Skip to content

Commit b909248

Browse files
authored
Merge pull request #3 from MicrosoftDocs/master
update fork
2 parents aa4c2c8 + de58f4a commit b909248

File tree

12 files changed

+505
-31
lines changed

12 files changed

+505
-31
lines changed

docset/windows/addsadministration/activedirectory.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ ms.assetid: 8AD46969-D3B0-4DE9-81D3-D485B99CB93F
2424
## Description
2525
The Active Directory module for Windows PowerShell is a PowerShell module that consolidates a group of cmdlets. You can use these cmdlets to manage your Active Directory domains, Active Directory Lightweight Directory Services (AD LDS) configuration sets, and Active Directory Database Mounting Tool instances in a single, self-contained package.
2626

27-
If you don't have the Active Directory module installed on your machine, you need to download the correct Remote Server Administration Tools (RSAT) package for your OS. If you're running Windows 7, you will also need to run the `import-module ActiveDirectory` command from an elevated PowerShell prompt.
27+
If you don't have the Active Directory module installed on your machine, you need to download the correct Remote Server Administration Tools (RSAT) package for your OS. If you're running Windows 7, you will also need to run the `import-module ActiveDirectory` command from an elevated PowerShell prompt. For more detail, see [RSAT for Windows operating systems](https://support.microsoft.com/help/2693643/remote-server-administration-tools-rsat-for-windows-operating-systems). Starting with Windows 10 October 2018 Update, RSAT is included as a set of Features on Demand right from Windows 10. Now, instead of downloading an RSAT package you can just go to Manage optional features in Settings and click Add a feature to see the list of available RSAT tools. Select and install the specific RSAT tools you need. To see installation progress, click the Back button to view status on the Manage optional features page.
2828

2929
## ActiveDirectory Cmdlets
3030
### [Add-ADCentralAccessPolicyMember](./Add-ADCentralAccessPolicyMember.md)

docset/windows/addsadministration/get-aduser.md

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -251,9 +251,28 @@ Accept wildcard characters: False
251251
```
252252

253253
### -Partition
254-
The default authentication method is Negotiate.
254+
Specifies the distinguished name of an Active Directory partition.
255+
The distinguished name must be one of the naming contexts on the current directory server.
256+
The cmdlet searches this partition to find the object defined by the *Identity* parameter.
257+
258+
In many cases, a default value is used for the *Partition* parameter if no value is specified.
259+
The rules for determining the default value are given below.
260+
Note that rules listed first are evaluated first and when a default value can be determined, no further rules are evaluated.
261+
262+
In AD DS environments, a default value for *Partition* are set in the following cases:
263+
264+
- If the *Identity* parameter is set to a distinguished name, the default value of *Partition* is automatically generated from this distinguished name.
265+
- If running cmdlets from an Active Directory provider drive, the default value of *Partition* is automatically generated from the current path in the drive.
266+
- If none of the previous cases apply, the default value of *Partition* is set to the default partition or naming context of the target domain.
267+
268+
In AD LDS environments, a default value for *Partition* will be set in the following cases:
269+
270+
- If the *Identity* parameter is set to a distinguished name, the default value of *Partition* is automatically generated from this distinguished name.
271+
- If running cmdlets from an Active Directory provider drive, the default value of *Partition* is automatically generated from the current path in the drive.
272+
- If the target AD LDS instance has a default naming context, the default value of *Partition* is set to the default naming context.
273+
To specify a default naming context for an AD LDS environment, set the **msDS-defaultNamingContext** property of the Active Directory directory service agent object (**nTDSDSA**) for the AD LDS instance.
274+
- If none of the previous cases apply, the *Partition* parameter does not take any default value.
255275

256-
A Secure Sockets Layer (SSL) connection is required for the Basic authentication method.
257276

258277
```yaml
259278
Type: String

docset/windows/defender/get-mppreference.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ Get-MpPreference [-CimSession <CimSession[]>] [-ThrottleLimit <Int32>] [-AsJob]
3030
```
3131

3232
## DESCRIPTION
33-
The **Get-MpPreference** cmdlet gets preferences for the Windows Defender scans and updates.
33+
The **Get-MpPreference** cmdlet gets preferences for the Windows Defender scans and updates. For more information about the preferences that this cmdlet retrieves, see [Windows Defender Preferences Class](https://docs.microsoft.com/previous-versions/windows/desktop/legacy/dn455323(v=vs.85))
3434

3535
## EXAMPLES
3636

docset/windows/dhcpserver/invoke-dhcpserverv4failoverreplication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,7 @@ Type: IPAddress[]
179179
Parameter Sets: ScopeId
180180
Aliases:
181181

182-
Required: True
182+
Required: False
183183
Position: Named
184184
Default value: None
185185
Accept pipeline input: True (ByPropertyName)

0 commit comments

Comments
 (0)