Skip to content

Commit d18e88a

Browse files
authored
Merge pull request MicrosoftDocs#3703 from MicrosoftDocs/main
Publish main to live, Monday 10:30AM PST, 11/13
2 parents df641c1 + 003b8fb commit d18e88a

File tree

1 file changed

+78
-1
lines changed

1 file changed

+78
-1
lines changed

docset/winserver2022-ps/defender/Set-MpPreference.md

Lines changed: 78 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Configures preferences for Windows Defender scans and updates.
1919
```powershell
2020
Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-ExclusionProcess <String[]>]
2121
[-ExclusionIpAddress <String[]>] [-RealTimeScanDirection <ScanDirection>]
22+
[-IntelTDTEnabled <UInt32>]
2223
[-QuarantinePurgeItemsAfterDelay <UInt32>] [-RemediationScheduleDay <Day>]
2324
[-RemediationScheduleTime <DateTime>] [-ReportingAdditionalActionTimeOut <UInt32>]
2425
[-ReportingCriticalFailureTimeOut <UInt32>] [-ReportingNonCriticalTimeOut <UInt32>]
@@ -57,8 +58,9 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
5758
[-ProxyServer <String>] [-ProxyBypass <String[]>] [-ForceUseProxyOnly <Boolean>]
5859
[-OobeEnableRtpAndSigUpdate <Boolean>]
5960
[-DisableTlsParsing <Boolean>] [-DisableHttpParsing <Boolean>] [-DisableDnsParsing <Boolean>]
60-
[-DisableFtpParsing <Boolean>]
61+
[-DisableFtpParsing <Boolean>] [-DisableSmtpParsing <Boolean>]
6162
[-DisableDnsOverTcpParsing <Boolean>] [-DisableSshParsing <Boolean>]
63+
[-DisableNetworkProtectionPerfTelemetry <Boolean>]
6264
[-PlatformUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>]
6365
[-SignaturesUpdatesChannel <UpdatesChannelType>] [-DisableGradualRelease <Boolean>]
6466
[-AllowNetworkProtectionDownLevel <Boolean>] [-AllowDatagramProcessingOnWinServer <Boolean>]
@@ -613,6 +615,24 @@ Accept pipeline input: False
613615
Accept wildcard characters: False
614616
```
615617

618+
### -DisableNetworkProtectionPerfTelemetry
619+
This setting disables the gathering and sending of performance telemetry from network protection.
620+
The accepted values are 0 and 1.
621+
- 1- Network protection telemetry is disabled.
622+
- 0 (Default) - Network protection telemetry is enabled.
623+
624+
```yaml
625+
Type: Boolean
626+
Parameter Sets: (All)
627+
Aliases: dnpp
628+
629+
Required: False
630+
Position: Named
631+
Default value: 0
632+
Accept pipeline input: False
633+
Accept wildcard characters: False
634+
```
635+
616636
### -DisablePrivacyMode
617637
**This is a legacy setting that does not have any affect on current platforms**. The intent of this parameter was to disable privacy mode, which prevented users, other than administrators, from displaying threat history. When this parameter was in use, if you specified a value of $False or did not specify a value, privacy mode was enabled.
618638

@@ -754,6 +774,24 @@ Accept pipeline input: False
754774
Accept wildcard characters: False
755775
```
756776

777+
### -DisableSmtpParsing
778+
This setting disables SMTP parsing for network protection.
779+
The accepted values are 0 and 1.
780+
- 1 - SMTP parsing is disabled.
781+
- 0 (Default) - SMTP parsing is enabled.
782+
783+
```yaml
784+
Type: Boolean
785+
Parameter Sets: (All)
786+
Aliases: dsp
787+
788+
Required: False
789+
Position: Named
790+
Default value: 0
791+
Accept pipeline input: False
792+
Accept wildcard characters: False
793+
```
794+
757795
### -DisableTlsParsing
758796
Specifies whether to disable inspection of TLS traffic.
759797
Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, network protection inspects TLS traffic.
@@ -1002,6 +1040,26 @@ Accept pipeline input: False
10021040
Accept wildcard characters: False
10031041
```
10041042

1043+
### -IntelTDTEnabled
1044+
This policy setting configures the Intel TDT integration level for Intel TDT-capable devices.
1045+
The acceptable values for this parameter are:
1046+
- 0 (Default) - If you don't configure this setting, the default value will be applied. The default value is controlled by Microsoft security intelligence updates. Microsoft will enable Intel TDT if there is a known threat.
1047+
- 1 - If you configure this setting to enabled, Intel TDT integration will turn on.
1048+
- 2 - If you configure this setting to disabled, Intel TDT integration will turn off.
1049+
1050+
```yaml
1051+
Type: UInt32
1052+
Parameter Sets: (All)
1053+
Aliases: itdte
1054+
Accepted values: 0,1 and 2
1055+
1056+
Required: False
1057+
Position: Named
1058+
Default value: 0
1059+
Accept pipeline input: False
1060+
Accept wildcard characters: False
1061+
```
1062+
10051063
### -LowThreatDefaultAction
10061064
Specifies which automatic remediation action to take for a low level threat.
10071065
The acceptable values for this parameter are:
@@ -1884,6 +1942,25 @@ Accept pipeline input: False
18841942
Accept wildcard characters: False
18851943
```
18861944

1945+
### -ThrottleForScheduledScanOnly
1946+
A CPU usage limit can be applied to scheduled scans only, or to scheduled and custom scans. The default value applies a CPU usage limit to scheduled scans only.
1947+
The acceptable values for this parameter are:
1948+
- 1 (Default) - If you enable this setting, CPU throttling will apply only to scheduled scans.
1949+
- 0 - If you disable this setting, CPU throttling will apply to scheduled and custom scans.
1950+
1951+
```yaml
1952+
Type: Boolean
1953+
Parameter Sets: (All)
1954+
Aliases:
1955+
1956+
Required: False
1957+
Position: Named
1958+
Default value: 1
1959+
Accept pipeline input: False
1960+
Accept wildcard characters: False
1961+
```
1962+
1963+
18871964
### -UILockdown
18881965
Indicates whether to disable UI lockdown mode.
18891966
If you specify a value of $True, Windows Defender disables UI lockdown mode.

0 commit comments

Comments
 (0)