Skip to content

Commit 18b68a5

Browse files
author
Sean Wheeler
committed
remove highbit chars v4
1 parent 41881c9 commit 18b68a5

File tree

51 files changed

+1103
-960
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

51 files changed

+1103
-960
lines changed

reference/3.0/CimCmdlets/Invoke-CimMethod.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,8 +104,7 @@ If the InputObject parameter is specified, the cmdlet works in one of the follow
104104

105105
## EXAMPLES
106106

107-
### Example 1: Invoke a method> [!NOTE]
108-
> Information the user should notice even if skimming
107+
### Example 1: Invoke a method
109108

110109
```powershell
111110
PS C:\>Invoke-CimMethod -Query 'select * from Win32_Process where name like "notepad%"' -MethodName "Terminate"

reference/3.0/CimCmdlets/Remove-CimInstance.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,8 +43,8 @@ You can specify the CIM instance to remove by using either a CIM instance object
4343

4444
If the InputObject parameter is not specified, the cmdlet works in one of the following ways:
4545

46-
--If neither the ComputerName parameter nor the CimSession parameter is specified, then this cmdlet works on local Windows Management Instrumentation (WMI) using a Component Object Model (COM) session.
47-
--If either the ComputerName parameter or the CimSession parameter is specified, then this cmdlet works against the CIM server specified by either the ComputerName parameter or the CimSession parameter.
46+
- If neither the ComputerName parameter nor the CimSession parameter is specified, then this cmdlet works on local Windows Management Instrumentation (WMI) using a Component Object Model (COM) session.
47+
- If either the ComputerName parameter or the CimSession parameter is specified, then this cmdlet works against the CIM server specified by either the ComputerName parameter or the CimSession parameter.
4848

4949
## EXAMPLES
5050

@@ -222,10 +222,8 @@ The URI is used to identify a specific type of resource, such as disks or proces
222222
A URI consists of a prefix and a path to a resource.
223223
For example:
224224
225-
http://schemas.microsoft.com/wbem/wsman/1/wmi/root/cimv2/Win32_LogicalDisk
226-
http://intel.com/wbem/wscim/1/amt-schema/1/AMT_GeneralSettings
227-
228-
225+
- `http://schemas.microsoft.com/wbem/wsman/1/wmi/root/cimv2/Win32_LogicalDisk`
226+
- `http://intel.com/wbem/wscim/1/amt-schema/1/AMT_GeneralSettings`
229227

230228
By default, if you do not specify this parameter, the DMTF standard resource URI http://schemas.dmtf.org/wbem/wscim/1/cim-schema/2/ is used and the class name is appended to it.
231229

reference/3.0/ISE/Import-IseSnippet.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -50,43 +50,43 @@ This cmdlet is introduced in Windows PowerShell 3.0.
5050

5151
### Example 1: Import snippets from a directory
5252

53-
```
54-
PS> Import-IseSnippet -Path \\Server01\Public\Snippets -Recurse
53+
```powershell
54+
Import-IseSnippet -Path \\Server01\Public\Snippets -Recurse
5555
```
5656

5757
This command imports the snippets from the \\\\Server01\Public\Snippets directory into the current session.
5858
It uses the Recurse parameter to get snippets from all subdirectories of the Snippets directory.
5959

6060
### Example 2: Import snippets from a module
6161

62-
```
63-
PS> Import-IseSnippet -Module SnippetModule -ListAvailable
62+
```powershell
63+
Import-IseSnippet -Module SnippetModule -ListAvailable
6464
```
6565

6666
This command imports the snippets from the SnippetModule module.
6767
The command uses the **ListAvailable** parameter to import the snippets even if the SnippetModule module is not imported into the user's session when the command runs.
6868

6969
### Example 3: Find snippets in modules
7070

71-
```
72-
PS> ($env:PSModulePath).split(";") | foreach {dir $_\*\Snippets\*.Snippets.ps1xml -ErrorAction SilentlyContinue} | foreach {$_.fullname}
71+
```powershell
72+
($env:PSModulePath).split(";") | ForEach-Object {dir $_\*\Snippets\*.Snippets.ps1xml -ErrorAction SilentlyContinue} | ForEach-Object {$_.fullname}
7373
```
7474

7575
This command gets snippets in all installed modules in the PSModulePath environment variable.
7676

7777
### Example 4: Import all module snippets
7878

79-
```
80-
PS> ($env:PSModulePath).split(";") | foreach {dir $_\*\Snippets\*.Snippets.ps1xml -ErrorAction SilentlyContinue} | foreach {$psise.CurrentPowerShellTab.Snippets.Load($_)}
79+
```powershell
80+
($env:PSModulePath).split(";") | ForEach-Object {dir $_\*\Snippets\*.Snippets.ps1xml -ErrorAction SilentlyContinue} | ForEach-Object {$psise.CurrentPowerShellTab.Snippets.Load($_)}
8181
```
8282

8383
This command imports all snippets from all installed modules into the current session.
8484
Typically, you don't need to run a command like this because modules that have snippets will use the **Import-IseSnippet** cmdlet to import them for you when the module is imported.
8585

8686
### Example 5: Copy all module snippets
8787

88-
```
89-
PS> ($env:PSModulePath).split(";") | foreach {dir $_\*\Snippets\*.Snippets.ps1xml -ErrorAction SilentlyContinue} | Copy-Item -Destination $home\Documents\WindowsPowerShell\Snippets
88+
```powershell
89+
($env:PSModulePath).split(";") | ForEach-Object {dir $_\*\Snippets\*.Snippets.ps1xml -ErrorAction SilentlyContinue} | Copy-Item -Destination $home\Documents\WindowsPowerShell\Snippets
9090
```
9191

9292
This command copies the snippet files from all installed modules into the Snippets directory of the current user.

reference/3.0/Microsoft.PowerShell.Core/About/about_Automatic_Variables.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,6 @@ blocks (which are unnamed functions).
153153
> You cannot use the `$input` variable inside both the Process block and the
154154
> End block in the same function or script block.
155155
156-
157156
Enumerators contain properties and methods you can use to retrieve loop values
158157
and change the current loop iteration. For more information, see
159158
[Using Enumerators](#using-enumerators).

reference/3.0/Microsoft.PowerShell.Core/Enable-PSRemoting.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,6 @@ online version: http://go.microsoft.com/fwlink/?LinkID=144300
77
external help file: System.Management.Automation.dll-Help.xml
88
title: Enable-PSRemoting
99
---
10-
1110
# Enable-PSRemoting
1211

1312
## SYNOPSIS
@@ -57,27 +56,27 @@ Remote commands, and later attempts to enable and disable remoting, are likely t
5756

5857
### Example 1
5958

60-
```
61-
PS> Enable-PSRemoting
59+
```powershell
60+
Enable-PSRemoting
6261
```
6362

6463
This command configures the computer to receive remote commands.
6564

6665
### Example 2
6766

68-
```
69-
PS> Enable-PSRemoting -Force
67+
```powershell
68+
Enable-PSRemoting -Force
7069
```
7170

7271
This command configures the computer to receive remote commands.
7372
It uses the Force parameter to suppress the user prompts.
7473

7574
### Example 3
7675

77-
```
78-
PS> Enable-PSRemoting -SkipNetworkProfileCheck -Force
76+
```powershell
77+
Enable-PSRemoting -SkipNetworkProfileCheck -Force
7978
80-
PS> Set-NetFirewallRule -Name "WINRM-HTTP-In-TCP-PUBLIC" -RemoteAddress Any
79+
Set-NetFirewallRule -Name "WINRM-HTTP-In-TCP-PUBLIC" -RemoteAddress Any
8180
```
8281

8382
This example shows how to allow remote access from public networks on client versions of Windows.

reference/3.0/Microsoft.PowerShell.Core/Get-Module.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ This command gets the properties of the **PSModuleInfo** object that `Get-Module
155155
There is one object for each module file.
156156

157157
You can use the properties to format and filter the module objects.
158-
For more information about the properties, see [PSModuleInfo Properties](/dotnet/api/system.management.automation.psmoduleinfo) in the MSDN library.
158+
For more information about the properties, see [PSModuleInfo Properties](/dotnet/api/system.management.automation.psmoduleinfo).
159159

160160
The output includes the new properties, such as **Author** and **CompanyName**, that were introduced in Windows PowerShell 3.0
161161

reference/3.0/Microsoft.PowerShell.Core/Invoke-Command.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -556,7 +556,7 @@ The default value is **Default**.
556556
557557
CredSSP authentication is available only in Windows Vista, Windows Server 2008, and later versions of Windows.
558558
559-
For more information about the values of this parameter, see [AuthenticationMechanism Enumeration](/dotnet/api/system.management.automation.runspaces.authenticationmechanism) in the MSDN library.
559+
For more information about the values of this parameter, see [AuthenticationMechanism Enumeration](/dotnet/api/system.management.automation.runspaces.authenticationmechanism).
560560
561561
CAUTION: Credential Security Support Provider (CredSSP) authentication, in which the user's credentials are passed to a remote computer to be authenticated, is designed for commands that require authentication on more than one resource, such as accessing a remote network share.
562562
This mechanism increases the security risk of the remote operation.

reference/3.0/Microsoft.PowerShell.Core/Update-Help.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -227,6 +227,7 @@ ADCSAdministration en-US
227227
ADCSDeployment en-US 3.0.0.0
228228
ADDSDeployment en-US 3.0.0.0
229229
ADFS en-US 3.0.0.0
230+
...
230231
```
231232

232233
## PARAMETERS
@@ -454,15 +455,15 @@ You can pipe a module object from the `Get-Module` cmdlet to `Update-Help`.
454455

455456
[Get-ChildItem](../Microsoft.PowerShell.Management/Get-ChildItem.md)
456457

457-
[Get-Culture](../microsoft.powershell.utility/get-culture.md)
458+
[Get-Culture](../Microsoft.PowerShell.Utility/Get-Culture.md)
458459

459460
[Get-Help](Get-Help.md)
460461

461462
[Get-Item](../Microsoft.PowerShell.Management/Get-Item.md)
462463

463464
[Get-Module](Get-Module.md)
464465

465-
[Get-UICulture](../microsoft.powershell.utility/get-uiculture.md)
466+
[Get-UICulture](../Microsoft.PowerShell.Utility/Get-UICulture.md)
466467

467468
[Start-Job](Start-Job.md)
468469

reference/3.0/Microsoft.PowerShell.Management/Get-WmiObject.md

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,14 @@ title: Get-WmiObject
99
---
1010

1111
# Get-WmiObject
12+
1213
## SYNOPSIS
1314
Gets instances of Windows Management Instrumentation (WMI) classes or information about the available classes.
15+
1416
## SYNTAX
1517

1618
### query (Default)
19+
1720
```
1821
Get-WmiObject [-Class] <String> [[-Property] <String[]>] [-Filter <String>] [-Amended] [-DirectRead] [-AsJob]
1922
[-Impersonation <ImpersonationLevel>] [-Authentication <AuthenticationLevel>] [-Locale <String>]
@@ -22,6 +25,7 @@ Get-WmiObject [-Class] <String> [[-Property] <String[]>] [-Filter <String>] [-Am
2225
```
2326

2427
### list
28+
2529
```
2630
Get-WmiObject [[-Class] <String>] [-Recurse] [-Amended] [-List] [-AsJob] [-Impersonation <ImpersonationLevel>]
2731
[-Authentication <AuthenticationLevel>] [-Locale <String>] [-EnableAllPrivileges] [-Authority <String>]
@@ -30,6 +34,7 @@ Get-WmiObject [[-Class] <String>] [-Recurse] [-Amended] [-List] [-AsJob] [-Imper
3034
```
3135

3236
### WQLQuery
37+
3338
```
3439
Get-WmiObject [-Amended] [-DirectRead] -Query <String> [-AsJob] [-Impersonation <ImpersonationLevel>]
3540
[-Authentication <AuthenticationLevel>] [-Locale <String>] [-EnableAllPrivileges] [-Authority <String>]
@@ -38,21 +43,24 @@ Get-WmiObject [-Amended] [-DirectRead] -Query <String> [-AsJob] [-Impersonation
3843
```
3944

4045
### path
46+
4147
```
4248
Get-WmiObject [-Amended] [-AsJob] [-Impersonation <ImpersonationLevel>] [-Authentication <AuthenticationLevel>]
4349
[-Locale <String>] [-EnableAllPrivileges] [-Authority <String>] [-Credential <PSCredential>]
4450
[-ThrottleLimit <Int32>] [-ComputerName <String[]>] [-Namespace <String>] [<CommonParameters>]
4551
```
4652

4753
### class
54+
4855
```
4956
Get-WmiObject [-Amended] [-AsJob] [-Impersonation <ImpersonationLevel>] [-Authentication <AuthenticationLevel>]
5057
[-Locale <String>] [-EnableAllPrivileges] [-Authority <String>] [-Credential <PSCredential>]
5158
[-ThrottleLimit <Int32>] [-ComputerName <String[]>] [-Namespace <String>] [<CommonParameters>]
5259
```
5360

5461
## DESCRIPTION
55-
Starting in Windows PowerShell 3.0, this cmdlet has been superseded by Get-CimInstancehttp://technet.microsoft.com/library/jj590758.aspx.
62+
63+
Starting in PowerShell 3.0, this cmdlet has been superseded by `Get-CimInstance`.
5664

5765
The **Get-WmiObject** cmdlet gets instances of WMI classes or information about the available WMI classes.
5866
To specify a remote computer, use the **ComputerName** parameter.
@@ -64,6 +72,7 @@ You can use the **ComputerName** parameter of the **Get-WmiObject** cmdlet even
6472

6573
Beginning in Windows PowerShell 3.0, the **__Server** property of the object that **Get-WmiObject** returns has a **PSComputerName** alias.
6674
This makes it easier to include the source computer name in output and reports.
75+
6776
## EXAMPLES
6877

6978
### Example 1
@@ -72,6 +81,7 @@ PS C:\> Get-WmiObject -Class Win32_Process
7281
```
7382

7483
This command get the processes on the local computer.
84+
7585
### Example 2
7686
```
7787
PS C:\> Get-WmiObject -Class Win32_Service -ComputerName 127.0.0.1
@@ -80,12 +90,14 @@ PS C:\> Get-WmiObject -Class Win32_Service -ComputerName 127.0.0.1
8090
This command gets the services on a remote computer.
8191
It uses the ComputerName parameter to specify the Internet Protocol (IP) address, 127.0.0.1.
8292
By default, the current account must be a member of the Administrators group on the remote computer.
93+
8394
### Example 3
8495
```
8596
PS C:\> Get-WmiObject -Namespace "root/default" -List
8697
```
8798

8899
This command gets the WMI classes in the root or default namespace of the local computer.
100+
89101
### Example 4
90102
```
91103
PS C:\> Get-WmiObject -Query "select * from win32_service where name='WinRM'" -ComputerName Server01, Server02 | Format-List -Property PSComputerName, Name, ExitCode, Name, ProcessID, StartMode, State, Status
@@ -116,6 +128,7 @@ This makes it easy to see the computer on which the service resides.
116128

117129
**PSComputerName** is an alias of the **__Server** property of the objects that **Get-WmiObject** returns.
118130
This alias is introduced in Windows PowerShell 3.0.
131+
119132
### Example 5
120133
```
121134
PS C:\> (Get-WmiObject -Class Win32_Service -Filter "name='WinRM'" -ComputerName Server01).StopService()
@@ -126,6 +139,7 @@ The command uses a **Get-WmiObject** command to get the WinRM service on Server0
126139
Then, it invokes the **StopService** method of the Win32_Service WMI class on the object that the **Get-WmiObject** command returns.
127140

128141
This command is an alternative to using the Stop-Service cmdlet.
142+
129143
### Example 6
130144
```
131145
PS C:\> Get-WmiObject -Class Win32_Bios | Format-List -Property
@@ -181,6 +195,7 @@ Container :
181195
This command gets the BIOS on the local computer.
182196
The command uses a value of all (*) for the Property parameter of the Format-List cmdlet to display all properties of the returned object in a list.
183197
By default, only a subset (defined in the Types.ps1xml configuration file) are displayed.
198+
184199
### Example 7
185200
```
186201
PS C:\> Get-WmiObject Win32_Service -Credential FABRIKAM\administrator Computer Fabrikam
@@ -189,6 +204,7 @@ PS C:\> Get-WmiObject Win32_Service -Credential FABRIKAM\administrator Computer
189204
This command uses the **Credential** parameter of the **Get-WmiObject** cmdlet to get the services on a remote computer.
190205
The value of the **Credential** parameter is a user account name.
191206
The user is prompted for a password.
207+
192208
## PARAMETERS
193209

194210
### -Amended
@@ -252,6 +268,7 @@ Valid values are:
252268
Type: AuthenticationLevel
253269
Parameter Sets: (All)
254270
Aliases:
271+
Accepted values: Default, None, Connect, Call, Packet, PacketIntegrity, PacketPrivacy, Unchanged
255272

256273
Required: False
257274
Position: Named
@@ -426,6 +443,7 @@ Allows objects to permit other objects to use the credentials of the caller.
426443
Type: ImpersonationLevel
427444
Parameter Sets: (All)
428445
Aliases:
446+
Accepted values: Default, Anonymous, Identify, Impersonate, Delegate
429447
430448
Required: False
431449
Position: Named
@@ -549,21 +567,25 @@ Accept wildcard characters: False
549567

550568
### CommonParameters
551569
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
570+
552571
## INPUTS
553572

554573
### None
555574
You cannot pipe input to **Get-WmiObject**.
575+
556576
## OUTPUTS
557577

558578
### PSObject or System.Management.Automation.RemotingJob
559579
When you use the **AsJob** parameter, the cmdlet returns a job object.
560580
Otherwise, the object that **Get-WmiObject** returns depends on the value of the **Class** parameter.
581+
561582
## NOTES
562583
* To access WMI information on a remote computer, the cmdlet must run under an account that is a member of the local administrators group on the remote computer. Or, the default access control on the WMI namespace of the remote repository can be changed to give access rights to other accounts.
563584

564585
Only some of the properties of each WMI class are displayed by default.
565586
The set of properties that is displayed for each WMI class is specified in the Types.ps1xml configuration file.
566587
To get all properties of a WMI object, use the Get-Member or Format-List cmdlets.
588+
567589
## RELATED LINKS
568590

569591
[Invoke-WmiMethod](Invoke-WmiMethod.md)

reference/3.0/Microsoft.PowerShell.Utility/Get-Alias.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,6 +58,7 @@ Alias chdir -> Set-Location
5858
Alias clc -> Clear-Content
5959
Alias clear -> Clear-Host
6060
Alias clhy -> Clear-History
61+
...
6162
```
6263

6364
This command gets all aliases in the current session.
@@ -218,6 +219,6 @@ Get-Alias returns the same object for every alias, but Windows PowerShell uses a
218219

219220
[Set-Alias](Set-Alias.md)
220221

221-
[Alias Provider](../microsoft.powershell.core/providers/alias-provider.md)
222+
[Alias Provider](../Microsoft.PowerShell.Core/Providers/Alias-Provider.md)
222223

223224
[about_Aliases](../Microsoft.PowerShell.Core/About/about_Aliases.md)

0 commit comments

Comments
 (0)