You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This setting disables the gathering and sending of performance telemetry from network protection.
620
+
The accepted values are 0 and 1.
621
+
- 1- Network protection telemetry is disabled.
622
+
- 0 (Default) - Network protection telemetry is enabled.
623
+
624
+
```yaml
625
+
Type: Boolean
626
+
Parameter Sets: (All)
627
+
Aliases: dnpp
628
+
629
+
Required: False
630
+
Position: Named
631
+
Default value: 0
632
+
Accept pipeline input: False
633
+
Accept wildcard characters: False
634
+
```
635
+
616
636
### -DisablePrivacyMode
617
637
**This is a legacy setting that does not have any affect on current platforms**. The intent of this parameter was to disable privacy mode, which prevented users, other than administrators, from displaying threat history. When this parameter was in use, if you specified a value of $False or did not specify a value, privacy mode was enabled.
618
638
@@ -754,6 +774,24 @@ Accept pipeline input: False
754
774
Accept wildcard characters: False
755
775
```
756
776
777
+
### -DisableSmtpParsing
778
+
This setting disables SMTP parsing for network protection.
779
+
The accepted values are 0 and 1.
780
+
- 1 - SMTP parsing is disabled.
781
+
- 0 (Default) - SMTP parsing is enabled.
782
+
783
+
```yaml
784
+
Type: Boolean
785
+
Parameter Sets: (All)
786
+
Aliases: dsp
787
+
788
+
Required: False
789
+
Position: Named
790
+
Default value: 0
791
+
Accept pipeline input: False
792
+
Accept wildcard characters: False
793
+
```
794
+
757
795
### -DisableTlsParsing
758
796
Specifies whether to disable inspection of TLS traffic.
759
797
Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, network protection inspects TLS traffic.
This policy setting configures the Intel TDT integration level for Intel TDT-capable devices.
1045
+
The acceptable values for this parameter are:
1046
+
- 0 (Default) - If you don't configure this setting, the default value will be applied. The default value is controlled by Microsoft security intelligence updates. Microsoft will enable Intel TDT if there is a known threat.
1047
+
- 1 - If you configure this setting to enabled, Intel TDT integration will turn on.
1048
+
- 2 - If you configure this setting to disabled, Intel TDT integration will turn off.
1049
+
1050
+
```yaml
1051
+
Type: UInt32
1052
+
Parameter Sets: (All)
1053
+
Aliases: itdte
1054
+
Accepted values: 0,1 and 2
1055
+
1056
+
Required: False
1057
+
Position: Named
1058
+
Default value: 0
1059
+
Accept pipeline input: False
1060
+
Accept wildcard characters: False
1061
+
```
1062
+
1005
1063
### -LowThreatDefaultAction
1006
1064
Specifies which automatic remediation action to take for a low level threat.
A CPU usage limit can be applied to scheduled scans only, or to scheduled and custom scans. The default value applies a CPU usage limit to scheduled scans only.
1947
+
The acceptable values for this parameter are:
1948
+
- 1 (Default) - If you enable this setting, CPU throttling will apply only to scheduled scans.
1949
+
- 0 - If you disable this setting, CPU throttling will apply to scheduled and custom scans.
1950
+
1951
+
```yaml
1952
+
Type: Boolean
1953
+
Parameter Sets: (All)
1954
+
Aliases:
1955
+
1956
+
Required: False
1957
+
Position: Named
1958
+
Default value: 1
1959
+
Accept pipeline input: False
1960
+
Accept wildcard characters: False
1961
+
```
1962
+
1963
+
1887
1964
### -UILockdown
1888
1965
Indicates whether to disable UI lockdown mode.
1889
1966
If you specify a value of $True, Windows Defender disables UI lockdown mode.
0 commit comments