Skip to content

Commit a985094

Browse files
committed
Markdown and PS Styles
1 parent ba7d368 commit a985094

11 files changed

+29
-23
lines changed

reference/7.5/Microsoft.PowerShell.Security/About/about_Certificate_Provider.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -196,7 +196,7 @@ $getChildItemSplat = @{
196196
Eku = "*Client Authentication*"
197197
}
198198
Get-ChildItem @getChildItemSplat |
199-
Where-Object {$_.SendAsTrustedIssuer -and $_.NotAfter -gt $ValidThrough }
199+
Where-Object {$_.SendAsTrustedIssuer -and $_.NotAfter -gt $ValidThrough}
200200
```
201201

202202
## Opening the Certificates MMC Snap-in
@@ -319,7 +319,7 @@ Start a remote session on the S1 computer using the `New-PSSession` cmdlet, and
319319
specify CredSSP authentication. Saves the session in the `$s` variable.
320320

321321
```powershell
322-
$s = New-PSSession S1 -Authentication CredSSP -Credential Domain01\Admin01
322+
$s = New-PSSession S1 -Authentication CredSSP -Credential Domain01\Admin01
323323
```
324324

325325
Finally, use the `Invoke-Command` cmdlet to run a `Remove-Item` command in the

reference/7.5/Microsoft.PowerShell.Security/ConvertFrom-SecureString.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -173,7 +173,8 @@ Accept wildcard characters: False
173173
174174
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable,
175175
-InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose,
176-
-WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
176+
-WarningAction, and -WarningVariable. For more information, see
177+
[about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
177178
178179
## INPUTS
179180

reference/7.5/Microsoft.PowerShell.Security/ConvertTo-SecureString.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -86,13 +86,14 @@ variable.
8686
The fourth command displays the encrypted string in the value of the `$Encrypted` variable.
8787

8888
The fifth command uses the `ConvertTo-SecureString` cmdlet to convert the encrypted standard string
89-
in the `$Encrypted` variable back into a secure string. It saves the result in the `$Secure2` variable.
90-
The sixth command displays the value of the `$Secure2` variable. The SecureString type indicates that
91-
the command was successful.
89+
in the `$Encrypted` variable back into a secure string. It saves the result in the `$Secure2`
90+
variable. The sixth command displays the value of the `$Secure2` variable. The SecureString type
91+
indicates that the command was successful.
9292

9393
### Example 2: Create a secure string from an encrypted string in a file
9494

95-
This example shows how to create a secure string from an encrypted standard string that is saved in a file.
95+
This example shows how to create a secure string from an encrypted standard string that is saved in
96+
a file.
9697

9798
```powershell
9899
$Secure = Read-Host -AsSecureString

reference/7.5/Microsoft.PowerShell.Security/Get-AuthenticodeSignature.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,9 @@ Get-AuthenticodeSignature -SourcePathOrExtension <String[]> -Content <Byte[]> [<
3838
> **This cmdlet is only available on the Windows platform.**
3939
4040
The `Get-AuthenticodeSignature` cmdlet gets information about the Authenticode signature for a
41-
file or file content as a byte array.
42-
If the file is both embedded signed and Windows catalog signed,
43-
the Windows catalog signature is used.
44-
If the file is not signed, the information is retrieved, but
45-
the fields are blank.
41+
file or file content as a byte array. If the file is both embedded signed and Windows catalog
42+
signed, the Windows catalog signature is used. If the file is not signed, the information is
43+
retrieved, but the fields are blank.
4644

4745
## EXAMPLES
4846

@@ -62,12 +60,13 @@ Get-AuthenticodeSignature test.ps1, test1.ps1, sign-file.ps1, makexml.ps1
6260
```
6361

6462
This command gets information about the Authenticode signature for the four files listed at the
65-
command line. In this example, the name of the **FilePath** parameter, which is optional, is omitted.
63+
command line. In this example, the name of the **FilePath** parameter, which is optional, is
64+
omitted.
6665

6766
### Example 3: Get only valid Authenticode signatures for multiple files
6867

6968
```powershell
70-
Get-ChildItem $PSHOME\*.* | ForEach-object {Get-AuthenticodeSignature $_} | Where-Object {$_.status -eq "Valid"}
69+
Get-ChildItem $PSHOME\*.* | ForEach-Object {Get-AuthenticodeSignature $_} | Where-Object {$_.Status -eq "Valid"}
7170
```
7271

7372
This command lists all of the files in the `$PSHOME` directory that have a valid Authenticode

reference/7.5/Microsoft.PowerShell.Security/Get-Credential.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ the **Credential** parameter.
5959
### Example 2
6060

6161
```powershell
62-
$c = Get-Credential -credential User01
62+
$c = Get-Credential -Credential User01
6363
$c.Username
6464
User01
6565
```

reference/7.5/Microsoft.PowerShell.Security/Get-ExecutionPolicy.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,8 @@ To display the execution policies for each scope in the order of precedence, use
3030
The effective execution policy is determined by execution policies that are set by
3131
`Set-ExecutionPolicy` and Group Policy settings.
3232

33-
For more information, see [about_Execution_Policies](../Microsoft.PowerShell.Core/about/about_Execution_Policies.md).
33+
For more information, see
34+
[about_Execution_Policies](../Microsoft.PowerShell.Core/About/about_Execution_Policies.md).
3435

3536
## EXAMPLES
3637

@@ -232,7 +233,7 @@ whether scripts must be digitally signed before they are run.
232233

233234
## RELATED LINKS
234235

235-
[about_Execution_Policies](../Microsoft.PowerShell.Core/about/about_Execution_Policies.md)
236+
[about_Execution_Policies](../Microsoft.PowerShell.Core/About/about_Execution_Policies.md)
236237

237238
[about_Group_Policy_Settings](../Microsoft.PowerShell.Core/About/about_Group_Policy_Settings.md)
238239

reference/7.5/Microsoft.PowerShell.Security/Microsoft.PowerShell.Security.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,8 @@ Sets the PowerShell execution policies for Windows computers.
7373

7474
### [Test-FileCatalog](Test-FileCatalog.md)
7575

76-
Validates whether the hashes contained in a catalog file (.cat) matches the hashes of the actual files in order to validate their authenticity.
76+
Validates whether the hashes contained in a catalog file (.cat) matches the hashes of the actual
77+
files in order to validate their authenticity.
7778

7879
### [Unprotect-CmsMessage](Unprotect-CmsMessage.md)
7980

reference/7.5/Microsoft.PowerShell.Security/Set-Acl.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -95,8 +95,8 @@ $NewAcl = Get-Acl File0.txt
9595
Get-ChildItem -Path "C:\temp" -Recurse -Include "*.txt" -Force | Set-Acl -AclObject $NewAcl
9696
```
9797

98-
These commands apply the security descriptors in the File0.txt file to all text files in the `C:\Temp`
99-
directory and all of its subdirectories.
98+
These commands apply the security descriptors in the File0.txt file to all text files in the
99+
`C:\Temp` directory and all of its subdirectories.
100100

101101
The first command gets the security descriptor of the File0.txt file in the current directory and
102102
uses the assignment operator (`=`) to store it in the `$NewACL` variable.

reference/7.5/Microsoft.PowerShell.Security/Set-AuthenticodeSignature.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,8 @@ earlier versions, the default is SHA1. Files that are signed with a different ha
195195
might not be recognized on other systems. Which algorithms are supported depends on the version of
196196
the operating system.
197197

198-
For a list of possible values, see [HashAlgorithmName Struct](/dotnet/api/system.security.cryptography.hashalgorithmname?view=netframework-4.7.2#properties).
198+
For a list of possible values, see
199+
[HashAlgorithmName Struct](/dotnet/api/system.security.cryptography.hashalgorithmname?view=netframework-4.7.2#properties).
199200

200201
```yaml
201202
Type: System.String

reference/7.5/Microsoft.PowerShell.Security/Set-ExecutionPolicy.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,8 @@ Set-ExecutionPolicy [-ExecutionPolicy] <ExecutionPolicy> [[-Scope] <ExecutionPol
2525
## DESCRIPTION
2626

2727
The `Set-ExecutionPolicy` cmdlet changes PowerShell execution policies for Windows computers. For
28-
more information, see [about_Execution_Policies](../Microsoft.PowerShell.Core/about/about_Execution_Policies.md).
28+
more information, see
29+
[about_Execution_Policies](../Microsoft.PowerShell.Core/about/about_Execution_Policies.md).
2930

3031
Beginning in PowerShell 6.0 for non-Windows computers, the default execution policy is
3132
`Unrestricted` and can't be changed. The `Set-ExecutionPolicy` cmdlet is available, but PowerShell

reference/7.5/Microsoft.PowerShell.Security/Test-FileCatalog.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,8 @@ Accept wildcard characters: False
171171

172172
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction,
173173
-InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and
174-
-WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
174+
-WarningVariable. For more information, see
175+
[about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
175176

176177
## INPUTS
177178

0 commit comments

Comments
 (0)