Skip to content

Commit

Permalink
Merge branch 'main' into American-Dipper-patch-1
Browse files Browse the repository at this point in the history
  • Loading branch information
Thomas Raya authored Nov 1, 2023
2 parents e10c791 + 96d0e12 commit 0c2c596
Show file tree
Hide file tree
Showing 41 changed files with 144 additions and 79 deletions.
2 changes: 1 addition & 1 deletion docset/mdop/appvclient/add-appvclientconnectiongroup.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Add-AppvClientConnectionGroup [-Path] <String> [<CommonParameters>]
```

## DESCRIPTION
The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group.
The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group.
In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running.

This cmdlet can also be used to update an already existing connection group definition.
Expand Down
2 changes: 1 addition & 1 deletion docset/mdop/appvclient/get-appvpublishingserver.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ Get-AppvPublishingServer [[-Name] <String>] [[-URL] <String>] [<CommonParameters
```

## DESCRIPTION
The **Get-AppvPublishingServer** cmdlet returns an Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.
The **Get-AppvPublishingServer** cmdlet returns a Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion docset/mdop/appvclient/mount-appvclientpackage.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ Mount-AppvClientPackage [-Name] <String> [[-Version] <String>] [<CommonParameter
```

## DESCRIPTION
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of an Microsoft Application Virtualization (App-V) package into the cache.
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of a Microsoft Application Virtualization (App-V) package into the cache.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion docset/mdop/appvclient/set-appvclientpackage.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ Set-AppvClientPackage [-Path <String>] [-DynamicDeploymentConfiguration <String>
```

## DESCRIPTION
The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package.
The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion docset/mdop/appvsequencer/expand-appvsequencerpackage.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Expand-AppvSequencerPackage [-AppvPackagePath] <String> [<CommonParameters>]
```

## DESCRIPTION
The **Expand-AppvSequencerPackage** cmdlet expands an Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer.
The **Expand-AppvSequencerPackage** cmdlet expands a Microsoft Application Virtualization (App-V) package into its native form to the NTFS file system on the computer running the sequencer.
You can more easily add prerequisites or dependent applications to the sequencer before generating the package.

Run this cmdlet each time to expand a new package onto the computer running the sequencer.
Expand Down
2 changes: 1 addition & 1 deletion docset/winserver2012-ps/mpio/Enable-MSDSMAutomaticClaim.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ Enable-MSDSMAutomaticClaim [-BusType] <String>
```

## DESCRIPTION
The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.

You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI).
You can enable MSDSM to automatically claim both SAS and iSCSI disks.
Expand Down
4 changes: 2 additions & 2 deletions docset/winserver2012r2-ps/hpc/HPC.md
Original file line number Diff line number Diff line change
Expand Up @@ -267,7 +267,7 @@ Clears the cached credentials that the HPC Diagnostics Service uses to run diagn
Clears the alert icon for diagnostic test runs.

### [Remove-HpcTokenCache](./Remove-HpcTokenCache.md)
Removes the client Azure Active Directory token cache used for job submission.
Removes the client Microsoft Entra token cache used for job submission.

### [Replicate-HpcImage](./Replicate-HpcImage.md)
Copies a base-node operating system image from a Windows image (.wim) file to an Internet SCSI (iSCSI) storage array.
Expand Down Expand Up @@ -321,7 +321,7 @@ Sets the properties for a task.
Sets the credentials for running diagnostic tests.

### [Set-HpcTokenCache](./Set-HpcTokenCache.md)
Sets the client Azure Active Directory token cache for job submission.
Sets the client Microsoft Entra token cache for job submission.

### [Shutdown-HpcNode](./Shutdown-HpcNode.md)
Turns off one or more nodes.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ Enable-MSDSMAutomaticClaim [-BusType] <String> [<CommonParameters>]
```

## DESCRIPTION
The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.

You need to specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI).
You can enable MSDSM to automatically claim both SAS and iSCSI disks.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,8 +72,8 @@ Accept wildcard characters: False
```
### -TenantId
Specifies the GUID representation of the Azure AD tenant ID.
This can be found in the URL bar of the Azure AD portal, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`
Specifies the GUID representation of the Microsoft Entra tenant ID.
This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`

Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID.

Expand Down
8 changes: 4 additions & 4 deletions docset/winserver2016-ps/adfs/Set-AdfsAzureMfaTenant.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId <String> -ClientId <String> [-WhatIf] [-Confirm
```

## DESCRIPTION
The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant.
The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant.

## EXAMPLES

Expand All @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer
## PARAMETERS

### -ClientId
Specifies the well-known ID of the Azure MFA application in Azure AD.
Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID.

```yaml
Type: String
Expand All @@ -60,8 +60,8 @@ Accept wildcard characters: False
```
### -TenantId
Specifies the GUID representation of an Azure AD tenant ID.
This can be found in the URL bar of the Azure AD portal, as in this example:
Specifies the GUID representation of a Microsoft Entra tenant ID.
This can be found in the URL bar of the Microsoft Entra admin center, as in this example:
`https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\<tenantID_GUID\>/directoryQuickStart`

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying

### Example 2: Create a custom message on the Sign in page
```
PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit <A href='https://passwordreset.microsoftonline.com/'>Azure AD self-service password reset</A>." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform"
PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit <A href='https://passwordreset.microsoftonline.com/'>Microsoft Entra self-service password reset</A>." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform"
```

The command creates a custom message on the Sign in page for the Office 365 relying party.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] <String> [<CommonParameters>]
```

## DESCRIPTION
The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group.
The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group.
In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running.

This cmdlet can also be used to update an already existing connection group definition.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] <String>] [[-URL] <String>] [<CommonParameters
```

## DESCRIPTION
The **Get-AppvPublishingServer** cmdlet returns an Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.
The **Get-AppvPublishingServer** cmdlet returns a Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ Mount-AppvClientPackage [-Name] <String> [[-Version] <String>] [<CommonParameter
```

## DESCRIPTION
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of an Microsoft Application Virtualization (App-V) package into the cache.
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of a Microsoft Application Virtualization (App-V) package into the cache.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Set-AppvClientPackage [-Path <String>] [-DynamicDeploymentConfiguration <String>
```

## DESCRIPTION
The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package.
The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package.

## EXAMPLES

Expand Down
2 changes: 1 addition & 1 deletion docset/winserver2016-ps/mpio/Enable-MSDSMAutomaticClaim.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] <String> [-WhatIf] [-Confirm] [<CommonPara
```

## DESCRIPTION
The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.

You must specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI).
You can enable MSDSM to automatically claim both SAS and iSCSI disks.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -71,8 +71,8 @@ Accept wildcard characters: False
```
### -TenantId
Specifies the GUID representation of the Azure AD tenant ID.
This can be found in the URL bar of the Azure AD portal, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`
Specifies the GUID representation of the Microsoft Entra tenant ID.
This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`

Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID.

Expand Down
8 changes: 4 additions & 4 deletions docset/winserver2019-ps/adfs/Set-AdfsAzureMfaTenant.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ Set-AdfsAzureMfaTenant -TenantId <String> -ClientId <String> [-WhatIf] [-Confirm
```

## DESCRIPTION
The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Azure Active Directory (AD) tenant.
The **Set-AdfsAzureMfaTenant** cmdlet enables an Active Directory Federation Services (AD FS) farm to use Azure Multi-Factor Authentication (MFA) after a certificate has been created and registered in the Microsoft Entra tenant.

## EXAMPLES

Expand All @@ -45,7 +45,7 @@ After AD FS has been configured for Azure MFA, this command determines which cer
## PARAMETERS

### -ClientId
Specifies the well-known ID of the Azure MFA application in Azure AD.
Specifies the well-known ID of the Azure MFA application in Microsoft Entra ID.

```yaml
Type: String
Expand All @@ -60,8 +60,8 @@ Accept wildcard characters: False
```
### -TenantId
Specifies the GUID representation of an Azure AD tenant ID.
This can be found in the URL bar of the Azure AD portal, as in this example:
Specifies the GUID representation of a Microsoft Entra tenant ID.
This can be found in the URL bar of the Microsoft Entra admin center, as in this example:
`https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/\<tenantID_GUID\>/directoryQuickStart`

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ This command assigns multiple error messages to display to users for the relying

### Example 2: Create a custom message on the Sign in page
```
PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit <A href='https://passwordreset.microsoftonline.com/'>Azure AD self-service password reset</A>." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform"
PS C:\> Set-AdfsRelyingPartyWebContent -SignInPageDescription "If you have forgotten your password, visit <A href='https://passwordreset.microsoftonline.com/'>Microsoft Entra self-service password reset</A>." -TargetRelyingPartyName "Microsoft Office 365 Identity Platform"
```

The command creates a custom message on the Sign in page for the Office 365 relying party.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Add-AppvClientConnectionGroup [-Path] <String> [<CommonParameters>]
```

## DESCRIPTION
The **Add-AppvClientConnectionGroup** cmdlet creates an Microsoft Application Virtualization (App-V) connection group.
The **Add-AppvClientConnectionGroup** cmdlet creates a Microsoft Application Virtualization (App-V) connection group.
In order for the group to be applied, all packages in the group must be added to the target computer, and must not be running.

This cmdlet can also be used to update an already existing connection group definition.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Get-AppvPublishingServer [[-Name] <String>] [[-URL] <String>] [<CommonParameters
```

## DESCRIPTION
The **Get-AppvPublishingServer** cmdlet returns an Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.
The **Get-AppvPublishingServer** cmdlet returns a Microsoft Application Virtualization (App-V) Server object or set of App-V Server objects based on the criteria provided.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ Mount-AppvClientPackage [-Name] <String> [[-Version] <String>] [<CommonParameter
```

## DESCRIPTION
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of an Microsoft Application Virtualization (App-V) package into the cache.
The **Mount-AppvClientPackage** cmdlet initiates or resumes the loading of a Microsoft Application Virtualization (App-V) package into the cache.

## EXAMPLES

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Set-AppvClientPackage [-Path <String>] [-DynamicDeploymentConfiguration <String>
```

## DESCRIPTION
The **Set-AppvClientPackage** cmdlet modifies the configuration files of an Microsoft Application Virtualization (App-V) package.
The **Set-AppvClientPackage** cmdlet modifies the configuration files of a Microsoft Application Virtualization (App-V) package.

## EXAMPLES

Expand Down
14 changes: 7 additions & 7 deletions docset/winserver2019-ps/laps/Get-LapsAADPassword.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
---
description: Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Azure AD device.
description: Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS) credentials on a specified Microsoft Entra device.
external help file: LAPS-help.xml
Module Name: LAPS
online version: https://learn.microsoft.com/powershell/module/laps/get-lapsaadpassword?view=windowsserver2019-ps&wt.mc_id=ps-gethelp
Expand All @@ -12,8 +12,8 @@ title: Get-LapsAADPassword
# Get-LapsAADPassword

## SYNOPSIS
Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS)
credentials on a specified Azure AD device.
Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS)
credentials on a specified Microsoft Entra device.

## SYNTAX

Expand All @@ -25,7 +25,7 @@ Get-LapsAADPassword -DeviceIds <String[]> [-IncludePasswords] [-IncludeHistory]
## DESCRIPTION

The `Get-LapsAADPassword` cmdlet allows administrators to retrieve LAPS passwords and password
history for an AAD-joined device. This is implemented by sending queries to Microsoft Graph over the
history for a Microsoft Entra joined device. This is implemented by sending queries to Microsoft Graph over the
deviceLocalCredentials collection.

The `Get-LapsAADPassword` cmdlet supports two basic modes when querying LAPS passwords:
Expand All @@ -51,9 +51,9 @@ device, the `DeviceManagementManagedDevices.Read.All` permission may also be req
> [!IMPORTANT]
> The `Get-LapsAADPassword` cmdlet is implemented as a wrapper around the Microsoft Graph PowerShell
> library, which must be manually installed on the device before `Get-LapsAADPassword` can work.
> Additional configuration steps are required in your AAD tenant to enable authentication to
> Additional configuration steps are required in your Microsoft Entra tenant to enable authentication to
> Microsoft Graph and to grant the necessary Microsoft Graph permissions. For more information, see
> [Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704)
> [Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704)
The **Verbose** parameter may be used to get additional information about the cmdlet's operation.

Expand Down Expand Up @@ -240,4 +240,4 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
[Windows LAPS Overview](https://go.microsoft.com/fwlink/?linkid=2233901)
[Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704)
[Get started with Windows LAPS and Microsoft Entra ID](https://go.microsoft.com/fwlink/?linkid=2233704)
4 changes: 2 additions & 2 deletions docset/winserver2019-ps/laps/LAPS.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,8 +25,8 @@ Local Administrator Password Solution (LAPS) password attributes.

### [Get-LapsAADPassword](Get-LapsAADPassword.md)

Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS)
credentials on a specified Azure AD device.
Queries Microsoft Entra ID for the Windows Local Administrator Password Solution (LAPS)
credentials on a specified Microsoft Entra device.

### [Get-LapsADPassword](Get-LapsADPassword.md)

Expand Down
2 changes: 1 addition & 1 deletion docset/winserver2019-ps/mpio/Enable-MSDSMAutomaticClaim.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ Enable-MSDSMAutomaticClaim [-BusType] <String> [-WhatIf] [-Confirm] [<CommonPara
```

## DESCRIPTION
The **Enable-MSDSMAutomaticClaim** cmdlet enables an Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.
The **Enable-MSDSMAutomaticClaim** cmdlet enables a Microsoft Device Specific Module (MSDSM) to automatically claim storage area network (SAN) disks for Microsoft Multipath I/O (MPIO) for a bus type.

You must specify a valid bus type, either serial attached storage (SAS) and Internet Small Computer System Interface (iSCSI).
You can enable MSDSM to automatically claim both SAS and iSCSI disks.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -72,8 +72,8 @@ Accept wildcard characters: False
```
### -TenantId
Specifies the GUID representation of the Azure AD tenant ID.
This can be found in the URL bar of the Azure AD portal, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`
Specifies the GUID representation of the Microsoft Entra tenant ID.
This can be found in the URL bar of the Microsoft Entra admin center, as in this example: `https://manage.windowsazure.com/contoso.onmicrosoft.com#Workspaces/ActiveDirectoryExtension/Directory/<tenantID_GUID>/directoryQuickStart`

Alternatively, you can use the **Login-AzureRmAccount** cmdlet to get the tenant ID.

Expand Down
Loading

0 comments on commit 0c2c596

Please sign in to comment.