You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This command allows the specified application to make changes in controlled folders.
47
+
38
48
## PARAMETERS
39
49
40
50
### -AsJob
@@ -59,6 +69,57 @@ Accept pipeline input: False
59
69
Accept wildcard characters: False
60
70
```
61
71
72
+
### -AttackSurfaceReductionOnlyExclusions
73
+
Specifies the files and paths to exclude from Attack Surface Reduction (ASR) rules. Specify the folders or files and resources that should be excluded from ASR rules. Enter a folder path or a fully qualified resource name. For example, ""C:\Windows"" will exclude all files in that directory. ""C:\Windows\App.exe"" will exclude only that specific file in that specific folder.
74
+
75
+
For more information about excluding files and folders from [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules).
76
+
77
+
```yaml
78
+
Type: String[]
79
+
Parameter Sets: (All)
80
+
Aliases:
81
+
82
+
Required: False
83
+
Position: Named
84
+
Default value: None
85
+
Accept pipeline input: False
86
+
Accept wildcard characters: False
87
+
```
88
+
89
+
### -AttackSurfaceReductionRules_Actions
90
+
Specifies the states of attack surface reduction rules specified by using the **AttackSurfaceReductionRules_Ids** parameter.
91
+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
92
+
93
+
```yaml
94
+
Type: ASRRuleActionType[]
95
+
Parameter Sets: (All)
96
+
Aliases:
97
+
98
+
Required: False
99
+
Position: Named
100
+
Default value: None
101
+
Accept pipeline input: False
102
+
Accept wildcard characters: False
103
+
```
104
+
105
+
### -AttackSurfaceReductionRules_Ids
106
+
Specifies the IDs of attack surface reduction rules.
107
+
Use the **AttackSurfaceReductionRules_Actions** parameter to specify the state for each rule.
108
+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
109
+
110
+
111
+
```yaml
112
+
Type: String[]
113
+
Parameter Sets: (All)
114
+
Aliases:
115
+
116
+
Required: False
117
+
Position: Named
118
+
Default value: None
119
+
Accept pipeline input: False
120
+
Accept wildcard characters: False
121
+
```
122
+
62
123
### -CimSession
63
124
Runs the cmdlet in a remote session or on a remote computer.
64
125
Enter a computer name or a session object, such as the output of a [New-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227967) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
@@ -76,10 +137,55 @@ Accept pipeline input: False
76
137
Accept wildcard characters: False
77
138
```
78
139
140
+
### -ControlledFolderAccessAllowedApplications
141
+
Specifies applications that can make changes in controlled folders.
142
+
143
+
```yaml
144
+
Type: String[]
145
+
Parameter Sets: (All)
146
+
Aliases:
147
+
148
+
Required: False
149
+
Position: Named
150
+
Default value: None
151
+
Accept pipeline input: False
152
+
Accept wildcard characters: False
153
+
```
154
+
155
+
### -ControlledFolderAccessProtectedFolders
156
+
Specifies more folders to protect.
157
+
158
+
```yaml
159
+
Type: String[]
160
+
Parameter Sets: (All)
161
+
Aliases:
162
+
163
+
Required: False
164
+
Position: Named
165
+
Default value: None
166
+
Accept pipeline input: False
167
+
Accept wildcard characters: False
168
+
```
169
+
79
170
### -ExclusionExtension
80
171
Specifies an array of file name extensions, such as obj or lib, to exclude from scheduled, custom, and real-time scanning.
81
172
This cmdlet adds these file name extensions to the exclusions.
82
173
174
+
```yaml
175
+
Type: String[]
176
+
Parameter Sets: (All)
177
+
Aliases:
178
+
179
+
Required: False
180
+
Position: Named
181
+
Default value: None
182
+
Accept pipeline input: False
183
+
Accept wildcard characters: False
184
+
```
185
+
186
+
### -ExclusionIpAddress
187
+
Specifies an array of IP addresses to exclude from scheduled and real-time scanning.
0 commit comments