Skip to content

Commit

Permalink
Merge pull request #11218 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
6/26/2024 PM Publish
  • Loading branch information
Taojunshen committed Jun 26, 2024
2 parents 836212d + 286bf9d commit 4c065b0
Show file tree
Hide file tree
Showing 5 changed files with 11 additions and 10 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -143,7 +143,7 @@ the function receives.
The automatic variable `$_` or `$PSItem` contains the current object in the
pipeline for use in the `process` block. The `$input` automatic variable
contains an enumerator that's only available to functions and script blocks.
For more information, see [about_Automatic_Variables][15].
For more information, see [about_Automatic_Variables][05].

- Calling the function at the beginning, or outside of a pipeline, executes the
`process` block once.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -143,7 +143,7 @@ the function receives.
The automatic variable `$_` or `$PSItem` contains the current object in the
pipeline for use in the `process` block. The `$input` automatic variable
contains an enumerator that's only available to functions and script blocks.
For more information, see [about_Automatic_Variables][15].
For more information, see [about_Automatic_Variables][05].

- Calling the function at the beginning, or outside of a pipeline, executes the
`process` block once.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
description: Describes how to create and use functions in PowerShell.
Locale: en-US
ms.date: 06/10/2024
ms.date: 06/26/2024
online version: https://learn.microsoft.com/powershell/module/microsoft.powershell.core/about/about_functions?view=powershell-7.4&WT.mc_id=ps-gethelp
schema: 2.0.0
title: about Functions
Expand Down Expand Up @@ -146,7 +146,7 @@ the function receives.
The automatic variable `$_` or `$PSItem` contains the current object in the
pipeline for use in the `process` block. The `$input` automatic variable
contains an enumerator that's only available to functions and script blocks.
For more information, see [about_Automatic_Variables][15].
For more information, see [about_Automatic_Variables][05].

- Calling the function at the beginning, or outside of a pipeline, executes the
`process` block once.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -146,7 +146,7 @@ the function receives.
The automatic variable `$_` or `$PSItem` contains the current object in the
pipeline for use in the `process` block. The `$input` automatic variable
contains an enumerator that's only available to functions and script blocks.
For more information, see [about_Automatic_Variables][15].
For more information, see [about_Automatic_Variables][05].

- Calling the function at the beginning, or outside of a pipeline, executes the
`process` block once.
Expand Down
11 changes: 6 additions & 5 deletions reference/docs-conceptual/learn/ps101/01-getting-started.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ indicated by the (x86) suffix on the shortcuts.

> [!NOTE]
> Windows 11 only ships as a 64-bit operating system. There is no 32-bit version of Windows 11.
> However, Windows 11 include 32-bit versions of Windows PowerShell and the Windows PowerShell ISE.
> However, Windows 11 includes 32-bit versions of Windows PowerShell and the Windows PowerShell ISE.
You only have two shortcuts if you're running an older 32-bit version of Windows. Those shortcuts
don't have the (x86) suffix but are 32-bit versions.
Expand Down Expand Up @@ -130,7 +130,7 @@ taskbar** as shown in Figure 1-6.
> [!IMPORTANT]
> The original version of this book, published in 2017, recommended pinning a shortcut to the
> taskbar to launch an elevated instance automatically every time you start PowerShell. However, due
> to potential security concerns, I no longer recommended it. Any application you launch from an
> to potential security concerns, I no longer recommend it. Any applications you launch from an
> elevated instance of PowerShell also bypass UAC and run elevated. For example, if you launch a web
> browser from an elevated instance of PowerShell, any website you visit containing malicious code
> also runs elevated.
Expand Down Expand Up @@ -265,9 +265,10 @@ the command. Notice the error message tells you why the command failed:
To enable the execution of scripts, change the execution policy with the `Set-ExecutionPolicy`
cmdlet. `LocalMachine` is the default scope when you don't specify the **Scope** parameter. You must
run PowerShell elevated as an administrator to change the execution policy for the local machine. If
you're signing your scripts, I recommend using the `RemoteSigned` execution policy. `RemoteSigned`
prevents you from running downloaded scripts that aren't signed by a trusted publisher.
run PowerShell elevated as an administrator to change the execution policy for the local machine.
Unless you're signing your scripts, I recommend using the `RemoteSigned` execution policy.
`RemoteSigned` prevents you from running downloaded scripts that aren't signed by a trusted
publisher.

Before you change the execution policy, read the [about_Execution_Policies][execution-policies] help
article to understand the security implications.
Expand Down

0 comments on commit 4c065b0

Please sign in to comment.