Skip to content

Commit ff68226

Browse files
authored
Merge branch 'master' into networkcontroller-v-tishe
2 parents b11786d + baaede7 commit ff68226

File tree

68 files changed

+645
-227
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+645
-227
lines changed

docset/winserver2016-ps/provisioning/Get-TrustedProvisioningCertificate.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ title: Get-TrustedProvisioningCertificate
1111
# Get-TrustedProvisioningCertificate
1212

1313
## SYNOPSIS
14-
{{Fill in the Synopsis}}
14+
Lists all installed trusted provisioning certificates.
1515

1616
## SYNTAX
1717

@@ -21,21 +21,26 @@ Get-TrustedProvisioningCertificate [[-Thumbprint] <String>] [-LogsDirectoryPath
2121
```
2222

2323
## DESCRIPTION
24-
{{Fill in the Description}}
24+
Lists all installed trusted provisioning certificates; use this cmdlet to get the certificate thumbprint to use with the `Uninstall-TrustedProvisioningCertificate` cmdlet.
2525

2626
## EXAMPLES
2727

28-
### Example 1
28+
### Example 1: List installed trusted provisioning certificates
29+
```powershell
30+
PS C:\> Get-TrustedProvisioningCertificate
2931
```
30-
PS C:\> {{ Add example code here }}
32+
```output
33+
The operation completed successfully.
34+
35+
No certificates found in the trusted provisioners store
3136
```
3237

33-
{{ Add example description here }}
38+
Lists all installed trusted provisioning certificates.
3439

3540
## PARAMETERS
3641

3742
### -ConnectedDevice
38-
{{Fill ConnectedDevice Description}}
43+
If enabled, specifies that the device type is mobile.
3944

4045
```yaml
4146
Type: SwitchParameter
@@ -50,7 +55,7 @@ Accept wildcard characters: False
5055
```
5156
5257
### -LogsDirectoryPath
53-
{{Fill LogsDirectoryPath Description}}
58+
Specifies the logs directory path.
5459
5560
```yaml
5661
Type: String
@@ -65,7 +70,7 @@ Accept wildcard characters: False
6570
```
6671
6772
### -Thumbprint
68-
{{Fill Thumbprint Description}}
73+
Specifies the thumbprint of the certificate to retrieve.
6974
7075
```yaml
7176
Type: String
@@ -80,7 +85,7 @@ Accept wildcard characters: False
8085
```
8186
8287
### -WprpFile
83-
{{Fill WprpFile Description}}
88+
Specifies the location of the WPR profile file.
8489
8590
```yaml
8691
Type: String

docset/winserver2016-ps/provisioning/Install-TrustedProvisioningCertificate.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ title: Install-TrustedProvisioningCertificate
1111
# Install-TrustedProvisioningCertificate
1212

1313
## SYNOPSIS
14-
{{Fill in the Synopsis}}
14+
Adds a certificate to the Trusted Certificate Store.
1515

1616
## SYNTAX
1717

@@ -21,16 +21,16 @@ Install-TrustedProvisioningCertificate [-CertificatePath] <String> [-ForceInstal
2121
```
2222

2323
## DESCRIPTION
24-
{{Fill in the Description}}
24+
Installs the specified certificate to the Trusted Certificate Store.
2525

2626
## EXAMPLES
2727

28-
### Example 1
29-
```
30-
PS C:\> {{ Add example code here }}
28+
### Example 1: Install Trusted Provisioning Certificate
29+
```powershell
30+
PS C:\> Install-TrustedProvisioningCertificate -CertificatePath trustedCert.cer
3131
```
3232

33-
{{ Add example description here }}
33+
Installs the specified certificate as a trusted provisioning certificate.
3434

3535
## PARAMETERS
3636

@@ -50,7 +50,7 @@ Accept wildcard characters: False
5050
```
5151
5252
### -ConnectedDevice
53-
{{Fill ConnectedDevice Description}}
53+
If enabled, specifies that the device type is mobile.
5454
5555
```yaml
5656
Type: SwitchParameter
@@ -65,7 +65,7 @@ Accept wildcard characters: False
6565
```
6666
6767
### -ForceInstall
68-
{{Fill ForceInstall Description}}
68+
Specifies whether, if the certificate already exists, it will be overwritten.
6969
7070
```yaml
7171
Type: SwitchParameter
@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
```
8181
8282
### -LogsDirectoryPath
83-
{{Fill LogsDirectoryPath Description}}
83+
Specifies the logs directory path.
8484
8585
```yaml
8686
Type: String
@@ -95,7 +95,7 @@ Accept wildcard characters: False
9595
```
9696
9797
### -WprpFile
98-
{{Fill WprpFile Description}}
98+
Specifies the location of the WPR profile file.
9999
100100
```yaml
101101
Type: String

docset/winserver2019-ps/assignedaccess/AssignedAccess.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ title: AssignedAccess
1313
## Description
1414
The Windows PowerShell cmdlets for Assigned Access are designed to enable the administration of restricted app access to specific user accounts. When Assigned Access is configured on a user account, it can use only one Windows Store app. The user cannot exit the app, sign out, or access any system settings.
1515

16+
Assigned Access cmdlets are supported on Windows 10 and Windows 11 client operating systems only.
17+
1618
## AssignedAccess Cmdlets
1719
### [Clear-AssignedAccess](./Clear-AssignedAccess.md)
1820
Removes the user account from assigned access.

docset/winserver2019-ps/assignedaccess/Clear-AssignedAccess.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ The **Clear-AssignedAccess** cmdlet clears assigned access configured account se
2424

2525
If a user is signed-in or the computer has a PS/2 keyboard, you must restart the computer to apply the changes.
2626

27+
Assigned Access cmdlets are supported on Windows 10 and Windows 11 client operating systems only.
28+
2729
## EXAMPLES
2830

2931
### Example 1: Clear assigned access configured settings

docset/winserver2019-ps/assignedaccess/Get-AssignedAccess.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ Get-AssignedAccess [<CommonParameters>]
2222
## DESCRIPTION
2323
The **Get-AssignedAccess** cmdlet gets the current configuration for assigned access, including the user name, user SID, app friendly name, and app ID.
2424

25+
Assigned Access cmdlets are supported on Windows 10 and Windows 11 client operating systems only.
26+
2527
## EXAMPLES
2628

2729
### Example 1: Get the configuration for assigned access

docset/winserver2019-ps/assignedaccess/Set-AssignedAccess.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,8 @@ If a user is signed-in or the computer has a PS/2 keyboard, you must restart the
4343

4444
To sign out of assigned access, quickly press the left Windows logo key five times.
4545

46+
Assigned Access cmdlets are supported on Windows 10 and Windows 11 client operating systems only.
47+
4648
## EXAMPLES
4749

4850
### Example 1: Set assigned access by SID and app name

docset/winserver2019-ps/configci/New-CIPolicyRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -308,7 +308,7 @@ Accept wildcard characters: False
308308
```
309309
310310
### -SpecificFileNameLevel
311-
Specifies the attribute of the file off which to base a file name rule. The -Level must be set to FileName for this option.
311+
Specifies the attribute of the file off which to base a file name rule.
312312
Refer to [File Name Rules Info](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-filename-rules) for a description of the acceptable values.
313313
314314
```yaml

docset/winserver2019-ps/defender/Set-MpPreference.md

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: MSFT_MpPreference.cdxml-help.xml
44
Module Name: Defender
5-
ms.date: 10/05/2021
5+
ms.date: 11/04/2021
66
online version: https://docs.microsoft.com/powershell/module/defender/set-mppreference?view=windowsserver2019-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Set-MpPreference
@@ -41,7 +41,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
4141
[-LowThreatDefaultAction <ThreatAction>] [-ModerateThreatDefaultAction <ThreatAction>]
4242
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
4343
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
44-
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>]
44+
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>][-CloudBlockLevel <CloudBlockLevelType>]
4545
```
4646

4747
## DESCRIPTION
@@ -138,6 +138,25 @@ Accept pipeline input: False
138138
Accept wildcard characters: False
139139
```
140140
141+
### -CloudBlockLevel
142+
Configure this policy to specify the level of cloud protection to your endpoint.
143+
144+
Default (0): provides strong detection without increasing risk of detecting legitamate files
145+
Moderate (1): provides moderate detection only for high confidence detections
146+
High (2): applies a strong level of detection while optimizing client performance
147+
HighPlus (4): applies extra protection measures (might affect client peformance and increase your chance of false positives)
148+
ZeroTolerance (6): blocks all unknown executables
149+
150+
```yaml
151+
Type: CloudBlockLevelType
152+
Accepted values: Default|Moderate|High|HighPlus|ZeroTolerance
153+
Position: Named
154+
Default value: None
155+
Accept pipeline input: False
156+
Accept wildcard characters: False
157+
```
158+
159+
141160
### -DefinitionUpdatesChannel
142161
Enable this policy to specify when devices receive daily Microsoft Defender security intelligence (definition/signature) updates during the daily gradual rollout.
143162

docset/winserver2019-ps/provisioning/Get-TrustedProvisioningCertificate.md

Lines changed: 14 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ title: Get-TrustedProvisioningCertificate
1111
# Get-TrustedProvisioningCertificate
1212

1313
## SYNOPSIS
14-
{{Fill in the Synopsis}}
14+
Lists all installed trusted provisioning certificates.
1515

1616
## SYNTAX
1717

@@ -21,21 +21,26 @@ Get-TrustedProvisioningCertificate [[-Thumbprint] <String>] [-LogsDirectoryPath
2121
```
2222

2323
## DESCRIPTION
24-
{{Fill in the Description}}
24+
Lists all installed trusted provisioning certificates; use this cmdlet to get the certificate thumbprint to use with the `Uninstall-TrustedProvisioningCertificate` cmdlet.
2525

2626
## EXAMPLES
2727

28-
### Example 1
28+
### Example 1: List installed trusted provisioning certificates
29+
```powershell
30+
PS C:\> Get-TrustedProvisioningCertificate
2931
```
30-
PS C:\> {{ Add example code here }}
32+
```output
33+
The operation completed successfully.
34+
35+
No certificates found in the trusted provisioners store
3136
```
3237

33-
{{ Add example description here }}
38+
List all installed trusted provisioning certificates.
3439

3540
## PARAMETERS
3641

3742
### -ConnectedDevice
38-
{{Fill ConnectedDevice Description}}
43+
If enabled, specifies that the device type is mobile.
3944

4045
```yaml
4146
Type: SwitchParameter
@@ -50,7 +55,7 @@ Accept wildcard characters: False
5055
```
5156
5257
### -LogsDirectoryPath
53-
{{Fill LogsDirectoryPath Description}}
58+
Specifies the logs directory path.
5459
5560
```yaml
5661
Type: String
@@ -65,7 +70,7 @@ Accept wildcard characters: False
6570
```
6671
6772
### -Thumbprint
68-
{{Fill Thumbprint Description}}
73+
Specifies the thumbprint of the certificate to retrieve.
6974
7075
```yaml
7176
Type: String
@@ -80,7 +85,7 @@ Accept wildcard characters: False
8085
```
8186
8287
### -WprpFile
83-
{{Fill WprpFile Description}}
88+
Specifies the location of the WPR profile file.
8489
8590
```yaml
8691
Type: String

docset/winserver2019-ps/provisioning/Install-TrustedProvisioningCertificate.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ title: Install-TrustedProvisioningCertificate
1111
# Install-TrustedProvisioningCertificate
1212

1313
## SYNOPSIS
14-
{{Fill in the Synopsis}}
14+
Adds a certificate to the Trusted Certificate Store.
1515

1616
## SYNTAX
1717

@@ -21,16 +21,16 @@ Install-TrustedProvisioningCertificate [-CertificatePath] <String> [-ForceInstal
2121
```
2222

2323
## DESCRIPTION
24-
{{Fill in the Description}}
24+
Installs the specified certificate to the Trusted Certificate Store.
2525

2626
## EXAMPLES
2727

28-
### Example 1
29-
```
30-
PS C:\> {{ Add example code here }}
28+
### Example 1: Install Trusted Provisioning Certificate
29+
```powershell
30+
PS C:\> Install-TrustedProvisioningCertificate -CertificatePath trustedCert.cer
3131
```
3232

33-
{{ Add example description here }}
33+
Installs the specified certificate as a trusted provisioning certificate.
3434

3535
## PARAMETERS
3636

@@ -50,7 +50,7 @@ Accept wildcard characters: False
5050
```
5151
5252
### -ConnectedDevice
53-
{{Fill ConnectedDevice Description}}
53+
If enabled, specifies that the device type is mobile.
5454
5555
```yaml
5656
Type: SwitchParameter
@@ -65,7 +65,7 @@ Accept wildcard characters: False
6565
```
6666
6767
### -ForceInstall
68-
{{Fill ForceInstall Description}}
68+
Specifies whether, if a certificate already exists, it will be overwritten.
6969
7070
```yaml
7171
Type: SwitchParameter
@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
```
8181
8282
### -LogsDirectoryPath
83-
{{Fill LogsDirectoryPath Description}}
83+
Specifies the logs directory path.
8484
8585
```yaml
8686
Type: String
@@ -95,7 +95,7 @@ Accept wildcard characters: False
9595
```
9696
9797
### -WprpFile
98-
{{Fill WprpFile Description}}
98+
Specifies the location of the WPR profile file.
9999
100100
```yaml
101101
Type: String

0 commit comments

Comments
 (0)