diff --git a/docset/mdop/appvclient/add-appvclientconnectiongroup.md b/docset/mdop/appvclient/add-appvclientconnectiongroup.md index b756d72edb..d8dc22a9bb 100644 --- a/docset/mdop/appvclient/add-appvclientconnectiongroup.md +++ b/docset/mdop/appvclient/add-appvclientconnectiongroup.md @@ -19,7 +19,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/mdop/appvclient/get-appvpublishingserver.md b/docset/mdop/appvclient/get-appvpublishingserver.md index 83173f798b..c3b1a53495 100644 --- a/docset/mdop/appvclient/get-appvpublishingserver.md +++ b/docset/mdop/appvclient/get-appvpublishingserver.md @@ -25,7 +25,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/mdop/appvsequencer/expand-appvsequencerpackage.md b/docset/mdop/appvsequencer/expand-appvsequencerpackage.md index 69b594a8d5..c25df39302 100644 --- a/docset/mdop/appvsequencer/expand-appvsequencerpackage.md +++ b/docset/mdop/appvsequencer/expand-appvsequencerpackage.md @@ -19,7 +19,7 @@ Expand-AppvSequencerPackage [-AppvPackagePath] [] ``` ## DESCRIPTION -The **Expand-AppvSequencerPackage** cmdlet expands an Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer. +The **Expand-AppvSequencerPackage** cmdlet expands a Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer. You can more easily add prerequisites or dependent applications to the sequencer before generating the package. Run this cmdlet each time to expand a new package onto the computer running the sequencer. diff --git a/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md index fb31a109f3..c6b1566b72 100644 --- a/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -17,7 +17,7 @@ Enable-MSDSMAutomaticClaim [-BusType] ``` ## DESCRIPTION -The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. +The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI). You can enable MSDSM to automatically claim both SAS and iSCSI disks. diff --git a/docset/winserver2012r2-ps/hpc/HPC.md b/docset/winserver2012r2-ps/hpc/HPC.md index 4efbd0df30..74a089557a 100644 --- a/docset/winserver2012r2-ps/hpc/HPC.md +++ b/docset/winserver2012r2-ps/hpc/HPC.md @@ -267,7 +267,7 @@ Clears the cached credentials that the HPC Diagnostics Service uses to run diagn Clears the alert icon for diagnostic test runs. ### [Remove-HpcTokenCache](./Remove-HpcTokenCache.md) -Removes the client Azure Active Directory token cache used for job submission. +Removes the client Microsoft Entra token cache used for job submission. ### [Replicate-HpcImage](./Replicate-HpcImage.md) Copies a base-node operating system image from a Windows image (.wim) file to an Internet SCSI (iSCSI) storage array. @@ -321,7 +321,7 @@ Sets the properties for a task. Sets the credentials for running diagnostic tests. ### [Set-HpcTokenCache](./Set-HpcTokenCache.md) -Sets the client Azure Active Directory token cache for job submission. +Sets the client Microsoft Entra token cache for job submission. ### [Shutdown-HpcNode](./Shutdown-HpcNode.md) Turns off one or more nodes. diff --git a/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md index ec5f420287..07295cc07e 100644 --- a/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -19,7 +19,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [] ``` ## DESCRIPTION -The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. +The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI). You can enable MSDSM to automatically claim both SAS and iSCSI disks. diff --git a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 88f4449005..1f4cd1c6b2 100644 --- a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -72,8 +72,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of the Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` +Specifies the GUID representation of the Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID. diff --git a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md index 7579d96ac1..1adb2c053a 100644 --- a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId -ClientId [-WhatIf] [-Confirm ``` ## DESCRIPTION -The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant. +The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant. ## EXAMPLES @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer ## PARAMETERS ### -ClientId -Specifies the well-known ID of the Azure MFA application in Azure AD. +Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID. ```yaml Type: String @@ -60,8 +60,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of an Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: +Specifies the GUID representation of a Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\/directoryQuickStart` diff --git a/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md b/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md index f55491eeba..023eae659a 100644 --- a/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md +++ b/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying ### Example 2: Create a custom message on the Sign in page ``` -PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Azure AD self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" +PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Microsoft Entra self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" ``` The command creates a custom message on the Sign in page for the Office 365 relying party. diff --git a/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md b/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md index 4653a75d53..c9b4e0d8ef 100644 --- a/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md +++ b/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md b/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md index b4ec42481f..eda6e55cf7 100644 --- a/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md +++ b/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md index c9fa20b9ef..929edfd47c 100644 --- a/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [-WhatIf] [-Confirm] [/directoryQuickStart` +Specifies the GUID representation of the Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID. diff --git a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md index 5563a15d78..35eea27491 100644 --- a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId -ClientId [-WhatIf] [-Confirm ``` ## DESCRIPTION -The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant. +The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant. ## EXAMPLES @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer ## PARAMETERS ### -ClientId -Specifies the well-known ID of the Azure MFA application in Azure AD. +Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID. ```yaml Type: String @@ -60,8 +60,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of an Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: +Specifies the GUID representation of a Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\/directoryQuickStart` diff --git a/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md b/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md index 6657a2f6ee..390dc45a45 100644 --- a/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md +++ b/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying ### Example 2: Create a custom message on the Sign in page ``` -PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Azure AD self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" +PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Microsoft Entra self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" ``` The command creates a custom message on the Sign in page for the Office 365 relying party. diff --git a/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md b/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md index 59e1bf2c32..cadf750e95 100644 --- a/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md +++ b/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md b/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md index f3b38f1fbb..40f03a580c 100644 --- a/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md +++ b/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/winserver2019-ps/laps/Get-LapsAADPassword.md b/docset/winserver2019-ps/laps/Get-LapsAADPassword.md index 480ba0bc76..98c9b8ada5 100644 --- a/docset/winserver2019-ps/laps/Get-LapsAADPassword.md +++ b/docset/winserver2019-ps/laps/Get-LapsAADPassword.md @@ -1,5 +1,5 @@ --- -description: Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Azure AD device. +description: Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Microsoft Entra device. external help file: LAPS-help.xml Module Name: LAPS online version: https://learn.microsoft.com/powershell/module/laps/get-lapsaadpassword?view=windowsserver2019-ps&wt.mc_id=ps-gethelp @@ -12,8 +12,8 @@ title: Get-LapsAADPassword # Get-LapsAADPassword ## SYNOPSIS -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ## SYNTAX @@ -25,7 +25,7 @@ Get-LapsAADPassword -DeviceIds [-IncludePasswords] [-IncludeHistory] ## DESCRIPTION The `Get-LapsAADPassword` cmdlet allows administrators to retrieve LAPS passwords and password -history for an AAD-joined device. This is implemented by sending queries to Microsoft Graph over the +history for a Microsoft Entra joined device. This is implemented by sending queries to Microsoft Graph over the deviceLocalCredentials collection. The `Get-LapsAADPassword` cmdlet supports two basic modes when querying LAPS passwords: @@ -51,9 +51,9 @@ device, the `DeviceManagementManagedDevices.Read.All` permission may also be req > [!IMPORTANT] > The `Get-LapsAADPassword` cmdlet is implemented as a wrapper around the Microsoft Graph PowerShell > library, which must be manually installed on the device before `Get-LapsAADPassword` can work. -> Additional configuration steps are required in your AAD tenant to enable authentication to +> Additional configuration steps are required in your Microsoft Entra tenant to enable authentication to > Microsoft Graph and to grant the necessary Microsoft Graph permissions. For more information, see -> [Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) +> [Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) The **Verbose** parameter may be used to get additional information about the cmdlet's operation. @@ -240,4 +240,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Windows LAPS Overview](https://go.microsoft.com/fwlink/?linkid=2233901) -[Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) \ No newline at end of file +[Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) diff --git a/docset/winserver2019-ps/laps/LAPS.md b/docset/winserver2019-ps/laps/LAPS.md index 902661693d..8f2d4ee052 100644 --- a/docset/winserver2019-ps/laps/LAPS.md +++ b/docset/winserver2019-ps/laps/LAPS.md @@ -25,8 +25,8 @@ Local Administrator Password Solution (LAPS) password attributes. ### [Get-LapsAADPassword](Get-LapsAADPassword.md) -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ### [Get-LapsADPassword](Get-LapsADPassword.md) diff --git a/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md index d24bb91303..a9ed25792d 100644 --- a/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [-WhatIf] [-Confirm] [/directoryQuickStart` +Specifies the GUID representation of the Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID. diff --git a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md index 292a669981..cb3d9cf62a 100644 --- a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId -ClientId [-WhatIf] [-Confirm ``` ## DESCRIPTION -The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant. +The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant. ## EXAMPLES @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer ## PARAMETERS ### -ClientId -Specifies the well-known ID of the Azure MFA application in Azure AD. +Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID. ```yaml Type: String @@ -60,8 +60,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of an Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: +Specifies the GUID representation of a Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\/directoryQuickStart` diff --git a/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md b/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md index 3847021a14..01350e6b67 100644 --- a/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md +++ b/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying ### Example 2: Create a custom message on the Sign in page ``` -PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Azure AD self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" +PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Microsoft Entra self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" ``` The command creates a custom message on the Sign in page for the Office 365 relying party. diff --git a/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md b/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md index 0d7a0da0dc..6d396893a3 100644 --- a/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md +++ b/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/winserver2022-ps/appvclient/Get-AppvPublishingServer.md b/docset/winserver2022-ps/appvclient/Get-AppvPublishingServer.md index b77f6ce54c..60731ded66 100644 --- a/docset/winserver2022-ps/appvclient/Get-AppvPublishingServer.md +++ b/docset/winserver2022-ps/appvclient/Get-AppvPublishingServer.md @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/winserver2022-ps/appx/Get-AppxPackage.md b/docset/winserver2022-ps/appx/Get-AppxPackage.md index cf1ab1795a..bd71b602af 100644 --- a/docset/winserver2022-ps/appx/Get-AppxPackage.md +++ b/docset/winserver2022-ps/appx/Get-AppxPackage.md @@ -47,6 +47,30 @@ Get-AppxPackage -Name "Package17" -User "Contoso\EvanNarvaez" This command displays information about `Package17` if it's installed in the specified user profile. +### Example 3: Get a particular app package information + +```powershell +Get-AppxPackage -Name Microsoft.ScreenSketch +``` + +This command displays information about the ScreenSketch app. + +### Example 4: Get all app packages for a particular Publisher + +```powershell +Get-AppxPackage -Publisher "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US" +``` + +This command lists all the Microsoft app packages that are installed on the computer. + +### Example 5: Get all app packages with PackageTypeFilter + +```powershell +Get-AppxPackage -PackageTypeFilter Bundle,Framework,Main,Resource +``` + +This command lists all the app packages with PackageTypeFilter installed on the computer. + ## PARAMETERS ### -AllUsers diff --git a/docset/winserver2022-ps/bitlocker/BackupToAAD-BitLockerKeyProtector.md b/docset/winserver2022-ps/bitlocker/BackupToAAD-BitLockerKeyProtector.md index f5ad8318a3..c0685321c2 100644 --- a/docset/winserver2022-ps/bitlocker/BackupToAAD-BitLockerKeyProtector.md +++ b/docset/winserver2022-ps/bitlocker/BackupToAAD-BitLockerKeyProtector.md @@ -7,7 +7,7 @@ schema: 2.0.0 # BackupToAAD-BitLockerKeyProtector ## SYNOPSIS -Saves a key protector for a BitLocker volume in Azure Active Directory. +Saves a key protector for a BitLocker volume in Microsoft Entra ID. ## SYNTAX @@ -17,7 +17,7 @@ BackupToAAD-BitLockerKeyProtector [-MountPoint] [-KeyProtectorId] BackupToAAD-BitLockerKeyProtector -MountPoint "C:" -KeyProtectorId "{E2611001E-6AD0-4A08-BAAA-C9c031DB2AA6}" ``` -This command saves a key protector for a specified BitLocker volume to Azure AD. The command specifies the key protector by using its ID. +This command saves a key protector for a specified BitLocker volume to Microsoft Entra ID. The command specifies the key protector by using its ID. ## PARAMETERS diff --git a/docset/winserver2022-ps/bitlocker/BitLocker.md b/docset/winserver2022-ps/bitlocker/BitLocker.md index 01d4143e1b..4c22b27630 100644 --- a/docset/winserver2022-ps/bitlocker/BitLocker.md +++ b/docset/winserver2022-ps/bitlocker/BitLocker.md @@ -18,7 +18,7 @@ This reference provides cmdlet descriptions and syntax for all BitLocker cmdlets Adds a key protector for a BitLocker volume. ### [BackupToAAD-BitLockerKeyProtector](./BackupToAAD-BitLockerKeyProtector.md) -Saves a key protector for a BitLocker volume in AAD. +Saves a key protector for a BitLocker volume in Microsoft Entra ID. ### [Backup-BitLockerKeyProtector](./Backup-BitLockerKeyProtector.md) Saves a key protector for a BitLocker volume in AD DS. diff --git a/docset/winserver2022-ps/defender/Set-MpPreference.md b/docset/winserver2022-ps/defender/Set-MpPreference.md index e798d8cb3a..050b94e09e 100644 --- a/docset/winserver2022-ps/defender/Set-MpPreference.md +++ b/docset/winserver2022-ps/defender/Set-MpPreference.md @@ -57,6 +57,7 @@ Set-MpPreference [-ExclusionPath ] [-ExclusionExtension ] [- [-ProxyServer ] [-ProxyBypass ] [-ForceUseProxyOnly ] [-OobeEnableRtpAndSigUpdate ] [-DisableTlsParsing ] [-DisableHttpParsing ] [-DisableDnsParsing ] + [-DisableFtpParsing ] [-DisableDnsOverTcpParsing ] [-DisableSshParsing ] [-PlatformUpdatesChannel ] [-EngineUpdatesChannel ] [-SignaturesUpdatesChannel ] [-DisableGradualRelease ] @@ -507,6 +508,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -DisableFtpParsing +Specifies whether to disable FTP parsing for network protection. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: dfp + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisableEmailScanning Indicates whether Windows Defender parses the mailbox and mail files, according to their specific format, in order to analyze mail bodies and attachments. Windows Defender supports several formats, including .pst, .dbx, .mbx, .mime, and .binhex. diff --git a/docset/winserver2022-ps/laps/Get-LapsAADPassword.md b/docset/winserver2022-ps/laps/Get-LapsAADPassword.md index dbe3857fd4..14d94a73ee 100644 --- a/docset/winserver2022-ps/laps/Get-LapsAADPassword.md +++ b/docset/winserver2022-ps/laps/Get-LapsAADPassword.md @@ -1,5 +1,5 @@ --- -description: Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Azure AD device. +description: Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Microsoft Entra device. external help file: LAPS-help.xml Module Name: LAPS online version: https://learn.microsoft.com/powershell/module/laps/get-lapsaadpassword?view=windowsserver2022-ps&wt.mc_id=ps-gethelp @@ -12,8 +12,8 @@ title: Get-LapsAADPassword # Get-LapsAADPassword ## SYNOPSIS -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ## SYNTAX @@ -25,7 +25,7 @@ Get-LapsAADPassword -DeviceIds [-IncludePasswords] [-IncludeHistory] ## DESCRIPTION The `Get-LapsAADPassword` cmdlet allows administrators to retrieve LAPS passwords and password -history for an AAD-joined device. This is implemented by sending queries to Microsoft Graph over the +history for a Microsoft Entra joined device. This is implemented by sending queries to Microsoft Graph over the deviceLocalCredentials collection. The `Get-LapsAADPassword` cmdlet supports two basic modes when querying LAPS passwords: @@ -51,9 +51,9 @@ device, the `DeviceManagementManagedDevices.Read.All` permission may also be req > [!IMPORTANT] > The `Get-LapsAADPassword` cmdlet is implemented as a wrapper around the Microsoft Graph PowerShell > library, which must be manually installed on the device before `Get-LapsAADPassword` can work. -> Additional configuration steps are required in your AAD tenant to enable authentication to +> Additional configuration steps are required in your Microsoft Entra tenant to enable authentication to > Microsoft Graph and to grant the necessary Microsoft Graph permissions. For more information, see -> [Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) +> [Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) The **Verbose** parameter may be used to get additional information about the cmdlet's operation. @@ -240,4 +240,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Windows LAPS Overview](https://go.microsoft.com/fwlink/?linkid=2233901) -[Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) \ No newline at end of file +[Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) diff --git a/docset/winserver2022-ps/laps/LAPS.md b/docset/winserver2022-ps/laps/LAPS.md index 84b98e43a0..74eec7556e 100644 --- a/docset/winserver2022-ps/laps/LAPS.md +++ b/docset/winserver2022-ps/laps/LAPS.md @@ -25,8 +25,8 @@ Local Administrator Password Solution (LAPS) password attributes. ### [Get-LapsAADPassword](Get-LapsAADPassword.md) -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ### [Get-LapsADPassword](Get-LapsADPassword.md) diff --git a/docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md index e8a1313df7..b432ebd528 100644 --- a/docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [-WhatIf] [-Confirm] [] [[-LogPath] ] -[-ProcessingType ] [-ForceFlush] [-WhatIf] [-Confirm] [] +[-ProcessingType ] [-IncludeAllLogs] [-ForceFlush] [-WhatIf] [-Confirm] [] +``` + + +### ParameterSetIncludeAllLogs +``` +Get-WindowsUpdateLog [-IncludeAllLogs] [] ``` ## DESCRIPTION @@ -26,11 +33,11 @@ Get-WindowsUpdateLog [[-ETLPath] ] [[-LogPath] ] The `Get-WindowsUpdateLog` cmdlet merges and converts Windows Update `.etl` files into a single readable `WindowsUpdate.log` file. Windows Update Agent uses Event Tracing for Windows (ETW) to generate diagnostic logs. Windows Update no longer directly produces a `WindowsUpdate.log` file. -Instead, it produces `.etl` files that are not immediately readable as written. +Instead, it produces `.etl` files that aren't immediately readable as written. For Windows 10 versions prior to 1709 (OS Build 16299), this cmdlet requires access to a Microsoft symbol server, and log decoding must be run from a Windows 10 version earlier than 1709. Logs from -Windows 10, version 1709 onward do not require a Microsoft symbol server, and need to be decoded +Windows 10, version 1709 onward don't require a Microsoft symbol server, and need to be decoded from Windows 10, versions 1709 or higher. ## EXAMPLES @@ -90,7 +97,7 @@ Prompts you for confirmation before running the cmdlet. ```yaml Type: SwitchParameter -Parameter Sets: (All) +Parameter Sets: Default Aliases: cf Required: False @@ -112,7 +119,7 @@ The acceptable values for this parameter are: ```yaml Type: String[] -Parameter Sets: (All) +Parameter Sets: Default Aliases: PsPath Required: False @@ -131,7 +138,7 @@ PowerShell with administrative credentials by using the Run as administrator com ```yaml Type: SwitchParameter -Parameter Sets: (All) +Parameter Sets: Default Aliases: Required: False @@ -141,6 +148,24 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -IncludeAllLogs + +Decodes all update-related logs: Windows Update, Update Session Orchestrator (USO), and the update user interface (UX). This parameter is mutually exclusive of all other parameters of this cmdlet. Specifying this parameter uses defaults for all other parameters. This parameter causes a folder to be created on the desktop and readable WindowsUpdate.log, USO.log, and UX.log files are written to it. + + +```yaml +Type: SwitchParameter +Parameter Sets: IncludeAllLogs +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + + ### -LogPath Specifies the full path to which `Get-WindowsUpdateLog` writes `WindowsUpdate.log`. @@ -148,7 +173,7 @@ The default value is `WindowsUpdate.log` in the Desktop folder of the current us ```yaml Type: String -Parameter Sets: (All) +Parameter Sets: Default Aliases: Required: False @@ -171,7 +196,7 @@ The temporary files are in `$env:TEMP\WindowsUpdateLog`. ```yaml Type: String -Parameter Sets: (All) +Parameter Sets: Default Aliases: Accepted values: CSV, XML @@ -185,11 +210,11 @@ Accept wildcard characters: False ### -WhatIf Shows what would happen if the cmdlet runs. -The cmdlet is not run. +The cmdlet isn't run. ```yaml Type: SwitchParameter -Parameter Sets: (All) +Parameter Sets: Default Aliases: wi Required: False