Skip to content

Commit 03d4d60

Browse files
Del MyersMikejo5000
andauthored
Apply suggestions from code review
Co-authored-by: Mike Jones <[email protected]>
1 parent 7931ac0 commit 03d4d60

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

docs/debugger/specify-symbol-dot-pdb-and-source-files-in-the-visual-studio-debugger.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -182,32 +182,32 @@ Both the **Automatically choose what module symbols to search for** and **Search
182182
module symbols unless excluded** options allow you to have more fine control over what symbols
183183
are searched for while debugging. Choose **Specify module filters** to fine-tune your experience.
184184

185-
By default, you will see the following dialog with **Automatically choose what module symbols to search for**:
185+
By default, you see the following dialog when **Automatically choose what module symbols to search for** is selected:
186186

187187
![Tools&#47; Options&#47; Debugging&#47;Automatic symbols&47;Specify module filters](media/vs-2022/specify-include-list.png "Tools&#47; Options&#47; Debugging&#47;Automatic symbols&47;Specify module filters")
188188

189189
You can add a module to the filter by using the '+' icon. Module filters support simple wild-card
190190
matching. A '\*' matches any group of characters. For example '\*myproduct\*' will match files such
191191
as 'myproduct.utilities.dll' and 'entrypoint.myproduct.exe', among others.
192192

193-
There are several additional options to tweak your experience:
193+
There are several additional options to further customize your experience:
194194

195195
- **Always load symbols located next to modules** instructs visual studio to load pdb files that
196196
are stored in the file system beside their corresponding .dll or .exe files. This can be helpful,
197197
for example, when attempting to debug a deployed web app.
198198

199-
- **Automatically load additional symbols when needed** will instruct Visual Studio to search for
199+
- **Automatically load additional symbols when needed** instructs Visual Studio to search for
200200
symbols to perform common debug actions, such as stepping, even if the module that you will be
201201
stepping to is not in your project or in the modules filter. The way that searching is determined
202-
may also be affected by your [Just My Code](just-my-code.md) settings.
202+
might be affected by your [Just My Code](just-my-code.md) settings.
203203

204204
If you have selected **Search for all module symbols unless excluded**, then the module filter
205205
dialog looks like this:
206206

207207
![Tools&#47; Options&#47; Debugging&#47;All symbols symbols&47;Specify module filters](media/vs-2022/specify-exclude-list.png "Tools&#47; Options&#47; Debugging&#47;All symbols symbols&47;Specify module filters")
208208

209209
In this dialog, you can choose what modules you *do not* want Visual Studio to load symbols for.
210-
In this case, Visual Studio will attempt to load symbols for every module in your debugged
210+
In this scenario, Visual Studio attempts to load symbols for every module in your debugged
211211
proces (including modules by third parties), unless you add a matching filter to exclude them.
212212
The only other way that this behavior will be modified is by your [Just My Code](just-my-code.md)
213213
settings.
@@ -237,7 +237,7 @@ You can select additional symbol options in **Tools** > **Options** > **Debuggin
237237
> [!IMPORTANT]
238238
> Arbitrary commands can be embedded in an app's *.pdb* file, so make sure to put only the commands you want to execute into a *srcsrv.ini* file. Any attempt to execute a command not in the *srcsvr.ini* file will cause a confirmation dialog box to appear. For more information, see [Security Warning: Debugger Must Execute Untrusted Command](../debugger/security-warning-debugger-must-execute-untrusted-command.md).
239239
>
240-
> No validation is done on command parameters, so be careful with trusted commands. For example, if you listed *cmd.exe* in your *srcsrv.ini*, a malicious user might specify parameters on *cmd.exe* that would make it dangerous.
240+
> No validation is performed on command parameters, so be careful with trusted commands. For example, if you listed *cmd.exe* in your *srcsrv.ini*, a malicious user might specify parameters on *cmd.exe* that would make it dangerous.
241241
242242
Select this item and the child items you want. **Allow source server for partial trust assemblies (Managed only)** and **Always run untrusted source server commands without prompting** can increase the security risks.
243243

0 commit comments

Comments
 (0)