Skip to content

Commit 1b13821

Browse files
authored
Update Set-MpPreference.md
Updated DisableNetworkProtectionPerfTelemetry, DisableSmtpParsing, IntelTDTEnabled and ThrottleForScheduledScanOnly Fixes MicrosoftDocs#3504 Fixes MicrosoftDocs#3505 Fixes MicrosoftDocs#3506 Fixes MicrosoftDocs#3508
1 parent f8d6932 commit 1b13821

File tree

1 file changed

+81
-1
lines changed

1 file changed

+81
-1
lines changed

docset/winserver2022-ps/defender/Set-MpPreference.md

Lines changed: 81 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Configures preferences for Windows Defender scans and updates.
1919
```powershell
2020
Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-ExclusionProcess <String[]>]
2121
[-ExclusionIpAddress <String[]>] [-RealTimeScanDirection <ScanDirection>]
22+
[-IntelTDTEnabled <UInt32>]
2223
[-QuarantinePurgeItemsAfterDelay <UInt32>] [-RemediationScheduleDay <Day>]
2324
[-RemediationScheduleTime <DateTime>] [-ReportingAdditionalActionTimeOut <UInt32>]
2425
[-ReportingCriticalFailureTimeOut <UInt32>] [-ReportingNonCriticalTimeOut <UInt32>]
@@ -57,8 +58,9 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
5758
[-ProxyServer <String>] [-ProxyBypass <String[]>] [-ForceUseProxyOnly <Boolean>]
5859
[-OobeEnableRtpAndSigUpdate <Boolean>]
5960
[-DisableTlsParsing <Boolean>] [-DisableHttpParsing <Boolean>] [-DisableDnsParsing <Boolean>]
60-
[-DisableFtpParsing <Boolean>]
61+
[-DisableFtpParsing <Boolean>] [-DisableSmtpParsing <Boolean>]
6162
[-DisableDnsOverTcpParsing <Boolean>] [-DisableSshParsing <Boolean>]
63+
[-DisableNetworkProtectionPerfTelemetry <Boolean>]
6264
[-PlatformUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>]
6365
[-SignaturesUpdatesChannel <UpdatesChannelType>] [-DisableGradualRelease <Boolean>]
6466
[-AllowNetworkProtectionDownLevel <Boolean>] [-AllowDatagramProcessingOnWinServer <Boolean>]
@@ -613,6 +615,24 @@ Accept pipeline input: False
613615
Accept wildcard characters: False
614616
```
615617

618+
### -DisableNetworkProtectionPerfTelemetry
619+
This setting disables the gathering and send of performance telemetry from Network Protection.
620+
The accepted values are 0 and 1
621+
1- Network protection telemetry is disabled.
622+
0 (Default)- Network protection telemetry is enabled.
623+
624+
```yaml
625+
Type: Boolean
626+
Parameter Sets: (All)
627+
Aliases: dnpp
628+
629+
Required: False
630+
Position: Named
631+
Default value: 0
632+
Accept pipeline input: False
633+
Accept wildcard characters: False
634+
```
635+
616636
### -DisablePrivacyMode
617637
**This is a legacy setting that does not have any affect on current platforms**. The intent of this parameter was to disable privacy mode, which prevented users, other than administrators, from displaying threat history. When this parameter was in use, if you specified a value of $False or did not specify a value, privacy mode was enabled.
618638

@@ -754,6 +774,24 @@ Accept pipeline input: False
754774
Accept wildcard characters: False
755775
```
756776

777+
### -DisableSmtpParsing
778+
This setting disables SMTP Parsing for Network Protection.
779+
The accepted values are 0 and 1
780+
1- SMTP parsing is disabled.
781+
0 (Default)- SMTP parsing is enabled.
782+
783+
```yaml
784+
Type: Boolean
785+
Parameter Sets: (All)
786+
Aliases: dsp
787+
788+
Required: False
789+
Position: Named
790+
Default value: 0
791+
Accept pipeline input: False
792+
Accept wildcard characters: False
793+
```
794+
757795
### -DisableTlsParsing
758796
Specifies whether to disable inspection of TLS traffic.
759797
Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, network protection inspects TLS traffic.
@@ -1002,6 +1040,27 @@ Accept pipeline input: False
10021040
Accept wildcard characters: False
10031041
```
10041042

1043+
### -IntelTDTEnabled
1044+
This policy setting configures the Intel TDT integration level for Intel TDT-capable devices.
1045+
The acceptable values for this parameter are:
1046+
1047+
- 0 (Default) - If you don't configure this setting, the default value will be applied. The default value is controlled by Microsoft security intelligence updates. Microsoft will enable Intel TDT if there is a known threat.
1048+
- 1 - If you configure this setting to enabled, Intel TDT integration will turn on.
1049+
- 2 - If you configure this setting to disabled, Intel TDT integration will turn off.
1050+
1051+
```yaml
1052+
Type: UInt32
1053+
Parameter Sets: (All)
1054+
Aliases: itdte
1055+
Accepted values: 0,1 and 2
1056+
1057+
Required: False
1058+
Position: Named
1059+
Default value: 0
1060+
Accept pipeline input: False
1061+
Accept wildcard characters: False
1062+
```
1063+
10051064
### -LowThreatDefaultAction
10061065
Specifies which automatic remediation action to take for a low level threat.
10071066
The acceptable values for this parameter are:
@@ -1884,6 +1943,27 @@ Accept pipeline input: False
18841943
Accept wildcard characters: False
18851944
```
18861945

1946+
### -ThrottleForScheduledScanOnly
1947+
A CPU usage limit can be applied to scheduled scans only, or to scheduled and custom scans. The default value applies a CPU usage limit to scheduled scans only.
1948+
The acceptable values for this parameter are:
1949+
1950+
1 (Default) - If you enable this setting, CPU throttling will apply only to scheduled scans.
1951+
0- If you disable this setting, CPU throttling will apply to scheduled and custom scans.
1952+
1953+
1954+
```yaml
1955+
Type: Boolean
1956+
Parameter Sets: (All)
1957+
Aliases:
1958+
1959+
Required: False
1960+
Position: Named
1961+
Default value: 1
1962+
Accept pipeline input: False
1963+
Accept wildcard characters: False
1964+
```
1965+
1966+
18871967
### -UILockdown
18881968
Indicates whether to disable UI lockdown mode.
18891969
If you specify a value of $True, Windows Defender disables UI lockdown mode.

0 commit comments

Comments
 (0)