You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Runs the cmdlet in a remote session or on a remote computer.
138
-
Enter a computer name or a session object, such as the output of a [New-CimSession](https://docs.microsoft.com/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
138
+
Enter a computer name or a session object, such as the output of a [New-CimSession](/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
139
139
The default is the current session on the local computer.
140
140
141
141
```yaml
@@ -288,4 +288,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
Copy file name to clipboardExpand all lines: docset/winserver2019-ps/windowserrorreporting/Disable-WindowsErrorReporting.md
+1-2
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ Windows Error Reporting generates reports in response to system events, such as
27
27
28
28
To get the current WER status, use the [Get-WindowsErrorReporting](./Get-WindowsErrorReporting.md) cmdlet.
29
29
If you disable WER, you can use the [Enable-WindowsErrorReporting](./Enable-WindowsErrorReporting.md) cmdlet to re-enable it.
30
-
After you run this cmdlet, WER again sends information about application failures to Microsoft. To customize the settings of Windows Error Reporting, use registry keys described in [WER Settings](https://docs.microsoft.com/windows/desktop/wer/wer-settings) article.
30
+
After you run this cmdlet, WER again sends information about application failures to Microsoft. To customize the settings of Windows Error Reporting, use registry keys described in [WER Settings](/windows/desktop/wer/wer-settings) article.
Copy file name to clipboardExpand all lines: docset/winserver2022-ps/activedirectory/ActiveDirectory.md
+1-2
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ The Active Directory module for Windows PowerShell is a PowerShell module that c
15
15
16
16
If you don't have the Active Directory module installed on your machine, you need to download the correct Remote Server Administration Tools (RSAT) package for your OS. If you're running Windows 7, you will also need to run the `import-module ActiveDirectory` command from an elevated PowerShell prompt. For more detail, see [RSAT for Windows operating systems](https://support.microsoft.com/help/2693643/remote-server-administration-tools-rsat-for-windows-operating-systems). Starting with Windows 10 October 2018 Update, RSAT is included as a set of Features on Demand right from Windows 10. Now, instead of downloading an RSAT package you can just go to Manage optional features in Settings and click Add a feature to see the list of available RSAT tools. Select and install the specific RSAT tools you need. To see installation progress, click the Back button to view status on the Manage optional features page.
17
17
18
-
If you want to use this module in PowerShell 7, please see [PowerShell 7 module compatibility](https://docs.microsoft.com/powershell/scripting/whats-new/module-compatibility).
18
+
If you want to use this module in PowerShell 7, see [PowerShell 7 module compatibility](/powershell/scripting/whats-new/module-compatibility).
Copy file name to clipboardExpand all lines: docset/winserver2022-ps/activedirectory/Get-ADComputer.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ You can also set the parameter to a computer object variable, such as `$<localCo
45
45
To search for and retrieve more than one computer, use the *Filter* or *LDAPFilter* parameters.
46
46
The *Filter* parameter uses the PowerShell Expression Language to write query strings for Active Directory.
47
47
PowerShell Expression Language syntax provides rich type conversion support for value types received by the *Filter* parameter.
48
-
For more information about the *Filter* parameter syntax, type `Get-Help`[about_ActiveDirectory_Filter](https://docs.microsoft.com/previous-versions/windows/server/hh531527(v=ws.10)).
48
+
For more information about the *Filter* parameter syntax, type `Get-Help`[about_ActiveDirectory_Filter](/previous-versions/windows/server/hh531527(v=ws.10)).
49
49
If you have existing Lightweight Directory Access Protocol (LDAP) query strings, you can use the *LDAPFilter* parameter.
50
50
51
51
This cmdlet retrieves a default set of computer object properties.
@@ -257,7 +257,7 @@ Specifies a query string that retrieves Active Directory objects.
257
257
This string uses the Windows PowerShell Expression Language syntax.
258
258
The Windows PowerShell Expression Language syntax provides rich type-conversion support for value types received by the *Filter* parameter.
259
259
The syntax uses an in-order representation, which means that the operator is placed between the operand and the value.
260
-
For more information about the *Filter* parameter, type `Get-Help` [about_ActiveDirectory_Filter](https://docs.microsoft.com/previous-versions/windows/server/hh531527(v=ws.10)).
260
+
For more information about the *Filter* parameter, type `Get-Help` [about_ActiveDirectory_Filter](/previous-versions/windows/server/hh531527(v=ws.10)).
Specifies an LDAP query string that is used to filter Active Directory objects.
331
331
You can use this parameter to run your existing LDAP queries.
332
332
The *Filter* parameter syntax supports the same functionality as the LDAP syntax.
333
-
For more information, see the *Filter* parameter description or type `Get-Help` [about_ActiveDirectory_Filter](https://docs.microsoft.com/previous-versions/windows/server/hh531527(v=ws.10)).
333
+
For more information, see the *Filter* parameter description or type `Get-Help` [about_ActiveDirectory_Filter](/previous-versions/windows/server/hh531527(v=ws.10)).
Copy file name to clipboardExpand all lines: docset/winserver2022-ps/activedirectory/Get-ADUser.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -190,7 +190,7 @@ The following syntax uses Backus-Naur form to show how to use the PowerShell Exp
190
190
191
191
For a list of supported types for \<value\>, type `Get-Help about_ActiveDirectory_ObjectModel`.
192
192
193
-
Note: For String parameter type, PowerShell will cast the filter query to a string while processing the command. When using a string variable as a value in the filter component, make sure that it complies with the [PowerShell Quoting Rules](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/about/about_quoting_rules). For example, if the filter expression is double-quoted, the variable should be enclosed using single quotation marks:
193
+
Note: For String parameter type, PowerShell will cast the filter query to a string while processing the command. When using a string variable as a value in the filter component, make sure that it complies with the [PowerShell Quoting Rules](/powershell/module/microsoft.powershell.core/about/about_quoting_rules). For example, if the filter expression is double-quoted, the variable should be enclosed using single quotation marks:
194
194
**Get-ADUser -Filter "Name -like '$UserName'"**. On the contrary, if curly braces are used to enclose the filter, the variable should not be quoted at all: **Get-ADUser -Filter {Name -like $UserName}**.
195
195
196
196
Note: PowerShell wildcards other than \*, such as ?, are not supported by the *Filter* syntax.
Copy file name to clipboardExpand all lines: docset/winserver2022-ps/adcsdeployment/Install-AdcsCertificationAuthority.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ You can import the cmdlet by running the following commands from Windows PowerSh
53
53
54
54
To include the Certification Authority and Certificate Templates consoles in a CA installation, you must use the *IncludeManagementTools* parameter at the end of the `Install-WindowsFeature Adcs-Cert-Authority` command.
55
55
56
-
Int is equivalent to Int32 in the [.NET Framework](https://docs.microsoft.com/dotnet/csharp/language-reference/builtin-types/built-in-types).
56
+
Int is equivalent to Int32 in the [.NET Framework](/dotnet/csharp/language-reference/builtin-types/built-in-types).
For more information, see [Configure On-Premises Conditional Access using registered devices](https://docs.microsoft.com/windows-server/identity/ad-fs/operations/configure-device-based-conditional-access-on-premises).
24
+
For more information, see [Configure On-Premises Conditional Access using registered devices](/windows-server/identity/ad-fs/operations/configure-device-based-conditional-access-on-premises).
25
25
26
26
The **Enable-AdfsDeviceRegistration** cmdlet configures a server in an Active Directory Federation Services (AD FS) farm to host the Device Registration Service.
27
27
To completely enable the Device Registration Service, you must run this command on each AD FS server in your AD FS farm.
@@ -121,4 +121,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm.
43
43
44
44
> [!NOTE]
45
-
> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](https://docs.microsoft.com/powershell/module/Azuread/?view=azureadps-2.0).
45
+
> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module, see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0).
46
46
47
47
### Example 2: Determine which certificate Azure MFA is using
Copy file name to clipboardExpand all lines: docset/winserver2022-ps/appx/Remove-AppxPackage.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -163,7 +163,7 @@ If you specify this parameter, the cmdlet removes the app package for only the u
163
163
> [!NOTE]
164
164
>
165
165
> - This parameter only accepts user SIDs
166
-
> - Use the **whoami /user** command to display the current SID of a user. See [whoami syntax](https://docs.microsoft.com/windows-server/administration/windows-commands/whoami) for details.
166
+
> - Use the **whoami /user** command to display the current SID of a user. See [whoami syntax](/windows-server/administration/windows-commands/whoami) for details.
Copy file name to clipboardExpand all lines: docset/winserver2022-ps/bitlocker/Get-BitLockerVolume.md
+2-3
Original file line number
Diff line number
Diff line change
@@ -41,9 +41,9 @@ You can also use this cmdlet to view the following information about a BitLocker
41
41
- Protection Status - Whether BitLocker currently uses a key protector to encrypt the volume encryption key.
42
42
- EncryptionMethod - Indicates the encryption algorithm and key size used on the volume.
43
43
44
-
See [BitLocker Overview](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview) for more information.
44
+
See [BitLocker Overview](/windows/security/information-protection/bitlocker/bitlocker-overview) for more information.
45
45
46
-
For an overview of encryption methods, see [GetEncryptionMethod method](https://docs.microsoft.com/windows/win32/secprov/getencryptionmethod-win32-encryptablevolume).
46
+
For an overview of encryption methods, see [GetEncryptionMethod method](/windows/win32/secprov/getencryptionmethod-win32-encryptablevolume).
47
47
48
48
## EXAMPLES
49
49
@@ -134,4 +134,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
Copy file name to clipboardExpand all lines: docset/winserver2022-ps/bitlocker/Remove-BitLockerKeyProtector.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ Any encrypted data on the drive remains encrypted.
32
32
33
33
We recommend you have at least one recovery password as key protector to a volume in case you need to recover a system.
34
34
35
-
For an overview of BitLocker, see [Overview of BitLocker Device Encryption](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10).
35
+
For an overview of BitLocker, see [Overview of BitLocker Device Encryption](/windows/security/information-protection/bitlocker/bitlocker-device-encryption-overview-windows-10).
Specifies the primary level of detail for generated rules. Refer to [WDAC File Rule Levels](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-file-rule-levels) for acceptable parameter values and descriptions.
463
+
Specifies the primary level of detail for generated rules. Refer to [WDAC File Rule Levels](/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-file-rule-levels) for acceptable parameter values and descriptions.
464
464
465
465
```yaml
466
466
Type: RuleLevel
@@ -674,4 +674,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
Specifies the path of a folder for generating a rule with level set to FilePath. Refer to [Filepath Rules Info](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#more-information-about-filepath-rules) for acceptable wildcard values and usage.
388
+
Specifies the path of a folder for generating a rule with level set to FilePath. Refer to [Filepath Rules Info](/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#more-information-about-filepath-rules) for acceptable wildcard values and usage.
389
389
This cmdlet will not check whether the filepath string is a valid filepath.
390
390
391
391
```yaml
@@ -492,4 +492,3 @@ This cmdlet returns the rules that it creates.
Specifies the index of the rule option that this cmdlet modifies.
133
-
Specify the **Help** parameter for option information. Refer to [WDAC Policy Rule Options](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-policy-rules) for more detailed descriptions of each option.
133
+
Specify the **Help** parameter for option information. Refer to [WDAC Policy Rule Options](/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-policy-rules) for more detailed descriptions of each option.
134
134
135
135
```yaml
136
136
Type: Int32
@@ -156,4 +156,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
Runs the cmdlet in a remote session or on a remote computer.
85
-
Enter a computer name or a session object, such as the output of a [New-CimSession](https://docs.microsoft.com/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
85
+
Enter a computer name or a session object, such as the output of a [New-CimSession](/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
86
86
The default is the current session on the local computer.
87
87
88
88
```yaml
@@ -172,4 +172,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th
Runs the cmdlet in a remote session or on a remote computer.
88
-
Enter a computer name or a session object, such as the output of a [New-CimSession](https://docs.microsoft.com/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
88
+
Enter a computer name or a session object, such as the output of a [New-CimSession](/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
89
89
The default is the current session on the local computer.
90
90
91
91
```yaml
@@ -204,4 +204,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th
Runs the cmdlet in a remote session or on a remote computer.
67
-
Enter a computer name or a session object, such as the output of a [New-CimSession](https://docs.microsoft.com/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
67
+
Enter a computer name or a session object, such as the output of a [New-CimSession](/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
68
68
The default is the current session on the local computer.
69
69
70
70
```yaml
@@ -128,4 +128,3 @@ A value of zero indicates success.
Runs the cmdlet in a remote session or on a remote computer.
63
-
Enter a computer name or a session object, such as the output of a [New-CimSession](https://docs.microsoft.com/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
63
+
Enter a computer name or a session object, such as the output of a [New-CimSession](/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
64
64
The default is the current session on the local computer.
65
65
66
66
```yaml
@@ -159,4 +159,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th
Runs the cmdlet in a remote session or on a remote computer.
93
-
Enter a computer name or a session object, such as the output of a [New-CimSession](https://docs.microsoft.com/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
93
+
Enter a computer name or a session object, such as the output of a [New-CimSession](/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
94
94
The default is the current session on the local computer.
95
95
96
96
```yaml
@@ -159,4 +159,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th
Runs the cmdlet in a remote session or on a remote computer.
77
-
Enter a computer name or a session object, such as the output of a [New-CimSession](https://docs.microsoft.com/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
77
+
Enter a computer name or a session object, such as the output of a [New-CimSession](/powershell/module/cimcmdlets/new-cimsession) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
78
78
The default is the current session on the local computer.
79
79
80
80
```yaml
@@ -171,4 +171,3 @@ The path after the pound sign (`#`) provides the namespace and class name for th
0 commit comments