Skip to content

Commit ec38eb0

Browse files
authored
Merge pull request MicrosoftDocs#2487 from marysiakam9889/patch-1
Update Set-MpPreference.md
2 parents 5c36761 + 463e1ef commit ec38eb0

File tree

1 file changed

+106
-2
lines changed

1 file changed

+106
-2
lines changed

docset/winserver2019-ps/defender/Set-MpPreference.md

Lines changed: 106 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,15 +32,16 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
3232
[-DisablePrivacyMode <Boolean>] [-RandomizeScheduleTaskTimes <Boolean>] [-DisableBehaviorMonitoring <Boolean>]
3333
[-DisableIntrusionPreventionSystem <Boolean>] [-DisableIOAVProtection <Boolean>]
3434
[-DisableRealtimeMonitoring <Boolean>] [-DisableScriptScanning <Boolean>] [-DisableArchiveScanning <Boolean>]
35-
[-DisableCatchupFullScan <Boolean>] [-DisableCatchupQuickScan <Boolean>] [-DisableCpuThrottleOnIdleScans <Boolean>] [-DisableEmailScanning <Boolean>]
35+
[-DisableCatchupFullScan <Boolean>] [-DisableCatchupQuickScan <Boolean>] [-DisableCpuThrottleOnIdleScans <Boolean>]
36+
[-DisableEmailScanning <Boolean>]
3637
[-DisableRemovableDriveScanning <Boolean>] [-DisableRestorePoint <Boolean>]
3738
[-DisableScanningMappedNetworkDrivesForFullScan <Boolean>] [-DisableScanningNetworkFiles <Boolean>]
3839
[-UILockdown <Boolean>] [-ThreatIDDefaultAction_Ids <Int64[]>]
3940
[-ThreatIDDefaultAction_Actions <ThreatAction[]>] [-UnknownThreatDefaultAction <ThreatAction>]
4041
[-LowThreatDefaultAction <ThreatAction>] [-ModerateThreatDefaultAction <ThreatAction>]
4142
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
4243
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
43-
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>]
44+
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>]
4445
```
4546

4647
## DESCRIPTION
@@ -137,6 +138,29 @@ Accept pipeline input: False
137138
Accept wildcard characters: False
138139
```
139140
141+
### -DefinitionUpdatesChannel
142+
Enable this policy to specify when devices receive daily Microsoft Defender definition updates during the daily gradual rollout.
143+
144+
Current Channel (Staged): Devices will be offered updates after the release cycle. Suggested to apply to a small, representative part of production population (~10%).
145+
146+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
147+
148+
If you disable or do not configure this policy, the device will stay up to date automatically during the daily release cycle. Suitable for most devices.
149+
150+
Supported OS versions: Windows 10
151+
152+
```yaml
153+
Type: UpdatesChannelType
154+
Parameter Sets: (All)
155+
Aliases:
156+
Accepted values: Staged|Broad|Not Configured
157+
Required: False
158+
Position: Named
159+
Default value: None
160+
Accept pipeline input: False
161+
Accept wildcard characters: False
162+
```
163+
140164
### -DisableArchiveScanning
141165
Indicates whether to scan archive files, such as .zip and .cab files, for malicious and unwanted software.
142166
If you specify a value of $False or do not specify a value, Windows Defender scans archive files.
@@ -248,6 +272,28 @@ Accept pipeline input: False
248272
Accept wildcard characters: False
249273
```
250274
275+
### -DisableGradualRelease
276+
277+
Enable this policy to disable gradual rollout of monthly and daily Defender updates.
278+
279+
Devices will be offered all Defender updates after the gradual release cycle completes. Best for datacenter machines that only receive limited updates.
280+
281+
Note: This setting applies to both monthly as well as daily Defender updates and will override any previously configured channel selections for platform and engine updates.
282+
283+
If you disable or do not configure this policy, the device will remain in Current Channel (Default) unless specified otherwise in specific channels for platform and engine updates. Stay up to date automatically during the gradual release cycle. Suitable for most devices.
284+
285+
Supported OS versions: Windows 10
286+
287+
```yaml
288+
Type: Boolean
289+
Aliases:
290+
Position: Named
291+
Default value: None
292+
Accept pipeline input: False
293+
Accept wildcard characters: False
294+
```
295+
296+
251297
### -DisableEmailScanning
252298
Indicates whether Windows Defender parses the mailbox and mail files, according to their specific format, in order to analyze mail bodies and attachments.
253299
Windows Defender supports several formats, including .pst, .dbx, .mbx, .mime, and .binhex.
@@ -266,6 +312,7 @@ Accept pipeline input: False
266312
Accept wildcard characters: False
267313
```
268314
315+
269316
### -DisableIOAVProtection
270317
Indicates whether Windows Defender scans all downloaded files and attachments.
271318
If you specify a value of $False or do not specify a value, scanning downloaded files and attachments is enabled.
@@ -410,6 +457,35 @@ Accept pipeline input: False
410457
Accept wildcard characters: False
411458
```
412459
460+
### -EngineUpdatesChannel
461+
462+
Enable this policy to specify when devices receive Microsoft Defender engine updates during the monthly gradual rollout.
463+
464+
Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.
465+
466+
Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.
467+
468+
Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).
469+
470+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
471+
472+
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
473+
474+
Supported OS versions: Windows 10
475+
476+
```yaml
477+
Type: UpdatesChannelType
478+
Parameter Sets: (All)
479+
Aliases:
480+
Accepted values:Beta|Preview|Staged|Broad|NotConfigured
481+
482+
Required: False
483+
Position: Named
484+
Default value: None
485+
Accept pipeline input: False
486+
Accept wildcard characters: False
487+
```
488+
413489
### -ExclusionExtension
414490
Specifies an array of file name extensions, such as obj or lib, to exclude from scheduled, custom, and real-time scanning.
415491
@@ -585,6 +661,34 @@ Accept pipeline input: False
585661
Accept wildcard characters: False
586662
```
587663
664+
### -PlatformUpdatesChannel
665+
666+
Enable this policy to specify when devices receive Microsoft Defender platform updates during the monthly gradual rollout.
667+
668+
Beta Channel: Devices set to this channel will be the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. For use in (manual) test environments only and a limited number of devices.
669+
670+
Current Channel (Preview): Devices set to this channel will be offered updates earliest during the monthly gradual release cycle. Suggested for pre-production/validation environments.
671+
672+
Current Channel (Staged): Devices will be offered updates after the monthly gradual release cycle. Suggested to apply to a small, representative part of your production population (~10%).
673+
674+
Current Channel (Broad): Devices will be offered updates only after the gradual release cycle completes. Suggested to apply to a broad set of devices in your production population (~10-100%).
675+
676+
If you disable or do not configure this policy, the device will stay up to date automatically during the gradual release cycle. Suitable for most devices.
677+
678+
Supported OS versions: Windows 10
679+
680+
```yaml
681+
Type: UpdatesChannelType
682+
Parameter Sets: (All)
683+
Aliases:
684+
Accepted values: Beta|Preview|Staged|Broad|NotConfigured
685+
Required: False
686+
Position: Named
687+
Default value: None
688+
Accept pipeline input: False
689+
Accept wildcard characters: False
690+
```
691+
588692
### -QuarantinePurgeItemsAfterDelay
589693
Specifies the number of days to keep items in the Quarantine folder.
590694
If you specify a value of zero or do not specify a value for this parameter, items stay in the Quarantine folder indefinitely.

0 commit comments

Comments
 (0)