From 8df8ab9c6311800c20d3edbe36a2738023c7958b Mon Sep 17 00:00:00 2001 From: brandyking <102766995+brandyking@users.noreply.github.com> Date: Fri, 14 Feb 2025 16:56:30 -0500 Subject: [PATCH 01/10] Update Rename-NetIPsecRule.md Updating the details in -KeyModule parameter to reflect changes in the code for how this value is set, and set this information to be consistent across all the relevant documentation pages that reference it. --- .../netsecurity/Rename-NetIPsecRule.md | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md index 214b6d2afd..f061b1f40d 100644 --- a/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md @@ -630,15 +630,12 @@ Accept wildcard characters: False Specifies that matching IPsec rules of the indicated key module are renamed. This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. --- Default: Equivalent to both IKEv1 and AuthIP. -Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7. ----- There are authentication and cryptographic methods that are only compatible with certain keying modules. -This is a very advanced setting intended only for specific interoperability scenarios. -Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there. +- Default: KeyModule is set based on the authentication method. As of Win11 24H2 and Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Server 2008. - AuthIP: Supported with phase 2 authentication. -- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. -- IKEv2: Not supported with Kerberos, PSK, or NTLM. -Windows versions prior to Windows Server 2012 only support the Default configuration. +- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. +- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. + +The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration. ```yaml Type: KeyModule[] @@ -648,7 +645,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2 Required: False Position: Named -Default value: None +Default value: Default Accept pipeline input: False Accept wildcard characters: False ``` From 97c126a35d0eb92ed1ee610d4dc1580a21503258 Mon Sep 17 00:00:00 2001 From: brandyking <102766995+brandyking@users.noreply.github.com> Date: Fri, 14 Feb 2025 16:58:28 -0500 Subject: [PATCH 02/10] Update Set-NetIPsecRule.md Updating the details in -KeyModule parameter to reflect changes in the code for how this value is set, and set this information to be consistent across all the relevant documentation pages that reference it. --- .../netsecurity/Set-NetIPsecRule.md | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/docset/winserver2022-ps/netsecurity/Set-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Set-NetIPsecRule.md index 2f37b70937..da965c6f52 100644 --- a/docset/winserver2022-ps/netsecurity/Set-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Set-NetIPsecRule.md @@ -521,15 +521,12 @@ Specifies that matching IPsec rules of the indicated key module are modified. This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. -- Default: Equivalent to both IKEv1 and AuthIP. -Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7. ----- There are authentication and cryptographic methods that are only compatible with certain keying modules. -This is a very advanced setting intended only for specific interoperability scenarios. -Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there. +- Default: KeyModule is set based on the authentication method. As of Win11 24H2 and Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Server 2008. - AuthIP: Supported with phase 2 authentication. -- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. -- IKEv2: Not supported with Kerberos, PSK, or NTLM. -Windows versions prior to Windows Server 2012 only support the Default configuration. +- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. +- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. + +The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration. ```yaml Type: KeyModule @@ -539,7 +536,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2 Required: False Position: Named -Default value: None +Default value: Default Accept pipeline input: False Accept wildcard characters: False ``` From 2d5f8287ea3169c68d37f526e780e61b71588c0b Mon Sep 17 00:00:00 2001 From: brandyking <102766995+brandyking@users.noreply.github.com> Date: Fri, 14 Feb 2025 17:01:48 -0500 Subject: [PATCH 03/10] Update Sync-NetIPsecRule.md Updating the details in -KeyModule parameter to reflect changes in the code for how this value is set, and set this information to be consistent across all the relevant documentation pages that reference it. --- .../netsecurity/Sync-NetIPsecRule.md | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/docset/winserver2022-ps/netsecurity/Sync-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Sync-NetIPsecRule.md index 8e9c302443..77b892b9fc 100644 --- a/docset/winserver2022-ps/netsecurity/Sync-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Sync-NetIPsecRule.md @@ -725,15 +725,12 @@ Specifies that matching IPsec rules of the indicated key module are synchronized This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. -- Default: Equivalent to both IKEv1 and AuthIP. -Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7. ----- There are authentication and cryptographic methods that are only compatible with certain keying modules. -This is a very advanced setting intended only for specific interoperability scenarios. -Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there. +- Default: KeyModule is set based on the authentication method. As of Win11 24H2 and Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Server 2008. - AuthIP: Supported with phase 2 authentication. -- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. -- IKEv2: Not supported with Kerberos, PSK, or NTLM. -Windows versions prior to Windows Server 2012 only support the Default configuration. +- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. +- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. + +The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration. ```yaml Type: KeyModule[] @@ -743,7 +740,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2 Required: False Position: Named -Default value: None +Default value: Default Accept pipeline input: False Accept wildcard characters: False ``` From 3320cef5b83c2cb8335fa5ffac24d7908073eb03 Mon Sep 17 00:00:00 2001 From: Meghan Stewart <33289333+mestew@users.noreply.github.com> Date: Mon, 3 Mar 2025 13:15:21 -0800 Subject: [PATCH 04/10] add to 2025, edits --- .../netsecurity/Sync-NetIPsecRule.md | 4 ++-- .../netsecurity/Sync-NetIPsecRule.md | 17 +++++++---------- 2 files changed, 9 insertions(+), 12 deletions(-) diff --git a/docset/winserver2022-ps/netsecurity/Sync-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Sync-NetIPsecRule.md index 77b892b9fc..d2fdc4ce69 100644 --- a/docset/winserver2022-ps/netsecurity/Sync-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Sync-NetIPsecRule.md @@ -2,7 +2,7 @@ description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml Module Name: NetSecurity -ms.date: 12/27/2016 +ms.date: 03/03/2025 online version: https://learn.microsoft.com/powershell/module/netsecurity/sync-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Sync-NetIPsecRule @@ -725,7 +725,7 @@ Specifies that matching IPsec rules of the indicated key module are synchronized This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. -- Default: KeyModule is set based on the authentication method. As of Win11 24H2 and Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Server 2008. +- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008. - AuthIP: Supported with phase 2 authentication. - IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. - IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. diff --git a/docset/winserver2025-ps/netsecurity/Sync-NetIPsecRule.md b/docset/winserver2025-ps/netsecurity/Sync-NetIPsecRule.md index 267e4a8a27..5aa4b052ab 100644 --- a/docset/winserver2025-ps/netsecurity/Sync-NetIPsecRule.md +++ b/docset/winserver2025-ps/netsecurity/Sync-NetIPsecRule.md @@ -2,7 +2,7 @@ description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml Module Name: NetSecurity -ms.date: 12/27/2016 +ms.date: 03/03/2025 online version: https://learn.microsoft.com/powershell/module/netsecurity/sync-netipsecrule?view=windowsserver2025-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Sync-NetIPsecRule @@ -725,15 +725,12 @@ Specifies that matching IPsec rules of the indicated key module are synchronized This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. -- Default: Equivalent to both IKEv1 and AuthIP. -Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7. ----- There are authentication and cryptographic methods that are only compatible with certain keying modules. -This is a very advanced setting intended only for specific interoperability scenarios. -Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there. -- AuthIP: Supported with phase 2 authentication. -- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. -- IKEv2: Not supported with Kerberos, PSK, or NTLM. -Windows versions prior to Windows Server 2012 only support the Default configuration. +- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008. +- AuthIP: Supported with phase 2 authentication. +- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. +- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. + +The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration. ```yaml Type: KeyModule[] From ff9559e880f86a7acd3145a69595a8e730f1af9e Mon Sep 17 00:00:00 2001 From: Meghan Stewart <33289333+mestew@users.noreply.github.com> Date: Mon, 3 Mar 2025 13:22:43 -0800 Subject: [PATCH 05/10] add to 2025, edits --- .../netsecurity/Set-NetIPsecRule.md | 4 ++-- .../netsecurity/Set-NetIPsecRule.md | 17 +++++++---------- 2 files changed, 9 insertions(+), 12 deletions(-) diff --git a/docset/winserver2022-ps/netsecurity/Set-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Set-NetIPsecRule.md index da965c6f52..5f27630007 100644 --- a/docset/winserver2022-ps/netsecurity/Set-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Set-NetIPsecRule.md @@ -2,7 +2,7 @@ description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml Module Name: NetSecurity -ms.date: 12/27/2016 +ms.date: 03/03/2025 online version: https://learn.microsoft.com/powershell/module/netsecurity/set-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Set-NetIPsecRule @@ -521,7 +521,7 @@ Specifies that matching IPsec rules of the indicated key module are modified. This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. -- Default: KeyModule is set based on the authentication method. As of Win11 24H2 and Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Server 2008. +- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008. - AuthIP: Supported with phase 2 authentication. - IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. - IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. diff --git a/docset/winserver2025-ps/netsecurity/Set-NetIPsecRule.md b/docset/winserver2025-ps/netsecurity/Set-NetIPsecRule.md index acf1ad8daa..582ebe24a4 100644 --- a/docset/winserver2025-ps/netsecurity/Set-NetIPsecRule.md +++ b/docset/winserver2025-ps/netsecurity/Set-NetIPsecRule.md @@ -2,7 +2,7 @@ description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml Module Name: NetSecurity -ms.date: 12/27/2016 +ms.date: 03/03/2025 online version: https://learn.microsoft.com/powershell/module/netsecurity/set-netipsecrule?view=windowsserver2025-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Set-NetIPsecRule @@ -521,15 +521,12 @@ Specifies that matching IPsec rules of the indicated key module are modified. This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. -- Default: Equivalent to both IKEv1 and AuthIP. -Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7. ----- There are authentication and cryptographic methods that are only compatible with certain keying modules. -This is a very advanced setting intended only for specific interoperability scenarios. -Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there. -- AuthIP: Supported with phase 2 authentication. -- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. -- IKEv2: Not supported with Kerberos, PSK, or NTLM. -Windows versions prior to Windows Server 2012 only support the Default configuration. +- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008. +- AuthIP: Supported with phase 2 authentication. +- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. +- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. + +The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration. ```yaml Type: KeyModule From 423b617eb66f0885901bf1d7d73bdea69979bd3d Mon Sep 17 00:00:00 2001 From: Meghan Stewart <33289333+mestew@users.noreply.github.com> Date: Mon, 3 Mar 2025 13:27:39 -0800 Subject: [PATCH 06/10] add to 2025, edits --- .../netsecurity/Rename-NetIPsecRule.md | 1 + .../netsecurity/Rename-NetIPsecRule.md | 18 ++++++++---------- 2 files changed, 9 insertions(+), 10 deletions(-) diff --git a/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md index f061b1f40d..b73e7ad3c9 100644 --- a/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md @@ -630,6 +630,7 @@ Accept wildcard characters: False Specifies that matching IPsec rules of the indicated key module are renamed. This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. + - Default: KeyModule is set based on the authentication method. As of Win11 24H2 and Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Server 2008. - AuthIP: Supported with phase 2 authentication. - IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. diff --git a/docset/winserver2025-ps/netsecurity/Rename-NetIPsecRule.md b/docset/winserver2025-ps/netsecurity/Rename-NetIPsecRule.md index 8d2ca099b0..039ce52f00 100644 --- a/docset/winserver2025-ps/netsecurity/Rename-NetIPsecRule.md +++ b/docset/winserver2025-ps/netsecurity/Rename-NetIPsecRule.md @@ -2,7 +2,7 @@ description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml Module Name: NetSecurity -ms.date: 12/27/2016 +ms.date: 03/03/2025 online version: https://learn.microsoft.com/powershell/module/netsecurity/rename-netipsecrule?view=windowsserver2025-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Rename-NetIPsecRule @@ -630,15 +630,13 @@ Accept wildcard characters: False Specifies that matching IPsec rules of the indicated key module are renamed. This parameter specifies which keying modules to negotiate. The acceptable values for this parameter are: Default, AuthIP, IKEv1, or IKEv2. --- Default: Equivalent to both IKEv1 and AuthIP. -Required in order for the rule to be applied to computers running Windows versions prior to nextref_server_7. ----- There are authentication and cryptographic methods that are only compatible with certain keying modules. -This is a very advanced setting intended only for specific interoperability scenarios. -Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules there. -- AuthIP: Supported with phase 2 authentication. -- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. -- IKEv2: Not supported with Kerberos, PSK, or NTLM. -Windows versions prior to Windows Server 2012 only support the Default configuration. + +- Default: KeyModule is set based on the authentication method. As of Windows 11, version 24H2 and Windows Server 2025, the Default is equivalent to both IKEv1 and IKEv2, and only sets AuthIP if the authentication method(s) require it. In previous releases, Default is equivalent to both IKEv1 and AuthIP. Required in order for the rule to be applied to computers running Windows versions prior to Windows Server 2008. +- AuthIP: Supported with phase 2 authentication. +- IKEv1: Supported with pre-shared key (PSK), Certificates, and Kerberos. Supported with phase 1 authentication only. +- IKEv2: Not supported with Kerberos, PSK, or NTLM. Supported with phase 1 authentication only. + +The default value is Default. There are authentication and cryptographic methods that are only compatible with certain keying modules. This is a very advanced setting intended only for specific interoperability scenarios. Overriding this parameter value may result in traffic being sent in plain-text if the authorization and cryptographic settings are not supported by the keying modules. Windows versions prior to Windows Server 2012 only support the Default configuration. ```yaml Type: KeyModule[] From bf03d049e771dcedce9df1018284a2e68d8560f5 Mon Sep 17 00:00:00 2001 From: Meghan Stewart <33289333+mestew@users.noreply.github.com> Date: Mon, 3 Mar 2025 13:39:44 -0800 Subject: [PATCH 07/10] add to 2025, edits --- docset/winserver2025-ps/netsecurity/Rename-NetIPsecRule.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docset/winserver2025-ps/netsecurity/Rename-NetIPsecRule.md b/docset/winserver2025-ps/netsecurity/Rename-NetIPsecRule.md index 039ce52f00..1310a13f23 100644 --- a/docset/winserver2025-ps/netsecurity/Rename-NetIPsecRule.md +++ b/docset/winserver2025-ps/netsecurity/Rename-NetIPsecRule.md @@ -646,7 +646,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2 Required: False Position: Named -Default value: None +Default value: Default Accept pipeline input: False Accept wildcard characters: False ``` From be03e014f271f1faf78ef4c848f12695bb3b002c Mon Sep 17 00:00:00 2001 From: Meghan Stewart <33289333+mestew@users.noreply.github.com> Date: Mon, 3 Mar 2025 13:44:13 -0800 Subject: [PATCH 08/10] add to 2025, edits --- docset/winserver2025-ps/netsecurity/Sync-NetIPsecRule.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docset/winserver2025-ps/netsecurity/Sync-NetIPsecRule.md b/docset/winserver2025-ps/netsecurity/Sync-NetIPsecRule.md index 5aa4b052ab..6b2d117d82 100644 --- a/docset/winserver2025-ps/netsecurity/Sync-NetIPsecRule.md +++ b/docset/winserver2025-ps/netsecurity/Sync-NetIPsecRule.md @@ -740,7 +740,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2 Required: False Position: Named -Default value: None +Default value: Default Accept pipeline input: False Accept wildcard characters: False ``` From de076388e74fe235dc48fa7151025f12a5a93871 Mon Sep 17 00:00:00 2001 From: Meghan Stewart <33289333+mestew@users.noreply.github.com> Date: Mon, 3 Mar 2025 13:47:26 -0800 Subject: [PATCH 09/10] add to 2025, edits --- docset/winserver2025-ps/netsecurity/Set-NetIPsecRule.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docset/winserver2025-ps/netsecurity/Set-NetIPsecRule.md b/docset/winserver2025-ps/netsecurity/Set-NetIPsecRule.md index 582ebe24a4..95a97cddb9 100644 --- a/docset/winserver2025-ps/netsecurity/Set-NetIPsecRule.md +++ b/docset/winserver2025-ps/netsecurity/Set-NetIPsecRule.md @@ -536,7 +536,7 @@ Accepted values: Default, IKEv1, AuthIP, IKEv2 Required: False Position: Named -Default value: None +Default value: Default Accept pipeline input: False Accept wildcard characters: False ``` From 1f3f5a56e8b0d113fd026010ef153dd4f709968e Mon Sep 17 00:00:00 2001 From: Meghan Stewart <33289333+mestew@users.noreply.github.com> Date: Mon, 3 Mar 2025 13:49:40 -0800 Subject: [PATCH 10/10] Update ms.date in Rename-NetIPsecRule.md --- docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md b/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md index b73e7ad3c9..9f003ff180 100644 --- a/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md +++ b/docset/winserver2022-ps/netsecurity/Rename-NetIPsecRule.md @@ -2,7 +2,7 @@ description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell. external help file: NetIPsecRule.cmdletDefinition.cdxml-help.xml Module Name: NetSecurity -ms.date: 12/27/2016 +ms.date: 03/03/2025 online version: https://learn.microsoft.com/powershell/module/netsecurity/rename-netipsecrule?view=windowsserver2022-ps&wt.mc_id=ps-gethelp schema: 2.0.0 title: Rename-NetIPsecRule