diff --git a/docset/mdop/appvclient/add-appvclientconnectiongroup.md b/docset/mdop/appvclient/add-appvclientconnectiongroup.md index b756d72edb..d8dc22a9bb 100644 --- a/docset/mdop/appvclient/add-appvclientconnectiongroup.md +++ b/docset/mdop/appvclient/add-appvclientconnectiongroup.md @@ -19,7 +19,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/mdop/appvclient/get-appvpublishingserver.md b/docset/mdop/appvclient/get-appvpublishingserver.md index 83173f798b..c3b1a53495 100644 --- a/docset/mdop/appvclient/get-appvpublishingserver.md +++ b/docset/mdop/appvclient/get-appvpublishingserver.md @@ -25,7 +25,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/mdop/appvsequencer/expand-appvsequencerpackage.md b/docset/mdop/appvsequencer/expand-appvsequencerpackage.md index 69b594a8d5..c25df39302 100644 --- a/docset/mdop/appvsequencer/expand-appvsequencerpackage.md +++ b/docset/mdop/appvsequencer/expand-appvsequencerpackage.md @@ -19,7 +19,7 @@ Expand-AppvSequencerPackage [-AppvPackagePath] [] ``` ## DESCRIPTION -The **Expand-AppvSequencerPackage** cmdlet expands an Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer. +The **Expand-AppvSequencerPackage** cmdlet expands a Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer. You can more easily add prerequisites or dependent applications to the sequencer before generating the package. Run this cmdlet each time to expand a new package onto the computer running the sequencer. diff --git a/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md index fb31a109f3..c6b1566b72 100644 --- a/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -17,7 +17,7 @@ Enable-MSDSMAutomaticClaim [-BusType] ``` ## DESCRIPTION -The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. +The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI). You can enable MSDSM to automatically claim both SAS and iSCSI disks. diff --git a/docset/winserver2012r2-ps/hpc/HPC.md b/docset/winserver2012r2-ps/hpc/HPC.md index 4efbd0df30..74a089557a 100644 --- a/docset/winserver2012r2-ps/hpc/HPC.md +++ b/docset/winserver2012r2-ps/hpc/HPC.md @@ -267,7 +267,7 @@ Clears the cached credentials that the HPC Diagnostics Service uses to run diagn Clears the alert icon for diagnostic test runs. ### [Remove-HpcTokenCache](./Remove-HpcTokenCache.md) -Removes the client Azure Active Directory token cache used for job submission. +Removes the client Microsoft Entra token cache used for job submission. ### [Replicate-HpcImage](./Replicate-HpcImage.md) Copies a base-node operating system image from a Windows image (.wim) file to an Internet SCSI (iSCSI) storage array. @@ -321,7 +321,7 @@ Sets the properties for a task. Sets the credentials for running diagnostic tests. ### [Set-HpcTokenCache](./Set-HpcTokenCache.md) -Sets the client Azure Active Directory token cache for job submission. +Sets the client Microsoft Entra token cache for job submission. ### [Shutdown-HpcNode](./Shutdown-HpcNode.md) Turns off one or more nodes. diff --git a/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md index ec5f420287..07295cc07e 100644 --- a/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2012r2-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -19,7 +19,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [] ``` ## DESCRIPTION -The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. +The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type. You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI). You can enable MSDSM to automatically claim both SAS and iSCSI disks. diff --git a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md index 88f4449005..1f4cd1c6b2 100644 --- a/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md +++ b/docset/winserver2016-ps/adfs/New-AdfsAzureMfaTenantCertificate.md @@ -72,8 +72,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of the Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` +Specifies the GUID representation of the Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID. diff --git a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md index 7579d96ac1..1adb2c053a 100644 --- a/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId -ClientId [-WhatIf] [-Confirm ``` ## DESCRIPTION -The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant. +The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant. ## EXAMPLES @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer ## PARAMETERS ### -ClientId -Specifies the well-known ID of the Azure MFA application in Azure AD. +Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID. ```yaml Type: String @@ -60,8 +60,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of an Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: +Specifies the GUID representation of a Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\/directoryQuickStart` diff --git a/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md b/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md index f55491eeba..023eae659a 100644 --- a/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md +++ b/docset/winserver2016-ps/adfs/Set-AdfsRelyingPartyWebContent.md @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying ### Example 2: Create a custom message on the Sign in page ``` -PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Azure AD self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" +PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Microsoft Entra self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" ``` The command creates a custom message on the Sign in page for the Office 365 relying party. diff --git a/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md b/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md index 4653a75d53..c9b4e0d8ef 100644 --- a/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md +++ b/docset/winserver2016-ps/appvclient/Add-AppvClientConnectionGroup.md @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md b/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md index b4ec42481f..eda6e55cf7 100644 --- a/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md +++ b/docset/winserver2016-ps/appvclient/Get-AppvPublishingServer.md @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md index c9fa20b9ef..929edfd47c 100644 --- a/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [-WhatIf] [-Confirm] [/directoryQuickStart` +Specifies the GUID representation of the Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID. diff --git a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md index 5563a15d78..35eea27491 100644 --- a/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId -ClientId [-WhatIf] [-Confirm ``` ## DESCRIPTION -The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant. +The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant. ## EXAMPLES @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer ## PARAMETERS ### -ClientId -Specifies the well-known ID of the Azure MFA application in Azure AD. +Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID. ```yaml Type: String @@ -60,8 +60,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of an Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: +Specifies the GUID representation of a Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\/directoryQuickStart` diff --git a/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md b/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md index 6657a2f6ee..390dc45a45 100644 --- a/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md +++ b/docset/winserver2019-ps/adfs/Set-AdfsRelyingPartyWebContent.md @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying ### Example 2: Create a custom message on the Sign in page ``` -PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Azure AD self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" +PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Microsoft Entra self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" ``` The command creates a custom message on the Sign in page for the Office 365 relying party. diff --git a/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md b/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md index 59e1bf2c32..cadf750e95 100644 --- a/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md +++ b/docset/winserver2019-ps/appvclient/Add-AppvClientConnectionGroup.md @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition. diff --git a/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md b/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md index f3b38f1fbb..40f03a580c 100644 --- a/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md +++ b/docset/winserver2019-ps/appvclient/Get-AppvPublishingServer.md @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] ] [[-URL] ] [ [[-Version] ] [] [-DynamicDeploymentConfiguration ``` ## DESCRIPTION -The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package. +The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package. ## EXAMPLES diff --git a/docset/winserver2019-ps/laps/Get-LapsAADPassword.md b/docset/winserver2019-ps/laps/Get-LapsAADPassword.md index 480ba0bc76..98c9b8ada5 100644 --- a/docset/winserver2019-ps/laps/Get-LapsAADPassword.md +++ b/docset/winserver2019-ps/laps/Get-LapsAADPassword.md @@ -1,5 +1,5 @@ --- -description: Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Azure AD device. +description: Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Microsoft Entra device. external help file: LAPS-help.xml Module Name: LAPS online version: https://learn.microsoft.com/powershell/module/laps/get-lapsaadpassword?view=windowsserver2019-ps&wt.mc_id=ps-gethelp @@ -12,8 +12,8 @@ title: Get-LapsAADPassword # Get-LapsAADPassword ## SYNOPSIS -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ## SYNTAX @@ -25,7 +25,7 @@ Get-LapsAADPassword -DeviceIds [-IncludePasswords] [-IncludeHistory] ## DESCRIPTION The `Get-LapsAADPassword` cmdlet allows administrators to retrieve LAPS passwords and password -history for an AAD-joined device. This is implemented by sending queries to Microsoft Graph over the +history for a Microsoft Entra joined device. This is implemented by sending queries to Microsoft Graph over the deviceLocalCredentials collection. The `Get-LapsAADPassword` cmdlet supports two basic modes when querying LAPS passwords: @@ -51,9 +51,9 @@ device, the `DeviceManagementManagedDevices.Read.All` permission may also be req > [!IMPORTANT] > The `Get-LapsAADPassword` cmdlet is implemented as a wrapper around the Microsoft Graph PowerShell > library, which must be manually installed on the device before `Get-LapsAADPassword` can work. -> Additional configuration steps are required in your AAD tenant to enable authentication to +> Additional configuration steps are required in your Microsoft Entra tenant to enable authentication to > Microsoft Graph and to grant the necessary Microsoft Graph permissions. For more information, see -> [Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) +> [Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) The **Verbose** parameter may be used to get additional information about the cmdlet's operation. @@ -240,4 +240,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable [Windows LAPS Overview](https://go.microsoft.com/fwlink/?linkid=2233901) -[Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704) \ No newline at end of file +[Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704) diff --git a/docset/winserver2019-ps/laps/LAPS.md b/docset/winserver2019-ps/laps/LAPS.md index 902661693d..8f2d4ee052 100644 --- a/docset/winserver2019-ps/laps/LAPS.md +++ b/docset/winserver2019-ps/laps/LAPS.md @@ -25,8 +25,8 @@ Local Administrator Password Solution (LAPS) password attributes. ### [Get-LapsAADPassword](Get-LapsAADPassword.md) -Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) -credentials on a specified Azure AD device. +Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) +credentials on a specified Microsoft Entra device. ### [Get-LapsADPassword](Get-LapsADPassword.md) diff --git a/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md b/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md index d24bb91303..a9ed25792d 100644 --- a/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md +++ b/docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] [-WhatIf] [-Confirm] [/directoryQuickStart` +Specifies the GUID representation of the Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory//directoryQuickStart` Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID. diff --git a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md index 292a669981..cb3d9cf62a 100644 --- a/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md +++ b/docset/winserver2022-ps/adfs/Set-AdfsAzureMfaTenant.md @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId -ClientId [-WhatIf] [-Confirm ``` ## DESCRIPTION -The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant. +The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant. ## EXAMPLES @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer ## PARAMETERS ### -ClientId -Specifies the well-known ID of the Azure MFA application in Azure AD. +Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID. ```yaml Type: String @@ -60,8 +60,8 @@ Accept wildcard characters: False ``` ### -TenantId -Specifies the GUID representation of an Azure AD tenant ID. -This can be found in the URL bar of the Azure AD portal, as in this example: +Specifies the GUID representation of a Microsoft Entra tenant ID. +This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\/directoryQuickStart` diff --git a/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md b/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md index 3847021a14..01350e6b67 100644 --- a/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md +++ b/docset/winserver2022-ps/adfs/Set-AdfsRelyingPartyWebContent.md @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying ### Example 2: Create a custom message on the Sign in page ``` -PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Azure AD self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" +PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit Microsoft Entra self-service password reset." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform" ``` The command creates a custom message on the Sign in page for the Office 365 relying party. diff --git a/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md b/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md index 0d7a0da0dc..6d396893a3 100644 --- a/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md +++ b/docset/winserver2022-ps/appvclient/Add-AppvClientConnectionGroup.md @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] [] ``` ## DESCRIPTION -The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group. +The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group. In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running. This cmdlet can also be used to update an already existing connection group definition.