2
2
description : Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
3
3
external help file : MSFT_MpPreference.cdxml-help.xml
4
4
Module Name : Defender
5
- ms.date : 11/04/2021
5
+ ms.date : 01/24/2022
6
6
online version : https://docs.microsoft.com/powershell/module/defender/set-mppreference?view=windowsserver2019-ps&wt.mc_id=ps-gethelp
7
7
schema : 2.0.0
8
8
title : Set-MpPreference
@@ -23,7 +23,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
23
23
[-ReportingNonCriticalTimeOut <UInt32>] [-ScanAvgCPULoadFactor <Byte>]
24
24
[-CheckForSignaturesBeforeRunningScan <Boolean>] [-ScanPurgeItemsAfterDelay <UInt32>]
25
25
[-ScanOnlyIfIdleEnabled <Boolean>] [-ScanParameters <ScanType>] [-ScanScheduleDay <Day>]
26
- [-ScanScheduleQuickScanTime <DateTime>] [-ScanScheduleTime <DateTime >] [-SignatureFirstAuGracePeriod <UInt32>]
26
+ [-ScanScheduleQuickScanTime <DateTime>] [-ScanScheduleOffset <UInt32 >] [-SignatureFirstAuGracePeriod <UInt32>]
27
27
[-SignatureAuGracePeriod <UInt32>] [-SignatureDefinitionUpdateFileSharesSources <String>]
28
28
[-SignatureDisableUpdateOnStartupWithoutEngine <Boolean>] [-SignatureFallbackOrder <String>]
29
29
[-SignatureScheduleDay <Day>] [-SignatureScheduleTime <DateTime>] [-SignatureUpdateCatchupInterval <UInt32>]
@@ -41,7 +41,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
41
41
[-LowThreatDefaultAction <ThreatAction>] [-ModerateThreatDefaultAction <ThreatAction>]
42
42
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
43
43
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
44
- [-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>][-CloudBlockLevel <CloudBlockLevelType>]
44
+ [-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>][-CloudBlockLevel <CloudBlockLevelType>][-ServiceHealthReportInterval <UInt32>]
45
45
```
46
46
47
47
## DESCRIPTION
@@ -975,7 +975,7 @@ Accept wildcard characters: False
975
975
### -ScanScheduleQuickScanTime
976
976
Specifies the time of day, as the number of minutes after midnight, to perform a scheduled quick scan.
977
977
The time refers to the local time on the computer.
978
- If you do not specify a value for this parameter, a scheduled quick scan runs at the time specified by the **ScanScheduleTime ** parameter.
978
+ If you do not specify a value for this parameter, a scheduled quick scan runs at the time specified by the **ScanScheduleOffset ** parameter.
979
979
That parameter has a default time of two hours after midnight.
980
980
981
981
` ` ` yaml
@@ -991,14 +991,15 @@ Accept wildcard characters: False
991
991
` ` `
992
992
993
993
### -ScanScheduleTime
994
- Specifies the time of day, as the number of minutes after midnight, to perform a scheduled scan.
995
- The time refers to the local time on the computer.
996
- If you do not specify a value for this parameter, a scheduled scan runs at a default time of two hours after midnight.
994
+ This setting is discontinued and replaced with -ScanScheduleOffset as of the January 2022 (version 4.18.2201.X) update to Microsoft Defender Antivirus.
995
+
996
+ ### -ScanScheduleOffset
997
+ Configures the number of minutes after midnight to perform a scheduled scan. The time on the endpoint is used to determine the local time. If you enable this setting, a scheduled scan will run at the time specified. If you disable or do not enable this setting, a scheduled scan runs at the default time of two hours (120 minutes) after midnight.
997
998
998
999
` ` ` yaml
999
- Type : DateTime
1000
+ Type : UInt32
1000
1001
Parameter Sets : (All)
1001
- Aliases : scst
1002
+ Aliases : scso
1002
1003
1003
1004
Required : False
1004
1005
Position : Named
@@ -1007,6 +1008,23 @@ Accept pipeline input: False
1007
1008
Accept wildcard characters : False
1008
1009
` ` `
1009
1010
1011
+ ### -ServiceHealthReportInterval
1012
+ This policy setting configures the time interval (in minutes) for the service health reports to be sent from endpoints.
1013
+
1014
+ If you do not configure this setting, the default value will be applied. The default value is set at 60 minutes (one hour).
1015
+ If you configure this setting to 0, no service health reports will be sent.
1016
+ The maximum value allowed to be set is 14400 minutes (ten days).
1017
+
1018
+ ` ` ` yaml
1019
+ Type : UInt32
1020
+ Aliases : shri
1021
+ Accepted values : 0-14400
1022
+ Position : Named
1023
+ Default value : 60
1024
+ Accept pipeline input : False
1025
+ Accept wildcard characters : False
1026
+ ` ` `
1027
+
1010
1028
### -SevereThreatDefaultAction
1011
1029
Specifies which automatic remediation action to take for a severe level threat.
1012
1030
The acceptable values for this parameter are:
0 commit comments