Skip to content

Commit da23325

Browse files
Add changes from PlayPS.
1 parent eb011a0 commit da23325

File tree

9 files changed

+440
-72
lines changed

9 files changed

+440
-72
lines changed

docset/winserver2022-ps/configci/Add-SignerRule.md

Lines changed: 39 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,15 @@ Creates a signer rule and adds it to a policy.
1515

1616
## SYNTAX
1717

18+
### Certificate
1819
```
19-
Add-SignerRule -FilePath <String> -CertificatePath <String> [-Kernel] [-User] [-Update] [-Deny]
20+
Add-SignerRule -FilePath <String> -CertificatePath <String> [-Kernel] [-User] [-Update] [-Supplemental] [-Deny]
21+
[<CommonParameters>]
22+
```
23+
24+
### CertStore
25+
```
26+
Add-SignerRule -FilePath <String> -CertStorePath <String> [-Kernel] [-User] [-Update] [-Supplemental] [-Deny]
2027
[<CommonParameters>]
2128
```
2229

@@ -46,7 +53,7 @@ Specifies the path of a certificate (.cer) file that this cmdlet uses for the ru
4653

4754
```yaml
4855
Type: String
49-
Parameter Sets: (All)
56+
Parameter Sets: Certificate
5057
Aliases: c
5158

5259
Required: True
@@ -56,6 +63,21 @@ Accept pipeline input: False
5663
Accept wildcard characters: False
5764
```
5865
66+
### -CertStorePath
67+
{{ Fill CertStorePath Description }}
68+
69+
```yaml
70+
Type: String
71+
Parameter Sets: CertStore
72+
Aliases:
73+
74+
Required: True
75+
Position: Named
76+
Default value: None
77+
Accept pipeline input: False
78+
Accept wildcard characters: False
79+
```
80+
5981
### -Deny
6082
Indicates that this cmdlet creates a deny rule instead of the default allow rule.
6183
@@ -102,6 +124,21 @@ Accept pipeline input: False
102124
Accept wildcard characters: False
103125
```
104126
127+
### -Supplemental
128+
{{ Fill Supplemental Description }}
129+
130+
```yaml
131+
Type: SwitchParameter
132+
Parameter Sets: (All)
133+
Aliases:
134+
135+
Required: False
136+
Position: Named
137+
Default value: None
138+
Accept pipeline input: False
139+
Accept wildcard characters: False
140+
```
141+
105142
### -Update
106143
Indicates that this cmdlet adds the rule as an Update policy signers rule.
107144
You can add a rule as more than one scenario.

docset/winserver2022-ps/configci/ConfigCI.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -42,16 +42,19 @@ Combines the rules in several Code Integrity policy files.
4242
### [New-CIPolicy](./New-CIPolicy.md)
4343
Creates a Code Integrity policy as an .xml file.
4444

45-
### [New-CIPolicyRule](./New-CIPolicyRule.md)
46-
Generates Code Integrity policy rules for drivers.
45+
### [New-CIPolicyRule](New-CIPolicyRule.md)
46+
Generates Code Integrity policy rules for user mode code and drivers.
4747

4848
### [Remove-CIPolicyRule](./Remove-CIPolicyRule.md)
4949
This cmdlet is not supported.
5050

5151
### [Set-CIPolicyIdInfo](./Set-CIPolicyIdInfo.md)
5252
Modifies the name and ID of a Code Integrity policy.
5353

54-
### [Set-CIPolicyVersion](./Set-CIPolicyVersion.md)
54+
### [Set-CIPolicySetting](Set-CIPolicySetting.md)
55+
{{ Fill in the Synopsis }}
56+
57+
### [Set-CIPolicyVersion](Set-CIPolicyVersion.md)
5558
Updates the version number of the policy.
5659

5760
### [Set-HVCIOptions](./Set-HVCIOptions.md)

docset/winserver2022-ps/configci/Edit-CIPolicyRule.md

Lines changed: 14 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -185,12 +185,12 @@ Accept pipeline input: False
185185
Accept wildcard characters: False
186186
```
187187
188-
### -RType
188+
### -RemoveEkus
189+
189190
```yaml
190-
Type: String
191-
Parameter Sets: (All)
192-
Aliases: t
193-
Accepted values: Allow, Deny, a, d
191+
Type: String[]
192+
Parameter Sets: SignerRule
193+
Aliases:
194194

195195
Required: False
196196
Position: Named
@@ -199,13 +199,12 @@ Accept pipeline input: False
199199
Accept wildcard characters: False
200200
```
201201
202-
### -RemoveEkus
203-
202+
### -RemoveExceptions
204203
205204
```yaml
206205
Type: String[]
207206
Parameter Sets: SignerRule
208-
Aliases:
207+
Aliases:
209208

210209
Required: False
211210
Position: Named
@@ -214,13 +213,12 @@ Accept pipeline input: False
214213
Accept wildcard characters: False
215214
```
216215
217-
### -RemoveExceptions
218-
216+
### -Root
219217
220218
```yaml
221-
Type: String[]
219+
Type: String
222220
Parameter Sets: SignerRule
223-
Aliases:
221+
Aliases:
224222

225223
Required: False
226224
Position: Named
@@ -229,13 +227,12 @@ Accept pipeline input: False
229227
Accept wildcard characters: False
230228
```
231229
232-
### -Root
233-
234-
230+
### -RType
235231
```yaml
236232
Type: String
237-
Parameter Sets: SignerRule
238-
Aliases:
233+
Parameter Sets: (All)
234+
Aliases: t
235+
Accepted values: Allow, Deny, a, d
239236

240237
Required: False
241238
Position: Named

docset/winserver2022-ps/configci/Merge-CIPolicy.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ Combines the rules in several Code Integrity policy files.
1616
## SYNTAX
1717

1818
```
19-
Merge-CIPolicy [-OutputFilePath] <String> [-PolicyPaths] <String[]> [-Rules <Rule[]>] [<CommonParameters>]
19+
Merge-CIPolicy [-OutputFilePath] <String> [-PolicyPaths] <String[]> [-Rules <Rule[]>] [-AppIdTaggingPolicy]
20+
[<CommonParameters>]
2021
```
2122

2223
## DESCRIPTION
@@ -89,6 +90,21 @@ For this example, we present only the first few rules.
8990

9091
## PARAMETERS
9192

93+
### -AppIdTaggingPolicy
94+
{{ Fill AppIdTaggingPolicy Description }}
95+
96+
```yaml
97+
Type: SwitchParameter
98+
Parameter Sets: (All)
99+
Aliases:
100+
101+
Required: False
102+
Position: Named
103+
Default value: None
104+
Accept pipeline input: False
105+
Accept wildcard characters: False
106+
```
107+
92108
### -OutputFilePath
93109
Specifies the path of the merged .xml policy file.
94110

docset/winserver2022-ps/configci/New-CIPolicy.md

Lines changed: 102 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,14 +18,18 @@ Creates a Code Integrity policy as an .xml file.
1818
### Drivers
1919
```
2020
New-CIPolicy [-FilePath] <String> [-DriverFiles <DriverFile[]>] -Level <RuleLevel> [-Fallback <RuleLevel[]>]
21-
[-Audit] [-ScanPath <String>] [-ScriptFileNames] [-UserPEs] [-NoScript] [-Deny] [-NoShadowCopy]
22-
[-OmitPaths <String[]>] [-PathToCatroot <String>] [-MultiplePolicyFormat] [<CommonParameters>]
21+
[-Audit] [-ScanPath <String>] [-ScriptFileNames] [-AllowFileNameFallbacks]
22+
[-SpecificFileNameLevel <FileNameLevel>] [-UserWriteablePaths] [-UserPEs] [-NoScript] [-Deny] [-NoShadowCopy]
23+
[-MultiplePolicyFormat] [-OmitPaths <String[]>] [-PathToCatroot <String>] [-AppIdTaggingPolicy]
24+
[-AppIdTaggingKey <String[]>] [-AppIdTaggingValue <String[]>] [<CommonParameters>]
2325
```
2426

2527
### Rules
2628
```
27-
New-CIPolicy [-FilePath] <String> -Rules <Rule[]> [-Audit] [-ScanPath <String>] [-ScriptFileNames] [-UserPEs]
28-
[-NoScript] [-Deny] [-NoShadowCopy] [-OmitPaths <String[]>] [-PathToCatroot <String>] [-MultiplePolicyFormat] [<CommonParameters>]
29+
New-CIPolicy [-FilePath] <String> -Rules <Rule[]> [-Audit] [-ScanPath <String>] [-ScriptFileNames]
30+
[-AllowFileNameFallbacks] [-SpecificFileNameLevel <FileNameLevel>] [-UserWriteablePaths] [-UserPEs]
31+
[-NoScript] [-Deny] [-NoShadowCopy] [-MultiplePolicyFormat] [-OmitPaths <String[]>] [-PathToCatroot <String>]
32+
[-AppIdTaggingPolicy] [-AppIdTaggingKey <String[]>] [-AppIdTaggingValue <String[]>] [<CommonParameters>]
2933
```
3034

3135
## DESCRIPTION
@@ -309,6 +313,66 @@ File rule exceptions cannot use the PCA Certificate, Publisher, Signed Version,
309313

310314
## PARAMETERS
311315

316+
### -AllowFileNameFallbacks
317+
{{ Fill AllowFileNameFallbacks Description }}
318+
319+
```yaml
320+
Type: SwitchParameter
321+
Parameter Sets: (All)
322+
Aliases:
323+
324+
Required: False
325+
Position: Named
326+
Default value: None
327+
Accept pipeline input: False
328+
Accept wildcard characters: False
329+
```
330+
331+
### -AppIdTaggingKey
332+
{{ Fill AppIdTaggingKey Description }}
333+
334+
```yaml
335+
Type: String[]
336+
Parameter Sets: (All)
337+
Aliases:
338+
339+
Required: False
340+
Position: Named
341+
Default value: None
342+
Accept pipeline input: False
343+
Accept wildcard characters: False
344+
```
345+
346+
### -AppIdTaggingPolicy
347+
{{ Fill AppIdTaggingPolicy Description }}
348+
349+
```yaml
350+
Type: SwitchParameter
351+
Parameter Sets: (All)
352+
Aliases:
353+
354+
Required: False
355+
Position: Named
356+
Default value: None
357+
Accept pipeline input: False
358+
Accept wildcard characters: False
359+
```
360+
361+
### -AppIdTaggingValue
362+
{{ Fill AppIdTaggingValue Description }}
363+
364+
```yaml
365+
Type: String[]
366+
Parameter Sets: (All)
367+
Aliases:
368+
369+
Required: False
370+
Position: Named
371+
Default value: None
372+
Accept pipeline input: False
373+
Accept wildcard characters: False
374+
```
375+
312376
### -Audit
313377
Indicates that this cmdlet searches the Code Integrity Audit log for drivers.
314378
It does not perform a full system scan.
@@ -407,6 +471,22 @@ Accept pipeline input: False
407471
Accept wildcard characters: False
408472
```
409473
474+
### -MultiplePolicyFormat
475+
Indicates that this cmdlet should create a policy in multiple policy format as opposed to a single policy format.
476+
Refer to [Create WDAC policies in Multiple Policy Format](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#creating-wdac-policies-in-multiple-policy-format) for the difference between the policy formats.
477+
478+
```yaml
479+
Type: SwitchParameter
480+
Parameter Sets: (All)
481+
Aliases:
482+
483+
Required: False
484+
Position: Named
485+
Default value: None
486+
Accept pipeline input: False
487+
Accept wildcard characters: False
488+
```
489+
410490
### -NoScript
411491
Indicates that this cmdlet does not search script files.
412492
It searches portable executable files (PE files) only.
@@ -525,6 +605,21 @@ Accept pipeline input: False
525605
Accept wildcard characters: False
526606
```
527607
608+
### -SpecificFileNameLevel
609+
{{ Fill SpecificFileNameLevel Description }}
610+
611+
```yaml
612+
Type: FileNameLevel
613+
Parameter Sets: (All)
614+
Aliases:
615+
616+
Required: False
617+
Position: Named
618+
Default value: None
619+
Accept pipeline input: False
620+
Accept wildcard characters: False
621+
```
622+
528623
### -UserPEs
529624
Indicates that this cmdlet includes user-mode files in the scan.
530625
Specify this parameter only if you do not provide driver files or rules.
@@ -541,14 +636,13 @@ Accept pipeline input: False
541636
Accept wildcard characters: False
542637
```
543638
544-
### -MultiplePolicyFormat
545-
Indicates that this cmdlet should create a policy in multiple policy format as opposed to a single policy format.
546-
Refer to [Create WDAC policies in Multiple Policy Format](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#creating-wdac-policies-in-multiple-policy-format) for the difference between the policy formats.
639+
### -UserWriteablePaths
640+
{{ Fill UserWriteablePaths Description }}
547641
548642
```yaml
549643
Type: SwitchParameter
550644
Parameter Sets: (All)
551-
Aliases: None
645+
Aliases:
552646

553647
Required: False
554648
Position: Named

0 commit comments

Comments
 (0)