Skip to content

Commit ac0bf59

Browse files
authored
Merge pull request #1665 from dariomws306/Dariomws12282019
OPath fix
2 parents 343ad7d + d6960f4 commit ac0bf59

File tree

131 files changed

+301
-301
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

131 files changed

+301
-301
lines changed

docset/windows/addsadministration/Add-ADCentralAccessPolicyMember.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This command adds the central access rules Finance Documents Rule and Corporate
4545

4646
### Example 2: Add a central access rule to an existing central access policy
4747
```
48-
PS C:\> Get-ADCentralAccessPolicy -Filter { Name -like "Corporate*" } | Add-ADCentralAccessPolicyMember -Members "Corporate Documents Rule"
48+
PS C:\> Get-ADCentralAccessPolicy -Filter "Name -like 'Corporate*'" | Add-ADCentralAccessPolicyMember -Members "Corporate Documents Rule"
4949
```
5050

5151
This command gets all central access policies that have a name that starts with Corporate and then passes this information to Add-ADCentralAccessPolicyMember by using the pipeline operator.

docset/windows/addsadministration/Add-ADFineGrainedPasswordPolicySubject.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ This command applies the fine-grained password policy named DlgtdAdminsPSO to th
7070

7171
### Example 4: Apply a fine-grained password policy to users with a specified name
7272
```
73-
PS C:\> Get-ADUser -Filter {lastname -eq "Fuller"} | Add-ADFineGrainedPasswordPolicySubject -Identity DlgtdAdminsPSO
73+
PS C:\> Get-ADUser -Filter "lastname -eq 'Fuller'" | Add-ADFineGrainedPasswordPolicySubject -Identity DlgtdAdminsPSO
7474
```
7575

7676
This command applies the fine-grained password policy named DlgtdAdminsPSO to any users whose last name is Fuller.

docset/windows/addsadministration/Add-ADGroupMember.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ This command adds user accounts with SAM account names DavidChew and PattiFuller
7676

7777
### Example 3: Add an account by distinguished name to a filtered group
7878
```
79-
PS C:\> Get-ADGroup -Server localhost:60000 -SearchBase "OU=AccountDeptOU,DC=AppNC" -Filter { name -like "AccountLeads" } | Add-ADGroupMember -Members "CN=PattiFuller,OU=AccountDeptOU,DC=AppNC"
79+
PS C:\> Get-ADGroup -Server localhost:60000 -SearchBase "OU=AccountDeptOU,DC=AppNC" -Filter "name -like 'AccountLeads'" | Add-ADGroupMember -Members "CN=PattiFuller,OU=AccountDeptOU,DC=AppNC"
8080
```
8181

8282
This command gets a group from the organizational unit OU=AccountDeptOU,DC=AppNC in the AD LDS instance localhost:60000 that has the name AccountLeads, and then pipes it to **Add-ADGroupMember**, which then adds the user account with the distinguished name CN=PattiFuller,OU=AccountDeptOU,DC=AppNC to it.

docset/windows/addsadministration/Add-ADPrincipalGroupMembership.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ This command demonstrates the default behavior of this cmdlet, with no parameter
8686

8787
### Example 4: Add filtered users to a distinguished name group
8888
```
89-
PS C:\> Get-ADUser -Server localhost:60000 -SearchBase "DC=AppNC" -Filter { Title -eq "Account Lead" -and Office -eq "Branch1" } | Add-ADPrincipalGroupMembership -MemberOf "CN=AccountLeads,OU=AccountDeptOU,DC=AppNC"
89+
PS C:\> Get-ADUser -Server localhost:60000 -SearchBase "DC=AppNC" -Filter "Title -eq 'Account Lead' -and Office -eq 'Branch1'" | Add-ADPrincipalGroupMembership -MemberOf "CN=AccountLeads,OU=AccountDeptOU,DC=AppNC"
9090
```
9191

9292
This command adds all employees in Branch1 in the AD LDS instance localhost:60000 whose title is Account Lead to the group with the distinguished name CN=AccountLeads,OU=AccountDeptOU,DC=AppNC.

docset/windows/addsadministration/Add-ADResourcePropertyListMember.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ This command demonstrates the default behavior for this cmdlet when no parameter
5959

6060
### Example 3: Add members to a filtered resource property list
6161
```
62-
PS C:\> Get-ADResourcePropertyList -Filter { Name -like "Corporate*" } | Add-ADResourcePropertyListMember -Members Country,Authors
62+
PS C:\> Get-ADResourcePropertyList -Filter "Name -like 'Corporate*'" | Add-ADResourcePropertyListMember -Members Country,Authors
6363
```
6464

6565
This command gets any resource property list that has a name that begins with Corporate and then passes it to Add-ADResourcePropertyListMember, which then adds the resource properties Country and Authors to it.

docset/windows/addsadministration/Get-ADCentralAccessPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ This command retrieves a list of all central access policies.
5959

6060
### Example 2: Get a list of specific central access policies using a filter
6161
```
62-
PS C:\> Get-ADCentralAccessPolicy -Filter {Members -eq 'Finance Documents Rule'}
62+
PS C:\> Get-ADCentralAccessPolicy -Filter "Members -eq 'Finance Documents Rule'"
6363
```
6464

6565
This command gets the central access policies that have the central access rule Finance Documents Rule as its members.

docset/windows/addsadministration/Get-ADCentralAccessRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ This command retrieves a list of all central access rules.
5959

6060
### Example 2: Get central access rules that have a specific resource condition
6161
```
62-
PS C:\> Get-ADCentralAccessRule -Filter { ResourceCondition -like "*Department*" }
62+
PS C:\> Get-ADCentralAccessRule -Filter "ResourceCondition -like '*Department*'"
6363
```
6464

6565
This command retrieves the central access rules that have Department in its resource condition.

docset/windows/addsadministration/Get-ADClaimTransformPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ This command retrieves a list of all claims transformation policies.
5858
### Example 2: Get all the claims transformation policies that are applied to a specific trust
5959
```
6060
PS C:\> $Contoso = Get-ADTrust -Identity "corp.contoso.com"
61-
PS C:\> Get-ADClaimTransformPolicy -Filter {IncomingTrust -eq $Contoso -or OutgoingTrust -eq $Contoso}
61+
PS C:\> Get-ADClaimTransformPolicy -Filter "IncomingTrust -eq '$Contoso' -or OutgoingTrust -eq '$Contoso'"
6262
```
6363

6464
This example gets all the claims transformation policies that are applied to trusts made with corp.contoso.com.

docset/windows/addsadministration/Get-ADClaimType.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ This command retrieves a list of all claim types.
5858

5959
### Example 2: Get all the claim types that are sourced from the attribute title.
6060
```
61-
PS C:\> Get-ADClaimType -Filter {SourceAttribute -eq 'title'}
61+
PS C:\> Get-ADClaimType -Filter "SourceAttribute -eq 'title'"
6262
```
6363

6464
This command gets all the claim types that are sourced from the attribute title.

docset/windows/addsadministration/Get-ADDomainControllerPasswordReplicationPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ This command gets from an RODC domain controller password replication policy the
6262

6363
### Example 2: Get the password replication policy allowed list from all RODCs in the domain
6464
```
65-
C:\PS>Get-ADDomainController -Filter {IsReadOnly -eq $true} | Get-ADDomainControllerPasswordReplicationPolicy -Allowed
65+
C:\PS>Get-ADDomainController -Filter "IsReadOnly -eq `$true" | Get-ADDomainControllerPasswordReplicationPolicy -Allowed
6666
6767
DistinguishedName : CN=Allowed RODC Password Replication Group,CN=Users,DC=Fabrikam,DC=com
6868
Name : Allowed RODC Password Replication Group

docset/windows/addsadministration/Get-ADDomainControllerPasswordReplicationPolicyUsage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ The command displays the name and object class of each account returned.
7171

7272
### Example 3: Get a list of accounts cached across all RODCs
7373
```
74-
PS C:\> Get-ADDomainController -Filter {IsReadOnly -eq $true} | Get-ADDomainControllerPasswordReplicationPolicyUsage
74+
PS C:\> Get-ADDomainController -Filter "IsReadOnly -eq `$true" | Get-ADDomainControllerPasswordReplicationPolicyUsage
7575
DistinguishedName : CN=krbtgt_35512,CN=Users,DC=User01,DC=com
7676
Enabled : False
7777
Name : krbtgt_35512

docset/windows/addsadministration/Get-ADFineGrainedPasswordPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ This command gets all the properties for the fine-grained password policy with D
144144

145145
### Example 3: Get all fine-grained password policy objects using a filter
146146
```
147-
PS C:\> Get-ADFineGrainedPasswordPolicy -Filter {name -like "*admin*"}
147+
PS C:\> Get-ADFineGrainedPasswordPolicy -Filter "name -like '*admin*'"
148148
AppliesTo : {CN=GlenJohn,CN=Users,DC=USER01,DC=com, CN=JeffPrice,CN=Users,DC=USER01,DC=com, CN=Administrator,CN=Users,DC=USER01,DC=com}
149149
ComplexityEnabled : True
150150
DistinguishedName : CN=DlgtdAdminsPSO,CN=Password Settings Container,CN=System,DC=USER01,DC=com

docset/windows/addsadministration/Get-ADGroup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ This command gets all groups that have a GroupCategory of Security but do not ha
105105

106106
### Example 4: Get a group from a specified search base and filter the results
107107
```
108-
PS C:\> Get-ADGroup -Server localhost:60000 -Filter {GroupScope -eq "DomainLocal"} -SearchBase "DC=AppNC"
108+
PS C:\> Get-ADGroup -Server localhost:60000 -Filter "GroupScope -eq 'DomainLocal'" -SearchBase "DC=AppNC"
109109
110110
111111
DistinguishedName : CN=AlphaGroup,OU=AccountDeptOU,DC=AppNC

docset/windows/addsadministration/Get-ADGroupMember.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ This command gets all the members of the Administrators group.
9090

9191
### Example 2: Get all group members of all domain local groups
9292
```
93-
PS C:\> Get-ADGroup -Server localhost:60000 -Filter {GroupScope -eq "DomainLocal"} -SearchBase "DC=AppNC" | Get-ADGroupMember -Partition "DC=AppNC"
93+
PS C:\> Get-ADGroup -Server localhost:60000 -Filter "GroupScope -eq 'DomainLocal'" -SearchBase "DC=AppNC" | Get-ADGroupMember -Partition "DC=AppNC"
9494
distinguishedName : CN=SanjayPatel,OU=AccountDeptOU,DC=AppNC
9595
name : SanjayPatel
9696
objectClass : user

docset/windows/addsadministration/Get-ADReplicationConnection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ This command gets all of the replication connections.
5454

5555
### Example 2: Get all replication connections from a specified domain controller
5656
```
57-
PS C:\> Get-ADReplicationConnection -Filter {ReplicateFromDirectoryServer -eq "corp-DC01"}
57+
PS C:\> Get-ADReplicationConnection -Filter "ReplicateFromDirectoryServer -eq 'corp-DC01'"
5858
```
5959

6060
This command gets all replication connections that replicate from corp-DC01.

docset/windows/addsadministration/Get-ADReplicationSite.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ This command gets all Active Directory Replication sites.
5353

5454
### Example 2: Get replication sites by flag
5555
```
56-
PS C:\> Get-ADReplicationSite -Properties * -Filter {WindowsServer2003KCCSiteLinkBridgingEnabled -eq $TRUE}
56+
PS C:\> Get-ADReplicationSite -Properties * -Filter "WindowsServer2003KCCSiteLinkBridgingEnabled -eq `$TRUE"
5757
```
5858

5959
This command gets all sites that have the WindowsServer2003KCCBehaviorEnabled flag turned on.

docset/windows/addsadministration/Get-ADReplicationSiteLink.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -54,14 +54,14 @@ This command gets all the site links.
5454

5555
### Example 2: Get all specified replication site links
5656
```
57-
PS C:\> Get-ADReplicationSiteLink -Filter {SitesIncluded -eq "NorthAmerica"} | Format-Table Name,SitesIncluded -A
57+
PS C:\> Get-ADReplicationSiteLink -Filter "SitesIncluded -eq 'NorthAmerica'" | Format-Table Name,SitesIncluded -A
5858
```
5959

6060
This command gets all site links that include NorthAmerica.
6161

6262
### Example 3: Get filtered replication site links
6363
```
64-
PS C:\> Get-ADReplicationSiteLink -Filter {Cost -gt 100 -and ReplicationFrequencyInMinutes -lt 15}
64+
PS C:\> Get-ADReplicationSiteLink -Filter "Cost -gt 100 -and ReplicationFrequencyInMinutes -lt 15"
6565
```
6666

6767
This command gets all site links that have a cost greater than 100 and a replication frequency less than 15 minutes.

docset/windows/addsadministration/Get-ADReplicationSiteLinkBridge.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ This command gets all of the site link bridges.
5353

5454
### Example 2: Get a filtered list of site link bridges
5555
```
56-
PS C:\> Get-ADReplicationSiteLinkBridge -Filter {SiteLinksIncluded -eq "NorthAmerica-Europe"} | FT Name,SiteLinksIncluded -A
56+
PS C:\> Get-ADReplicationSiteLinkBridge -Filter "SiteLinksIncluded -eq 'NorthAmerica-Europe'" | FT Name,SiteLinksIncluded -A
5757
```
5858

5959
This command gets all site link bridges that include the site link NorthAmerica-Europe.

docset/windows/addsadministration/Get-ADReplicationSubnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ This command gets all of the subnets.
5555

5656
### Example 2: Get subnets in a specified location
5757
```
58-
PS C:\> Get-ADReplicationSubnet -Filter {Location -like "*Japan"}
58+
PS C:\> Get-ADReplicationSubnet -Filter "Location -like '*Japan'"
5959
```
6060

6161
This command gets all the subnets in Japan.

docset/windows/addsadministration/Get-ADResourceProperty.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The **Get-ADResourceProperty** cmdlet gets one or more resource properties.
5252

5353
### Example 1: Get filtered resource properties
5454
```
55-
PS C:\> Get-ADResourceProperty -Filter {SharesValuesWith -eq 'Country'}
55+
PS C:\> Get-ADResourceProperty -Filter "SharesValuesWith -eq 'Country'"
5656
```
5757

5858
This command gets all the resource properties that refer to the claim type named Country for their suggested values.

docset/windows/addsadministration/Get-ADResourcePropertyList.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ This command gets a list of all resource property lists.
5959

6060
### Example 2: Get all resource property lists with a specified property
6161
```
62-
PS C:\> Get-ADResourcePropertyList -Filter {Members -eq 'Country'}
62+
PS C:\> Get-ADResourcePropertyList -Filter "Members -eq 'Country'"
6363
```
6464

6565
This command gets all resource property lists that include the resource property Country.

docset/windows/addsadministration/Get-ADResourcePropertyValueType.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ This command gets the names of all resource property value types.
5858

5959
### Example 2: Get resource property value types for specified resource properties
6060
```
61-
PS C:\> Get-ADResourcePropertyValueType -Filter {ResourceProperties -eq 'Country' -or ResourceProperties -eq 'Authors'}
61+
PS C:\> Get-ADResourcePropertyValueType -Filter "ResourceProperties -eq 'Country' -or ResourceProperties -eq 'Authors'"
6262
```
6363

6464
This command gets all resource property value types that the resource properties Country and Authors use.

docset/windows/addsadministration/Get-ADServiceAccount.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ This command gets the managed service account with SID S-1-5-21-159507390-298035
9898

9999
### Example 3: Get a filtered list of managed service accounts
100100
```
101-
PS C:\> Get-ADServiceAccount -Filter {HostComputers -eq "CN=SQL-Server-1, DC=contoso,DC=com" }
101+
PS C:\> Get-ADServiceAccount -Filter "HostComputers -eq 'CN=SQL-Server-1, DC=contoso,DC=com'"
102102
Enabled : True
103103
Name : service1
104104
UserPrincipalName :

docset/windows/addsadministration/Get-ADTrust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ This command gets all of the trusted domain objects in the forest.
6363

6464
### Example 2: Get filtered trusted domain objects
6565
```
66-
PS C:\> Get-ADTrust -Filter {Target -eq "corp.contoso.com"}
66+
PS C:\> Get-ADTrust -Filter "Target -eq 'corp.contoso.com'"
6767
```
6868

6969
This command gets all the trusted domain objects with corp.contoso.com as the trust partner.

docset/windows/addsadministration/Get-ADUser.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,7 @@ This command gets all of the properties of the user with the SAM account name Ch
102102

103103
### Example 4: Get a specified user
104104
```
105-
PS C:\> Get-ADUser -Filter {Name -eq "ChewDavid"} -SearchBase "DC=AppNC" -Properties "mail" -Server lds.Fabrikam.com:50000
105+
PS C:\> Get-ADUser -Filter "Name -eq 'ChewDavid'" -SearchBase "DC=AppNC" -Properties "mail" -Server lds.Fabrikam.com:50000
106106
```
107107

108108
This command gets the user with name ChewDavid in the Active Directory Lightweight Directory Services (AD LDS) instance.
@@ -187,7 +187,7 @@ The following syntax uses Backus-Naur form to show how to use the PowerShell Exp
187187

188188
For a list of supported types for \<value\>, type `Get-Help about_ActiveDirectory_ObjectModel`.
189189

190-
Note: For String parameter type, PowerShell will cast the filter query to a string while processing the command. When using a string variable as a value in the filter component, make sure that it complies with the [PowerShell Quoting Rules](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/about/about_quoting_rules). For example, if the filter expression is double-quoted, the variable should be enclosed using single quotation marks: **Get-ADUser -Filter "Name -like '$UserName'"**. On the contrary, if curly braces are used to enclose the filter, the variable should not be quoted at all: **Get-ADUser -Filter {Name -like $UserName}**.
190+
Note: For String parameter type, PowerShell will cast the filter query to a string while processing the command. When using a string variable as a value in the filter component, make sure that it complies with the [PowerShell Quoting Rules](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/about/about_quoting_rules). For example, if the filter expression is double-quoted, the variable should be enclosed using single quotation marks: **Get-ADUser -Filter "Name -like '$UserName'"**. On the contrary, if curly braces are used to enclose the filter, the variable should not be quoted at all: **Get-ADUser -Filter "Name -like '$UserName'"**.
191191

192192
Note: PowerShell wildcards other than \*, such as ?, are not supported by the *Filter* syntax.
193193

docset/windows/addsadministration/Install-ADServiceAccount.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ If a group managed service account is used, the service account must have the **
5959

6060
### Example 2: Get a managed service account and install it on the local computer
6161
```
62-
PS C:\> $Account = Get-ADServiceAccount -Filter { Name -eq 'SQL-HR-svc-01'}
62+
PS C:\> $Account = Get-ADServiceAccount -Filter "Name -eq 'SQL-HR-svc-01'"
6363
PS C:\> Install-ADServiceAccount $Account
6464
```
6565

docset/windows/addsadministration/Move-ADDirectoryServer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ This command moves the domain controller USER01-DC2 to the site Branch-Office-Si
5959

6060
### Example 2: Move read-only domain controllers to an existing site
6161
```
62-
PS C:\> Get-ADDomainController -Filter {IsReadOnly -eq $True} | Move-ADDirectoryServer -Site "RODC-Site-Name"
62+
PS C:\> Get-ADDomainController -Filter "IsReadOnly -eq `$True" | Move-ADDirectoryServer -Site "RODC-Site-Name"
6363
```
6464

6565
This command moves all Read-Only domain controllers to the site RODC-Site-Name.

docset/windows/addsadministration/Remove-ADCentralAccessPolicyMember.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ This command removes the central access rules named Finance Documents Rule and C
5252

5353
### Example 3: Get central access policies using a filter then remove specified central access rules from those policies
5454
```
55-
PS C:\> Get-ADCentralAccessPolicy -Filter { Name -like "Corporate*" } | Remove-ADCentralAccessPolicyMember -Members "Finance Documents Rule","Corporate Documents Rule"
55+
PS C:\> Get-ADCentralAccessPolicy -Filter "Name -like 'Corporate*'" | Remove-ADCentralAccessPolicyMember -Members "Finance Documents Rule","Corporate Documents Rule"
5656
```
5757

5858
This command gets the central access policies that begin with Corporate in its name, and then pipes that result to the **Remove-ADCentralAccessPolicyMember**, which then removes the central access rules named Finance Documents Rule and Corporate Documents Rule from the policies.

docset/windows/addsadministration/Remove-ADCentralAccessRule.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ This command removes the specified central access rule, Finance Documents Rule.
4444

4545
### Example 2: Remove all central access rules using a filter
4646
```
47-
PS C:\> Get-ADCentralAccessRule -Filter { ResourceCondition -like "*Department*" } | Remove-ADCentralAccessRule
47+
PS C:\> Get-ADCentralAccessRule -Filter "ResourceCondition -like '*Department*'" | Remove-ADCentralAccessRule
4848
```
4949

5050
This command removes the central access rules with Department in their resource conditions.

docset/windows/addsadministration/Remove-ADClaimTransformPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ This command removes the claims transformation policy with the name DenyAllPolic
4444

4545
### Example 2: Get all claims transformation policies using a filter then remove them
4646
```
47-
PS C:\> Get-ADClaimTransformPolicy -Filter {Description -eq "For testing only."} | Remove-ADClaimTransformPolicy
47+
PS C:\> Get-ADClaimTransformPolicy -Filter "Description -eq 'For testing only.'" | Remove-ADClaimTransformPolicy
4848
```
4949

5050
This command gets all claims transformation policies that were marked in their description as for testing only and removes them.

docset/windows/addsadministration/Remove-ADClaimType.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ This command removes the claim type with the name Title.
4444

4545
### Example 2: Get all disabled claim types and remove them
4646
```
47-
PS C:\> Get-ADClaimType -Filter { Enabled -eq $FALSE } | Remove-ADClaimType
47+
PS C:\> Get-ADClaimType -Filter "Enabled -eq `$False" | Remove-ADClaimType
4848
```
4949

5050
This command gets all the disabled claim types and remove them.

docset/windows/addsadministration/Remove-ADFineGrainedPasswordPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ This command removes the fine-grained password policy object with DistinguishedN
5656

5757
### Example 3: Remove fine-grained password policy objects that contains a specified string
5858
```
59-
PS C:\> Get-ADFineGrainedPasswordPolicy -Filter {Name -like "*user*"} | Remove-ADFineGrainedPasswordPolicy
59+
PS C:\> Get-ADFineGrainedPasswordPolicy -Filter "Name -like '*user*'" | Remove-ADFineGrainedPasswordPolicy
6060
```
6161

6262
This command removes all fine-grained password policy objects that contain user in their names.

docset/windows/addsadministration/Remove-ADReplicationSite.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ This command removes the site with name Europe.
4646

4747
### Example 2: Get filtered replication sites and remove them
4848
```
49-
PS C:\> Get-ADReplicationSite -Filter {Description -eq "For testing only."} | Remove-ADReplicationSite
49+
PS C:\> Get-ADReplicationSite -Filter "Description -eq 'For testing only.'" | Remove-ADReplicationSite
5050
```
5151

5252
This command gets the sites that are for testing only and removes them.

docset/windows/addsadministration/Remove-ADReplicationSiteLink.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This command removes the site link with the name Europe-Asia.
4545

4646
### Example 2: Get a filtered list of replication site links and remove them
4747
```
48-
PS C:\> Get-ADReplicationSiteLink -Filter {SitesIncluded -eq "NorthAmerica"} | Remove-ADReplicationSiteLink
48+
PS C:\> Get-ADReplicationSiteLink -Filter "SitesIncluded -eq 'NorthAmerica'" | Remove-ADReplicationSiteLink
4949
```
5050

5151
This command gets the site links that include NorthAmerica and removes them.

docset/windows/addsadministration/Remove-ADReplicationSiteLinkBridge.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ This command removes the site link bridge named NorthAmerica-Asia.
4646

4747
### Example 2: Remove a filtered list of site link bridges
4848
```
49-
PS C:\> Get-ADReplicationSiteLinkBridge -Filter {SiteLinksIncluded -eq "Europe-Asia"} | Remove-ADReplicationSiteLinkBridge
49+
PS C:\> Get-ADReplicationSiteLinkBridge -Filter "SiteLinksIncluded -eq 'Europe-Asia'" | Remove-ADReplicationSiteLinkBridge
5050
```
5151

5252
This command gets the site link bridges that include Europe-Asia and removes them.

docset/windows/addsadministration/Remove-ADReplicationSubnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ This cmdlet removes the subnet identified as 10.0.0.0/25.
4848

4949
### Example 3: Remove a filtered list of subnets
5050
```
51-
PS C:\> Get-ADReplicationSubnet -Filter {Location -like "*Japan"} | Remove-ADReplicationSubnet
51+
PS C:\> Get-ADReplicationSubnet -Filter "Location -like '*Japan'" | Remove-ADReplicationSubnet
5252
```
5353

5454
This command gets all the subnets in Japan and removes them.

0 commit comments

Comments
 (0)