Skip to content

Commit bf62807

Browse files
committed
Standardize abbreviations
- Add common abbreviations on first use - Shorten wording to use abbreviations
1 parent dbef4cc commit bf62807

12 files changed

+143
-139
lines changed

docset/winserver2022-ps/laps/Find-LapsADExtendedRights.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ title: Find-LapsADExtendedRights
1212
# Find-LapsADExtendedRights
1313

1414
## SYNOPSIS
15-
Queries Active Directory to find principals that have been granted permission to read Windows Local
16-
Administrator Password Solution (LAPS) password attributes.
15+
Queries Active Directory (AD) to find principals that have been granted permission to read Windows
16+
Local Administrator Password Solution (LAPS) password attributes.
1717

1818
## SYNTAX
1919

@@ -47,7 +47,7 @@ This example shows how to run the cmdlet.
4747

4848
### -Credential
4949

50-
Specifies the credentials to use when updating Active Directory. If not specified, the current
50+
Specifies the credentials to use when updating AD. If not specified, the current
5151
user's credentials are used.
5252

5353
```yaml
@@ -64,7 +64,7 @@ Accept wildcard characters: False
6464
6565
### -Domain
6666
67-
Specifies which Active Directory domain to connect to.
67+
Specifies the name of the domain to connect to.
6868
6969
```yaml
7070
Type: System.String
@@ -80,7 +80,7 @@ Accept wildcard characters: False
8080
8181
### -DomainController
8282
83-
Specifies which Active Directory domain controller to connect to.
83+
Specifies the name of the domain controller to connect to.
8484
8585
```yaml
8686
Type: System.String
@@ -96,10 +96,10 @@ Accept wildcard characters: False
9696
9797
### -Identity
9898
99-
Specifies which Active Directory Organizational Unit to query.
99+
Specifies the name of the OU to query.
100100
101101
This parameter accepts several different name formats that influence the criteria used in the
102-
resultant Active Directory search. The supported name formats are as follows:
102+
resultant AD search. The supported name formats are as follows:
103103
104104
- distinguishedName (begins with a `CN=`)
105105
- name (for all other inputs)

docset/winserver2022-ps/laps/Get-LapsAADPassword.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ title: Get-LapsAADPassword
1212
# Get-LapsAADPassword
1313

1414
## SYNOPSIS
15-
Queries Azure Active Directory for the Windows Local Administrator Password Solution (LAPS)
15+
Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS)
1616
credentials on a specified Azure AD device.
1717

1818
## SYNTAX
@@ -25,8 +25,8 @@ Get-LapsAADPassword -DeviceIds <String[]> [-IncludePasswords] [-IncludeHistory]
2525
## DESCRIPTION
2626

2727
The `Get-LapsAADPassword` cmdlet allows administrators to retrieve LAPS passwords and password
28-
history for an Azure Active Directory-joined device. This is implemented by sending queries to
29-
Microsoft Graph over the deviceLocalCredentials collection.
28+
history for an AAD-joined device. This is implemented by sending queries to Microsoft Graph over the
29+
deviceLocalCredentials collection.
3030

3131
The `Get-LapsAADPassword` cmdlet supports two basic modes when querying LAPS passwords:
3232

@@ -51,7 +51,7 @@ device, the `DeviceManagementManagedDevices.Read.All` permission may also be req
5151
> [!IMPORTANT]
5252
> The `Get-LapsAADPassword` cmdlet is implemented as a wrapper around the Microsoft Graph PowerShell
5353
> library, which must be manually installed on the device before `Get-LapsAADPassword` can work.
54-
> Additional configuration steps are required in your Azure Active Directory tenant to enable
54+
> Additional configuration steps are required in your AAD tenant to enable
5555
> authentication to Microsoft Graph and to grant the necessary Microsoft Graph permissions. For more
5656
> information, see
5757
> [Get started with Windows LAPS and Azure Active Directory](https://go.microsoft.com/fwlink/?linkid=2233704)
@@ -82,8 +82,11 @@ is specified by device name.
8282

8383
```powershell
8484
Connect-MgGraph -TenantId b20f5886-bddf-43bb-aee6-dda0c87c5fa2 -ClientId 9fa98e34-277f-47fa-9847-e36bdf6bca1f
85-
Welcome To Microsoft Graph!
8685
Get-LapsAADPassword -DeviceIds dfc6d5f0-225a-4b46-adcf-73a349a31e70 -IncludePasswords
86+
```
87+
88+
```Output
89+
Welcome To Microsoft Graph!
8790
8891
DeviceName : LAPSAAD
8992
DeviceId : dfc6d5f0-225a-4b46-adcf-73a349a31e70

docset/winserver2022-ps/laps/Get-LapsADPassword.md

Lines changed: 35 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -12,8 +12,8 @@ title: Get-LapsADPassword
1212
# Get-LapsADPassword
1313

1414
## SYNOPSIS
15-
Queries Windows Local Administrator Password Solution (LAPS) credentials from Active Directory on a
16-
specified AD computer or domain controller object.
15+
Queries Windows Local Administrator Password Solution (LAPS) credentials from Active Directory (AD)
16+
on a specified AD computer or domain controller object.
1717

1818
## SYNTAX
1919

@@ -34,8 +34,9 @@ Get-LapsADPassword [-Credential <PSCredential>] [-DecryptionCredential <PSCreden
3434
### DomainControllerMode
3535

3636
```
37-
Get-LapsADPassword [-Credential <PSCredential>] [-DecryptionCredential <PSCredential>] [-IncludeHistory]
38-
[-AsPlainText] [-Identity] <String[]> -DomainController <String> [<CommonParameters>]
37+
Get-LapsADPassword [-Credential <PSCredential>] [-DecryptionCredential <PSCredential>]
38+
[-IncludeHistory] [-AsPlainText] [-Identity] <String[]> -DomainController <String>
39+
[<CommonParameters>]
3940
```
4041

4142
### SnapshotBrowserMode
@@ -67,7 +68,7 @@ history for an Active Directory computer or domain controller object. Depending
6768
configuration, LAPS passwords may be stored in either clear-text form or encrypted form. The
6869
`Get-LapsADPassword` cmdlet automatically decrypts encrypted passwords.
6970

70-
The `Get-LapsADPassword` cmdlet may also be used to connected to a mounted Active Directory
71+
The `Get-LapsADPassword` cmdlet may also be used to connected to a mounted AD
7172
snapshot.
7273

7374
The **Verbose** may be used to get additional information about the cmdlet's operation.
@@ -93,8 +94,8 @@ AuthorizedDecryptor : NotApplicable
9394
```
9495

9596
This example demonstrates querying the current LAPS password for the `LAPSCLIENT` computer in the
96-
current domain. The password was stored in Active Directory in clear-text form and didn't require
97-
decryption. The password was returned wrapped in a **SecureString** object.
97+
current domain. The password was stored in AD in clear-text form and didn't require decryption. The
98+
password was returned wrapped in a **SecureString** object.
9899

99100
### Example 2
100101

@@ -116,8 +117,8 @@ AuthorizedDecryptor : NotApplicable
116117

117118
This example demonstrates querying the current LAPS password on a specific domain controller
118119
(`lapsDC`), for the `LAPSCLIENT` computer, requesting that the password be displayed in clear-text
119-
form. The password was stored in Active Directory in clear-text form and didn't require decryption.
120-
The password was returned in clear-text form.
120+
form. The password was stored in AD in clear-text form and didn't require decryption. The password
121+
was returned in clear-text form.
121122

122123
### Example 3
123124

@@ -147,12 +148,13 @@ DecryptionStatus : Success
147148
AuthorizedDecryptor : LAPS\LAPS Admins
148149
```
149150

150-
This example demonstrates querying the current LAPS password for the 'LAPSCLIENT2' computer, in a
151-
specific Active Directory domain ('laps.com'), requesting that the password be displayed in
152-
clear-text form. The password was stored in Active Directory in encrypted form and was successfully
151+
This example demonstrates querying the current LAPS password for the `LAPSCLIENT2` computer, in a
152+
specific AD domain (`laps.com`), requesting that the password be displayed in
153+
clear-text form. The password was stored in AD in encrypted form and was successfully
153154
decrypted.
154155

155-
Note that ExpirationTimestamp will always be empty for any older LAPS passwords returned.
156+
> [!NOTE]
157+
> **ExpirationTimestamp** is always empty for any older LAPS passwords returned.
156158
157159
### Example 4
158160

@@ -172,9 +174,9 @@ DecryptionStatus : Success
172174
AuthorizedDecryptor : LAPS\Domain Admins
173175
```
174176

175-
This example demonstrates querying the current LAPS password for the 'lapsDC.laps.com' domain
177+
This example demonstrates querying the current LAPS password for the `lapsDC.laps.com` domain
176178
controller, requesting that the password be displayed in clear-text form. The password was stored in
177-
Active Directory in encrypted form and was successfully decrypted.
179+
AD in encrypted form and was successfully decrypted.
178180

179181
### Example 5
180182

@@ -194,7 +196,7 @@ DecryptionStatus : Unauthorized
194196
AuthorizedDecryptor : LAPS\Domain Admins
195197
```
196198

197-
This example demonstrates querying the current LAPS password for the 'lapsDC' domain controller when
199+
This example demonstrates querying the current LAPS password for the `lapsDC` domain controller when
198200
the user doesn't have permissions to decrypt the LAPS DSRM password.
199201

200202
### Example 6
@@ -216,8 +218,11 @@ AuthorizedDecryptor : NotApplicable
216218
```
217219

218220
This example demonstrates querying the current LAPS password for the 'lapsLegacyClient' machine
219-
which is currently running in legacy LAPS emulation mode. Note that when querying legacy LAPS-style
220-
passwords, the Account and PasswordUpdateTime fields will always be unavailable.
221+
which is currently running in legacy LAPS emulation mode.
222+
223+
> [!NOTE]
224+
> When querying legacy LAPS-style passwords, the **Account** and **PasswordUpdateTime** fields are
225+
> always unavailable.
221226
222227
### Example 7
223228

@@ -237,9 +242,9 @@ DecryptionStatus : NotApplicable
237242
AuthorizedDecryptor : NotApplicable
238243
```
239244

240-
This example demonstrates querying an Active Directory Snapshot browser instance for the current
241-
LAPS password for the `LAPSCLIENT` machine. This example assumes that that the snapshot browser has
242-
been previously started on the local machine listening on an LDAP port of `50000`.
245+
This example demonstrates querying an AD Snapshot browser instance for the current LAPS password for
246+
the `LAPSCLIENT` machine. This example assumes that that the snapshot browser has been previously
247+
started on the local machine listening on an LDAP port of `50000`.
243248

244249
## PARAMETERS
245250

@@ -267,8 +272,8 @@ Accept wildcard characters: False
267272
268273
### -Credential
269274
270-
Specifies a set of credentials to use when querying Active Directory for the LAPS credentials. If
271-
not specified, the current user's credentials are used.
275+
Specifies a set of credentials to use when querying AD for the LAPS credentials. If not specified,
276+
the current user's credentials are used.
272277
273278
```yaml
274279
Type: System.Management.Automation.PSCredential
@@ -301,7 +306,7 @@ Accept wildcard characters: False
301306
302307
### -Domain
303308
304-
Specifies which Active Directory domain to connect to.
309+
Specifies the name of the domain to connect to.
305310
306311
```yaml
307312
Type: System.String
@@ -317,8 +322,8 @@ Accept wildcard characters: False
317322
318323
### -DomainController
319324
320-
Specifies which Active Directory domain controller to connect to, or the remote server on which an
321-
Active Directory snapshot browser is running.
325+
Specifies the name of the domain controller to connect to, or the remote server on which an AD
326+
Snapshot Browser is running.
322327
323328
```yaml
324329
Type: System.String
@@ -346,11 +351,10 @@ Accept wildcard characters: False
346351
347352
### -Identity
348353
349-
Specifies which Active Directory computer or domain controller object to retrieve LAPS credentials
350-
from.
354+
Specifies the name of the computer or domain controller object to retrieve LAPS credentials from.
351355
352356
This parameter accepts several different name formats that influence the criteria used when
353-
searching Active Directory for the target device. The supported name formats are as follows:
357+
searching AD for the target device. The supported name formats are as follows:
354358
355359
- distinguishedName (begins with a `CN=`)
356360
- samAccountName (begins with a '$")
@@ -387,7 +391,7 @@ Accept wildcard characters: False
387391

388392
### -Port
389393

390-
Specifies which Active Directory Snapshot Browser port to connect to.
394+
Specifies the name of the AD Snapshot Browser port to connect to.
391395

392396
```yaml
393397
Type: System.Nullable`1[System.Int32]
@@ -408,7 +412,7 @@ credential via the normal mechanisms. For example, this might be necessary if a
408412
encrypted against a group that has since been deleted.
409413
410414
>[!IMPORTANT]
411-
> When specifying this parameter, you MUST be logged-in locally as a Domain Administrator on a
415+
> When specifying this parameter, you must be logged-in locally as a Domain Administrator on a
412416
> writable domain controller.
413417
414418
```yaml

docset/winserver2022-ps/laps/Invoke-LapsPolicyProcessing.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ title: Invoke-LapsPolicyProcessing
1212
# Invoke-LapsPolicyProcessing
1313

1414
## SYNOPSIS
15-
Causes Windows Local Administrator Password Solution (LAPS) to process the currently configured LAPS
15+
Causes Windows Local Administrator Password Solution (LAPS) to process the currently configured
1616
policy.
1717

1818
## SYNTAX
@@ -23,13 +23,12 @@ Invoke-LapsPolicyProcessing [<CommonParameters>]
2323

2424
## DESCRIPTION
2525

26-
The `Invoke-LapsPolicyProcessing` cmdlet tells Windows Local Administrator Password Solution
27-
(LAPS) to process the currently configured LAPS policy.
26+
The `Invoke-LapsPolicyProcessing` cmdlet tells LAPS to process the currently configured policy.
2827

2928
The cmdlet doesn't return detailed information about the results of the operation. See
30-
[Use Windows LAPS event logs](https://go.microsoft.com/fwlink/?linkid=2234103) for more
31-
information on querying the resultant event log entries to get specific information on the outcome
32-
of the operation.
29+
[Use Windows LAPS event logs](https://go.microsoft.com/fwlink/?linkid=2234103) for more information
30+
on querying the resultant event log entries to get specific information on the outcome of the
31+
operation.
3332

3433
## EXAMPLES
3534

docset/winserver2022-ps/laps/LAPS.md

Lines changed: 20 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
---
2-
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
2+
description: This reference provides cmdlet descriptions and syntax for all Windows Local Administrator Password
3+
Solution (LAPS) module.
34
Module Name: LAPS
45
Module Guid: 8eb7ddf9-7890-49ae-9af1-3b41d7e63c41
56
Download Help Link: https://aka.ms/winsvr-2022-pshelp
@@ -14,24 +15,24 @@ title: LAPS
1415
## Description
1516

1617
This reference provides cmdlet descriptions and syntax for all Windows Local Administrator Password
17-
Solution (LAPS)-specific cmdlets. It lists the cmdlets in alphabetical order.
18+
Solution (LAPS) module. It lists the cmdlets in alphabetical order.
1819

1920
## LAPS Cmdlets
2021

2122
### [Find-LapsADExtendedRights](Find-LapsADExtendedRights.md)
2223

23-
Queries Active Directory to find principals that have been granted permission to read Windows Local
24-
Administrator Password Solution (LAPS) password attributes.
24+
Queries Active Directory (AD) to find principals that have been granted permission to read Windows
25+
Local Administrator Password Solution (LAPS) password attributes.
2526

2627
### [Get-LapsAADPassword](Get-LapsAADPassword.md)
2728

28-
Queries Azure Active Directory for the Windows Local Administrator Password Solution (LAPS)
29+
Queries Azure Active Directory (AAD) for the Windows Local Administrator Password Solution (LAPS)
2930
credentials on a specified Azure AD device.
3031

3132
### [Get-LapsADPassword](Get-LapsADPassword.md)
3233

33-
Queries Windows Local Administrator Password Solution (LAPS) credentials from Active Directory on a
34-
specified AD computer or domain controller object.
34+
Queries Windows Local Administrator Password Solution (LAPS) credentials from Active Directory (AD)
35+
on a specified AD computer or domain controller object.
3536

3637
### [Get-LapsDiagnostics](Get-LapsDiagnostics.md)
3738

@@ -40,7 +41,7 @@ machine.
4041

4142
### [Invoke-LapsPolicyProcessing](Invoke-LapsPolicyProcessing.md)
4243

43-
Causes Windows Local Administrator Password Solution (LAPS) to process the currently configured LAPS
44+
Causes Windows Local Administrator Password Solution (LAPS) to process the currently configured
4445
policy.
4546

4647
### [Reset-LapsPassword](Reset-LapsPassword.md)
@@ -50,30 +51,31 @@ the currently managed local account.
5051

5152
### [Set-LapsADAuditing](Set-LapsADAuditing.md)
5253

53-
Configures an Active Directory Organizational Unit to enable auditing on the Windows Local
54+
Configures an Active Directory (AD) Organizational Unit (OU) to enable auditing on the Windows Local
5455
Administrator Password Solution (LAPS) password schema attributes.
5556

5657
### [Set-LapsADComputerSelfPermission](Set-LapsADComputerSelfPermission.md)
5758

58-
Configures permissions on an Active Directory Organizational Unit to enable computers in that OU to
59-
update their LAPS passwords.
59+
Configures permissions on an Active Directory (AD) Organizational Unit (OU) to enable computers in
60+
that OU to update their Windows Local Administrator Password Solution (LAPS) passwords.
6061

6162
### [Set-LapsADPasswordExpirationTime](Set-LapsADPasswordExpirationTime.md)
6263

6364
Sets the Windows Local Administrator Password Solution (LAPS) password expiration timestamp on an
64-
Active Directory computer or domain controller object.
65+
Active Directory (AD) computer or domain controller object.
6566

6667
### [Set-LapsADReadPasswordPermission](Set-LapsADReadPasswordPermission.md)
6768

68-
Configures security on an Active Directory Organizational Unit to grant specific users or groups
69-
permission to query Windows Local Administrator Password Solution (LAPS) passwords.
69+
Configures security on an Active Directory (AD) Organizational Unit (OU) to grant specific users or
70+
groups permission to query Windows Local Administrator Password Solution (LAPS) passwords.
7071

7172
### [Set-LapsADResetPasswordPermission](Set-LapsADResetPasswordPermission.md)
7273

73-
Configures security on an Active Directory Organizational Unit to grant specific users or groups
74-
permission to set the Windows Local Administrator Password Solution (LAPS) password expiration time.
74+
Configures security on an Active Directory (AD) Organizational Unit (OU) to grant specific users or
75+
groups permission to set the Windows Local Administrator Password Solution (LAPS) password
76+
expiration time.
7577

7678
### [Update-LapsADSchema](Update-LapsADSchema.md)
7779

78-
Extends the Active Directory schema with the Windows Local Administrator Password Solution (LAPS)
79-
schema attributes.
80+
Extends the Active Directory (AD) schema with the Windows Local Administrator Password Solution
81+
(LAPS) schema attributes.

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy