Skip to content

Commit ad85c96

Browse files
authored
Merge pull request MicrosoftDocs#1326 from MicrosoftDocs/master
Publish 09/23/2019 10:30 PST Third Attempt
2 parents 1814a27 + 200e1c2 commit ad85c96

12 files changed

+30
-61
lines changed

docset/windows/configci/new-cipolicy.md

Lines changed: 1 addition & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -331,23 +331,7 @@ Accept wildcard characters: False
331331
```
332332
333333
### -Level
334-
Specifies the primary level of detail for generated rules.
335-
The acceptable values for this parameter are:
336-
337-
- None
338-
- Hash
339-
- FileName
340-
- FilePath
341-
- SignedVersion
342-
- PFN
343-
- Publisher
344-
- FilePublisher
345-
- LeafCertificate
346-
- PcaCertificate
347-
- RootCertificate
348-
- WHQL
349-
- WHQLPublisher
350-
- WHQLFilePublisher
334+
Specifies the primary level of detail for generated rules. Refer to [WDAC File Rule Levels](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-file-rule-levels) for acceptable parameter values and descriptions.
351335
352336
```yaml
353337
Type: RuleLevel

docset/windows/defender/defender.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,11 @@ ms.assetid: 00797342-0AAC-4FFF-84FE-4749DA9242D6
2222

2323
# Defender Module
2424
## Description
25-
This reference provides cmdlet descriptions and syntax for all Defender-specific cmdlets.
26-
It lists the cmdlets in alphabetical order based on the verb at the beginning of the cmdlet.
25+
This reference provides functions descriptions and syntax for all Defender-specific functions.
26+
It lists the functions in alphabetical order based on the verb at the beginning of the functions.
27+
28+
> [!NOTE]
29+
> You might also hear these functions being referred to as cmdlets. They were designed to appear like cmdlets, even though they were developed as PowerShell functions.
2730
2831
## Defender Cmdlets
2932
### [Add-MpPreference](./Add-MpPreference.md)

docset/windows/hnvdiagnostics/disable-muxechoresponder.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.assetid: 9DB96E25-63EC-4F0F-AF2A-A763F128EED3
2121
# Disable-MuxEchoResponder
2222

2323
## SYNOPSIS
24-
Disables an ICMP echo responder.
24+
Disables an ICMP echo responder. This cmdlet has been deprecated.
2525

2626
## SYNTAX
2727

docset/windows/hnvdiagnostics/enable-muxechoresponder.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ ms.assetid: 76E1FFE7-C816-49FD-BCA7-6DCC662CBCD8
2121
# Enable-MuxEchoResponder
2222

2323
## SYNOPSIS
24-
Enables an ICMP echo responder.
24+
Enables an ICMP echo responder. This cmdlet has been deprecated.
2525

2626
## SYNTAX
2727

docset/windows/netadapter/disable-netadapterencapsulatedpackettaskoffload.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,9 @@ Accept wildcard characters: False
116116
```
117117
118118
### -EncapsulationType
119-
{{Fill EncapsulationType Description}}
119+
Specifies the encapsulation type. The acceptable values for this parameter are:
120+
- NVGRE: Network Virtualization Generic Routing Encapsulation.
121+
- VXLAN: Virtual eXtensible Local Area Network.
120122
121123
```yaml
122124
Type: EncapsulationType

docset/windows/netadapter/set-netadapterencapsulatedpackettaskoffload.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -58,18 +58,18 @@ The **Enable-NetAdapterEncapsulatedPacketTaskoffload** and **Disable-NetAdapterE
5858

5959
### Example 1: Enable encapsulated packet task offload on the specified network adapter
6060
```
61-
PS C:\> Set-NetAdapterEncapsulatedPacketTaskOffload -Name "MyAdapter" -EncapsulatedPacketTaskOffloadEnabled $True
61+
PS C:\> Set-NetAdapterEncapsulatedPacketTaskOffload -Name "MyAdapter" -VxlanEncapsulatedPacketTaskOffloadEnabled $True
6262
```
6363

64-
This command enables encapsulated packet task offload on the network adapter named MyAdapter and restarts the network adapter.
64+
This command enables VXLAN encapsulated packet task offload on the network adapter named MyAdapter and restarts the network adapter.
6565
The **Enable-NetAdapterEncapsulatedPacketTaskOffload** cmdlet is the preferred cmdlet to perform this operation.
6666

6767
### Example 2: Disable encapsulated packet task offload on the specified network adapter
6868
```
69-
PS C:\> Set-NetAdapterEncapsulatedPacketTaskOffload -Name "MyAdapter" -EncapsulatedPacketTaskOffloadEnabled $False
69+
PS C:\> Set-NetAdapterEncapsulatedPacketTaskOffload -Name "MyAdapter" -VxlanEncapsulatedPacketTaskOffloadEnabled $False
7070
```
7171

72-
This command disables encapsulated packet task offload on the network adapter named MyAdapter and restarts the network adapter.
72+
This command disables VXLAN encapsulated packet task offload on the network adapter named MyAdapter and restarts the network adapter.
7373
The **Disable-NetAdapterEncapsulatedPacketTaskOffload** cmdlet is the preferred cmdlet to perform this operation.
7474

7575
## PARAMETERS
@@ -208,7 +208,7 @@ Accept wildcard characters: False
208208
```
209209

210210
### -NvgreEncapsulatedPacketTaskOffloadEnabled
211-
{{Fill NvgreEncapsulatedPacketTaskOffloadEnabled Description}}
211+
Specifies the enabled state of the Network Virtualization Generic Routing Encapsulation (NVGRE) encapsulated packet task offload in the network adapter. The acceptable values for this parameter are: $true or $false.
212212

213213
```yaml
214214
Type: Boolean
@@ -256,7 +256,7 @@ Accept wildcard characters: False
256256
```
257257

258258
### -VxlanEncapsulatedPacketTaskOffloadEnabled
259-
{{Fill VxlanEncapsulatedPacketTaskOffloadEnabled Description}}
259+
Specifies the enabled state of the Virtual eXtensible Local Area Network (VXLAN) encapsulated packet task offload in the network adapter. The acceptable values for this parameter are: $true or $false.
260260

261261
```yaml
262262
Type: Boolean
@@ -271,7 +271,7 @@ Accept wildcard characters: False
271271
```
272272

273273
### -VxlanUDPPortNumber
274-
{{Fill VxlanUDPPortNumber Description}}
274+
Specifies the port number to use for the VXLAN UDP destination port.
275275

276276
```yaml
277277
Type: UInt16

docset/windows/netadapter/set-netadapterrss.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Set-NetAdapterRss -InputObject <CimInstance[]> [-NumberOfReceiveQueues <UInt32>]
5555
## DESCRIPTION
5656
The **Set-NetAdapterRss** cmdlet sets the receive side scaling (RSS) properties on a network adapter.
5757
RSS is a scalability technology that distributes the receive network traffic among multiple processors by hashing the header of the incoming packet.
58-
Without RSS in firstref_longhorn, firstref_server_7, and Windows Server® 2012; network traffic is received on the first processor which can quickly reach full utilization limiting receive network throughput.
58+
If RSS is disabled, network traffic is processed on a single processor core. This may impact network performance as the processor utilization increases.
5959
Many properties can be configured using the parameters to optimize the performance of RSS.
6060
The selection of the processors to use for RSS is an important aspect of load balancing.
6161
Most of the parameters for this cmdlet help to determine the processors used by RSS.
@@ -356,7 +356,7 @@ Specifies the RSS profile.
356356

357357
The acceptable values for this parameter are:
358358

359-
- Closest: Behavior is consistent with the behavior of firstref_server_7.
359+
- Closest: Behavior is consistent with the behavior of Windows Server® 2008 R2.
360360
- ClosestStatic: No dynamic load balancing, such as distributing but not load balancing at runtime.
361361
- NUMA: Assigns RSS processors in a round robin basis across every NUMA node to enable applications that are running on NUMA servers to scale well.
362362
- NUMAStatic: Default behavior.

docset/windows/netlbfo/set-netlbfoteam.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ Accept wildcard characters: False
147147
```
148148
149149
### -LacpTimer
150-
{{Fill LacpTimer Description}}
150+
Specifies how often inter-connected devices exchange LACP protocol data units (PDUs) or control messages.
151151
152152
```yaml
153153
Type: LacpTimers

docset/windows/remoteaccess/set-vpnserverconfiguration.md

Lines changed: 6 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -57,41 +57,21 @@ By Specifying CustomPolicy, IPsec parameters can be customized.
5757

5858
## EXAMPLES
5959

60-
### Example 1: Modify the idle disconnect seconds of a VPN server
60+
### Example 1: Change the idle disconnect time
6161
```
62-
PS C:\>Set-VpnServerIPsecConfiguration -IdleDisconnectSeconds 1000 -PassThru
63-
WARNING: Configuration parameters will be modified after the Remote Access service is restarted.
62+
PS C:\>Set-VpnServerConfiguration -IdleDisconnectSeconds 1000 -PassThru
6463
65-
EncryptionType : OptionalEncryption
66-
Ikev2Ports : 5
67-
IdleDisconnect(s) : 1000
68-
L2tpPorts : 5
69-
SADataSizeForRenegotiation(KB) : 102400
70-
SALifeTime(s) : 28800
7164
```
7265

73-
This command modifies the idle disconnect seconds of the VPN server.
66+
This command changes the idle disconnect time of the VPN server to 1000 seconds. The command includes the PassThru parameter, so it sends a VpnServerIPsecConfiguration object to the console.
7467

75-
### Example 2: Plumb custom IPsec policy for incoming VPN connections
68+
### Example 2: Configure a custom IPsec policy
7669
```
77-
PS C:\>Set-VpnServerIPsecConfiguration -CustomPolicy -EncryptionMethod "AES128" -DhGroup "Group2" -PfsGroup "PFS2" -CipherTransformConstants "AES128" -IntegrityCheckMethod "SHA256" -AuthenticationTransformConstants "SHA256128" -PassThru
78-
WARNING: Configuration parameters will be modified after the Remote Access service is restarted.
70+
PS C:\>Set-VpnServerConfiguration -CustomPolicy -EncryptionMethod "AES128" -DhGroup "Group2" -PfsGroup "PFS2" -CipherTransformConstants "AES128" -IntegrityCheckMethod "SHA256" -AuthenticationTransformConstants "SHA256128" -PassThru
7971
80-
AuthenticationTransformConstants : SHA256128
81-
CipherTransformConstants : AES128
82-
CustomPolicy : True
83-
DHGroup : Group2
84-
EncryptionMethod : AES128
85-
Ikev2Ports : 5
86-
IdleDisconnect(s) : 1000
87-
IntegrityCheckMethod : SHA256
88-
L2tpPorts : 5
89-
PFSgroup : PFS2
90-
SADataSizeForRenegotiation(KB) : 102400
91-
SALifeTime(s) : 28800
9272
```
9373

94-
This command plumbs custom IPsec policy for incoming VPN connections and site to site VPN connections whose authentication method is not pre shared key.
74+
This command configures a custom IPsec policy for incoming VPN connections and S2S protocol VPN connections that do not use a pre-shared key as an authentication method.
9575

9676
## PARAMETERS
9777

docset/winserver2012r2-ps/netadapter/Enable-NetAdapterRss.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ Enable-NetAdapterRss -InputObject <CimInstance[]> [-NoRestart] [-PassThru] [-Cim
4545
## DESCRIPTION
4646
The **Enable-NetAdapterRss** cmdlet enables receive side scaling (RSS) on the network adapter.
4747
RSS is a scalability technology that distributes the receive network traffic among multiple processors by hashing the header of the incoming packet.
48-
Without RSS in firstref_longhorn and later, network traffic is received on the first processor which can quickly reach full utilization limiting receive network throughput.
48+
If RSS is disabled, network traffic is processed on a single processor core. This may impact network performance as the processor utilization increases.
4949

5050
## EXAMPLES
5151

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy