS
137154

138-
[Enable-PSRemoting](../Microsoft.PowerShell.Core/Enable-PSRemoting.md)
139-
140-
[New-PSSession](../Microsoft.PowerShell.Core/New-PSSession.md)
141-
142155
[Connect-WSMan](Connect-WSMan.md)
143156

144157
[Disable-WSManCredSSP](Disable-WSManCredSSP.md)
145158

146159
[Disconnect-WSMan](Disconnect-WSMan.md)
147160

161+
[Enable-PSRemoting](../Microsoft.PowerShell.Core/Enable-PSRemoting.md)
162+
148163
[Enable-WSManCredSSP](Enable-WSManCredSSP.md)
149164

150165
[Get-WSManCredSSP](Get-WSManCredSSP.md)
151166

152167
[Get-WSManInstance](Get-WSManInstance.md)
153168

169+
[How To: Configure WINRM for HTTPS](https://support.microsoft.com/en-us/help/2019527/how-to-configure-winrm-for-https)
170+
154171
[Invoke-WSManAction](Invoke-WSManAction.md)
155172

173+
[New-PSSession](../Microsoft.PowerShell.Core/New-PSSession.md)
174+
156175
[New-WSManInstance](New-WSManInstance.md)
157176

158177
[New-WSManSessionOption](New-WSManSessionOption.md)
159178

160179
[Test-WSMan](Test-WSMan.md)
161-
162-

0 commit comments

Comments
 (0)