Skip to content

Commit 9749959

Browse files
authored
Rename image folders (MicrosoftDocs#5511)
* Rename image folders * update image link * Update Infographic
1 parent 0b18215 commit 9749959

File tree

95 files changed

+577
-462
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

95 files changed

+577
-462
lines changed

assets/PowerShell_7_Infographic.pdf

448 KB
Binary file not shown.

reference/docs-conceptual/components/vscode/How-To-Replicate-the-ISE-Experience-In-VSCode.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Select "PowerShell: Enable ISE Mode" from the list.
2828
This command will apply a lot of the settings found in this document automatically.
2929
The result looks like this:
3030

31-
![ISE Mode](images/How-To-Replicate-the-ISE-Experience-In-VSCode/3-ise-mode.png)
31+
![ISE Mode](media/How-To-Replicate-the-ISE-Experience-In-VSCode/3-ise-mode.png)
3232

3333
The rest of this article includes more detailed information on settings in ISE Mode and
3434
some additional settings.
@@ -60,11 +60,11 @@ If you're looking to simplify the Visual Studio Code UI to look more closely to
6060
6161
This will hide the "Activity Bar" and the "Debug Side Bar" sections below inside of the red box:
6262

63-
![highlighted section includes Activity Bar and Debug Side Bar](images/How-To-Replicate-the-ISE-Experience-In-VSCode/1-highlighted-sidebar.png)
63+
![highlighted section includes Activity Bar and Debug Side Bar](media/How-To-Replicate-the-ISE-Experience-In-VSCode/1-highlighted-sidebar.png)
6464

6565
The end result looks like this:
6666

67-
![Simplified view of VS Code](images/How-To-Replicate-the-ISE-Experience-In-VSCode/2-simplified-ui.png)
67+
![Simplified view of VS Code](media/How-To-Replicate-the-ISE-Experience-In-VSCode/2-simplified-ui.png)
6868

6969
## Tab completion
7070

reference/docs-conceptual/components/vscode/Using-VSCode-for-Remote-Editing-and-Debugging.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ With the PowerShell extension for VSCode started and the PowerShell Integrated C
3939
can type `Open-EditorFile foo.ps1` or `psedit foo.ps1` to open the local foo.ps1 file right in the
4040
editor.
4141

42-
![Open-EditorFile foo.ps1 works locally](images/Using-VSCode-for-Remote-Editing-and-Debugging/1-open-local-file.png)
42+
![Open-EditorFile foo.ps1 works locally](media/Using-VSCode-for-Remote-Editing-and-Debugging/1-open-local-file.png)
4343

4444
>[!NOTE]
4545
> The file `foo.ps1` must already exist.
@@ -48,11 +48,11 @@ From there, we can:
4848

4949
- Add breakpoints to the gutter
5050

51-
![adding breakpoint to gutter](images/Using-VSCode-for-Remote-Editing-and-Debugging/2-adding-breakpoint-gutter.png)
51+
![adding breakpoint to gutter](media/Using-VSCode-for-Remote-Editing-and-Debugging/2-adding-breakpoint-gutter.png)
5252

5353
- Hit F5 to debug the PowerShell script.
5454

55-
![debugging the PowerShell local script](images/Using-VSCode-for-Remote-Editing-and-Debugging/3-local-debug.png)
55+
![debugging the PowerShell local script](media/Using-VSCode-for-Remote-Editing-and-Debugging/3-local-debug.png)
5656

5757
While debugging, you can interact with the debug console, check out the variables in the scope on
5858
the left, and all the other standard debugging tools.
@@ -77,20 +77,20 @@ Since we are going from macOS to an Ubuntu VM in Azure, we are using SSH for rem
7777
First, in the Integrated Console, run `Enter-PSSession`. You're connected to the remote session
7878
when `[<hostname>]` shows up to the left of your prompt.
7979

80-
![The call to Enter-PSSession](images/Using-VSCode-for-Remote-Editing-and-Debugging/4-enter-pssession.png)
80+
![The call to Enter-PSSession](media/Using-VSCode-for-Remote-Editing-and-Debugging/4-enter-pssession.png)
8181

8282
Now, we can do the same steps as if we are editing a local script.
8383

8484
1. Run `Open-EditorFile test.ps1` or `psedit test.ps1` to open the remote `test.ps1` file
8585

86-
![Open-EditorFile the test.ps1 file](images/Using-VSCode-for-Remote-Editing-and-Debugging/5-open-remote-file.png)
86+
![Open-EditorFile the test.ps1 file](media/Using-VSCode-for-Remote-Editing-and-Debugging/5-open-remote-file.png)
8787

8888
1. Edit the file/set breakpoints
8989

90-
![edit and set breakpoints](images/Using-VSCode-for-Remote-Editing-and-Debugging/6-set-breakpoints.png)
90+
![edit and set breakpoints](media/Using-VSCode-for-Remote-Editing-and-Debugging/6-set-breakpoints.png)
9191

9292
1. Start debugging (F5) the remote file
9393

94-
![debugging the remote file](images/Using-VSCode-for-Remote-Editing-and-Debugging/7-start-debugging.png)
94+
![debugging the remote file](media/Using-VSCode-for-Remote-Editing-and-Debugging/7-start-debugging.png)
9595

9696
If you have any problems, you can open issues in the [GitHub repo](https://github.com/powershell/vscode-powershell).

reference/docs-conceptual/components/vscode/using-vscode.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ For traditional Windows PowerShell workloads, see [Installing Windows PowerShell
5555
1. The **Extensions** view opens on the Side Bar. Select the PowerShell extension from Microsoft.
5656
You should see a VSCode screen similar to the following image:
5757

58-
![VSCode](../../images/using-vscode/vscode.png)
58+
![VSCode](media/using-vscode/vscode.png)
5959

6060
1. Click the **Install** button on the PowerShell extension from Microsoft.
6161
1. After the install, you see the **Install** button turns to **Reload**. Click on **Reload**.
Binary file not shown.
Binary file not shown.

reference/docs-conceptual/components/web-access/install-and-use-windows-powershell-web-access.md

+25-18
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ the See Also section.
5050

5151
The following diagram shows how Windows PowerShell Web Access works.
5252

53-
![Windows PowerShell Web Access diagram](images/Windows-PowerShell-Web-Access-diagram.jpg)
53+
![Windows PowerShell Web Access diagram](media/install-and-use-windows-powershell-web-access/Windows-PowerShell-Web-Access-diagram.jpg)
5454

5555
## Requirements for running Windows PowerShell Web Access
5656

@@ -180,8 +180,9 @@ instruct the cmdlet to change the default site container of the web application.
180180
configuration options that are available for web applications, such as changing the port number or
181181
the Secure Sockets Layer (SSL) certificate.
182182

183-
> **![Security Note](images/securitynote.jpeg) Security Note**
184-
> We strongly recommend that administrators configure the gateway to use a valid certificate that has been signed by a CA.
183+
> [!IMPORTANT]
184+
> We strongly recommend that administrators configure the gateway to use a valid certificate that
185+
> has been signed by a CA.
185186
186187
#### To configure the Windows PowerShell Web Access gateway with a test certificate by using Install-PswaWebApplication
187188

@@ -194,7 +195,7 @@ the Secure Sockets Layer (SSL) certificate.
194195

195196
`Install-PswaWebApplication -UseTestCertificate`
196197

197-
> **![Security Note](images/securitynote.jpeg) Security Note**
198+
> [!IMPORTANT]
198199
> The `UseTestCertificate` parameter should only be used in a private test environment. For a
199200
> secure production environment, we recommend using a valid certificate that has been signed by
200201
> a CA.
@@ -221,8 +222,9 @@ the Secure Sockets Layer (SSL) certificate.
221222

222223
> [!NOTE]
223224
> You cannot sign in until users have been granted access to the website by adding authorization
224-
> rules. For more information, see [configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule)
225-
> and [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
225+
> rules. For more information, see
226+
> [configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule) and
227+
> [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
226228
227229
#### To configure the Windows PowerShell Web Access gateway with a genuine certificate by using Install-PswaWebApplication and IIS Manager
228230

@@ -273,8 +275,10 @@ the Secure Sockets Layer (SSL) certificate.
273275

274276
> [!NOTE]
275277
> You cannot sign in until users have been granted access to the website by adding authorization
276-
> rules. For more information, see [Configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule),
277-
> in this topic, and [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
278+
> rules. For more information, see
279+
> [Configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule), in
280+
> this topic, and
281+
> [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
278282
279283
### Configure a restrictive authorization rule
280284

@@ -336,7 +340,8 @@ gateway in IIS Manager.
336340
1. If Server Manager is already open, go on to the next step. If Server Manager is not already
337341
open, open it by doing one of the following.
338342

339-
- On the Windows desktop, start Server Manager by clicking **Server Manager** in the Windows taskbar.
343+
- On the Windows desktop, start Server Manager by clicking **Server Manager** in the Windows
344+
taskbar.
340345
- On the Windows **Start** screen, click **Server Manager**.
341346

342347
2. On the **Manage** menu, click **Add Roles and Features**.
@@ -418,7 +423,7 @@ gateway as a root website.
418423
[To configure an SSL certificate in IIS Manager](#to-configure-an-ssl-certificate-in-iis-manager)
419424
in this topic.
420425

421-
10. ![Security Note](images/SecurityNote.jpeg) Optional security step:
426+
10. Optional security step:
422427

423428
With the website selected in the tree pane, double-click **SSL Settings** in the content pane.
424429
Select **Require SSL**, and then in the **Actions** pane, click **Apply**. Optionally, in the
@@ -536,9 +541,11 @@ gateway as a root website.
536541
`https://<gateway_server_name>`. You should not need to add **/pswa** to the URL.
537542

538543
> [!NOTE]
539-
> You cannot sign in until users have been granted access to the website
540-
> by adding authorization rules. For more information, see [Configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule),
541-
> in this topic, and [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
544+
> You cannot sign in until users have been granted access to the website by adding authorization
545+
> rules. For more information, see
546+
> [Configure a restrictive authorization rule](#configure-a-restrictive-authorization-rule), in
547+
> this topic, and
548+
> [Authorization Rules and Security Features of Windows PowerShell Web Access](authorization-rules-and-security-features-of-windows-powershell-web-access.md).
542549
543550
### Configuring a restrictive authorization rule
544551

@@ -562,7 +569,7 @@ For more detail about Windows PowerShell Web Access authorization rules and secu
562569
- On the Windows **Start** screen, right-click **Windows PowerShell**, and then click
563570
**Run as Administrator**.
564571

565-
1. ![Security Note](images/SecurityNote.jpeg) Optional step for restricting user access by using session configurations:
572+
1. Optional step for restricting user access by using session configurations:
566573

567574
Verify that session configurations that you want to use in your rules already exist. If they
568575
have not yet been created, use instructions for creating session configurations in
@@ -574,7 +581,7 @@ For more detail about Windows PowerShell Web Access authorization rules and secu
574581

575582
This authorization rule allows a specific user access to one computer on the network to which
576583
they typically have access, with access to a specific session configuration that is scoped to
577-
the user's typical scripting and cmdlet needs.
584+
the user'&trade;s typical scripting and cmdlet needs.
578585

579586
In the following example, a user named `JSmith` in the `Contoso` domain is granted access to
580587
manage the computer `Contoso_214`, and use a session configuration named `NewAdminsOnly`.
@@ -611,9 +618,9 @@ valid SSL certificate from a CA.
611618
[GeoTrust](https://www.geotrust.com/). The certificate's common name must match the host header
612619
in the request.
613620

614-
For example, if the client browser requests `http://www.contoso.com/`, then the common name must
615-
also be `http://www.contoso.com/`. This is the most secure and recommended option for providing
616-
the Windows PowerShell Web Access gateway with a certificate.
621+
For example, if the client browser requests `http://www.contoso.com/`, then the common name
622+
must also be `http://www.contoso.com/`. This is the most secure and recommended option for
623+
providing the Windows PowerShell Web Access gateway with a certificate.
617624

618625
- Click **Create a Self-Signed Certificate** to create a certificate that you can use
619626
immediately, and have signed later by a CA if desired. Specify a friendly name for the

0 commit comments

Comments
 (0)