Skip to content

Commit

Permalink
Merge pull request #3684 from msbemba/patch-170
Browse files Browse the repository at this point in the history
Update Set-MpPreference.md
  • Loading branch information
tiburd authored Nov 13, 2023
2 parents 1404de2 + 8e44d9b commit 003b8fb
Showing 1 changed file with 78 additions and 1 deletion.
79 changes: 78 additions & 1 deletion docset/winserver2022-ps/defender/Set-MpPreference.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ Configures preferences for Windows Defender scans and updates.
```powershell
Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-ExclusionProcess <String[]>]
[-ExclusionIpAddress <String[]>] [-RealTimeScanDirection <ScanDirection>]
[-IntelTDTEnabled <UInt32>]
[-QuarantinePurgeItemsAfterDelay <UInt32>] [-RemediationScheduleDay <Day>]
[-RemediationScheduleTime <DateTime>] [-ReportingAdditionalActionTimeOut <UInt32>]
[-ReportingCriticalFailureTimeOut <UInt32>] [-ReportingNonCriticalTimeOut <UInt32>]
Expand Down Expand Up @@ -57,8 +58,9 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
[-ProxyServer <String>] [-ProxyBypass <String[]>] [-ForceUseProxyOnly <Boolean>]
[-OobeEnableRtpAndSigUpdate <Boolean>]
[-DisableTlsParsing <Boolean>] [-DisableHttpParsing <Boolean>] [-DisableDnsParsing <Boolean>]
[-DisableFtpParsing <Boolean>]
[-DisableFtpParsing <Boolean>] [-DisableSmtpParsing <Boolean>]
[-DisableDnsOverTcpParsing <Boolean>] [-DisableSshParsing <Boolean>]
[-DisableNetworkProtectionPerfTelemetry <Boolean>]
[-PlatformUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>]
[-SignaturesUpdatesChannel <UpdatesChannelType>] [-DisableGradualRelease <Boolean>]
[-AllowNetworkProtectionDownLevel <Boolean>] [-AllowDatagramProcessingOnWinServer <Boolean>]
Expand Down Expand Up @@ -613,6 +615,24 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -DisableNetworkProtectionPerfTelemetry
This setting disables the gathering and sending of performance telemetry from network protection.
The accepted values are 0 and 1.
- 1- Network protection telemetry is disabled.
- 0 (Default) - Network protection telemetry is enabled.

```yaml
Type: Boolean
Parameter Sets: (All)
Aliases: dnpp
Required: False
Position: Named
Default value: 0
Accept pipeline input: False
Accept wildcard characters: False
```

### -DisablePrivacyMode
**This is a legacy setting that does not have any affect on current platforms**. The intent of this parameter was to disable privacy mode, which prevented users, other than administrators, from displaying threat history. When this parameter was in use, if you specified a value of $False or did not specify a value, privacy mode was enabled.

Expand Down Expand Up @@ -754,6 +774,24 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -DisableSmtpParsing
This setting disables SMTP parsing for network protection.
The accepted values are 0 and 1.
- 1 - SMTP parsing is disabled.
- 0 (Default) - SMTP parsing is enabled.

```yaml
Type: Boolean
Parameter Sets: (All)
Aliases: dsp
Required: False
Position: Named
Default value: 0
Accept pipeline input: False
Accept wildcard characters: False
```

### -DisableTlsParsing
Specifies whether to disable inspection of TLS traffic.
Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, network protection inspects TLS traffic.
Expand Down Expand Up @@ -1002,6 +1040,26 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -IntelTDTEnabled
This policy setting configures the Intel TDT integration level for Intel TDT-capable devices.
The acceptable values for this parameter are:
- 0 (Default) - If you don't configure this setting, the default value will be applied. The default value is controlled by Microsoft security intelligence updates. Microsoft will enable Intel TDT if there is a known threat.
- 1 - If you configure this setting to enabled, Intel TDT integration will turn on.
- 2 - If you configure this setting to disabled, Intel TDT integration will turn off.

```yaml
Type: UInt32
Parameter Sets: (All)
Aliases: itdte
Accepted values: 0,1 and 2
Required: False
Position: Named
Default value: 0
Accept pipeline input: False
Accept wildcard characters: False
```

### -LowThreatDefaultAction
Specifies which automatic remediation action to take for a low level threat.
The acceptable values for this parameter are:
Expand Down Expand Up @@ -1884,6 +1942,25 @@ Accept pipeline input: False
Accept wildcard characters: False
```

### -ThrottleForScheduledScanOnly
A CPU usage limit can be applied to scheduled scans only, or to scheduled and custom scans. The default value applies a CPU usage limit to scheduled scans only.
The acceptable values for this parameter are:
- 1 (Default) - If you enable this setting, CPU throttling will apply only to scheduled scans.
- 0 - If you disable this setting, CPU throttling will apply to scheduled and custom scans.

```yaml
Type: Boolean
Parameter Sets: (All)
Aliases:
Required: False
Position: Named
Default value: 1
Accept pipeline input: False
Accept wildcard characters: False
```


### -UILockdown
Indicates whether to disable UI lockdown mode.
If you specify a value of $True, Windows Defender disables UI lockdown mode.
Expand Down

0 comments on commit 003b8fb

Please sign in to comment.