You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Enable this policy to specify when devices receive daily Microsoft Defender security intelligence (definition/signature) updates during the daily gradual rollout.
143
+
144
+
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
145
+
146
+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
147
+
148
+
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
149
+
150
+
Supported OS versions: Windows 10
151
+
152
+
Note: This policy is available starting with platform version 4.18.2106.5 and later
153
+
154
+
```yaml
155
+
Type: UpdatesChannelType
156
+
Aliases: suc
157
+
Accepted values: Staged|Broad|Not Configured
158
+
Position: Named
159
+
Default value: None
160
+
Accept pipeline input: False
161
+
Accept wildcard characters: False
162
+
```
163
+
141
164
### -DisableArchiveScanning
142
165
Indicates whether to scan archive files, such as .zip and .cab files, for malicious and unwanted software.
143
166
If you specify a value of $False or do not specify a value, Windows Defender scans archive files.
@@ -446,6 +469,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad
446
469
447
470
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
448
471
472
+
Critical- Time Delay: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only.
473
+
449
474
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
450
475
451
476
Supported OS versions: Windows 10
@@ -454,7 +479,7 @@ Note: This policy is available starting with platform version 4.18.2106.5 and la
@@ -648,6 +673,8 @@ Current Channel (Staged): Devices will be offered updates after the monthly grad
648
673
649
674
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
650
675
676
+
Critical- Time Delay: Devices will be offered updates with a 48-hour delay. Suggested for critical environments only.
677
+
651
678
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
652
679
653
680
Supported OS versions: Windows 10
@@ -657,7 +684,7 @@ Note: This policy is available starting with platform version 4.18.2106.5 and la
Enable this policy to specify when devices receive daily Microsoft Defender definition updates during the daily gradual rollout.
1148
-
1149
-
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
1150
-
1151
-
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
1152
-
1153
-
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
1154
-
1155
-
Supported OS versions: Windows 10
1156
-
1157
-
Note: This policy is available starting with platform version 4.18.2106.5 and later
1158
-
1159
-
```yaml
1160
-
Type: UpdatesChannelType
1161
-
Aliases: suc
1162
-
Accepted values: Staged|Broad|Not Configured
1163
-
Position: Named
1164
-
Default value: None
1165
-
Accept pipeline input: False
1166
-
Accept wildcard characters: False
1167
-
```
1168
1173
1169
1174
### -SignatureUpdateInterval
1170
1175
Specifies the interval, in hours, at which to check for definition updates.
Copy file name to clipboardExpand all lines: docset/winserver2019-ps/storage/Get-StorageAdvancedProperty.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,8 @@ The **Get-StorageAdvancedProperty** cmdlet gets the advanced properties of a sto
24
24
For example, Get-PhysicalDisk gets the most commonly used attributes of a physical disk such as **CanPool**.
25
25
To get the cache (**IsDeviceCacheEnabled**) and power protection (**IsPowerProtected**) settings for a physical disk, you can pass a **PhysicalDisk** object to the **Get-StorageAdvancedProperty** cmdlet.
26
26
27
+
The output of the cache (**IsDeviceCacheEnabled**) and power protection (**IsPowerProtected**) are collected from the user-defined settings of the physical disk. Power protection (**IsPowerProtected**) is not an indicator of the physical disk support for power loss protection (PLP). Refer to the physical disk vendor’s datasheet for PLP support details.
28
+
27
29
## EXAMPLES
28
30
29
31
### Example 1: Get advanced storage properties of a physical disk
@@ -82,4 +84,3 @@ The cmdlet gets the advanced properties for **PhysicalDisk** objects: **IsPowerP
This command allows the specified application to make changes in controlled folders.
47
+
38
48
## PARAMETERS
39
49
40
50
### -AsJob
@@ -59,6 +69,57 @@ Accept pipeline input: False
59
69
Accept wildcard characters: False
60
70
```
61
71
72
+
### -AttackSurfaceReductionOnlyExclusions
73
+
Specifies the files and paths to exclude from Attack Surface Reduction (ASR) rules. Specify the folders or files and resources that should be excluded from ASR rules. Enter a folder path or a fully qualified resource name. For example, ""C:\Windows"" will exclude all files in that directory. ""C:\Windows\App.exe"" will exclude only that specific file in that specific folder.
74
+
75
+
For more information about excluding files and folders from [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules).
76
+
77
+
```yaml
78
+
Type: String[]
79
+
Parameter Sets: (All)
80
+
Aliases:
81
+
82
+
Required: False
83
+
Position: Named
84
+
Default value: None
85
+
Accept pipeline input: False
86
+
Accept wildcard characters: False
87
+
```
88
+
89
+
### -AttackSurfaceReductionRules_Actions
90
+
Specifies the states of attack surface reduction rules specified by using the **AttackSurfaceReductionRules_Ids** parameter.
91
+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
92
+
93
+
```yaml
94
+
Type: ASRRuleActionType[]
95
+
Parameter Sets: (All)
96
+
Aliases:
97
+
98
+
Required: False
99
+
Position: Named
100
+
Default value: None
101
+
Accept pipeline input: False
102
+
Accept wildcard characters: False
103
+
```
104
+
105
+
### -AttackSurfaceReductionRules_Ids
106
+
Specifies the IDs of attack surface reduction rules.
107
+
Use the **AttackSurfaceReductionRules_Actions** parameter to specify the state for each rule.
108
+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
109
+
110
+
111
+
```yaml
112
+
Type: String[]
113
+
Parameter Sets: (All)
114
+
Aliases:
115
+
116
+
Required: False
117
+
Position: Named
118
+
Default value: None
119
+
Accept pipeline input: False
120
+
Accept wildcard characters: False
121
+
```
122
+
62
123
### -CimSession
63
124
Runs the cmdlet in a remote session or on a remote computer.
64
125
Enter a computer name or a session object, such as the output of a [New-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227967) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
@@ -76,10 +137,55 @@ Accept pipeline input: False
76
137
Accept wildcard characters: False
77
138
```
78
139
140
+
### -ControlledFolderAccessAllowedApplications
141
+
Specifies applications that can make changes in controlled folders.
142
+
143
+
```yaml
144
+
Type: String[]
145
+
Parameter Sets: (All)
146
+
Aliases:
147
+
148
+
Required: False
149
+
Position: Named
150
+
Default value: None
151
+
Accept pipeline input: False
152
+
Accept wildcard characters: False
153
+
```
154
+
155
+
### -ControlledFolderAccessProtectedFolders
156
+
Specifies more folders to protect.
157
+
158
+
```yaml
159
+
Type: String[]
160
+
Parameter Sets: (All)
161
+
Aliases:
162
+
163
+
Required: False
164
+
Position: Named
165
+
Default value: None
166
+
Accept pipeline input: False
167
+
Accept wildcard characters: False
168
+
```
169
+
79
170
### -ExclusionExtension
80
171
Specifies an array of file name extensions, such as obj or lib, to exclude from scheduled, custom, and real-time scanning.
81
172
This cmdlet adds these file name extensions to the exclusions.
82
173
174
+
```yaml
175
+
Type: String[]
176
+
Parameter Sets: (All)
177
+
Aliases:
178
+
179
+
Required: False
180
+
Position: Named
181
+
Default value: None
182
+
Accept pipeline input: False
183
+
Accept wildcard characters: False
184
+
```
185
+
186
+
### -ExclusionIpAddress
187
+
Specifies an array of IP addresses to exclude from scheduled and real-time scanning.
0 commit comments