Skip to content

Commit d40c5ac

Browse files
Incorporate feedback.
1 parent d981f56 commit d40c5ac

File tree

7 files changed

+65
-30
lines changed

7 files changed

+65
-30
lines changed

docset/winserver2022-ps/configci/Add-SignerRule.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ Accept wildcard characters: False
6464
```
6565
6666
### -CertStorePath
67-
{{ Fill CertStorePath Description }}
67+
Specifies the path to a certificate store to export certificates into the policy.
6868
6969
```yaml
7070
Type: String
@@ -125,7 +125,8 @@ Accept wildcard characters: False
125125
```
126126
127127
### -Supplemental
128-
{{ Fill Supplemental Description }}
128+
Indicates that this cmdlet adds the rule as a Supplemental policy signers rule.
129+
You can add a rule as more than one scenario.
129130
130131
```yaml
131132
Type: SwitchParameter

docset/winserver2022-ps/configci/ConfigCI.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ This cmdlet is not supported.
5252
Modifies the name and ID of a Code Integrity policy.
5353

5454
### [Set-CIPolicySetting](Set-CIPolicySetting.md)
55-
{{ Fill in the Synopsis }}
55+
Modifies the SecureSettings within the Code Integrity policy.
5656

5757
### [Set-CIPolicyVersion](Set-CIPolicyVersion.md)
5858
Updates the version number of the policy.

docset/winserver2022-ps/configci/Merge-CIPolicy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ For this example, we present only the first few rules.
9191
## PARAMETERS
9292

9393
### -AppIdTaggingPolicy
94-
{{ Fill AppIdTaggingPolicy Description }}
94+
This parameter is reserved for future use.
9595

9696
```yaml
9797
Type: SwitchParameter

docset/winserver2022-ps/configci/New-CIPolicy.md

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,11 @@ File rule exceptions cannot use the PCA Certificate, Publisher, Signed Version,
314314
## PARAMETERS
315315

316316
### -AllowFileNameFallbacks
317-
{{ Fill AllowFileNameFallbacks Description }}
317+
Indicates that files that do not have an `OriginalFileName` fall back in the following order:
318+
319+
- InternalName
320+
- FileDescription
321+
- ProductName
318322

319323
```yaml
320324
Type: SwitchParameter
@@ -329,7 +333,7 @@ Accept wildcard characters: False
329333
```
330334
331335
### -AppIdTaggingKey
332-
{{ Fill AppIdTaggingKey Description }}
336+
This parameter is reserved for future use.
333337
334338
```yaml
335339
Type: String[]
@@ -344,7 +348,7 @@ Accept wildcard characters: False
344348
```
345349
346350
### -AppIdTaggingPolicy
347-
{{ Fill AppIdTaggingPolicy Description }}
351+
This parameter is reserved for future use.
348352
349353
```yaml
350354
Type: SwitchParameter
@@ -359,7 +363,7 @@ Accept wildcard characters: False
359363
```
360364
361365
### -AppIdTaggingValue
362-
{{ Fill AppIdTaggingValue Description }}
366+
This parameter is reserved for future use.
363367
364368
```yaml
365369
Type: String[]
@@ -606,7 +610,8 @@ Accept wildcard characters: False
606610
```
607611
608612
### -SpecificFileNameLevel
609-
{{ Fill SpecificFileNameLevel Description }}
613+
Specifies the attribute of the file off which to base a file name rule. The -Level must be set to FileName for this option.
614+
Refer to [File Name Rules Info](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-filename-rules) for a description of the acceptable values.
610615
611616
```yaml
612617
Type: FileNameLevel
@@ -637,7 +642,7 @@ Accept wildcard characters: False
637642
```
638643
639644
### -UserWriteablePaths
640-
{{ Fill UserWriteablePaths Description }}
645+
Indicates that this cmdlet includes files identified as user writeable in the policy.
641646
642647
```yaml
643648
Type: SwitchParameter

docset/winserver2022-ps/configci/New-CIPolicyRule.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,11 @@ This set of commands finds a packaged application matching the specified name an
247247
## PARAMETERS
248248

249249
### -AllowFileNameFallbacks
250-
{{ Fill AllowFileNameFallbacks Description }}
250+
Indicates that files that do not have an `OriginalFileName` fall back in the following order:
251+
252+
- InternalName
253+
- FileDescription
254+
- ProductName
251255

252256
```yaml
253257
Type: SwitchParameter
@@ -262,7 +266,10 @@ Accept wildcard characters: False
262266
```
263267
264268
### -AppID
265-
{{ Fill AppID Description }}
269+
Specifies an app.
270+
This cmdlet creates per-app rules which control whether specific plug-ins, add-ins, and modules can run from specific apps.
271+
272+
For more information, see [Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules](/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules).
266273
267274
```yaml
268275
Type: String
@@ -403,8 +410,8 @@ Accept wildcard characters: False
403410
```
404411
405412
### -SpecificFileNameLevel
406-
Specifies the attribute of the file off which to base a file name rule. The -Level must be set to FileName for this option.
407-
Refer to [File Name Rules Info](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-filename-rules) for a description of the acceptable values.
413+
Specifies the attribute of the file off which to base a file name rule. The -Level must be set to FileName for this option.
414+
Refer to [File Name Rules Info](https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create#windows-defender-application-control-filename-rules) for a description of the acceptable values.
408415
409416
```yaml
410417
Type: FileNameLevel
@@ -420,7 +427,7 @@ Accept wildcard characters: False
420427
```
421428
422429
### -UserWriteablePaths
423-
{{ Fill UserWriteablePaths Description }}
430+
Indicates that this cmdlet includes files identified as user writeable in the policy.
424431
425432
```yaml
426433
Type: SwitchParameter

docset/winserver2022-ps/configci/Set-CIPolicySetting.md

Lines changed: 36 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,17 @@
11
---
2+
description: The Set-CIPolicySetting cmdlet modifies the SecureSettings within the Code Integrity policy.
23
external help file: Microsoft.ConfigCI.Commands.dll-Help.xml
34
Module Name: ConfigCI
4-
online version:
5+
ms.date: 10/20/2021
6+
online version: https://docs.microsoft.com/powershell/module/configci/set-cipolicysetting?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
57
schema: 2.0.0
8+
title: Set-CIPolicySetting
69
---
710

811
# Set-CIPolicySetting
912

1013
## SYNOPSIS
11-
{{ Fill in the Synopsis }}
14+
Modifies the SecureSettings within the Code Integrity policy.
1215

1316
## SYNTAX
1417

@@ -25,21 +28,23 @@ Set-CIPolicySetting [-FilePath] <String> -Provider <String> -Key <String> -Value
2528
```
2629

2730
## DESCRIPTION
28-
{{ Fill in the Description }}
31+
The **Set-CIPolicySetting** cmdlet modifies the Secure Settings within a Code Integrity policy.
32+
Specify the .xml file of the policy to modify.
33+
Secure Settings are queried by Windows APIs to set security behaviors.
2934

3035
## EXAMPLES
3136

32-
### Example 1
37+
### Example 1: Sets the Code Integrity policy
3338
```powershell
34-
PS C:\> {{ Add example code here }}
39+
Set-CIPolicySetting -FilePath C:\Policies\WDAC_policy.xml -Key "{12345678-9abc-def0-1234-56789abcdef0}" -Provider WSH -Value $True -ValueName EnterpriseDefinedClsId -ValueType Boolean
3540
```
3641

37-
{{ Add example description here }}
42+
This command sets the Code Integrity policy to allow for the specified **Provider**, **Key** and **ValueName**.
3843

3944
## PARAMETERS
4045

4146
### -Delete
42-
{{ Fill Delete Description }}
47+
Indicates that this cmdlet removes a Secure Setting from the Code Integrity policy identified by **Provider**, **Key** and **ValueName**.
4348

4449
```yaml
4550
Type: SwitchParameter
@@ -54,7 +59,7 @@ Accept wildcard characters: False
5459
```
5560
5661
### -FilePath
57-
{{ Fill FilePath Description }}
62+
Specifies the full path of the policy .xml file.
5863
5964
```yaml
6065
Type: String
@@ -69,7 +74,10 @@ Accept wildcard characters: False
6974
```
7075
7176
### -Key
72-
{{ Fill Key Description }}
77+
Specifies the Secure Setting key.
78+
The key is the GUID of the program to run in this format:
79+
80+
{33333333-4444-4444-1616-161616161616}
7381
7482
```yaml
7583
Type: String
@@ -84,7 +92,8 @@ Accept wildcard characters: False
8492
```
8593
8694
### -Provider
87-
{{ Fill Provider Description }}
95+
Specifies the Secure Setting provider.
96+
The provider is the platform on which the code runs.
8897
8998
```yaml
9099
Type: String
@@ -99,7 +108,10 @@ Accept wildcard characters: False
99108
```
100109
101110
### -Value
102-
{{ Fill Value Description }}
111+
Specifies the Secure Setting value.
112+
Specify `$True` to allow or `$False` to deny.
113+
114+
Specify $False, or deny, only for base policies, not supplemental policies.
103115

104116
```yaml
105117
Type: String
@@ -114,7 +126,7 @@ Accept wildcard characters: False
114126
```
115127

116128
### -ValueName
117-
{{ Fill ValueName Description }}
129+
Specifies the value name.
118130

119131
```yaml
120132
Type: String
@@ -129,7 +141,12 @@ Accept wildcard characters: False
129141
```
130142

131143
### -ValueType
132-
{{ Fill ValueType Description }}
144+
Specifies the value type. Valid values are:
145+
146+
- Boolean
147+
- DWord
148+
- Binary
149+
- String
133150

134151
```yaml
135152
Type: String
@@ -145,7 +162,7 @@ Accept wildcard characters: False
145162
```
146163

147164
### CommonParameters
148-
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216).
165+
This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](https://go.microsoft.com/fwlink/?LinkID=113216).
149166

150167
## INPUTS
151168

@@ -154,6 +171,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable
154171
## OUTPUTS
155172

156173
### System.Object
174+
157175
## NOTES
158176

159177
## RELATED LINKS
178+
179+
[New-CIPolicy](New-CIPolicy.md)
180+
181+
[New-CIPolicyRule](New-CIPolicyRule.md)

docset/winserver2022-ps/configci/Set-HVCIOptions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Accept wildcard characters: False
7070
```
7171
7272
### -DisableAllowed
73-
{{ Fill DisableAllowed Description }}
73+
Indicates that this cmdlet allows for HVCI to be disabled by the user outside of the Code Integrity policy enablement method.
7474
7575
```yaml
7676
Type: SwitchParameter

0 commit comments

Comments
 (0)