Skip to content

Commit 207707f

Browse files
Merge pull request #1 from MicrosoftDocs/master
test
2 parents 1f6ac22 + 444dcdc commit 207707f

File tree

82 files changed

+170
-172
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+170
-172
lines changed

docset/windows/defender/set-mppreference.md

Lines changed: 19 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,7 @@ Accept wildcard characters: False
133133
134134
### -DisableArchiveScanning
135135
Indicates whether to scan archive files, such as .zip and .cab files, for malicious and unwanted software.
136-
If you specify a value of $True or do not specify a value, Windows Defender scans archive files.
136+
If you specify a value of $False or do not specify a value, Windows Defender scans archive files.
137137
138138
```yaml
139139
Type: Boolean
@@ -164,7 +164,7 @@ Accept wildcard characters: False
164164
165165
### -DisableBehaviorMonitoring
166166
Indicates whether to enable behavior monitoring.
167-
If you specify a value of $True or do not specify a value, Windows Defender enables behavior monitoring.
167+
If you specify a value of $False or do not specify a value, Windows Defender enables behavior monitoring.
168168
169169
```yaml
170170
Type: Boolean
@@ -195,8 +195,7 @@ Accept wildcard characters: False
195195
### -DisableCatchupFullScan
196196
Indicates whether Windows Defender runs catch-up scans for scheduled full scans.
197197
A computer can miss a scheduled scan, usually because the computer is turned off at the scheduled time.
198-
If you specify a value of $True, after the computer misses two scheduled full scans, Windows Defender runs a catch-up scan the next time someone logs on to the computer.
199-
If you specify a value of $False or do not specify a value, the computer does not run catch-up scans for scheduled full scans.
198+
If you specify a value of $False or do not specify a value, after the computer misses two scheduled full scans, Windows Defender runs a catch-up scan the next time someone logs on to the computer. If you specify a value of $True, the computer does not run catch-up scans for scheduled full scans.
200199
201200
```yaml
202201
Type: Boolean
@@ -213,8 +212,7 @@ Accept wildcard characters: False
213212
### -DisableCatchupQuickScan
214213
Indicates whether Windows Defender runs catch-up scans for scheduled quick scans.
215214
A computer can miss a scheduled scan, usually because the computer is off at the scheduled time.
216-
If you specify a value of $True, after the computer misses two scheduled quick scans, Windows Defender runs a catch-up scan the next time someone logs onto the computer.
217-
If you specify a value of $False or do not specify a value, the computer does not run catch-up scans for scheduled quick scans.
215+
If you specify a value of $False or do not specify a value, after the computer misses two scheduled quick scans, Windows Defender runs a catch-up scan the next time someone logs onto the computer. If you specify a value of $True, the computer does not run catch-up scans for scheduled quick scans.
218216
219217
```yaml
220218
Type: Boolean
@@ -231,8 +229,7 @@ Accept wildcard characters: False
231229
### -DisableEmailScanning
232230
Indicates whether Windows Defender parses the mailbox and mail files, according to their specific format, in order to analyze mail bodies and attachments.
233231
Windows Defender supports several formats, including .pst, .dbx, .mbx, .mime, and .binhex.
234-
If you specify a value of $True, Windows Defender performs email scanning.
235-
If you specify a value of $False or do not specify a value, Windows Defender does not perform email scanning.
232+
If you specify a value of $False or do not specify a value, Windows Defender performs email scanning. If you specify a value of $True or do not specify a value, Windows Defender does not perform email scanning.
236233
237234
```yaml
238235
Type: Boolean
@@ -248,7 +245,7 @@ Accept wildcard characters: False
248245
249246
### -DisableIOAVProtection
250247
Indicates whether Windows Defender scans all downloaded files and attachments.
251-
If you specify a value of $True or do not specify a value, scanning downloaded files and attachments is enabled.
248+
If you specify a value of $False or do not specify a value, scanning downloaded files and attachments is enabled.
252249
253250
```yaml
254251
Type: Boolean
@@ -264,7 +261,7 @@ Accept wildcard characters: False
264261
265262
### -DisableIntrusionPreventionSystem
266263
Indicates whether to configure network protection against exploitation of known vulnerabilities.
267-
If you specify a value of $True or do not specify a value, network protection is enabled.
264+
If you specify a value of $False or do not specify a value, network protection is enabled.
268265
269266
```yaml
270267
Type: Boolean
@@ -296,7 +293,7 @@ Accept wildcard characters: False
296293
297294
### -DisableRealtimeMonitoring
298295
Indicates whether to use real-time protection.
299-
If you specify a value of $True or do not specify a value, Windows Defender uses real-time protection.
296+
If you specify a value of $False or do not specify a value, Windows Defender uses real-time protection.
300297
We recommend that you enable Windows Defender to use real-time protection.
301298
302299
```yaml
@@ -313,9 +310,7 @@ Accept wildcard characters: False
313310
314311
### -DisableRemovableDriveScanning
315312
Indicates whether to scan for malicious and unwanted software in removable drives, such as flash drives, during a full scan.
316-
If you specify a value of $True, Windows Defender scans removable drives during any type of scan.
317-
If you specify a value of $False or do not specify a value, Windows Defender does not scan removable drives during a full scan.
318-
Windows Defender can still scan removable drives during quick scans or custom scans.
313+
If you specify a value of $False or do not specify a value, Windows Defender scans removable drives during any type of scan. If you specify a value of $True, Windows Defender does not scan removable drives during a full scan. Windows Defender can still scan removable drives during quick scans or custom scans.
319314
320315
```yaml
321316
Type: Boolean
@@ -337,6 +332,14 @@ Type: Boolean
337332
Parameter Sets: (All)
338333
Aliases: drp
339334

335+
Required: False
336+
Position: Named
337+
Default value: None
338+
Accept pipeline input: False
339+
Accept wildcard characters: False
340+
```False
341+
Aliases: dsnf
342+
340343
Required: False
341344
Position: Named
342345
Default value: None
@@ -345,9 +348,7 @@ Accept wildcard characters: False
345348
```
346349

347350
### -DisableScanningMappedNetworkDrivesForFullScan
348-
Indicates whether to scan mapped network drives.
349-
If you specify a value of $True, Windows Defender scans mapped network drives.
350-
If you specify a value of $False or do not specify a value, Windows Defender does not scan mapped network drives.
351+
Indicates whether to scan mapped network drives. If you specify a value of $False or do not specify a value, Windows Defender scans mapped network drives.If you specify a value of $True, Windows Defender does not scan mapped network drives.
351352

352353
```yaml
353354
Type: Boolean
@@ -362,10 +363,7 @@ Accept wildcard characters: False
362363
```
363364

364365
### -DisableScanningNetworkFiles
365-
Indicates whether to scan for network files.
366-
If you specify a value of $True, Windows Defender scans network files.
367-
If you specify a value of $False or do not specify a value, Windows Defender does not scan network files.
368-
We do not recommend that you scan network files.
366+
Indicates whether to scan for network files. If you specify a value of $False or do not specify a value, Windows Defender scans network files. If you specify a value of $True or do not specify a value, Windows Defender does not scan network files. We do not recommend that you scan network files.
369367

370368
```yaml
371369
Type: Boolean

docset/windows/netadapter/enable-netadaptersriov.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ This command enables SR-IOV for the network adapter with the description Contoso
6767
### Example 3: Enable SRI-OV for the specified network adapter using the InputObject parameter
6868
```
6969
The first command gets the network adapter named Ethernet 2 and stores the result in the variable named $NetAdapter.The second command enables SRI-OV on the network adapter stored in the $NetAdapter variable.
70-
PS C:\> $NetApapter = Get-NetAdapter -Name "Ethernet 2"
70+
PS C:\> $NetAdapter = Get-NetAdapter -Name "Ethernet 2"
7171
PS C:\> Enable-NetAdapterSriov -InputObject $NetAdapter
7272
7373
This command is a version of the above cmdlet that selects the network adapter and pipes the network adapter object into this cmdlet.

docset/windows/netadapter/get-netadapterpowermanagement.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ This command gets the power management properties of the network adapter named E
5757

5858
### Example 3: Get all power management properties for the specified network adapter and format the list
5959
```
60-
PS C:\> Get-NetAdapterPowerManagment -Name "Ethernet" | Format-List -Property "*"
60+
PS C:\> Get-NetAdapterPowerManagement -Name "Ethernet" | Format-List -Property "*"
6161
```
6262

6363
This command displays all power management properties of the network adapter named Ethernet.

docset/windows/netqos/new-netqospolicy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -271,7 +271,7 @@ Accept wildcard characters: False
271271
```
272272
273273
### -Cluster
274-
Specifies the Microsoft cluster service, which uses the default cluster network driver UDP port 3343.
274+
Specifies the Microsoft cluster service, which uses the default SQL server TCP/UDP port 3343.
275275
276276
```yaml
277277
Type: SwitchParameter
@@ -772,7 +772,7 @@ Accept wildcard characters: False
772772

773773
### -UserMatchCondition
774774
Specifies the user or group name in Active Directory, such as `contoso\DavidChew`.
775-
This parameter is usually specified with another filtering parameter such as the *AppPathNameMatchCondtion* parameter.
775+
This parameter is usually specified with another filtering parameter such as the *AppPathNameMatchCondition* parameter.
776776

777777
```yaml
778778
Type: String

docset/windows/netqos/set-netqospolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -591,7 +591,7 @@ Accept wildcard characters: False
591591

592592
### -UserMatchCondition
593593
Specifies the user or group name in Active Directory, such as `contoso\davidchew`.
594-
This parameter is usually specified with other filtering parameter such as the *AppPathNameMatchCondtion* parameter.
594+
This parameter is usually specified with other filtering parameter such as the *AppPathNameMatchCondition* parameter.
595595

596596
```yaml
597597
Type: String

docset/windows/netsecurity/copy-netipsecrule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -384,7 +384,7 @@ Accept wildcard characters: False
384384
```
385385
386386
### -AssociatedNetIPsecPhase1AuthSet
387-
Gets the IPsec rules that are associated with the given phase 1 authenication set to be copied.
387+
Gets the IPsec rules that are associated with the given phase 1 authentication set to be copied.
388388
A NetIPsecPhase1AuthSet object represents the phase 1 authorization set conditions associated with an IPsec or main mode rule.
389389
This parameter sets the methods for main mode negotiation by describing the proposals for computer authentication.
390390
See the Get-NetIPsecPhase1AuthSet cmdlet for more information.

docset/windows/netsecurity/get-netfirewalladdressfilter.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ PS C:\>Get-NetFirewallRule -DisplayGroup "Core Networking" | Get-NetFirewallAddr
9393
9494
9595
This is an alternate method with this cmdlet.
96-
PS C:\>Get-NetFirewallRule -DisplayGroup "Core Networking" | Get-NetFirewallAddressFilter | Where-Object -FilterScript { $_.RemoteAddress -Eq "LocalSubnet6" } | Get-NetFirewallRule | Set-NetFirewalllRule -RemoteAddress LocalSubnet4
96+
PS C:\>Get-NetFirewallRule -DisplayGroup "Core Networking" | Get-NetFirewallAddressFilter | Where-Object -FilterScript { $_.RemoteAddress -Eq "LocalSubnet6" } | Get-NetFirewallRule | Set-NetFirewallRule -RemoteAddress LocalSubnet4
9797
```
9898

9999
This example gets the filter objects associated with the firewall rules with a particular remote, second, endpoint belonging to the Core Networking group and modifies the second endpoint of those rules.

docset/windows/netsecurity/new-netipsecphase2authset.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ New-NetIPsecPhase2AuthSet [-PolicyStore <String>] [-GPOSession <String>] [-Name
3131
```
3232

3333
## DESCRIPTION
34-
The **New-NetIPsecPhase1AuthSet** cmdlet creates a set that specifies the computerof authentication methods, usually for computer, to use during IPsec negotiations.
34+
The **New-NetIPsecPhase1AuthSet** cmdlet creates a set that specifies the computer authentication methods, usually for the computer to use during IPsec negotiations.
3535
The first phase of authentication is typically a computer authentication method such as Kerberos v5, certificate, or pre-shared key (PSK) authentication.
3636

3737
A phase 1 authentication set is contains an ordered list of computer authentication proposals.

docset/windows/netsecurity/remove-netipsecmainmodecryptoset.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -481,7 +481,7 @@ Accept wildcard characters: False
481481
```
482482

483483
### -PolicyStoreSourceType
484-
Specifies that the main mode cryptographic sets that match the indicated policy store source type are removied.
484+
Specifies that the main mode cryptographic sets that match the indicated policy store source type are removed.
485485
This parameter describes the type of policy store where the rule originated if the object is retrieved from the ActiveStore with the TracePolicyStoreSource option set.
486486
This parameter value is automatically generated and should not be modified.
487487
The acceptable values for this parameter are:

docset/windows/netsecurity/remove-netipsecphase1authset.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ This cmdlet is useful for removing any policy that conflicts with the domain GPO
9595
PS C:\>Remove-NetIPsecPhase1AuthSet -DisplayName "(DA Client) - Phase 1 Auth Set"
9696
```
9797

98-
This example deletes a set based on theee localized name.
98+
This example deletes a set based on the localized name.
9999

100100
### EXAMPLE 3
101101
```

0 commit comments

Comments
 (0)