Skip to content

Commit ca44cec

Browse files
authored
Merge pull request MicrosoftDocs#2671 from TimShererWithAquent/configci-v-tishe
ConfigCI PowerShell reference update
2 parents 93275a2 + dedf295 commit ca44cec

File tree

9 files changed

+478
-75
lines changed

9 files changed

+478
-75
lines changed

docset/winserver2022-ps/configci/Add-SignerRule.md

Lines changed: 40 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,15 @@ Creates a signer rule and adds it to a policy.
1515

1616
## SYNTAX
1717

18+
### Certificate
1819
```
19-
Add-SignerRule -FilePath <String> -CertificatePath <String> [-Kernel] [-User] [-Update] [-Deny]
20+
Add-SignerRule -FilePath <String> -CertificatePath <String> [-Kernel] [-User] [-Update] [-Supplemental] [-Deny]
21+
[<CommonParameters>]
22+
```
23+
24+
### CertStore
25+
```
26+
Add-SignerRule -FilePath <String> -CertStorePath <String> [-Kernel] [-User] [-Update] [-Supplemental] [-Deny]
2027
[<CommonParameters>]
2128
```
2229

@@ -46,7 +53,7 @@ Specifies the path of a certificate (.cer) file that this cmdlet uses for the ru
4653

4754
```yaml
4855
Type: String
49-
Parameter Sets: (All)
56+
Parameter Sets: Certificate
5057
Aliases: c
5158

5259
Required: True
@@ -56,6 +63,21 @@ Accept pipeline input: False
5663
Accept wildcard characters: False
5764
```
5865
66+
### -CertStorePath
67+
Specifies the path to a certificate store to export certificates into the policy.
68+
69+
```yaml
70+
Type: String
71+
Parameter Sets: CertStore
72+
Aliases:
73+
74+
Required: True
75+
Position: Named
76+
Default value: None
77+
Accept pipeline input: False
78+
Accept wildcard characters: False
79+
```
80+
5981
### -Deny
6082
Indicates that this cmdlet creates a deny rule instead of the default allow rule.
6183
@@ -102,6 +124,22 @@ Accept pipeline input: False
102124
Accept wildcard characters: False
103125
```
104126
127+
### -Supplemental
128+
Indicates that this cmdlet adds the rule as a Supplemental policy signers rule.
129+
You can add a rule as more than one scenario.
130+
131+
```yaml
132+
Type: SwitchParameter
133+
Parameter Sets: (All)
134+
Aliases:
135+
136+
Required: False
137+
Position: Named
138+
Default value: None
139+
Accept pipeline input: False
140+
Accept wildcard characters: False
141+
```
142+
105143
### -Update
106144
Indicates that this cmdlet adds the rule as an Update policy signers rule.
107145
You can add a rule as more than one scenario.

docset/winserver2022-ps/configci/ConfigCI.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,16 +42,19 @@ Combines the rules in several Code Integrity policy files.
4242
### [New-CIPolicy](./New-CIPolicy.md)
4343
Creates a Code Integrity policy as an .xml file.
4444

45-
### [New-CIPolicyRule](./New-CIPolicyRule.md)
46-
Generates Code Integrity policy rules for drivers.
45+
### [New-CIPolicyRule](New-CIPolicyRule.md)
46+
Generates Code Integrity policy rules for user mode code and drivers.
4747

4848
### [Remove-CIPolicyRule](./Remove-CIPolicyRule.md)
4949
This cmdlet is not supported.
5050

5151
### [Set-CIPolicyIdInfo](./Set-CIPolicyIdInfo.md)
5252
Modifies the name and ID of a Code Integrity policy.
5353

54-
### [Set-CIPolicyVersion](./Set-CIPolicyVersion.md)
54+
### [Set-CIPolicySetting](Set-CIPolicySetting.md)
55+
Modifies the SecureSettings within the Code Integrity policy.
56+
57+
### [Set-CIPolicyVersion](Set-CIPolicyVersion.md)
5558
Updates the version number of the policy.
5659

5760
### [Set-HVCIOptions](./Set-HVCIOptions.md)

docset/winserver2022-ps/configci/Edit-CIPolicyRule.md

Lines changed: 14 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -185,12 +185,12 @@ Accept pipeline input: False
185185
Accept wildcard characters: False
186186
```
187187
188-
### -RType
188+
### -RemoveEkus
189+
189190
```yaml
190-
Type: String
191-
Parameter Sets: (All)
192-
Aliases: t
193-
Accepted values: Allow, Deny, a, d
191+
Type: String[]
192+
Parameter Sets: SignerRule
193+
Aliases:
194194

195195
Required: False
196196
Position: Named
@@ -199,13 +199,12 @@ Accept pipeline input: False
199199
Accept wildcard characters: False
200200
```
201201
202-
### -RemoveEkus
203-
202+
### -RemoveExceptions
204203
205204
```yaml
206205
Type: String[]
207206
Parameter Sets: SignerRule
208-
Aliases:
207+
Aliases:
209208

210209
Required: False
211210
Position: Named
@@ -214,13 +213,12 @@ Accept pipeline input: False
214213
Accept wildcard characters: False
215214
```
216215
217-
### -RemoveExceptions
218-
216+
### -Root
219217
220218
```yaml
221-
Type: String[]
219+
Type: String
222220
Parameter Sets: SignerRule
223-
Aliases:
221+
Aliases:
224222

225223
Required: False
226224
Position: Named
@@ -229,13 +227,12 @@ Accept pipeline input: False
229227
Accept wildcard characters: False
230228
```
231229
232-
### -Root
233-
234-
230+
### -RType
235231
```yaml
236232
Type: String
237-
Parameter Sets: SignerRule
238-
Aliases:
233+
Parameter Sets: (All)
234+
Aliases: t
235+
Accepted values: Allow, Deny, a, d
239236

240237
Required: False
241238
Position: Named

docset/winserver2022-ps/configci/Merge-CIPolicy.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ Combines the rules in several Code Integrity policy files.
1616
## SYNTAX
1717

1818
```
19-
Merge-CIPolicy [-OutputFilePath] <String> [-PolicyPaths] <String[]> [-Rules <Rule[]>] [<CommonParameters>]
19+
Merge-CIPolicy [-OutputFilePath] <String> [-PolicyPaths] <String[]> [-Rules <Rule[]>] [-AppIdTaggingPolicy]
20+
[<CommonParameters>]
2021
```
2122

2223
## DESCRIPTION
@@ -89,6 +90,21 @@ For this example, we present only the first few rules.
8990

9091
## PARAMETERS
9192

93+
### -AppIdTaggingPolicy
94+
This parameter is reserved for future use.
95+
96+
```yaml
97+
Type: SwitchParameter
98+
Parameter Sets: (All)
99+
Aliases:
100+
101+
Required: False
102+
Position: Named
103+
Default value: None
104+
Accept pipeline input: False
105+
Accept wildcard characters: False
106+
```
107+
92108
### -OutputFilePath
93109
Specifies the path of the merged .xml policy file.
94110

docset/winserver2022-ps/configci/New-CIPolicy.md

Lines changed: 107 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,14 +18,18 @@ Creates a Code Integrity policy as an .xml file.
1818
### Drivers
1919
```
2020
New-CIPolicy [-FilePath] <String> [-DriverFiles <DriverFile[]>] -Level <RuleLevel> [-Fallback <RuleLevel[]>]
21-
[-Audit] [-ScanPath <String>] [-ScriptFileNames] [-UserPEs] [-NoScript] [-Deny] [-NoShadowCopy]
22-
[-OmitPaths <String[]>] [-PathToCatroot <String>] [-MultiplePolicyFormat] [<CommonParameters>]
21+
[-Audit] [-ScanPath <String>] [-ScriptFileNames] [-AllowFileNameFallbacks]
22+
[-SpecificFileNameLevel <FileNameLevel>] [-UserWriteablePaths] [-UserPEs] [-NoScript] [-Deny] [-NoShadowCopy]
23+
[-MultiplePolicyFormat] [-OmitPaths <String[]>] [-PathToCatroot <String>] [-AppIdTaggingPolicy]
24+
[-AppIdTaggingKey <String[]>] [-AppIdTaggingValue <String[]>] [<CommonParameters>]
2325
```
2426

2527
### Rules
2628
```
27-
New-CIPolicy [-FilePath] <String> -Rules <Rule[]> [-Audit] [-ScanPath <String>] [-ScriptFileNames] [-UserPEs]
28-
[-NoScript] [-Deny] [-NoShadowCopy] [-OmitPaths <String[]>] [-PathToCatroot <String>] [-MultiplePolicyFormat] [<CommonParameters>]
29+
New-CIPolicy [-FilePath] <String> -Rules <Rule[]> [-Audit] [-ScanPath <String>] [-ScriptFileNames]
30+
[-AllowFileNameFallbacks] [-SpecificFileNameLevel <FileNameLevel>] [-UserWriteablePaths] [-UserPEs]
31+
[-NoScript] [-Deny] [-NoShadowCopy] [-MultiplePolicyFormat] [-OmitPaths <String[]>] [-PathToCatroot <String>]
32+
[-AppIdTaggingPolicy] [-AppIdTaggingKey <String[]>] [-AppIdTaggingValue <String[]>] [<CommonParameters>]
2933
```
3034

3135
## DESCRIPTION
@@ -309,6 +313,70 @@ File rule exceptions cannot use the PCA Certificate, Publisher, Signed Version,
309313

310314
## PARAMETERS
311315

316+
### -AllowFileNameFallbacks
317+
Indicates that files that do not have an `OriginalFileName` fall back in the following order:
318+
319+
- InternalName
320+
- FileDescription
321+
- ProductName
322+
323+
```yaml
324+
Type: SwitchParameter
325+
Parameter Sets: (All)
326+
Aliases:
327+
328+
Required: False
329+
Position: Named
330+
Default value: None
331+
Accept pipeline input: False
332+
Accept wildcard characters: False
333+
```
334+
335+
### -AppIdTaggingKey
336+
This parameter is reserved for future use.
337+
338+
```yaml
339+
Type: String[]
340+
Parameter Sets: (All)
341+
Aliases:
342+
343+
Required: False
344+
Position: Named
345+
Default value: None
346+
Accept pipeline input: False
347+
Accept wildcard characters: False
348+
```
349+
350+
### -AppIdTaggingPolicy
351+
This parameter is reserved for future use.
352+
353+
```yaml
354+
Type: SwitchParameter
355+
Parameter Sets: (All)
356+
Aliases:
357+
358+
Required: False
359+
Position: Named
360+
Default value: None
361+
Accept pipeline input: False
362+
Accept wildcard characters: False
363+
```
364+
365+
### -AppIdTaggingValue
366+
This parameter is reserved for future use.
367+
368+
```yaml
369+
Type: String[]
370+
Parameter Sets: (All)
371+
Aliases:
372+
373+
Required: False
374+
Position: Named
375+
Default value: None
376+
Accept pipeline input: False
377+
Accept wildcard characters: False
378+
```
379+
312380
### -Audit
313381
Indicates that this cmdlet searches the Code Integrity Audit log for drivers.
314382
It does not perform a full system scan.
@@ -407,6 +475,22 @@ Accept pipeline input: False
407475
Accept wildcard characters: False
408476
```
409477
478+
### -MultiplePolicyFormat
479+
Indicates that this cmdlet should create a policy in multiple policy format as opposed to a single policy format.
480+
Refer to [Create WDAC policies in Multiple Policy Format](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#creating-wdac-policies-in-multiple-policy-format) for the difference between the policy formats.
481+
482+
```yaml
483+
Type: SwitchParameter
484+
Parameter Sets: (All)
485+
Aliases:
486+
487+
Required: False
488+
Position: Named
489+
Default value: None
490+
Accept pipeline input: False
491+
Accept wildcard characters: False
492+
```
493+
410494
### -NoScript
411495
Indicates that this cmdlet does not search script files.
412496
It searches portable executable files (PE files) only.
@@ -525,6 +609,22 @@ Accept pipeline input: False
525609
Accept wildcard characters: False
526610
```
527611
612+
### -SpecificFileNameLevel
613+
Specifies the attribute of the file off which to base a file name rule. The -Level must be set to FileName for this option. Possible values are: None, OriginalFileName, InternalName, FileDescription, ProductName, PackageFamilyName, and FilePath.
614+
Refer to [File Name Rules Info](/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-filename-rules) for a description of the acceptable values.
615+
616+
```yaml
617+
Type: FileNameLevel
618+
Parameter Sets: (All)
619+
Aliases:
620+
621+
Required: False
622+
Position: Named
623+
Default value: None
624+
Accept pipeline input: False
625+
Accept wildcard characters: False
626+
```
627+
528628
### -UserPEs
529629
Indicates that this cmdlet includes user-mode files in the scan.
530630
Specify this parameter only if you do not provide driver files or rules.
@@ -541,14 +641,13 @@ Accept pipeline input: False
541641
Accept wildcard characters: False
542642
```
543643
544-
### -MultiplePolicyFormat
545-
Indicates that this cmdlet should create a policy in multiple policy format as opposed to a single policy format.
546-
Refer to [Create WDAC policies in Multiple Policy Format](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#creating-wdac-policies-in-multiple-policy-format) for the difference between the policy formats.
644+
### -UserWriteablePaths
645+
Indicates that this cmdlet includes files identified as user writeable in the policy.
547646
548647
```yaml
549648
Type: SwitchParameter
550649
Parameter Sets: (All)
551-
Aliases: None
650+
Aliases:
552651

553652
Required: False
554653
Position: Named

0 commit comments

Comments
 (0)