You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -309,6 +313,66 @@ File rule exceptions cannot use the PCA Certificate, Publisher, Signed Version,
309
313
310
314
## PARAMETERS
311
315
316
+
### -AllowFileNameFallbacks
317
+
{{ Fill AllowFileNameFallbacks Description }}
318
+
319
+
```yaml
320
+
Type: SwitchParameter
321
+
Parameter Sets: (All)
322
+
Aliases:
323
+
324
+
Required: False
325
+
Position: Named
326
+
Default value: None
327
+
Accept pipeline input: False
328
+
Accept wildcard characters: False
329
+
```
330
+
331
+
### -AppIdTaggingKey
332
+
{{ Fill AppIdTaggingKey Description }}
333
+
334
+
```yaml
335
+
Type: String[]
336
+
Parameter Sets: (All)
337
+
Aliases:
338
+
339
+
Required: False
340
+
Position: Named
341
+
Default value: None
342
+
Accept pipeline input: False
343
+
Accept wildcard characters: False
344
+
```
345
+
346
+
### -AppIdTaggingPolicy
347
+
{{ Fill AppIdTaggingPolicy Description }}
348
+
349
+
```yaml
350
+
Type: SwitchParameter
351
+
Parameter Sets: (All)
352
+
Aliases:
353
+
354
+
Required: False
355
+
Position: Named
356
+
Default value: None
357
+
Accept pipeline input: False
358
+
Accept wildcard characters: False
359
+
```
360
+
361
+
### -AppIdTaggingValue
362
+
{{ Fill AppIdTaggingValue Description }}
363
+
364
+
```yaml
365
+
Type: String[]
366
+
Parameter Sets: (All)
367
+
Aliases:
368
+
369
+
Required: False
370
+
Position: Named
371
+
Default value: None
372
+
Accept pipeline input: False
373
+
Accept wildcard characters: False
374
+
```
375
+
312
376
### -Audit
313
377
Indicates that this cmdlet searches the Code Integrity Audit log for drivers.
314
378
It does not perform a full system scan.
@@ -407,6 +471,22 @@ Accept pipeline input: False
407
471
Accept wildcard characters: False
408
472
```
409
473
474
+
### -MultiplePolicyFormat
475
+
Indicates that this cmdlet should create a policy in multiple policy format as opposed to a single policy format.
476
+
Refer to [Create WDAC policies in Multiple Policy Format](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#creating-wdac-policies-in-multiple-policy-format) for the difference between the policy formats.
477
+
478
+
```yaml
479
+
Type: SwitchParameter
480
+
Parameter Sets: (All)
481
+
Aliases:
482
+
483
+
Required: False
484
+
Position: Named
485
+
Default value: None
486
+
Accept pipeline input: False
487
+
Accept wildcard characters: False
488
+
```
489
+
410
490
### -NoScript
411
491
Indicates that this cmdlet does not search script files.
412
492
It searches portable executable files (PE files) only.
@@ -525,6 +605,21 @@ Accept pipeline input: False
525
605
Accept wildcard characters: False
526
606
```
527
607
608
+
### -SpecificFileNameLevel
609
+
{{ Fill SpecificFileNameLevel Description }}
610
+
611
+
```yaml
612
+
Type: FileNameLevel
613
+
Parameter Sets: (All)
614
+
Aliases:
615
+
616
+
Required: False
617
+
Position: Named
618
+
Default value: None
619
+
Accept pipeline input: False
620
+
Accept wildcard characters: False
621
+
```
622
+
528
623
### -UserPEs
529
624
Indicates that this cmdlet includes user-mode files in the scan.
530
625
Specify this parameter only if you do not provide driver files or rules.
Indicates that this cmdlet should create a policy in multiple policy format as opposed to a single policy format.
546
-
Refer to [Create WDAC policies in Multiple Policy Format](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies#creating-wdac-policies-in-multiple-policy-format) for the difference between the policy formats.
0 commit comments