You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This setting disables the gathering and send of performance telemetry from Network Protection.
620
+
The accepted values are 0 and 1
621
+
1- Network protection telemetry is disabled.
622
+
0 (Default)- Network protection telemetry is enabled.
623
+
624
+
```yaml
625
+
Type: Boolean
626
+
Parameter Sets: (All)
627
+
Aliases: dnpp
628
+
629
+
Required: False
630
+
Position: Named
631
+
Default value: 0
632
+
Accept pipeline input: False
633
+
Accept wildcard characters: False
634
+
```
635
+
616
636
### -DisablePrivacyMode
617
637
**This is a legacy setting that does not have any affect on current platforms**. The intent of this parameter was to disable privacy mode, which prevented users, other than administrators, from displaying threat history. When this parameter was in use, if you specified a value of $False or did not specify a value, privacy mode was enabled.
618
638
@@ -754,6 +774,24 @@ Accept pipeline input: False
754
774
Accept wildcard characters: False
755
775
```
756
776
777
+
### -DisableSmtpParsing
778
+
This setting disables SMTP Parsing for Network Protection.
779
+
The accepted values are 0 and 1
780
+
1- SMTP parsing is disabled.
781
+
0 (Default)- SMTP parsing is enabled.
782
+
783
+
```yaml
784
+
Type: Boolean
785
+
Parameter Sets: (All)
786
+
Aliases: dsp
787
+
788
+
Required: False
789
+
Position: Named
790
+
Default value: 0
791
+
Accept pipeline input: False
792
+
Accept wildcard characters: False
793
+
```
794
+
757
795
### -DisableTlsParsing
758
796
Specifies whether to disable inspection of TLS traffic.
759
797
Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, network protection inspects TLS traffic.
This policy setting configures the Intel TDT integration level for Intel TDT-capable devices.
1045
+
The acceptable values for this parameter are:
1046
+
1047
+
- 0 (Default) - If you don't configure this setting, the default value will be applied. The default value is controlled by Microsoft security intelligence updates. Microsoft will enable Intel TDT if there is a known threat.
1048
+
- 1 - If you configure this setting to enabled, Intel TDT integration will turn on.
1049
+
- 2 - If you configure this setting to disabled, Intel TDT integration will turn off.
1050
+
1051
+
```yaml
1052
+
Type: UInt32
1053
+
Parameter Sets: (All)
1054
+
Aliases: itdte
1055
+
Accepted values: 0,1 and 2
1056
+
1057
+
Required: False
1058
+
Position: Named
1059
+
Default value: 0
1060
+
Accept pipeline input: False
1061
+
Accept wildcard characters: False
1062
+
```
1063
+
1005
1064
### -LowThreatDefaultAction
1006
1065
Specifies which automatic remediation action to take for a low level threat.
A CPU usage limit can be applied to scheduled scans only, or to scheduled and custom scans. The default value applies a CPU usage limit to scheduled scans only.
1948
+
The acceptable values for this parameter are:
1949
+
1950
+
1 (Default) - If you enable this setting, CPU throttling will apply only to scheduled scans.
1951
+
0- If you disable this setting, CPU throttling will apply to scheduled and custom scans.
1952
+
1953
+
1954
+
```yaml
1955
+
Type: Boolean
1956
+
Parameter Sets: (All)
1957
+
Aliases:
1958
+
1959
+
Required: False
1960
+
Position: Named
1961
+
Default value: 1
1962
+
Accept pipeline input: False
1963
+
Accept wildcard characters: False
1964
+
```
1965
+
1966
+
1887
1967
### -UILockdown
1888
1968
Indicates whether to disable UI lockdown mode.
1889
1969
If you specify a value of $True, Windows Defender disables UI lockdown mode.
0 commit comments