Skip to content

Commit d50f432

Browse files
authored
Merge branch 'master' into update/Uninstall-ProvisioningPackage
2 parents b5564a7 + b0b784d commit d50f432

File tree

513 files changed

+16436
-1976
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

513 files changed

+16436
-1976
lines changed

.openpublishing.redirection.json

+5
Original file line numberDiff line numberDiff line change
@@ -5354,6 +5354,11 @@
53545354
"source_path": "docset/winserver2022-ps/WindowsUpdate/WindowsUpdate.md",
53555355
"redirect_url": "/powershell/module/windowsupdate/WindowsUpdate.md?view=windowsserver2022-ps",
53565356
"redirect_document_id": false
5357+
},
5358+
{
5359+
"source_path": "docset/winserver2022-ps/EventTracingManagement/Set-AutologgerConfig.md",
5360+
"redirect_url": "/powershell/module/eventtracingmanagement/Update-AutologgerConfig.md?view=windowsserver2022-ps",
5361+
"redirect_document_id": false
53575362
}
53585363
]
53595364
}

docset/winserver2012-ps/nfs/New-NfsNetgroup.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Because netgroups are a server-side setting, **New-NfsNetgroup** is not availabl
3535

3636
### Example 1: Create a netgroup and add a member
3737
```
38-
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
38+
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices" -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
3939
```
4040

4141
This command creates a netgroup that is named Contoso-PrintServices and adds one member that is named Contoso-PS02.

docset/winserver2012r2-ps/nettcpip/Set-NetIPv4Protocol.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ This command enables the DHCP Media Sense event log.
4343
PS C:\>Set-NetIPv4Protocol -NeighborCacheLimitEntries 1000
4444
```
4545

46-
This command increases the size of the cache of on-link neighbors on the subnet to 1,000.
46+
This command increases the size of the cache of on-link neighbors on the subnet that are no longer referenced to 1,000.
4747
The default value is 256.
4848

4949
## PARAMETERS
@@ -330,7 +330,7 @@ Accept wildcard characters: False
330330
```
331331
332332
### -NeighborCacheLimitEntries
333-
Specifies the maximum number of neighbor cache entries.
333+
Specifies the maximum number of entries in the neighbor cache, which consists of all dynamic neighbors no longer referenced.
334334
The cmdlet modifies the value for this setting.
335335
336336
The default value is 256.

docset/winserver2012r2-ps/nettcpip/Set-NetIPv6Protocol.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This command enables the DHCP Media Sense event log.
4545
PS C:\>Set-NetIPv6Protocol -NeighborCacheLimitEntries 1000
4646
```
4747

48-
This command increases the size of the cache of on-link neighbors on the subnet to 1,000.
48+
This command increases the size of the cache of on-link neighbors on the subnet that are no longer referenced to 1,000.
4949
The default value is 256.
5050

5151
## PARAMETERS
@@ -398,7 +398,7 @@ Accept wildcard characters: False
398398
```
399399

400400
### -NeighborCacheLimitEntries
401-
Specifies the maximum number of neighbor cache entries.
401+
Specifies the maximum number of entries in the neighbor cache, which consists of all dynamic neighbors no longer referenced.
402402
The cmdlet modifies the value for this setting.
403403

404404
The default value is 256.

docset/winserver2012r2-ps/nfs/New-NfsNetgroup.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Because netgroups are a server-side setting, **New-NfsNetgroup** is not availabl
3737

3838
### Example 1: Create a netgroup and add a member
3939
```
40-
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
40+
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices" -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
4141
```
4242

4343
This command creates a netgroup that is named Contoso-PrintServices and adds one member that is named Contoso-PS02.

docset/winserver2016-ps/nettcpip/Set-NetIPv4Protocol.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ This command enables the DHCP Media Sense event log.
4444
PS C:\>Set-NetIPv4Protocol -NeighborCacheLimitEntries 1000
4545
```
4646

47-
This command increases the size of the cache of on-link neighbors on the subnet to 1,000.
47+
This command increases the size of the cache of on-link neighbors on the subnet that are no longer referenced to 1,000.
4848
The default value is 256.
4949

5050
## PARAMETERS
@@ -349,7 +349,7 @@ Accept wildcard characters: False
349349
```
350350
351351
### -NeighborCacheLimitEntries
352-
Specifies the maximum number of neighbor cache entries.
352+
Specifies the maximum number of entries in the neighbor cache, which consists of all dynamic neighbors no longer referenced.
353353
The cmdlet modifies the value for this setting.
354354
355355
The default value is 256.

docset/winserver2016-ps/nettcpip/Set-NetIPv6Protocol.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ This command enables the DHCP Media Sense event log.
4747
PS C:\>Set-NetIPv6Protocol -NeighborCacheLimitEntries 1000
4848
```
4949

50-
This command increases the size of the cache of on-link neighbors on the subnet to 1,000.
50+
This command increases the size of the cache of on-link neighbors on the subnet that are no longer referenced to 1,000.
5151
The default value is 256.
5252

5353
## PARAMETERS
@@ -396,7 +396,7 @@ Accept wildcard characters: False
396396
```
397397
398398
### -NeighborCacheLimitEntries
399-
Specifies the maximum number of neighbor cache entries.
399+
Specifies the maximum number of entries in the neighbor cache, which consists of all dynamic neighbors no longer referenced.
400400
The cmdlet modifies the value for this setting.
401401
402402
The default value is 256.

docset/winserver2016-ps/nfs/New-NfsNetgroup.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ Because netgroups are a server-side setting, **New-NfsNetgroup** is not availabl
3838

3939
### Example 1: Create a netgroup and add a member
4040
```
41-
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
41+
PS C:\> New-NfsNetgroup -NetGroupName "Contoso-PrintServices" -AddMember "Contoso-PS02" -LdapInstanceName "Contoso.com" -LdapNamingContext "CN=MappedIdentity,DC=Contoso,DC=com"
4242
```
4343

4444
This command creates a netgroup that is named Contoso-PrintServices and adds one member that is named Contoso-PS02.

docset/winserver2016-ps/provisioning/Get-TrustedProvisioningCertificate.md

+14-9
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ title: Get-TrustedProvisioningCertificate
1111
# Get-TrustedProvisioningCertificate
1212

1313
## SYNOPSIS
14-
{{Fill in the Synopsis}}
14+
Lists all installed trusted provisioning certificates.
1515

1616
## SYNTAX
1717

@@ -21,21 +21,26 @@ Get-TrustedProvisioningCertificate [[-Thumbprint] <String>] [-LogsDirectoryPath
2121
```
2222

2323
## DESCRIPTION
24-
{{Fill in the Description}}
24+
Lists all installed trusted provisioning certificates; use this cmdlet to get the certificate thumbprint to use with the `Uninstall-TrustedProvisioningCertificate` cmdlet.
2525

2626
## EXAMPLES
2727

28-
### Example 1
28+
### Example 1: List installed trusted provisioning certificates
29+
```powershell
30+
PS C:\> Get-TrustedProvisioningCertificate
2931
```
30-
PS C:\> {{ Add example code here }}
32+
```output
33+
The operation completed successfully.
34+
35+
No certificates found in the trusted provisioners store
3136
```
3237

33-
{{ Add example description here }}
38+
Lists all installed trusted provisioning certificates.
3439

3540
## PARAMETERS
3641

3742
### -ConnectedDevice
38-
{{Fill ConnectedDevice Description}}
43+
If enabled, specifies that the device type is mobile.
3944

4045
```yaml
4146
Type: SwitchParameter
@@ -50,7 +55,7 @@ Accept wildcard characters: False
5055
```
5156
5257
### -LogsDirectoryPath
53-
{{Fill LogsDirectoryPath Description}}
58+
Specifies the logs directory path.
5459
5560
```yaml
5661
Type: String
@@ -65,7 +70,7 @@ Accept wildcard characters: False
6570
```
6671
6772
### -Thumbprint
68-
{{Fill Thumbprint Description}}
73+
Specifies the thumbprint of the certificate to retrieve.
6974
7075
```yaml
7176
Type: String
@@ -80,7 +85,7 @@ Accept wildcard characters: False
8085
```
8186
8287
### -WprpFile
83-
{{Fill WprpFile Description}}
88+
Specifies the location of the WPR profile file.
8489
8590
```yaml
8691
Type: String

docset/winserver2016-ps/provisioning/Install-TrustedProvisioningCertificate.md

+10-10
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ title: Install-TrustedProvisioningCertificate
1111
# Install-TrustedProvisioningCertificate
1212

1313
## SYNOPSIS
14-
{{Fill in the Synopsis}}
14+
Adds a certificate to the Trusted Certificate Store.
1515

1616
## SYNTAX
1717

@@ -21,16 +21,16 @@ Install-TrustedProvisioningCertificate [-CertificatePath] <String> [-ForceInstal
2121
```
2222

2323
## DESCRIPTION
24-
{{Fill in the Description}}
24+
Installs the specified certificate to the Trusted Certificate Store.
2525

2626
## EXAMPLES
2727

28-
### Example 1
29-
```
30-
PS C:\> {{ Add example code here }}
28+
### Example 1: Install Trusted Provisioning Certificate
29+
```powershell
30+
PS C:\> Install-TrustedProvisioningCertificate -CertificatePath trustedCert.cer
3131
```
3232

33-
{{ Add example description here }}
33+
Installs the specified certificate as a trusted provisioning certificate.
3434

3535
## PARAMETERS
3636

@@ -50,7 +50,7 @@ Accept wildcard characters: False
5050
```
5151
5252
### -ConnectedDevice
53-
{{Fill ConnectedDevice Description}}
53+
If enabled, specifies that the device type is mobile.
5454
5555
```yaml
5656
Type: SwitchParameter
@@ -65,7 +65,7 @@ Accept wildcard characters: False
6565
```
6666
6767
### -ForceInstall
68-
{{Fill ForceInstall Description}}
68+
Specifies whether, if the certificate already exists, it will be overwritten.
6969
7070
```yaml
7171
Type: SwitchParameter
@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
```
8181
8282
### -LogsDirectoryPath
83-
{{Fill LogsDirectoryPath Description}}
83+
Specifies the logs directory path.
8484
8585
```yaml
8686
Type: String
@@ -95,7 +95,7 @@ Accept wildcard characters: False
9595
```
9696
9797
### -WprpFile
98-
{{Fill WprpFile Description}}
98+
Specifies the location of the WPR profile file.
9999
100100
```yaml
101101
Type: String

docset/winserver2016-ps/provisioning/Uninstall-TrustedProvisioningCertificate.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ title: Uninstall-TrustedProvisioningCertificate
1111
# Uninstall-TrustedProvisioningCertificate
1212

1313
## SYNOPSIS
14-
{{Fill in the Synopsis}}
14+
Removes a previously installed provisioning certificate.
1515

1616
## SYNTAX
1717

@@ -21,21 +21,21 @@ Uninstall-TrustedProvisioningCertificate [-Thumbprint] <String> [-LogsDirectoryP
2121
```
2222

2323
## DESCRIPTION
24-
{{Fill in the Description}}
24+
Removes a previously installed provisioning certificate.
2525

2626
## EXAMPLES
2727

28-
### Example 1
29-
```
30-
PS C:\> {{ Add example code here }}
28+
### Example 1: Uninstall a trusted provisioning certificate
29+
```powershell
30+
PS C:\> Uninstall-TrustedProvisioningCertificate -Thumbprint ‎fedd995b45e633d4ef30fcbc8f3a48b627e9a28b
3131
```
3232

33-
{{ Add example description here }}
33+
Uninstall a trusted provisioning certificate with the specified thumbprint.
3434

3535
## PARAMETERS
3636

3737
### -ConnectedDevice
38-
{{Fill ConnectedDevice Description}}
38+
If enabled, specifies that the device type is mobile.
3939

4040
```yaml
4141
Type: SwitchParameter
@@ -50,7 +50,7 @@ Accept wildcard characters: False
5050
```
5151
5252
### -LogsDirectoryPath
53-
{{Fill LogsDirectoryPath Description}}
53+
Specifies the logs directory path.
5454
5555
```yaml
5656
Type: String
@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
```
8181
8282
### -WprpFile
83-
{{Fill WprpFile Description}}
83+
Specifies the location of the WPR profile file.
8484
8585
```yaml
8686
Type: String

docset/winserver2019-ps/assignedaccess/AssignedAccess.md

+2
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ title: AssignedAccess
1313
## Description
1414
The Windows PowerShell cmdlets for Assigned Access are designed to enable the administration of restricted app access to specific user accounts. When Assigned Access is configured on a user account, it can use only one Windows Store app. The user cannot exit the app, sign out, or access any system settings.
1515

16+
Assigned Access cmdlets are supported on Windows 10 and Windows 11 client operating systems only.
17+
1618
## AssignedAccess Cmdlets
1719
### [Clear-AssignedAccess](./Clear-AssignedAccess.md)
1820
Removes the user account from assigned access.

docset/winserver2019-ps/assignedaccess/Clear-AssignedAccess.md

+2
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ The **Clear-AssignedAccess** cmdlet clears assigned access configured account se
2424

2525
If a user is signed-in or the computer has a PS/2 keyboard, you must restart the computer to apply the changes.
2626

27+
Assigned Access cmdlets are supported on Windows 10 and Windows 11 client operating systems only.
28+
2729
## EXAMPLES
2830

2931
### Example 1: Clear assigned access configured settings

docset/winserver2019-ps/assignedaccess/Get-AssignedAccess.md

+2
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ Get-AssignedAccess [<CommonParameters>]
2222
## DESCRIPTION
2323
The **Get-AssignedAccess** cmdlet gets the current configuration for assigned access, including the user name, user SID, app friendly name, and app ID.
2424

25+
Assigned Access cmdlets are supported on Windows 10 and Windows 11 client operating systems only.
26+
2527
## EXAMPLES
2628

2729
### Example 1: Get the configuration for assigned access

docset/winserver2019-ps/assignedaccess/Set-AssignedAccess.md

+2
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ If a user is signed-in or the computer has a PS/2 keyboard, you must restart the
4343

4444
To sign out of assigned access, quickly press the left Windows logo key five times.
4545

46+
Assigned Access cmdlets are supported on Windows 10 and Windows 11 client operating systems only.
47+
4648
## EXAMPLES
4749

4850
### Example 1: Set assigned access by SID and app name

docset/winserver2019-ps/configci/New-CIPolicyRule.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,7 @@ Accept wildcard characters: False
308308
```
309309
310310
### -SpecificFileNameLevel
311-
Specifies the attribute of the file off which to base a file name rule. The -Level must be set to FileName for this option.
311+
Specifies the attribute of the file off which to base a file name rule.
312312
Refer to [File Name Rules Info](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-filename-rules) for a description of the acceptable values.
313313
314314
```yaml

docset/winserver2019-ps/defender/Set-MpPreference.md

+21-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: MSFT_MpPreference.cdxml-help.xml
44
Module Name: Defender
5-
ms.date: 10/05/2021
5+
ms.date: 11/04/2021
66
online version: https://docs.microsoft.com/powershell/module/defender/set-mppreference?view=windowsserver2019-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Set-MpPreference
@@ -41,7 +41,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
4141
[-LowThreatDefaultAction <ThreatAction>] [-ModerateThreatDefaultAction <ThreatAction>]
4242
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
4343
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
44-
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>]
44+
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>][-CloudBlockLevel <CloudBlockLevelType>]
4545
```
4646

4747
## DESCRIPTION
@@ -138,6 +138,25 @@ Accept pipeline input: False
138138
Accept wildcard characters: False
139139
```
140140
141+
### -CloudBlockLevel
142+
Configure this policy to specify the level of cloud protection to your endpoint.
143+
144+
Default (0): provides strong detection without increasing risk of detecting legitamate files
145+
Moderate (1): provides moderate detection only for high confidence detections
146+
High (2): applies a strong level of detection while optimizing client performance
147+
HighPlus (4): applies extra protection measures (might affect client peformance and increase your chance of false positives)
148+
ZeroTolerance (6): blocks all unknown executables
149+
150+
```yaml
151+
Type: CloudBlockLevelType
152+
Accepted values: Default|Moderate|High|HighPlus|ZeroTolerance
153+
Position: Named
154+
Default value: None
155+
Accept pipeline input: False
156+
Accept wildcard characters: False
157+
```
158+
159+
141160
### -DefinitionUpdatesChannel
142161
Enable this policy to specify when devices receive daily Microsoft Defender security intelligence (definition/signature) updates during the daily gradual rollout.
143162

0 commit comments

Comments
 (0)