diff --git a/docset/docfx.json b/docset/docfx.json index 9e769dcb50..c6034818fa 100644 --- a/docset/docfx.json +++ b/docset/docfx.json @@ -85,7 +85,10 @@ "AngelaMotherofDragons", "dstrome", "v-dihans", - "sdwheeler" + "sdwheeler", + "Stacyrch140", + "v-stsavell", + "American-Dipper" ], "_op_documentIdPathDepotMapping": { "./": { diff --git a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 1f4cd1c6b2..c2dc606fbf 100644 --- a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref +ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2016-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: New-AdfsAzureMfaTenantCertificate @@ -43,7 +43,7 @@ PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f4 These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm. > [!NOTE] -> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0). +> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module. ### Example 2: Determine which certificate Azure MFA is using ``` diff --git a/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 08223c48de..4d8601d150 100644 --- a/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2019-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -3,7 +3,7 @@ description: Use this topic to help manage Windows and Windows Server technologi external help file: Microsoft.IdentityServer.Management.dll-Help.xml Module Name: ADFS ms.date: 12/20/2016 -ms.custom: has-azure-ad-ps-ref +ms.custom: has-azure-ad-ps-ref, azure-ad-ref-level-one-done online version: https://learn.microsoft.com/powershell/module/adfs/new-adfsazuremfatenantcertificate?view=windowsserver2019-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: New-AdfsAzureMfaTenantCertificate @@ -43,7 +43,7 @@ PS C:\> Set-AdfsAzureMfaTenant -TenantId -ClientId 981f26a1-7f4 These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm. > [!NOTE] -> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](/powershell/module/Azuread/?view=azureadps-2.0). +> Customers are encouraged to use the newer [Microsoft Graph PowerShell](/powershell/microsoftgraph/overview) module. ### Example 2: Determine which certificate Azure MFA is using ``` diff --git a/docset/winserver2022-ps/appx/Get-AppxPackageAutoUpdateSettings.md b/docset/winserver2022-ps/appx/Get-AppxPackageAutoUpdateSettings.md index c70846fe05..cb299cd764 100644 --- a/docset/winserver2022-ps/appx/Get-AppxPackageAutoUpdateSettings.md +++ b/docset/winserver2022-ps/appx/Get-AppxPackageAutoUpdateSettings.md @@ -54,6 +54,14 @@ Get-AppxPackageAutoUpdateSettings -PackageFullName publisher.package1_1.0.0.0_ne This will return the Auto Update and Repair settings for a specific Windows App that has been installed and registered to the signed-in user. +### Example 4: Get App Package Auto Update settings for all installed Windows Apps + +```powershell +Get-AppxPackageAutoUpdateSettings -ShowUpdateAvailability +``` + +Displays available update information for all installed Windows Apps. + ## PARAMETERS ### -PackageFullName diff --git a/docset/winserver2022-ps/windowssearch/Set-WindowsSearchSetting.md b/docset/winserver2022-ps/windowssearch/Set-WindowsSearchSetting.md index 85de5df5db..60d30e5a48 100644 --- a/docset/winserver2022-ps/windowssearch/Set-WindowsSearchSetting.md +++ b/docset/winserver2022-ps/windowssearch/Set-WindowsSearchSetting.md @@ -33,7 +33,7 @@ You can also specify SafeSearch settings. PS C:\> Set-WindowsSearchSetting -SearchExperienceSetting "Personalized" ``` -This command allows Windows Search to use search history, but not specific location of the user, to personalize results. +This command allows Windows Search to use search history, but not the specific location of the user, to personalize results. ### Example 2: Modify Windows Search settings ``` @@ -41,9 +41,16 @@ PS C:\> Set-WindowsSearchSetting -EnableWebResultsSetting $True -SafeSearchSetti ``` This command modifies Windows Search settings. -The command enables the use of search history and specific location of the user by specifying a value of PersonalizedAndLocation for the *SearchExperienceSetting* parameter. +The command enables the use of search history and the specific location of the user by specifying a value of PersonalizedAndLocation for the *SearchExperienceSetting* parameter. The command enables web results and sets SafeSearch to a value of Strict. +### Example 3: Enable metered web search +``` +PS C:\> Set-WindowsSearchSetting -EnableMeteredWebResultsSetting $True +``` + +This command enables Windows Search to display web results and suggestions while using metered connections. + ## PARAMETERS ### -EnableMeteredWebResultsSetting diff --git a/docset/winserver2022-ps/windowsupdate/Get-WindowsUpdateLog.md b/docset/winserver2022-ps/windowsupdate/Get-WindowsUpdateLog.md index 8f9e914656..87dbb167c3 100644 --- a/docset/winserver2022-ps/windowsupdate/Get-WindowsUpdateLog.md +++ b/docset/winserver2022-ps/windowsupdate/Get-WindowsUpdateLog.md @@ -1,8 +1,8 @@ --- -description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. +description: Use this article to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: WindowsUpdateLog.psm1-help.xml Module Name: WindowsUpdate -ms.date: 12/20/2016 +ms.date: 10/31/2023 online version: https://learn.microsoft.com/powershell/module/windowsupdate/get-windowsupdatelog?view=windowsserver2022-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Get-WindowsUpdateLog @@ -16,21 +16,28 @@ Merges Windows Update `.etl` files into a single log file. ## SYNTAX +### ParameterSetDefault ``` Get-WindowsUpdateLog [[-ETLPath] ] [[-LogPath] ] [-ProcessingType ] [-ForceFlush] [-WhatIf] [-Confirm] [] ``` + +### ParameterSetIncludeAllLogs +``` +Get-WindowsUpdateLog [-IncludeAllLogs] [] +``` + ## DESCRIPTION The `Get-WindowsUpdateLog` cmdlet merges and converts Windows Update `.etl` files into a single readable `WindowsUpdate.log` file. Windows Update Agent uses Event Tracing for Windows (ETW) to generate diagnostic logs. Windows Update no longer directly produces a `WindowsUpdate.log` file. -Instead, it produces `.etl` files that are not immediately readable as written. +Instead, it produces `.etl` files that aren't immediately readable as written. For Windows 10 versions prior to 1709 (OS Build 16299), this cmdlet requires access to a Microsoft symbol server, and log decoding must be run from a Windows 10 version earlier than 1709. Logs from -Windows 10, version 1709 onward do not require a Microsoft symbol server, and need to be decoded +Windows 10, version 1709 onward don't require a Microsoft symbol server, and need to be decoded from Windows 10, versions 1709 or higher. ## EXAMPLES @@ -90,7 +97,7 @@ Prompts you for confirmation before running the cmdlet. ```yaml Type: SwitchParameter -Parameter Sets: (All) +Parameter Sets: Default Aliases: cf Required: False @@ -112,7 +119,7 @@ The acceptable values for this parameter are: ```yaml Type: String[] -Parameter Sets: (All) +Parameter Sets: Default Aliases: PsPath Required: False @@ -131,7 +138,7 @@ PowerShell with administrative credentials by using the Run as administrator com ```yaml Type: SwitchParameter -Parameter Sets: (All) +Parameter Sets: Default Aliases: Required: False @@ -141,6 +148,24 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -IncludeAllLogs + +Decodes all update-related logs: Windows Update, Update Session Orchestrator (USO), and the update user interface (UX). This parameter is mutually exclusive of all other parameters of this cmdlet. Specifying this parameter uses defaults for all other parameters. This parameter causes a folder to be created on the desktop and readable WindowsUpdate.log, USO.log, and UX.log files are written to it. + + +```yaml +Type: SwitchParameter +Parameter Sets: IncludeAllLogs +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + + ### -LogPath Specifies the full path to which `Get-WindowsUpdateLog` writes `WindowsUpdate.log`. @@ -148,7 +173,7 @@ The default value is `WindowsUpdate.log` in the Desktop folder of the current us ```yaml Type: String -Parameter Sets: (All) +Parameter Sets: Default Aliases: Required: False @@ -171,7 +196,7 @@ The temporary files are in `$env:TEMP\WindowsUpdateLog`. ```yaml Type: String -Parameter Sets: (All) +Parameter Sets: Default Aliases: Accepted values: CSV, XML @@ -185,11 +210,11 @@ Accept wildcard characters: False ### -WhatIf Shows what would happen if the cmdlet runs. -The cmdlet is not run. +The cmdlet isn't run. ```yaml Type: SwitchParameter -Parameter Sets: (All) +Parameter Sets: Default Aliases: wi Required: False