Skip to content

Commit ac76841

Browse files
Update Set-MpPreference.md
Adding SDP/ update control powershell commands
1 parent 010c07d commit ac76841

File tree

1 file changed

+101
-1
lines changed

1 file changed

+101
-1
lines changed

docset/winserver2019-ps/defender/Set-MpPreference.md

Lines changed: 101 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
4141
[-LowThreatDefaultAction <ThreatAction>] [-ModerateThreatDefaultAction <ThreatAction>]
4242
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
4343
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
44-
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>]
44+
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>]
4545
```
4646

4747
## DESCRIPTION
@@ -267,6 +267,28 @@ Accept pipeline input: False
267267
Accept wildcard characters: False
268268
```
269269
270+
### -DisableGradualRelease
271+
272+
Enable this policy to disable gradual rollout of monthly and daily Defender updates.
273+
274+
Devices will be offered all Defender updates after the gradual release cycle completes. Best for datacenter machines that only receive limited updates.
275+
276+
Note: This setting applies to both monthly as well as daily Defender updates and will override any previously configured channel selections for platform and engine updates.
277+
278+
If you disable or do not configure this policy, the device will remain in Current Channel (Default) unless specified otherwise in specific channels for platform and engine updates. Stay up to date automatically during the gradual release cycle. Suitable for most devices.
279+
280+
Supported OS versions: Windows 10
281+
282+
Note: This policy is available starting with platform version 4.18.2106.X and later
283+
284+
```yaml
285+
Type: Boolean
286+
Aliases: dgr
287+
Position: Named
288+
Default value: None
289+
Accept pipeline input: False
290+
Accept wildcard characters: False
291+
```
270292
271293
### -DisableIOAVProtection
272294
Indicates whether Windows Defender scans all downloaded files and attachments.
@@ -412,6 +434,33 @@ Accept pipeline input: False
412434
Accept wildcard characters: False
413435
```
414436
437+
### -EngineUpdatesChannel
438+
439+
Enable this policy to specify when devices receive Microsoft Defender engine updates during the monthly gradual rollout.
440+
441+
Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.
442+
443+
Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.
444+
445+
Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).
446+
447+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
448+
449+
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
450+
451+
Supported OS versions: Windows 10
452+
Note: This policy is available starting with platform version 4.18.2106.X and later
453+
454+
```yaml
455+
Type: UpdatesChannelType
456+
Aliases: euc
457+
Accepted values:Beta|Preview|Staged|Broad|NotConfigured
458+
Position: Named
459+
Default value: None
460+
Accept pipeline input: False
461+
Accept wildcard characters: False
462+
```
463+
415464
### -ExclusionExtension
416465
Specifies an array of file name extensions, such as obj or lib, to exclude from scheduled, custom, and real-time scanning.
417466
@@ -587,6 +636,34 @@ Accept pipeline input: False
587636
Accept wildcard characters: False
588637
```
589638
639+
### -PlatformUpdatesChannel
640+
641+
Enable this policy to specify when devices receive Microsoft Defender platform updates during the monthly gradual rollout.
642+
643+
Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.
644+
645+
Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.
646+
647+
Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).
648+
649+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
650+
651+
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
652+
653+
Supported OS versions: Windows 10
654+
655+
Note: This policy is available starting with platform version 4.18.2106.X and later
656+
657+
```yaml
658+
Type: UpdatesChannelType
659+
Aliases: puc
660+
Accepted values: Beta|Preview|Staged|Broad|NotConfigured
661+
Position: Named
662+
Default value: None
663+
Accept pipeline input: False
664+
Accept wildcard characters: False
665+
```
666+
590667
### -QuarantinePurgeItemsAfterDelay
591668
Specifies the number of days to keep items in the Quarantine folder.
592669
If you specify a value of zero or do not specify a value for this parameter, items stay in the Quarantine folder indefinitely.
@@ -1066,6 +1143,29 @@ Accept pipeline input: False
10661143
Accept wildcard characters: False
10671144
```
10681145
1146+
### -SignaturesUpdatesChannel
1147+
Enable this policy to specify when devices receive daily Microsoft Defender definition updates during the daily gradual rollout.
1148+
1149+
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
1150+
1151+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
1152+
1153+
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
1154+
1155+
Supported OS versions: Windows 10
1156+
1157+
Note: This policy is available starting with platform version 4.18.2106.X and later
1158+
1159+
```yaml
1160+
Type: UpdatesChannelType
1161+
Aliases: suc
1162+
Accepted values: Staged|Broad|Not Configured
1163+
Position: Named
1164+
Default value: None
1165+
Accept pipeline input: False
1166+
Accept wildcard characters: False
1167+
```
1168+
10691169
### -SignatureUpdateInterval
10701170
Specifies the interval, in hours, at which to check for definition updates.
10711171
The acceptable values for this parameter are: integers from 1 through 24.

0 commit comments

Comments
 (0)