Skip to content

Commit bb619ab

Browse files
authored
Merge branch 'master' into patch-20
2 parents 7eb1618 + 814aa79 commit bb619ab

File tree

10 files changed

+40
-11
lines changed

10 files changed

+40
-11
lines changed

docset/windows/adfs/new-adfsazuremfatenantcertificate.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,12 +46,15 @@ If it does not find one, it generates it.
4646
### Example 1: Create a certificate and enable Azure MFA on an AD FS farm
4747
```
4848
PS C:\> $certbase64 = New-AdfsAzureMfaTenantCertificate -TenantID <your tenant ID>
49-
PS C:\> New-MsolServicePrincipalCredential -AppPrincipalId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64
49+
PS C:\> New-AzureADServicePrincipalKeyCredential -ObjectId 981f26a1-7f43-403b-a875-f8b09b8cd720 -Type asymmetric -Usage verify -Value $certBase64
5050
PS C:\> Set-AdfsAzureMfaTenant -TenantId <your tenant ID> -ClientId 981f26a1-7f43-403b-a875-f8b09b8cd720
5151
```
5252

5353
These commands create a certificate for Azure MFA, register the certificate in a tenant, and enable Azure MFA on an AD FS farm.
5454

55+
> [!NOTE]
56+
> Customers are encouraged to use the newer Azure Active Directory PowerShell 2.0 module. For more information about the v2.0 module please see [AzureAD PowerShell 2.0](https://docs.microsoft.com/powershell/module/Azuread/?view=azureadps-2.0).
57+
5558
### Example 2: Determine which certificate Azure MFA is using
5659
```
5760
PS C:\> New-AdfsAzureMfaTenantCertificate -TenantID <your tenant ID> -out-file amfacert.cer

docset/windows/defender/add-mppreference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ The acceptable values for this parameter are:
159159
- 1: Clean
160160
- 2: Quarantine
161161
- 3: Remove
162-
- 4: Allow
162+
- 6: Allow
163163
- 8: UserDefined
164164
- 9: NoAction
165165
- 10: Block

docset/windows/defender/set-mppreference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1098,7 +1098,7 @@ The acceptable values for this parameter are:
10981098
- 1: Clean
10991099
- 2: Quarantine
11001100
- 3: Remove
1101-
- 4: Allow
1101+
- 6: Allow
11021102
- 8: UserDefined
11031103
- 9: NoAction
11041104
- 10: Block

docset/windows/dism/add-windowscapability.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ Accept wildcard characters: False
106106
107107
### -LogPath
108108
Specifies the full path and file name to log to.
109-
If not set, the default is `$env:WINDIR\Logs\Dism\dism.log`.
109+
If not set, the default is `"$env:WINDIR\Logs\Dism\dism.log"`.
110110
In Windows PE, the default directory is the RAMDISK scratch space which can be as low as 32 MB.
111111
The log file will automatically be archived.
112112
The archived log file will be saved with .bak appended to the file name and a new log file will be generated.
@@ -174,7 +174,7 @@ Accept wildcard characters: False
174174
### -ScratchDirectory
175175
Specifies a temporary directory that will be used when extracting files for use during servicing.
176176
The directory must exist locally.
177-
If not specified, the `\Windows\%Temp%` directory will be used, with a subdirectory name of a randomly generated hexadecimal value for each run of DISM.
177+
If not specified, the `"$env:Temp"` directory will be used, with a subdirectory name of a randomly generated hexadecimal value for each run of DISM.
178178
Items in the scratch directory are deleted after each operation.
179179
You should not use a network share location as a scratch directory to expand a package (.cab or .msu file) for installation.
180180
The directory used for extracting files for temporary usage during servicing should be a local directory.

docset/windows/msdtc/test-dtc.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -39,12 +39,15 @@ The cmdlet performs the following tests:
3939
- Checks whether the two computers can ping each other.
4040
- Checks whether a transaction can be propagated between the two computers.
4141

42-
To run this cmdlet, you must first enable the firewall rule for WMI on both computers by using the Netsh utility.
43-
Run the following command:
42+
To run this cmdlet, you must first enable the firewall rule for Distributed Transaction Coordinator on both computers by using the Netsh utility run the following command:
4443

45-
`netsh advfirewall firewall set rule group="Windows Management Instrumentation (WMI)" new enable=yes`
44+
`netsh advfirewall firewall set rule group="Distributed Transaction Coordinator" new enable=yes`
4645

47-
For more information, see [The Netsh Command-Line Utility](https://technet.microsoft.com/library/cc785383.aspx) (https://technet.microsoft.com/library/cc785383.aspx) in the TechNet library.
46+
For more information, see [Netsh Command Syntax, Contexts, and Formatting](https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts).
47+
48+
To enable the rule using PowerShell run the following command:
49+
50+
`Enable-NetFirewallRule -DisplayGroup "Distributed Transaction Coordinator"`
4851

4952
## EXAMPLES
5053

docset/windows/netsecurity/new-netfirewallrule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -756,7 +756,7 @@ Accepted values: Any, Domain, Private, Public, NotApplicable
756756
757757
Required: False
758758
Position: Named
759-
Default value: None
759+
Default value: Any
760760
Accept pipeline input: False
761761
Accept wildcard characters: False
762762
```

docset/windows/storage/get-disk.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,9 @@ ms.assetid: 3929EB27-1365-42CA-8ACF-68B364C3599F
2323
## SYNOPSIS
2424
Gets one or more disks visible to the operating system.
2525

26+
> [!NOTE]
27+
> This cmdlet returns physical disk objects like basic disks and partitioned drive partitions. Dynamic disks can span multiple pieces of physical media, so they will not be returned by Get-Disk. For more information, see [Basic and Dynamic Disks](https://docs.microsoft.com/windows/desktop/FileIO/basic-and-dynamic-disks).
28+
2629
## SYNTAX
2730

2831
### ByNumber (Default)

docset/windows/storage/get-storagetier.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ The **Get-StorageTier** cmdlet gets the storage tier from the storage pool objec
7272

7373
### Example 3: Get a storage tier from a virtual disk
7474
```
75-
PS C:\>Get-VirtualDisk-FriendlyName "VDisk01" | Get-StorageTier
75+
PS C:\>Get-VirtualDisk -FriendlyName "VDisk01" | Get-StorageTier
7676
```
7777

7878
This command uses the Get-VirtualDisk cmdlet to get the tiered virtual disk named VDisk01.

docset/winserver2012-ps/msdtc/Test-Dtc.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,16 @@ The cmdlet performs the following tests:
2929
- Checks whether the Microsoft Distributed Transaction Coordinator (MSDTC) network security settings are correctly configured for network transactions.
3030
- Checks whether the two computers can ping each other.
3131
- Checks whether a transaction can be propagated between the two computers.
32+
33+
To run this cmdlet, you must first enable the firewall rule for Distributed Transaction Coordinator on both computers by using the Netsh utility run the following command:
34+
35+
`netsh advfirewall firewall set rule group="Distributed Transaction Coordinator" new enable=yes`
36+
37+
For more information, see [Netsh Command Syntax, Contexts, and Formatting](https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts).
38+
39+
To enable the rule using PowerShell run the following command:
40+
41+
`Enable-NetFirewallRule -DisplayGroup "Distributed Transaction Coordinator"`
3242

3343
## EXAMPLES
3444

docset/winserver2012r2-ps/msdtc/Test-Dtc.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,16 @@ The cmdlet performs the following tests:
3838
- Checks whether the two computers can ping each other.
3939
- Checks whether a transaction can be propagated between the two computers.
4040

41+
To run this cmdlet, you must first enable the firewall rule for Distributed Transaction Coordinator on both computers by using the Netsh utility run the following command:
42+
43+
`netsh advfirewall firewall set rule group="Distributed Transaction Coordinator" new enable=yes`
44+
45+
For more information, see [Netsh Command Syntax, Contexts, and Formatting](https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts).
46+
47+
To enable the rule using PowerShell run the following command:
48+
49+
`Enable-NetFirewallRule -DisplayGroup "Distributed Transaction Coordinator"`
50+
4151
## EXAMPLES
4252

4353
### Example 1: Test MSDTC on the local computer

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy