Skip to content

Commit 3657930

Browse files
Merge branch 'master' into processmitigations-v-tishe
2 parents 9721efb + 1975764 commit 3657930

32 files changed

+2436
-142
lines changed

docset/winserver2012r2-ps/wsscmdlets/Set-HostedEmailAccount.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,10 @@ A hosted email service provides a hosted email account.
2626

2727
### Example 1: Assign a hosted email account to a local user account
2828
```
29-
PS C:\> Set-HostedEmailAccount -LocalAccountName "PattiFuller" -EmailAccount "PattiFuller@Constoso.com"
29+
PS C:\> Set-HostedEmailAccount -LocalAccountName "PattiFuller" -EmailAccount "PattiFuller@Contoso.com"
3030
```
3131

32-
This command assigns the hosted email account named PattiFuller@Constoso.com to the local user account named PattiFuller.
32+
This command assigns the hosted email account named PattiFuller@Contoso.com to the local user account named PattiFuller.
3333

3434
## PARAMETERS
3535

docset/winserver2019-ps/defender/Set-MpPreference.md

Lines changed: 31 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: MSFT_MpPreference.cdxml-help.xml
44
Module Name: Defender
5-
ms.date: 06/23/2021
5+
ms.date: 10/05/2021
66
online version: https://docs.microsoft.com/powershell/module/defender/set-mppreference?view=windowsserver2019-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Set-MpPreference
@@ -41,7 +41,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
4141
[-LowThreatDefaultAction <ThreatAction>] [-ModerateThreatDefaultAction <ThreatAction>]
4242
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
4343
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
44-
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-SignaturesUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>]
44+
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>]
4545
```
4646

4747
## DESCRIPTION
@@ -138,6 +138,29 @@ Accept pipeline input: False
138138
Accept wildcard characters: False
139139
```
140140
141+
### -DefinitionUpdatesChannel
142+
Enable this policy to specify when devices receive daily Microsoft Defender security intelligence (definition/signature) updates during the daily gradual rollout.
143+
144+
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
145+
146+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
147+
148+
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
149+
150+
Supported OS versions: Windows 10
151+
152+
Note: This policy is available starting with platform version 4.18.2106.5 and later
153+
154+
```yaml
155+
Type: UpdatesChannelType
156+
Aliases: suc
157+
Accepted values: Staged|Broad|Not Configured
158+
Position: Named
159+
Default value: None
160+
Accept pipeline input: False
161+
Accept wildcard characters: False
162+
```
163+
141164
### -DisableArchiveScanning
142165
Indicates whether to scan archive files, such as .zip and .cab files, for malicious and unwanted software.
143166
If you specify a value of $False or do not specify a value, Windows Defender scans archive files.
@@ -446,6 +469,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad
446469
447470
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
448471
472+
Critical- Time Delay: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only.
473+
449474
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
450475
451476
Supported OS versions: Windows 10
@@ -454,7 +479,7 @@ Note: This policy is available starting with platform version 4.18.2106.5 and la
454479
```yaml
455480
Type: UpdatesChannelType
456481
Aliases: euc
457-
Accepted values:Beta|Preview|Staged|Broad|NotConfigured
482+
Accepted values:Beta|Preview|Staged|Broad|Delayed|NotConfigured
458483
Position: Named
459484
Default value: None
460485
Accept pipeline input: False
@@ -648,6 +673,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad
648673
649674
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
650675
676+
Critical- Time Delay: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only.
677+
651678
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
652679
653680
Supported OS versions: Windows 10
@@ -657,7 +684,7 @@ Note: This policy is available starting with platform version 4.18.2106.5 and la
657684
```yaml
658685
Type: UpdatesChannelType
659686
Aliases: puc
660-
Accepted values: Beta|Preview|Staged|Broad|NotConfigured
687+
Accepted values: Beta|Preview|Staged|Broad|Delayed|NotConfigured
661688
Position: Named
662689
Default value: None
663690
Accept pipeline input: False
@@ -1143,28 +1170,6 @@ Accept pipeline input: False
11431170
Accept wildcard characters: False
11441171
```
11451172
1146-
### -SignaturesUpdatesChannel
1147-
Enable this policy to specify when devices receive daily Microsoft Defender definition updates during the daily gradual rollout.
1148-
1149-
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
1150-
1151-
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
1152-
1153-
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
1154-
1155-
Supported OS versions: Windows 10
1156-
1157-
Note: This policy is available starting with platform version 4.18.2106.5 and later
1158-
1159-
```yaml
1160-
Type: UpdatesChannelType
1161-
Aliases: suc
1162-
Accepted values: Staged|Broad|Not Configured
1163-
Position: Named
1164-
Default value: None
1165-
Accept pipeline input: False
1166-
Accept wildcard characters: False
1167-
```
11681173
11691174
### -SignatureUpdateInterval
11701175
Specifies the interval, in hours, at which to check for definition updates.

docset/winserver2019-ps/storage/Get-StorageAdvancedProperty.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,8 @@ The **Get-StorageAdvancedProperty** cmdlet gets the advanced properties of a sto
2424
For example, Get-PhysicalDisk gets the most commonly used attributes of a physical disk such as **CanPool**.
2525
To get the cache (**IsDeviceCacheEnabled**) and power protection (**IsPowerProtected**) settings for a physical disk, you can pass a **PhysicalDisk** object to the **Get-StorageAdvancedProperty** cmdlet.
2626

27+
The output of the cache (**IsDeviceCacheEnabled**) and power protection (**IsPowerProtected**) are collected from the user-defined settings of the physical disk. Power protection (**IsPowerProtected**) is not an indicator of the physical disk support for power loss protection (PLP). Refer to the physical disk vendor’s datasheet for PLP support details.
28+
2729
## EXAMPLES
2830

2931
### Example 1: Get advanced storage properties of a physical disk
@@ -82,4 +84,3 @@ The cmdlet gets the advanced properties for **PhysicalDisk** objects: **IsPowerP
8284
## RELATED LINKS
8385
8486
[Get-PhysicalDisk](./Get-PhysicalDisk.md)
85-

docset/winserver2022-ps/defender/Add-MpPreference.md

Lines changed: 111 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
2+
description: The Add-MpPreference cmdlet modifies settings for Windows Defender.
33
external help file: MSFT_MpPreference.cdxml-help.xml
44
Module Name: Defender
55
ms.date: 12/20/2016
@@ -17,8 +17,11 @@ Modifies settings for Windows Defender.
1717

1818
```
1919
Add-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-ExclusionProcess <String[]>]
20-
[-ThreatIDDefaultAction_Ids <Int64[]>] [-ThreatIDDefaultAction_Actions <ThreatAction[]>] [-Force]
21-
[-CimSession <CimSession[]>] [-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>]
20+
[-ExclusionIpAddress <String[]>] [-ThreatIDDefaultAction_Ids <Int64[]>]
21+
[-ThreatIDDefaultAction_Actions <ThreatAction[]>] [-AttackSurfaceReductionOnlyExclusions <String[]>]
22+
[-ControlledFolderAccessAllowedApplications <String[]>] [-ControlledFolderAccessProtectedFolders <String[]>]
23+
[-AttackSurfaceReductionRules_Ids <String[]>] [-AttackSurfaceReductionRules_Actions <ASRRuleActionType[]>]
24+
[-Force] [-CimSession <CimSession[]>] [-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>]
2225
```
2326

2427
## DESCRIPTION
@@ -28,13 +31,20 @@ Use this cmdlet to add exclusions for file name extensions, paths, and processes
2831
## EXAMPLES
2932

3033
### Example 1: Add a folder to the exclusion list
31-
```
32-
PS C:\> Add-MpPreference -ExclusionPath "C:\Temp"
34+
```powershell
35+
Add-MpPreference -ExclusionPath "C:\Temp"
3336
```
3437

3538
This command adds the folder C:\Temp to the exclusion list.
3639
The command disables Windows Defender scheduled and real-time scanning for files in this folder.
3740

41+
### Example 2: Allow an application to access folders
42+
```powershell
43+
Add-MpPreference -ControlledFolderAccessAllowedApplications "c:\apps\test.exe"
44+
```
45+
46+
This command allows the specified application to make changes in controlled folders.
47+
3848
## PARAMETERS
3949

4050
### -AsJob
@@ -59,6 +69,57 @@ Accept pipeline input: False
5969
Accept wildcard characters: False
6070
```
6171
72+
### -AttackSurfaceReductionOnlyExclusions
73+
Specifies the files and paths to exclude from Attack Surface Reduction (ASR) rules. Specify the folders or files and resources that should be excluded from ASR rules. Enter a folder path or a fully qualified resource name. For example, ""C:\Windows"" will exclude all files in that directory. ""C:\Windows\App.exe"" will exclude only that specific file in that specific folder.
74+
75+
For more information about excluding files and folders from [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules).
76+
77+
```yaml
78+
Type: String[]
79+
Parameter Sets: (All)
80+
Aliases:
81+
82+
Required: False
83+
Position: Named
84+
Default value: None
85+
Accept pipeline input: False
86+
Accept wildcard characters: False
87+
```
88+
89+
### -AttackSurfaceReductionRules_Actions
90+
Specifies the states of attack surface reduction rules specified by using the **AttackSurfaceReductionRules_Ids** parameter.
91+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
92+
93+
```yaml
94+
Type: ASRRuleActionType[]
95+
Parameter Sets: (All)
96+
Aliases:
97+
98+
Required: False
99+
Position: Named
100+
Default value: None
101+
Accept pipeline input: False
102+
Accept wildcard characters: False
103+
```
104+
105+
### -AttackSurfaceReductionRules_Ids
106+
Specifies the IDs of attack surface reduction rules.
107+
Use the **AttackSurfaceReductionRules_Actions** parameter to specify the state for each rule.
108+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
109+
110+
111+
```yaml
112+
Type: String[]
113+
Parameter Sets: (All)
114+
Aliases:
115+
116+
Required: False
117+
Position: Named
118+
Default value: None
119+
Accept pipeline input: False
120+
Accept wildcard characters: False
121+
```
122+
62123
### -CimSession
63124
Runs the cmdlet in a remote session or on a remote computer.
64125
Enter a computer name or a session object, such as the output of a [New-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227967) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
@@ -76,10 +137,55 @@ Accept pipeline input: False
76137
Accept wildcard characters: False
77138
```
78139
140+
### -ControlledFolderAccessAllowedApplications
141+
Specifies applications that can make changes in controlled folders.
142+
143+
```yaml
144+
Type: String[]
145+
Parameter Sets: (All)
146+
Aliases:
147+
148+
Required: False
149+
Position: Named
150+
Default value: None
151+
Accept pipeline input: False
152+
Accept wildcard characters: False
153+
```
154+
155+
### -ControlledFolderAccessProtectedFolders
156+
Specifies more folders to protect.
157+
158+
```yaml
159+
Type: String[]
160+
Parameter Sets: (All)
161+
Aliases:
162+
163+
Required: False
164+
Position: Named
165+
Default value: None
166+
Accept pipeline input: False
167+
Accept wildcard characters: False
168+
```
169+
79170
### -ExclusionExtension
80171
Specifies an array of file name extensions, such as obj or lib, to exclude from scheduled, custom, and real-time scanning.
81172
This cmdlet adds these file name extensions to the exclusions.
82173
174+
```yaml
175+
Type: String[]
176+
Parameter Sets: (All)
177+
Aliases:
178+
179+
Required: False
180+
Position: Named
181+
Default value: None
182+
Accept pipeline input: False
183+
Accept wildcard characters: False
184+
```
185+
186+
### -ExclusionIpAddress
187+
Specifies an array of IP addresses to exclude from scheduled and real-time scanning.
188+
83189
```yaml
84190
Type: String[]
85191
Parameter Sets: (All)

0 commit comments

Comments
 (0)