Skip to content

Commit

Permalink
[BULK] - DocuTune - Rebranding of Azure Active Dir
Browse files Browse the repository at this point in the history
  • Loading branch information
alexbuckgit committed Oct 24, 2023
1 parent bcb7693 commit c050c54
Show file tree
Hide file tree
Showing 8 changed files with 17 additions and 17 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] <String>] [[-URL] <String>] [<CommonParameters
```

## DESCRIPTION
The **Get-AppvPublishingServer** cmdlet returns an Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.
The **Get-AppvPublishingServer** cmdlet returns a Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ Mount-AppvClientPackage [-Name] <String> [[-Version] <String>] [<CommonParameter
```

## DESCRIPTION
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of an Microsoft Application Virtualization (App-V) package into the cache.
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of a Microsoft Application Virtualization (App-V) package into the cache.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Set-AppvClientPackage [-Path <String>] [-DynamicDeploymentConfiguration <String>
```

## DESCRIPTION
The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package.
The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ schema: 2.0.0
# BackupToAAD-BitLockerKeyProtector

## SYNOPSIS
Saves a key protector for a BitLocker volume in Azure Active Directory.
Saves a key protector for a BitLocker volume in Microsoft Entra ID.

## SYNTAX

Expand All @@ -17,7 +17,7 @@ BackupToAAD-BitLockerKeyProtector [-MountPoint] <String[]> [-KeyProtectorId] <St
```

## DESCRIPTION
The **BackupToAAD-BitLockerKeyProtector** cmdlet saves a recovery password key protector for a volume protected by BitLocker Drive Encryption to Azure Active Directory (AAD). Specify a key to be saved by ID.
The **BackupToAAD-BitLockerKeyProtector** cmdlet saves a recovery password key protector for a volume protected by BitLocker Drive Encryption to Microsoft Entra ID. Specify a key to be saved by ID.

## EXAMPLES

Expand All @@ -38,7 +38,7 @@ The second command backs up the key protector for the BitLocker volume specified
```powershell
PS C:\> BackupToAAD-BitLockerKeyProtector -MountPoint "C:" -KeyProtectorId "{E2611001E-6AD0-4A08-BAAA-C9c031DB2AA6}"
```
This command saves a key protector for a specified BitLocker volume to Azure AD. The command specifies the key protector by using its ID.
This command saves a key protector for a specified BitLocker volume to Microsoft Entra ID. The command specifies the key protector by using its ID.

## PARAMETERS

Expand Down
2 changes: 1 addition & 1 deletion docset/winserver2022-ps/bitlocker/BitLocker.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ This reference provides cmdlet descriptions and syntax for all BitLocker cmdlets
Adds a key protector for a BitLocker volume.

### [BackupToAAD-BitLockerKeyProtector](./BackupToAAD-BitLockerKeyProtector.md)
Saves a key protector for a BitLocker volume in AAD.
Saves a key protector for a BitLocker volume in Microsoft Entra ID.

### [Backup-BitLockerKeyProtector](./Backup-BitLockerKeyProtector.md)
Saves a key protector for a BitLocker volume in AD DS.
Expand Down
14 changes: 7 additions & 7 deletions docset/winserver2022-ps/laps/Get-LapsAADPassword.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
description: Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Azure AD device.
description: Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Microsoft Entra device.
external help file: LAPS-help.xml
Module Name: LAPS
online version: https://learn.microsoft.com/powershell/module/laps/get-lapsaadpassword?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
Expand All @@ -12,8 +12,8 @@ title: Get-LapsAADPassword
# Get-LapsAADPassword

## SYNOPSIS
Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS)
credentials on a specified Azure AD device.
Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS)
credentials on a specified Microsoft Entra device.

## SYNTAX

Expand All @@ -25,7 +25,7 @@ Get-LapsAADPassword -DeviceIds <String[]> [-IncludePasswords] [-IncludeHistory]
## DESCRIPTION

The `Get-LapsAADPassword` cmdlet allows administrators to retrieve LAPS passwords and password
history for an AAD-joined device. This is implemented by sending queries to Microsoft Graph over the
history for a Microsoft Entra joined device. This is implemented by sending queries to Microsoft Graph over the
deviceLocalCredentials collection.

The `Get-LapsAADPassword` cmdlet supports two basic modes when querying LAPS passwords:
Expand All @@ -51,9 +51,9 @@ device, the `DeviceManagementManagedDevices.Read.All` permission may also be req
> [!IMPORTANT]
> The `Get-LapsAADPassword` cmdlet is implemented as a wrapper around the Microsoft Graph PowerShell
> library, which must be manually installed on the device before `Get-LapsAADPassword` can work.
> Additional configuration steps are required in your AAD tenant to enable authentication to
> Additional configuration steps are required in your Microsoft Entra tenant to enable authentication to
> Microsoft Graph and to grant the necessary Microsoft Graph permissions. For more information, see
> [Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704)
> [Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704)
The **Verbose** parameter may be used to get additional information about the cmdlet's operation.

Expand Down Expand Up @@ -240,4 +240,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
[Windows LAPS Overview](https://go.microsoft.com/fwlink/?linkid=2233901)
[Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704)
[Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704)
4 changes: 2 additions & 2 deletions docset/winserver2022-ps/laps/LAPS.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,8 +25,8 @@ Local Administrator Password Solution (LAPS) password attributes.

### [Get-LapsAADPassword](Get-LapsAADPassword.md)

Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS)
credentials on a specified Azure AD device.
Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS)
credentials on a specified Microsoft Entra device.

### [Get-LapsADPassword](Get-LapsADPassword.md)

Expand Down
2 changes: 1 addition & 1 deletion docset/winserver2022-ps/mpio/Enable-MSDSMAutomaticClaim.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] <String> [-WhatIf] [-Confirm] [<CommonPara
```

## DESCRIPTION
The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.

You must specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI).
You can enable MSDSM to automatically claim both SAS and iSCSI disks.
Expand Down

0 comments on commit c050c54

Please sign in to comment.