Skip to content

Commit cf9329d

Browse files
authored
Merge branch 'main' into servermanager_get-windowsfeature
2 parents 9aba27c + c87ea1e commit cf9329d

File tree

139 files changed

+10751
-6378
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

139 files changed

+10751
-6378
lines changed
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,18 @@
11
ADCS
2+
Cmdletization
3+
Dcpromo
4+
Dedup
5+
DSRM
6+
Hotspot
7+
hotspots
8+
krbtgt
29
NTDS
10+
reoptimized
11+
rescan
12+
RODC
13+
Sysvol
14+
Unoptimization
15+
unoptimization
16+
unoptimizes
17+
unoptimize
18+
unoptimized

docset/winserver2022-ps/ServerManager/Disable-ServerManagerStandardUserRemoting.md

+44-16
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,10 @@ title: Disable-ServerManagerStandardUserRemoting
1111
# Disable-ServerManagerStandardUserRemoting
1212

1313
## SYNOPSIS
14-
Disables access for specified standard users to event, service, performance counter, and role and feature inventory data that is collected by Server Manager for a server.
15-
This cmdlet performs the opposite action, for specified users, of the Enable-ServerManagerStandardUserRemoting cmdlet.
14+
15+
Disables access for specified standard users to event, service, performance counter, and role and
16+
feature inventory data that is collected by Server Manager for a server. This cmdlet performs the
17+
opposite action, for specified users, of the `Enable-ServerManagerStandardUserRemoting` cmdlet.
1618

1719
## SYNTAX
1820

@@ -21,40 +23,57 @@ Disable-ServerManagerStandardUserRemoting [-User] <String[]> [-Force] [-WhatIf]
2123
```
2224

2325
## DESCRIPTION
24-
Disables access for one or more standard, non-Administrator users to event, service, performance counter, and role and feature inventory data for a server that you are managing by using Server Manager.
25-
The cmdlet restores the default, administrator-only access to this data, and must be run locally on the server that is being managed by using Server Manager.
26-
The cmdlet works by performing the following actions:
2726

28-
- Deletes access rights for specified standard users to the root\cimv2 namespace on the local server (for access to role and feature inventory information).
27+
Disables access for one or more standard, non-Administrator users to event, service, performance
28+
counter, and role and feature inventory data for a server that you are managing by using Server
29+
Manager. The cmdlet restores the default, administrator-only access to this data, and must be run
30+
locally on the server that is being managed by using Server Manager. The cmdlet works by performing
31+
the following actions:
32+
33+
- Deletes access rights for specified standard users to the `root\cimv2` namespace on the local server
34+
(for access to role and feature inventory information).
2935

30-
- Removes specified standard users from user groups (Remote Management Users, Event Log Readers, and Performance Log Readers) that allow remote access to event and performance counter logs on the local server.
36+
- Removes specified standard users from user groups (Remote Management Users, Event Log Readers, and
37+
Performance Log Readers) that allow remote access to event and performance counter logs on the
38+
local server.
3139

32-
- Removes access rights in the Service Control Manager for specified standard users who have access to the status of services on the local server.
40+
- Removes access rights in the Service Control Manager for specified standard users who have access
41+
to the status of services on the local server.
3342

3443
## EXAMPLES
3544

3645
### Example 1
46+
3747
```powershell
3848
Disable-ServerManagerStandardUserRemoting -User JennyL
3949
```
4050

41-
In the following example, the administrator disables access to event, performance counter, service status, and role and feature inventory data for a server that is being managed by using either a local or remote Server Manager console, and for which there is a standard user named JennyL.
51+
In this example, the administrator disables access to event, performance counter, service
52+
status, and role and feature inventory data for a server that is being managed by using either a
53+
local or remote Server Manager console, and for which there is a standard user named `JennyL`.
4254

4355
### Example 2
56+
4457
```powershell
4558
Disable-ServerManagerStandardUserRemoting -User JennyL -WhatIf
4659
```
4760

48-
In the following example, the administrator views the outcome of running a command to deny a standard user named JennyL access to event, performance counter, service status, and role and feature inventory data for a server that is being managed by using the Server Manager console running on either the local or a remote computer.
49-
The `WhatIf` parameter is added, meaning that the command actions are not carried out.
61+
In this example, the administrator views the outcome of running a command to deny a standard user
62+
named `JennyL` access to event, performance counter, service status, and role and feature inventory
63+
data for a server that is being managed by using the Server Manager console running on either the
64+
local or a remote computer. The **WhatIf** parameter is added, meaning that the command actions are
65+
not carried out.
5066

5167
### Example 3
68+
5269
```powershell
5370
Disable-ServerManagerStandardUserRemoting -User JennyL -Confirm
5471
```
5572

56-
In the following example, the administrator denies a standard user named JennyL access to event, performance counter, service status, and role and feature inventory data for a server that is being managed by using the Server Manager console running on either the local or a remote computer.
57-
The `Confirm` parameter is added, meaning that the command prompts for confirmation before performing the action.
73+
In this example, the administrator denies a standard user named `JennyL` access to event, performance
74+
counter, service status, and role and feature inventory data for a server that is being managed by
75+
using the Server Manager console running on either the local or a remote computer. The **Confirm**
76+
parameter is added, meaning that the command prompts for confirmation before performing the action.
5877

5978
## PARAMETERS
6079

@@ -75,7 +94,10 @@ Accept wildcard characters: False
7594
```
7695
7796
### -User
78-
Specifies the user account name of a standard user who runs Server Manager, and no longer requires access to event, performance counter, service, and role and feature inventory data for a server that is being managed by using either a local or remote Server Manager console.
97+
98+
Specifies the user account name of a standard user who runs Server Manager and no longer requires
99+
access to event, performance counter, service, and role and feature inventory data for a server that
100+
is being managed by using either a local or remote Server Manager console.
79101
80102
```yaml
81103
Type: String[]
@@ -90,6 +112,7 @@ Accept wildcard characters: False
90112
```
91113
92114
### -Confirm
115+
93116
Prompts you for confirmation before running the cmdlet.
94117
95118
```yaml
@@ -105,7 +128,8 @@ Accept wildcard characters: False
105128
```
106129
107130
### -WhatIf
108-
Shows what would happen if the cmdlet runs.
131+
132+
Shows what would happen if the cmdlet were run.
109133
The cmdlet is not run.
110134
111135
```yaml
@@ -121,7 +145,11 @@ Accept wildcard characters: False
121145
```
122146
123147
### CommonParameters
124-
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
148+
149+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
150+
-InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose,
151+
-WarningAction, and -WarningVariable. For more information, see
152+
[about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
125153
126154
## INPUTS
127155

docset/winserver2022-ps/ServerManager/Enable-ServerManagerStandardUserRemoting.md

+55-22
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,10 @@ title: Enable-ServerManagerStandardUserRemoting
1111
# Enable-ServerManagerStandardUserRemoting
1212

1313
## SYNOPSIS
14-
Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing by using Server Manager.
14+
15+
Provides one or more standard, non-Administrator users access to event, service, performance
16+
counter, and role and feature inventory data for a server that you are managing by using Server
17+
Manager.
1518

1619
## SYNTAX
1720

@@ -20,48 +23,69 @@ Enable-ServerManagerStandardUserRemoting [-User] <String[]> [-Force] [-WhatIf] [
2023
```
2124

2225
## DESCRIPTION
23-
Provides one or more standard, non-Administrator users access to event, service, performance counter, and role and feature inventory data for a server that you are managing, either locally or remotely, by using Server Manager.
24-
The cmdlet must be run locally on the server that you are managing by using Server Manager.
25-
The cmdlet works by performing the following actions:
2626

27-
- Adds access rights for specified standard users to the root\cimv2 namespace on the local server (for access to role and feature inventory information).
27+
Provides one or more standard, non-Administrator users access to event, service, performance
28+
counter, and role and feature inventory data for a server that you are managing, either locally or
29+
remotely, by using Server Manager. The cmdlet must be run locally on the server that you are
30+
managing by using Server Manager. The cmdlet works by performing the following actions:
31+
32+
- Adds access rights for specified standard users to the root\cimv2 namespace on the local server
33+
(for access to role and feature inventory information).
2834

29-
- Adds specified standard users to required user groups (Remote Management Users, Event Log Readers, and Performance Log Readers) that allow remote access to event and performance counter logs on the managed server.
35+
- Adds specified standard users to required user groups (Remote Management Users, Event Log Readers,
36+
and Performance Log Readers) that allow remote access to event and performance counter logs on the
37+
managed server.
3038

31-
- Changes access rights in the Service Control Manager to allow specified standard users remote access to the status of services on the managed server.
39+
- Changes access rights in the Service Control Manager to allow specified standard users remote
40+
access to the status of services on the managed server.
3241

33-
This cmdlet does not provide standard users access to bpa (BPA) results, or allow standard users to run BPA scans.
34-
Aside from the preceding list of changes, this cmdlet provides no additional access that a standard user does not already have, by default, on managed servers.
42+
This cmdlet does not provide standard users access to bpa (BPA) results, or allow standard users to
43+
run BPA scans. Aside from the preceding list of changes, this cmdlet provides no additional access
44+
that a standard user does not already have, by default, on managed servers.
3545

36-
Running this cmdlet has security implications for your network environment because it grants specified non-Administrator users access rights to information that, by default, is restricted to members of the Administrators group on the local computer.
37-
The cmdlet provides access to other WMI providers in the root\cimv2 namespace, but only those providers that can be used by standard users.
38-
We recommend that you run this cmdlet only when you must add a specific standard user to the users who require access to remote server data by using Server Manager.
39-
Additionally, you should promptly run `Disable-ServerManagerStandardUserRemoting` to deny this access to users as soon as they no longer require it.
46+
Running this cmdlet has security implications for your network environment because it grants
47+
specified non-Administrator users access rights to information that, by default, is restricted to
48+
members of the Administrators group on the local computer. The cmdlet provides access to other WMI
49+
providers in the root\cimv2 namespace, but only those providers that can be used by standard users.
50+
We recommend that you run this cmdlet only when you must add a specific standard user to the users
51+
who require access to remote server data by using Server Manager. Additionally, you should promptly
52+
run `Disable-ServerManagerStandardUserRemoting` to deny this access to users as soon as they no
53+
longer require it.
4054

4155
## EXAMPLES
4256

4357
### Example 1
58+
4459
```powershell
4560
Enable-ServerManagerStandardUserRemoting -User JennyL
4661
```
4762

48-
In the following example, the administrator gives a standard user named JennyL access to event, performance counter, service status, and role and feature inventory data on a server that is being managed, either locally or remotely, by using Server Manager.
63+
In this example, the administrator gives a standard user named `JennyL` access to event, performance
64+
counter, service status, and role and feature inventory data on a server that is being managed,
65+
either locally or remotely, by using Server Manager.
4966

5067
### Example 2
68+
5169
```powershell
5270
Enable-ServerManagerStandardUserRemoting -User JennyL -WhatIf
5371
```
5472

55-
In the following example, the administrator views the outcome of running a command to give a standard user named JennyL access to event, performance counter, service status, and role and feature inventory data on a server that is being managed, either locally or remotely, by using Server Manager.
56-
The `WhatIf` parameter is added, meaning that the command actions are not carried out.
73+
In the following example, the administrator views the outcome of running a command to give a
74+
standard user named JennyL access to event, performance counter, service status, and role and
75+
feature inventory data on a server that is being managed, either locally or remotely, by using
76+
Server Manager. The `WhatIf` parameter is added, meaning that the command actions are not carried
77+
out.
5778

5879
### Example 3
80+
5981
```powershell
6082
Enable-ServerManagerStandardUserRemoting -User JennyL -Confirm
6183
```
6284

63-
In the following example, the administrator gives a standard user named JennyL access to event, performance counter, service status, and role and feature inventory data on a server that is being managed, either locally or remotely, by using Server Manager.
64-
The `Confirm` parameter is added, meaning that the command prompts for confirmation before performing the action.
85+
In the following example, the administrator gives a standard user named `JennyL` access to event,
86+
performance counter, service status, and role and feature inventory data on a server that is being
87+
managed, either locally or remotely, by using Server Manager. The `Confirm` parameter is added,
88+
meaning that the command prompts for confirmation before performing the action.
6589

6690
## PARAMETERS
6791

@@ -82,7 +106,10 @@ Accept wildcard characters: False
82106
```
83107
84108
### -User
85-
Specifies the user account name of a standard user who runs Server Manager, and requires access to event, performance counter, service, and role and feature inventory data for remote servers that are managed by using the local Server Manager console.
109+
110+
Specifies the user account name of a standard user who runs Server Manager, and requires access to
111+
event, performance counter, service, and role and feature inventory data for remote servers that are
112+
managed by using the local Server Manager console.
86113
87114
```yaml
88115
Type: String[]
@@ -97,6 +124,7 @@ Accept wildcard characters: False
97124
```
98125
99126
### -Confirm
127+
100128
Prompts you for confirmation before running the cmdlet.
101129
102130
```yaml
@@ -111,7 +139,8 @@ Accept pipeline input: False
111139
Accept wildcard characters: False
112140
```
113141
### -WhatIf
114-
Shows what would happen if the cmdlet runs.
142+
143+
Shows what would happen if the cmdlet were run.
115144
The cmdlet is not run.
116145
117146
```yaml
@@ -127,11 +156,16 @@ Accept wildcard characters: False
127156
```
128157
129158
### CommonParameters
130-
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
159+
160+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
161+
-InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose,
162+
-WarningAction, and -WarningVariable. For more information, see
163+
[about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
131164
132165
## INPUTS
133166
134167
### None
168+
135169
## OUTPUTS
136170
137171
### System.Object
@@ -147,4 +181,3 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
147181
[Uninstall-WindowsFeature](./Uninstall-WindowsFeature.md)
148182
149183
[Disable-ServerManagerStandardUserRemoting](./Disable-ServerManagerStandardUserRemoting.md)
150-

0 commit comments

Comments
 (0)