Skip to content

Commit c968625

Browse files
JoelJerkinsdwheeler
authored andcommitted
Added missing parameters
Added missing parameters #ATCP
1 parent db5f258 commit c968625

File tree

1 file changed

+101
-2
lines changed

1 file changed

+101
-2
lines changed

docset/winserver2019-ps/defender/Add-MpPreference.md

Lines changed: 101 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,11 @@ Modifies settings for Windows Defender.
1717

1818
```
1919
Add-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-ExclusionProcess <String[]>]
20-
[-ThreatIDDefaultAction_Ids <Int64[]>] [-ThreatIDDefaultAction_Actions <ThreatAction[]>] [-Force]
21-
[-CimSession <CimSession[]>] [-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>]
20+
[-ExclusionIpAddress <String[]>] [-ThreatIDDefaultAction_Ids <Int64[]>]
21+
[-ThreatIDDefaultAction_Actions <ThreatAction[]>] [-AttackSurfaceReductionOnlyExclusions <String[]>]
22+
[-ControlledFolderAccessAllowedApplications <String[]>] [-ControlledFolderAccessProtectedFolders <String[]>]
23+
[-AttackSurfaceReductionRules_Ids <String[]>] [-AttackSurfaceReductionRules_Actions <ASRRuleActionType[]>]
24+
[-Force] [-CimSession <CimSession[]>] [-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>]
2225
```
2326

2427
## DESCRIPTION
@@ -59,6 +62,57 @@ Accept pipeline input: False
5962
Accept wildcard characters: False
6063
```
6164
65+
### -AttackSurfaceReductionOnlyExclusions
66+
Specifies the files and paths to exclude from Attack Surface Reduction (ASR) rules. Specify the folders or files and resources that should be excluded from ASR rules. Enter a folder path or a fully qualified resource name. For example, ""C:\Windows"" will exclude all files in that directory. ""C:\Windows\App.exe"" will exclude only that specific file in that specific folder.
67+
68+
For more information about excluding files and folders from [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules).
69+
70+
```yaml
71+
Type: String[]
72+
Parameter Sets: (All)
73+
Aliases:
74+
75+
Required: False
76+
Position: Named
77+
Default value: None
78+
Accept pipeline input: False
79+
Accept wildcard characters: False
80+
```
81+
82+
### -AttackSurfaceReductionRules_Actions
83+
Specifies the states of attack surface reduction rules specified by using the **AttackSurfaceReductionRules_Ids** parameter.
84+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
85+
86+
```yaml
87+
Type: ASRRuleActionType[]
88+
Parameter Sets: (All)
89+
Aliases:
90+
91+
Required: False
92+
Position: Named
93+
Default value: None
94+
Accept pipeline input: False
95+
Accept wildcard characters: False
96+
```
97+
98+
### -AttackSurfaceReductionRules_Ids
99+
Specifies the IDs of attack surface reduction rules.
100+
Use the **AttackSurfaceReductionRules_Actions** parameter to specify the state for each rule.
101+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
102+
103+
104+
```yaml
105+
Type: String[]
106+
Parameter Sets: (All)
107+
Aliases:
108+
109+
Required: False
110+
Position: Named
111+
Default value: None
112+
Accept pipeline input: False
113+
Accept wildcard characters: False
114+
```
115+
62116
### -CimSession
63117
Runs the cmdlet in a remote session or on a remote computer.
64118
Enter a computer name or a session object, such as the output of a [New-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227967) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
@@ -76,6 +130,36 @@ Accept pipeline input: False
76130
Accept wildcard characters: False
77131
```
78132
133+
### -ControlledFolderAccessAllowedApplications
134+
Specifies applications that can make changes in controlled folders.
135+
136+
```yaml
137+
Type: String[]
138+
Parameter Sets: (All)
139+
Aliases:
140+
141+
Required: False
142+
Position: Named
143+
Default value: None
144+
Accept pipeline input: False
145+
Accept wildcard characters: False
146+
```
147+
148+
### -ControlledFolderAccessProtectedFolders
149+
Specifies more folders to protect.
150+
151+
```yaml
152+
Type: String[]
153+
Parameter Sets: (All)
154+
Aliases:
155+
156+
Required: False
157+
Position: Named
158+
Default value: None
159+
Accept pipeline input: False
160+
Accept wildcard characters: False
161+
```
162+
79163
### -ExclusionExtension
80164
Specifies an array of file name extensions, such as obj or lib, to exclude from scheduled, custom, and real-time scanning.
81165
This cmdlet adds these file name extensions to the exclusions.
@@ -92,6 +176,21 @@ Accept pipeline input: False
92176
Accept wildcard characters: False
93177
```
94178
179+
### -ExclusionIpAddress
180+
Specifies an array of IP addresses to exclude from scheduled and real-time scanning.
181+
182+
```yaml
183+
Type: String[]
184+
Parameter Sets: (All)
185+
Aliases:
186+
187+
Required: False
188+
Position: Named
189+
Default value: None
190+
Accept pipeline input: False
191+
Accept wildcard characters: False
192+
```
193+
95194
### -ExclusionPath
96195
Specifies an array of file paths to exclude from scheduled and real-time scanning.
97196
You can specify a folder to exclude all the files under the folder.

0 commit comments

Comments
 (0)