Skip to content

Commit 14b8a26

Browse files
bobbytreedsdwheeler
authored andcommitted
Header and blank line updates (MicrosoftDocs#3765)
* Header and blank line updates * Fixing build error
1 parent 740f371 commit 14b8a26

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+1139
-71
lines changed

reference/6/Microsoft.PowerShell.Core/About/About.md

Lines changed: 103 additions & 1 deletion
Large diffs are not rendered by default.

reference/6/Microsoft.PowerShell.Core/About/about_Aliases.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,9 @@ locale: en-us
55
keywords: powershell,cmdlet
66
title: about_Aliases
77
---
8-
98
# About Aliases
109

1110
## SHORT DESCRIPTION
12-
1311
Describes how to use alternate names for cmdlets and commands in
1412
PowerShell.
1513

reference/6/Microsoft.PowerShell.Core/Enable-PSSessionConfiguration.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ online version: http://go.microsoft.com/fwlink/?LinkId=821476
88
schema: 2.0.0
99
title: Enable-PSSessionConfiguration
1010
---
11-
1211
# Enable-PSSessionConfiguration
1312

1413
## SYNOPSIS
@@ -22,6 +21,7 @@ Enable-PSSessionConfiguration [[-Name] <String[]>] [-Force] [-SecurityDescriptor
2221
```
2322

2423
## DESCRIPTION
24+
2525
The **Enable-PSSessionConfiguration** cmdlet enables registered session configurations that have been disabled, such as by using the Disable-PSSessionConfiguration or Disable-PSRemoting cmdlets, or the *AccessMode* parameter of Register-PSSessionConfiguration.
2626
This is an advanced cmdlet that is designed to be used by system administrators to manage customized session configurations for their users.
2727

@@ -38,20 +38,23 @@ Instead, use the more comprehensive cmdlet, Enable-PSRemoting.
3838
## EXAMPLES
3939

4040
### Example 1: Re-enable the default session
41+
4142
```
4243
PS C:\> Enable-PSSessionConfiguration
4344
```
4445

4546
This command re-enables the Microsoft.PowerShell default session configuration on the computer.
4647

4748
### Example 2: Re-enable specified sessions
49+
4850
```
4951
PS C:\> Enable-PSSessionConfiguration -Name MaintenanceShell, AdminShell
5052
```
5153

5254
This command re-enables the MaintenanceShell and AdminShell session configurations on the computer.
5355

5456
### Example 3: Re-enable the all sessions
57+
5558
```
5659
PS C:\> Enable-PSSessionConfiguration -Name *
5760
PS C:\> Get-PSSessionConfiguration | Enable-PSSessionConfiguration
@@ -64,6 +67,7 @@ Therefore, you can use either.
6467
**Enable-PSSessionConfiguration** does not generate an error if you enable a session configuration that is already enabled.
6568

6669
### Example 4: Re-enable a session and specify a new security descriptor
70+
6771
```
6872
PS C:\> Enable-PSSessionConfiguration -Name MaintenanceShell -SecurityDescriptorSDDL "O:NSG:BAD:P(A;;GXGWGR;;;BA)(A;;GAGR;;;S-1-5-21-123456789-188441444-3100496)S:P"
6973
```
@@ -73,6 +77,7 @@ This command re-enables the MaintenanceShell session configuration and specifies
7377
## PARAMETERS
7478

7579
### -Force
80+
7681
Indicates that the cmdlet does not prompt you for confirmation, and restarts the WinRM service without prompting.
7782
Restarting the service makes the configuration change effective.
7883

@@ -91,6 +96,7 @@ Accept wildcard characters: False
9196
```
9297
9398
### -Name
99+
94100
Specifies the names of session configurations to enable.
95101
Enter one or more configuration names.
96102
Wildcard characters are permitted.
@@ -112,6 +118,7 @@ Accept wildcard characters: False
112118
```
113119
114120
### -NoServiceRestart
121+
115122
Indicates that the cmdlet does not restart the service.
116123
117124
```yaml
@@ -127,6 +134,7 @@ Accept wildcard characters: False
127134
```
128135
129136
### -SecurityDescriptorSddl
137+
130138
Specifies a security descriptor with which this cmdlet replaces the security descriptor on the session configuration.
131139
132140
If you omit this parameter, **Enable-PSSessionConfiguration** only deletes the deny all item from the security descriptor.
@@ -144,6 +152,7 @@ Accept wildcard characters: False
144152
```
145153
146154
### -SkipNetworkProfileCheck
155+
147156
Indicates that this cmdlet enables the session configuration when the computer is on a public network.
148157
This parameter enables a firewall rule for public networks that allows remote access only from computers in the same local subnet.
149158
By default, **Enable-PSSessionConfiguration** fails on a public network.
@@ -170,6 +179,7 @@ Accept wildcard characters: False
170179
```
171180
172181
### -Confirm
182+
173183
Prompts you for confirmation before running the cmdlet.
174184
175185
```yaml
@@ -185,6 +195,7 @@ Accept wildcard characters: False
185195
```
186196
187197
### -WhatIf
198+
188199
Shows what would happen if the cmdlet runs.
189200
The cmdlet is not run.
190201
@@ -201,19 +212,23 @@ Accept wildcard characters: False
201212
```
202213
203214
### CommonParameters
215+
204216
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
205217
206218
## INPUTS
207219
208220
### Microsoft.PowerShell.Commands.PSSessionConfigurationCommands#PSSessionConfiguration, System.String
221+
209222
You can pipe a session configuration object or a string that contains the name of a session configuration to this cmdlet.
210223
211224
## OUTPUTS
212225
213226
### None
227+
214228
This cmdlet does not return any objects.
215229
216230
## NOTES
231+
217232
* To run this cmdlet on Windows Vista, Windows Server 2008, and later versions of the Windows operating system, you must start Windows PowerShell by using the Run as administrator option.
218233
219234
*

reference/6/Microsoft.PowerShell.Core/Enter-PSHostProcess.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ online version: http://go.microsoft.com/fwlink/?LinkID=403736
88
schema: 2.0.0
99
title: Enter-PSHostProcess
1010
---
11-
1211
# Enter-PSHostProcess
1312

1413
## SYNOPSIS
@@ -17,26 +16,31 @@ Connects to and enters into an interactive session with a local process.
1716
## SYNTAX
1817

1918
### ProcessIdParameterSet (Default)
19+
2020
```
2121
Enter-PSHostProcess [-Id] <Int32> [[-AppDomainName] <String>] [<CommonParameters>]
2222
```
2323

2424
### ProcessParameterSet
25+
2526
```
2627
Enter-PSHostProcess [-Process] <Process> [[-AppDomainName] <String>] [<CommonParameters>]
2728
```
2829

2930
### ProcessNameParameterSet
31+
3032
```
3133
Enter-PSHostProcess [-Name] <String> [[-AppDomainName] <String>] [<CommonParameters>]
3234
```
3335

3436
### PSHostProcessInfoParameterSet
37+
3538
```
3639
Enter-PSHostProcess [-HostProcessInfo] <PSHostProcessInfo> [[-AppDomainName] <String>] [<CommonParameters>]
3740
```
3841

3942
## DESCRIPTION
43+
4044
The **Enter-PSHostProcess** cmdlet connects to and enters into an interactive session with a local process.
4145

4246
Instead of creating a new process to host PowerShell and run a remote session, the remote, interactive session is run in an existing process that is already running PowerShell.
@@ -58,6 +62,7 @@ To support attaching to processes on remote computers, the **Enter-PSHostProcess
5862
## EXAMPLES
5963

6064
### Example 1: Start debugging a runspace within the Windows PowerShell ISE process
65+
6166
```
6267
In this example, you run **Enter-PSHostProcess** from within the Windows PowerShell console to enter the Windows PowerShell ISE process. In the resulting interactive session, you can find a runspace that you want to debug by running Get-Runspace, and then debug the runspace.
6368
PS C:\> Enter-PSHostProcess -Name powershell_ise
@@ -132,6 +137,7 @@ Accept wildcard characters: False
132137
```
133138
134139
### -Id
140+
135141
Specifies a process by the process ID.
136142
To get a process ID, run the Get-Process cmdlet.
137143
@@ -148,6 +154,7 @@ Accept wildcard characters: False
148154
```
149155
150156
### -Name
157+
151158
Specifies a process by the process name.
152159
To get a process name, run the Get-Process cmdlet.
153160
You can also get process names from the Properties dialog box of a process in Task Manager.
@@ -165,6 +172,7 @@ Accept wildcard characters: False
165172
```
166173
167174
### -Process
175+
168176
Specifies a process by the process object.
169177
The simplest way to use this parameter is to save the results of a **Get-Process** command that returns process that you want to enter in a variable, and then specify the variable as the value of this parameter.
170178
@@ -181,6 +189,7 @@ Accept wildcard characters: False
181189
```
182190
183191
### CommonParameters
192+
184193
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216).
185194
186195
## INPUTS
@@ -190,6 +199,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
190199
## OUTPUTS
191200
192201
## NOTES
202+
193203
* **Enter-PSHostProcess** cannot enter the process of the PowerShell session in which you are running the command. You can, however, enter the process of another PowerShell session, or a Windows PowerShell ISE session that is running at the same time as the session in which you are running **Enter-PSHostProcess**.
194204
195205
**Enter-PSHostProcess** can enter only those processes that are hosting PowerShell.

0 commit comments

Comments
 (0)