Skip to content

Commit 3c99cc7

Browse files
author
Del Myers
committed
Merge branch 'dev/delmyers/symbolsettings' of https://github.com/delmyers/visualstudio-docs-pr into dev/delmyers/symbolsettings
2 parents 734932b + 03d4d60 commit 3c99cc7

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

docs/debugger/specify-symbol-dot-pdb-and-source-files-in-the-visual-studio-debugger.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -181,32 +181,32 @@ Both the **Automatically choose what module symbols to search for** and **Search
181181
module symbols unless excluded** options allow you to have more fine control over what symbols
182182
are searched for while debugging. Choose **Specify module filters** to fine-tune your experience.
183183

184-
By default, you will see the following dialog with **Automatically choose what module symbols to search for**:
184+
By default, you see the following dialog when **Automatically choose what module symbols to search for** is selected:
185185

186186
![Tools/ Options/ Debugging/Automatic symbols&47;Specify module filters](media/vs-2022/specify-include-list.png "Tools/ Options/ Debugging/Automatic symbols&47;Specify module filters")
187187

188188
You can add a module to the filter by using the '+' icon. Module filters support simple wild-card
189189
matching. A '\*' matches any group of characters. For example '\*myproduct\*' will match files such
190190
as 'myproduct.utilities.dll' and 'entrypoint.myproduct.exe', among others.
191191

192-
There are several additional options to tweak your experience:
192+
There are several additional options to further customize your experience:
193193

194194
- **Always load symbols located next to modules** instructs visual studio to load pdb files that
195195
are stored in the file system beside their corresponding .dll or .exe files. This can be helpful,
196196
for example, when attempting to debug a deployed web app.
197197

198-
- **Automatically load additional symbols when needed** will instruct Visual Studio to search for
198+
- **Automatically load additional symbols when needed** instructs Visual Studio to search for
199199
symbols to perform common debug actions, such as stepping, even if the module that you will be
200200
stepping to is not in your project or in the modules filter. The way that searching is determined
201-
may also be affected by your [Just My Code](just-my-code.md) settings.
201+
might be affected by your [Just My Code](just-my-code.md) settings.
202202

203203
If you have selected **Search for all module symbols unless excluded**, then the module filter
204204
dialog looks like this:
205205

206206
![Tools/ Options/ Debugging/All symbols symbols&47;Specify module filters](media/vs-2022/specify-exclude-list.png "Tools/ Options/ Debugging/All symbols symbols&47;Specify module filters")
207207

208208
In this dialog, you can choose what modules you *do not* want Visual Studio to load symbols for.
209-
In this case, Visual Studio will attempt to load symbols for every module in your debugged
209+
In this scenario, Visual Studio attempts to load symbols for every module in your debugged
210210
proces (including modules by third parties), unless you add a matching filter to exclude them.
211211
The only other way that this behavior will be modified is by your [Just My Code](just-my-code.md)
212212
settings.
@@ -236,7 +236,7 @@ You can select additional symbol options in **Tools** > **Options** > **Debuggin
236236
> [!IMPORTANT]
237237
> Arbitrary commands can be embedded in an app's *.pdb* file, so make sure to put only the commands you want to execute into a *srcsrv.ini* file. Any attempt to execute a command not in the *srcsvr.ini* file will cause a confirmation dialog box to appear. For more information, see [Security Warning: Debugger Must Execute Untrusted Command](../debugger/security-warning-debugger-must-execute-untrusted-command.md).
238238
>
239-
> No validation is done on command parameters, so be careful with trusted commands. For example, if you listed *cmd.exe* in your *srcsrv.ini*, a malicious user might specify parameters on *cmd.exe* that would make it dangerous.
239+
> No validation is performed on command parameters, so be careful with trusted commands. For example, if you listed *cmd.exe* in your *srcsrv.ini*, a malicious user might specify parameters on *cmd.exe* that would make it dangerous.
240240
241241
Select this item and the child items you want. **Allow source server for partial trust assemblies (Managed only)** and **Always run untrusted source server commands without prompting** can increase the security risks.
242242

0 commit comments

Comments
 (0)