You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -309,6 +313,70 @@ File rule exceptions cannot use the PCA Certificate, Publisher, Signed Version,
309
313
310
314
## PARAMETERS
311
315
316
+
### -AllowFileNameFallbacks
317
+
Indicates that files that do not have an `OriginalFileName` fall back in the following order:
318
+
319
+
- InternalName
320
+
- FileDescription
321
+
- ProductName
322
+
323
+
```yaml
324
+
Type: SwitchParameter
325
+
Parameter Sets: (All)
326
+
Aliases:
327
+
328
+
Required: False
329
+
Position: Named
330
+
Default value: None
331
+
Accept pipeline input: False
332
+
Accept wildcard characters: False
333
+
```
334
+
335
+
### -AppIdTaggingKey
336
+
This parameter is reserved for future use.
337
+
338
+
```yaml
339
+
Type: String[]
340
+
Parameter Sets: (All)
341
+
Aliases:
342
+
343
+
Required: False
344
+
Position: Named
345
+
Default value: None
346
+
Accept pipeline input: False
347
+
Accept wildcard characters: False
348
+
```
349
+
350
+
### -AppIdTaggingPolicy
351
+
This parameter is reserved for future use.
352
+
353
+
```yaml
354
+
Type: SwitchParameter
355
+
Parameter Sets: (All)
356
+
Aliases:
357
+
358
+
Required: False
359
+
Position: Named
360
+
Default value: None
361
+
Accept pipeline input: False
362
+
Accept wildcard characters: False
363
+
```
364
+
365
+
### -AppIdTaggingValue
366
+
This parameter is reserved for future use.
367
+
368
+
```yaml
369
+
Type: String[]
370
+
Parameter Sets: (All)
371
+
Aliases:
372
+
373
+
Required: False
374
+
Position: Named
375
+
Default value: None
376
+
Accept pipeline input: False
377
+
Accept wildcard characters: False
378
+
```
379
+
312
380
### -Audit
313
381
Indicates that this cmdlet searches the Code Integrity Audit log for drivers.
314
382
It does not perform a full system scan.
@@ -407,6 +475,22 @@ Accept pipeline input: False
407
475
Accept wildcard characters: False
408
476
```
409
477
478
+
### -MultiplePolicyFormat
479
+
Indicates that this cmdlet should create a policy in multiple policy format as opposed to a single policy format.
480
+
Refer to [Create WDAC policies in Multiple Policy Format](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#creating-wdac-policies-in-multiple-policy-format) for the difference between the policy formats.
481
+
482
+
```yaml
483
+
Type: SwitchParameter
484
+
Parameter Sets: (All)
485
+
Aliases:
486
+
487
+
Required: False
488
+
Position: Named
489
+
Default value: None
490
+
Accept pipeline input: False
491
+
Accept wildcard characters: False
492
+
```
493
+
410
494
### -NoScript
411
495
Indicates that this cmdlet does not search script files.
412
496
It searches portable executable files (PE files) only.
@@ -525,6 +609,22 @@ Accept pipeline input: False
525
609
Accept wildcard characters: False
526
610
```
527
611
612
+
### -SpecificFileNameLevel
613
+
Specifies the attribute of the file off which to base a file name rule. The -Level must be set to FileName for this option. Possible values are: None, OriginalFileName, InternalName, FileDescription, ProductName, PackageFamilyName, and FilePath.
614
+
Refer to [File Name Rules Info](/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-filename-rules) for a description of the acceptable values.
615
+
616
+
```yaml
617
+
Type: FileNameLevel
618
+
Parameter Sets: (All)
619
+
Aliases:
620
+
621
+
Required: False
622
+
Position: Named
623
+
Default value: None
624
+
Accept pipeline input: False
625
+
Accept wildcard characters: False
626
+
```
627
+
528
628
### -UserPEs
529
629
Indicates that this cmdlet includes user-mode files in the scan.
530
630
Specify this parameter only if you do not provide driver files or rules.
Indicates that this cmdlet should create a policy in multiple policy format as opposed to a single policy format.
546
-
Refer to [Create WDAC policies in Multiple Policy Format](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#creating-wdac-policies-in-multiple-policy-format) for the difference between the policy formats.
644
+
### -UserWriteablePaths
645
+
Indicates that this cmdlet includes files identified as user writeable in the policy.
0 commit comments