Skip to content

Commit 01ac406

Browse files
author
Angela Fleischmann
authored
Merge pull request MicrosoftDocs#3417 from MicrosoftDocs/main
Publish 05/01/2023 3:30 PM PDT
2 parents 3eaef12 + eac17b7 commit 01ac406

6 files changed

+345
-176
lines changed

docset/winserver2022-ps/ServerManager/Disable-ServerManagerStandardUserRemoting.md

+5-2
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Disable-ServerManagerStandardUserRemoting -User JennyL
5050

5151
In this example, the administrator disables access to event, performance counter, service
5252
status, and role and feature inventory data for a server that is being managed by using either a
53-
local or remote Server Manager console, and for which there is a standard user named JennyL.
53+
local or remote Server Manager console, and for which there is a standard user named `JennyL`.
5454

5555
### Example 2
5656

@@ -146,7 +146,10 @@ Accept wildcard characters: False
146146
147147
### CommonParameters
148148
149-
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
149+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
150+
-InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose,
151+
-WarningAction, and -WarningVariable. For more information, see
152+
[about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
150153
151154
## INPUTS
152155

docset/winserver2022-ps/ServerManager/Enable-ServerManagerStandardUserRemoting.md

+55-22
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,10 @@ title: Enable-ServerManagerStandardUserRemoting
1111
# Enable-ServerManagerStandardUserRemoting
1212

1313
## SYNOPSIS
14-
Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing by using Server Manager.
14+
15+
Provides one or more standard, non-Administrator users access to event, service, performance
16+
counter, and role and feature inventory data for a server that you are managing by using Server
17+
Manager.
1518

1619
## SYNTAX
1720

@@ -20,48 +23,69 @@ Enable-ServerManagerStandardUserRemoting [-User] <String[]> [-Force] [-WhatIf] [
2023
```
2124

2225
## DESCRIPTION
23-
Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing, either locally or remotely, by using Server Manager.
24-
The cmdlet must be run locally on the server that you are managing by using Server Manager.
25-
The cmdlet works by performing the following actions:
2626

27-
- Adds access rights for specified standard users to the root\cimv2 namespace on the local server (for access to role and feature inventory information).
27+
Provides one or more standard, non-Administrator users access to event, service, performance
28+
counter, and role and feature inventory data for a server that you are managing, either locally or
29+
remotely, by using Server Manager. The cmdlet must be run locally on the server that you are
30+
managing by using Server Manager. The cmdlet works by performing the following actions:
31+
32+
- Adds access rights for specified standard users to the root\cimv2 namespace on the local server
33+
(for access to role and feature inventory information).
2834

29-
- Adds specified standard users to required user groups (Remote Management Users, Event Log Readers, and Performance Log Readers) that allow remote access to event and performance counter logs on the managed server.
35+
- Adds specified standard users to required user groups (Remote Management Users, Event Log Readers,
36+
and Performance Log Readers) that allow remote access to event and performance counter logs on the
37+
managed server.
3038

31-
- Changes access rights in the Service Control Manager to allow specified standard users remote access to the status of services on the managed server.
39+
- Changes access rights in the Service Control Manager to allow specified standard users remote
40+
access to the status of services on the managed server.
3241

33-
This cmdlet does not provide standard users access to bpa (BPA) results, or allow standard users to run BPA scans.
34-
Aside from the preceding list of changes, this cmdlet provides no additional access that a standard user does not already have, by default, on managed servers.
42+
This cmdlet does not provide standard users access to bpa (BPA) results, or allow standard users to
43+
run BPA scans. Aside from the preceding list of changes, this cmdlet provides no additional access
44+
that a standard user does not already have, by default, on managed servers.
3545

36-
Running this cmdlet has security implications for your network environment because it grants specified non-Administrator users access rights to information that, by default, is restricted to members of the Administrators group on the local computer.
37-
The cmdlet provides access to other WMI providers in the root\cimv2 namespace, but only those providers that can be used by standard users.
38-
We recommend that you run this cmdlet only when you must add a specific standard user to the users who require access to remote server data by using Server Manager.
39-
Additionally, you should promptly run `Disable-ServerManagerStandardUserRemoting` to deny this access to users as soon as they no longer require it.
46+
Running this cmdlet has security implications for your network environment because it grants
47+
specified non-Administrator users access rights to information that, by default, is restricted to
48+
members of the Administrators group on the local computer. The cmdlet provides access to other WMI
49+
providers in the root\cimv2 namespace, but only those providers that can be used by standard users.
50+
We recommend that you run this cmdlet only when you must add a specific standard user to the users
51+
who require access to remote server data by using Server Manager. Additionally, you should promptly
52+
run `Disable-ServerManagerStandardUserRemoting` to deny this access to users as soon as they no
53+
longer require it.
4054

4155
## EXAMPLES
4256

4357
### Example 1
58+
4459
```powershell
4560
Enable-ServerManagerStandardUserRemoting -User JennyL
4661
```
4762

48-
In the following example, the administrator gives a standard user named JennyL access to event, performance counter, service status, and role and feature inventory data on a server that is being managed, either locally or remotely, by using Server Manager.
63+
In this example, the administrator gives a standard user named `JennyL` access to event, performance
64+
counter, service status, and role and feature inventory data on a server that is being managed,
65+
either locally or remotely, by using Server Manager.
4966

5067
### Example 2
68+
5169
```powershell
5270
Enable-ServerManagerStandardUserRemoting -User JennyL -WhatIf
5371
```
5472

55-
In the following example, the administrator views the outcome of running a command to give a standard user named JennyL access to event, performance counter, service status, and role and feature inventory data on a server that is being managed, either locally or remotely, by using Server Manager.
56-
The `WhatIf` parameter is added, meaning that the command actions are not carried out.
73+
In the following example, the administrator views the outcome of running a command to give a
74+
standard user named JennyL access to event, performance counter, service status, and role and
75+
feature inventory data on a server that is being managed, either locally or remotely, by using
76+
Server Manager. The `WhatIf` parameter is added, meaning that the command actions are not carried
77+
out.
5778

5879
### Example 3
80+
5981
```powershell
6082
Enable-ServerManagerStandardUserRemoting -User JennyL -Confirm
6183
```
6284

63-
In the following example, the administrator gives a standard user named JennyL access to event, performance counter, service status, and role and feature inventory data on a server that is being managed, either locally or remotely, by using Server Manager.
64-
The `Confirm` parameter is added, meaning that the command prompts for confirmation before performing the action.
85+
In the following example, the administrator gives a standard user named `JennyL` access to event,
86+
performance counter, service status, and role and feature inventory data on a server that is being
87+
managed, either locally or remotely, by using Server Manager. The `Confirm` parameter is added,
88+
meaning that the command prompts for confirmation before performing the action.
6589

6690
## PARAMETERS
6791

@@ -82,7 +106,10 @@ Accept wildcard characters: False
82106
```
83107
84108
### -User
85-
Specifies the user account name of a standard user who runs Server Manager, and requires access to event, performance counter, service, and role and feature inventory data for remote servers that are managed by using the local Server Manager console.
109+
110+
Specifies the user account name of a standard user who runs Server Manager, and requires access to
111+
event, performance counter, service, and role and feature inventory data for remote servers that are
112+
managed by using the local Server Manager console.
86113
87114
```yaml
88115
Type: String[]
@@ -97,6 +124,7 @@ Accept wildcard characters: False
97124
```
98125
99126
### -Confirm
127+
100128
Prompts you for confirmation before running the cmdlet.
101129
102130
```yaml
@@ -111,7 +139,8 @@ Accept pipeline input: False
111139
Accept wildcard characters: False
112140
```
113141
### -WhatIf
114-
Shows what would happen if the cmdlet runs.
142+
143+
Shows what would happen if the cmdlet were run.
115144
The cmdlet is not run.
116145
117146
```yaml
@@ -127,11 +156,16 @@ Accept wildcard characters: False
127156
```
128157
129158
### CommonParameters
130-
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
159+
160+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
161+
-InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose,
162+
-WarningAction, and -WarningVariable. For more information, see
163+
[about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
131164
132165
## INPUTS
133166
134167
### None
168+
135169
## OUTPUTS
136170
137171
### System.Object
@@ -147,4 +181,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
147181
[Uninstall-WindowsFeature](./Uninstall-WindowsFeature.md)
148182
149183
[Disable-ServerManagerStandardUserRemoting](./Disable-ServerManagerStandardUserRemoting.md)
150-

docset/winserver2022-ps/ServerManager/Get-WindowsFeature.md

+58-32
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,9 @@ title: Get-WindowsFeature
1111
# Get-WindowsFeature
1212

1313
## SYNOPSIS
14-
Gets information about Windows Server roles, role services, and features that are available for installation and installed on a specified server.
14+
15+
Gets information about Windows Server roles, role services, and features that are available for
16+
installation and installed on a specified server.
1517

1618
## SYNTAX
1719

@@ -21,57 +23,73 @@ Get-WindowsFeature [[-Name] <String[]>] [-Vhd <String>] [-ComputerName <String>]
2123
```
2224

2325
## DESCRIPTION
24-
The `Get-WindowsFeature` cmdlet gets information about features that are both available for installation and already installed on a computer that is running Windows Server or an offline virtual hard disk (VHD) that is running Windows Server.
26+
27+
The `Get-WindowsFeature` cmdlet gets information about features that are both available for
28+
installation and already installed on a computer that is running Windows Server, or an offline
29+
virtual hard disk (VHD) that is running Windows Server.
2530

2631
## EXAMPLES
2732

2833
### Example 1
34+
2935
```powershell
3036
Get-WindowsFeature -ComputerName Server1 -Credential contoso.com\user1
3137
```
3238

33-
This example gets a list of features that is available and installed on the target computer named Server1.
34-
The credentials for user user1 in the Contoso.com domain, a user who has Administrator rights on Server1, are provided.
39+
This example gets a list of features that are available and installed on the target computer named `Server1`.
40+
The credentials for user `user1` in the Contoso.com domain, a user who has Administrator rights on `Server1`, are provided.
3541

3642
### Example 2
43+
3744
```powershell
3845
Get-WindowsFeature -Vhd D:\ps-test\vhd1.vhd
3946
```
4047

41-
This example returns a list of features that is available and installed on the specified offline VHD located at D:\ps-test\vhd1.vhd.
48+
This example returns a list of features that are available and installed on the specified offline
49+
VHD located at `D:\ps-test\vhd1.vhd`.
4250

4351
### Example 3
52+
4453
```powershell
4554
Get-WindowsFeature -Name AD*, Web*
4655
```
4756

48-
This example returns a list of available and installed features that have a command ID starting with AD or Web.
57+
This example returns a list of available and installed features that have a command ID starting with
58+
`AD` or `Web`.
4959

5060
### Example 4
61+
5162
```powershell
5263
Get-WindowsFeature -ComputerName Server01 | Where Installed
5364
```
5465

55-
This example returns a list of features installed on a specified server, Server01.
66+
This example returns a list of features installed on a specified server, `Server01`.
5667

5768
### Example 5
69+
5870
```powershell
5971
Get-WindowsFeature -ComputerName Server01 | Where InstallState -Eq Removed
6072
```
6173

62-
This example returns a list of features on a specified server, Server01, that have installation files removed from the local side-by-side store, and require an external file source for installation.
74+
This example returns a list of features on a specified server, `Server01`, that have installation
75+
files removed from the local side-by-side store and require an external file source for
76+
installation.
6377

6478
## PARAMETERS
6579

6680
### -ComputerName
67-
Gets the list of available features from the specified remote computer that is running Windows Server.
68-
The parameter accepts only one computer name.
69-
If this parameter is not added, or no computer name is specified, the default target is the local computer.
70-
Valid values for the parameter include a NetBIOS name, an IP address, or a fully qualified domain name of a remote computer.
7181

72-
To use a remote computer's IP address as the value of this parameter, your command must include the `Credential` parameter.
73-
The computer must either be configured for HTTPS transport, or the IP address of the remote computer must be included in the WinRM TrustedHosts list on the local computer.
74-
For information about adding a computer name to the WinRM TrustedHosts list, see "How to Add a Computer to the Trusted Host List" in [about_Remote_Troubleshooting](https://go.microsoft.com/fwlink/p/?LinkID=135188).
82+
Gets the list of available features from the specified remote computer that is running Windows
83+
Server. The parameter accepts only one computer name. If this parameter is not added, or no computer
84+
name is specified, the default target is the local computer. Valid values for the parameter include
85+
a NetBIOS name, an IP address, or a fully qualified domain name of a remote computer.
86+
87+
To use a remote computer's IP address as the value of this parameter, your command must include the
88+
**Credential** parameter. The computer must either be configured for HTTPS transport, or the IP
89+
address of the remote computer must be included in the WinRM TrustedHosts list on the local
90+
computer. For information about adding a computer name to the WinRM TrustedHosts list, see "How to
91+
Add a Computer to the Trusted Host List" in
92+
[about_Remote_Troubleshooting](https://go.microsoft.com/fwlink/p/?LinkID=135188).
7593

7694
```yaml
7795
Type: String
@@ -86,10 +104,10 @@ Accept wildcard characters: False
86104
```
87105
88106
### -Credential
89-
Specifies a user account that has access rights to perform this action.
90-
If the parameter is not added, or no value is specified, the default value of this parameter is the current user.
91-
Enter a user name in one of the following formats.
92-
Quotation marks are optional.
107+
108+
Specifies a user account that has access rights to perform this action. If the parameter is not
109+
added, or no value is specified, the default value of this parameter is the current user. Enter a
110+
user name in one of the following formats. Quotation marks are optional.
93111
94112
-- "UserName"
95113
-- "Domain\User"
@@ -111,6 +129,7 @@ Accept wildcard characters: False
111129
```
112130
113131
### -LogPath
132+
114133
Specifies a name and path to a log file.
115134
Add this parameter if the results of this cmdlet must be stored in a log.
116135
@@ -127,6 +146,7 @@ Accept wildcard characters: False
127146
```
128147
129148
### -Name
149+
130150
Specifies the command IDs of roles, role services, or features about which to return information.
131151
132152
```yaml
@@ -142,19 +162,22 @@ Accept wildcard characters: False
142162
```
143163
144164
### -Vhd
145-
Specifies the path to an offline VHD.
146-
The path can either point to a VHD file, or to a location on which the VHD is already mounted by using Deployment Image Servicing and Management (DISM) tools.
147165
148-
The VHD can be on a local disk on the target computer, or on a network shared folder.
149-
If the VHD is in a network shared folder, then the value of this parameter is a UNC path to the VHD.
150-
In this case, the computer account of the computer that you are using to mount the VHD must have read and write permissions (Read/Write permissions in the File Sharing dialog box, or Full Control on the Security tab of the folder Properties dialog box) on the shared folder, or the VHD will not be accessible.
151-
Local loopback UNC paths are not supported.
152-
Use either of the following formats for the computer account: DOMAIN\SERVERNAME$ or SERVERNAME$.
166+
Specifies the path to an offline VHD. The path can either point to a VHD file, or to a location on
167+
which the VHD is already mounted by using Deployment Image Servicing and Management (DISM) tools.
153168
154-
Add the `ComputerName` parameter to specify the target computer you want to use to mount the VHD.
155-
If the `ComputerName` parameter is not specified, then the local computer is used.
156-
The computer that you are using to mount the VHD must be running Windows Server.
157-
Any local path, such as D:\myFolder, that is specified by using this parameter is always relative to the target computer.
169+
The VHD can be on a local disk on the target computer or on a network shared folder. If the VHD is
170+
in a network shared folder, then the value of this parameter is a UNC path to the VHD. In this case,
171+
the computer account of the computer that you are using to mount the VHD must have read and write
172+
permissions (Read/Write permissions in the File Sharing dialog box or Full Control on the Security
173+
tab of the folder Properties dialog box) on the shared folder or the VHD will not be accessible.
174+
Local loopback UNC paths are not supported. Use either of the following formats for the computer
175+
account: DOMAIN\SERVERNAME$ or SERVERNAME$.
176+
177+
Add the **ComputerName** parameter to specify the target computer you want to use to mount the VHD.
178+
If the **ComputerName** parameter is not specified, then the local computer is used. The computer
179+
that you are using to mount the VHD must be running Windows Server. Any local path, such as
180+
`D:\myFolder`, that is specified by using this parameter is always relative to the target computer.
158181

159182
```yaml
160183
Type: String
@@ -169,7 +192,11 @@ Accept wildcard characters: False
169192
```
170193

171194
### CommonParameters
172-
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
195+
196+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
197+
-InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose,
198+
-WarningAction, and -WarningVariable. For more information, see
199+
[about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
173200

174201
## INPUTS
175202

@@ -190,4 +217,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
190217
[Enable-ServerManagerStandardUserRemoting](./Enable-ServerManagerStandardUserRemoting.md)
191218

192219
[Disable-ServerManagerStandardUserRemoting](./Disable-ServerManagerStandardUserRemoting.md)
193-

0 commit comments

Comments
 (0)