Skip to content

Commit 6704cef

Browse files
authored
Merge pull request MicrosoftDocs#2727 from JoelJerkin/patch-1
Added missing parameters
2 parents db5f258 + a1077f5 commit 6704cef

File tree

2 files changed

+112
-7
lines changed

2 files changed

+112
-7
lines changed

docset/winserver2019-ps/defender/Add-MpPreference.md

+110-5
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
2+
description: The Add-MpPreference cmdlet modifies settings for Windows Defender.
33
external help file: MSFT_MpPreference.cdxml-help.xml
44
Module Name: Defender
55
ms.date: 12/20/2016
@@ -17,8 +17,11 @@ Modifies settings for Windows Defender.
1717

1818
```
1919
Add-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-ExclusionProcess <String[]>]
20-
[-ThreatIDDefaultAction_Ids <Int64[]>] [-ThreatIDDefaultAction_Actions <ThreatAction[]>] [-Force]
21-
[-CimSession <CimSession[]>] [-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>]
20+
[-ExclusionIpAddress <String[]>] [-ThreatIDDefaultAction_Ids <Int64[]>]
21+
[-ThreatIDDefaultAction_Actions <ThreatAction[]>] [-AttackSurfaceReductionOnlyExclusions <String[]>]
22+
[-ControlledFolderAccessAllowedApplications <String[]>] [-ControlledFolderAccessProtectedFolders <String[]>]
23+
[-AttackSurfaceReductionRules_Ids <String[]>] [-AttackSurfaceReductionRules_Actions <ASRRuleActionType[]>]
24+
[-Force] [-CimSession <CimSession[]>] [-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>]
2225
```
2326

2427
## DESCRIPTION
@@ -28,13 +31,20 @@ Use this cmdlet to add exclusions for file name extensions, paths, and processes
2831
## EXAMPLES
2932

3033
### Example 1: Add a folder to the exclusion list
31-
```
32-
PS C:\> Add-MpPreference -ExclusionPath "C:\Temp"
34+
```powershell
35+
Add-MpPreference -ExclusionPath "C:\Temp"
3336
```
3437

3538
This command adds the folder C:\Temp to the exclusion list.
3639
The command disables Windows Defender scheduled and real-time scanning for files in this folder.
3740

41+
### Example 2: Allow an application to access folders
42+
```powershell
43+
Add-MpPreference -ControlledFolderAccessAllowedApplications "c:\apps\test.exe"
44+
```
45+
46+
This command allows the specified application to make changes in controlled folders.
47+
3848
## PARAMETERS
3949

4050
### -AsJob
@@ -59,6 +69,56 @@ Accept pipeline input: False
5969
Accept wildcard characters: False
6070
```
6171
72+
### -AttackSurfaceReductionOnlyExclusions
73+
Specifies the files or folders to exclude from attack surface reduction (ASR) rules. Enter a folder path or a fully qualified resource name. For example, `C:\Windows` excludes all files in that directory. `C:\Windows\App.exe` excludes only that specific file in that specific folder.
74+
75+
See the [ASR rules](/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) topic for more information about excluding files and folders from ASR rules.
76+
77+
```yaml
78+
Type: String[]
79+
Parameter Sets: (All)
80+
Aliases:
81+
82+
Required: False
83+
Position: Named
84+
Default value: None
85+
Accept pipeline input: False
86+
Accept wildcard characters: False
87+
```
88+
89+
### -AttackSurfaceReductionRules_Actions
90+
Specifies the states of attack surface reduction rules specified by using the **AttackSurfaceReductionRules_Ids** parameter.
91+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
92+
93+
```yaml
94+
Type: ASRRuleActionType[]
95+
Parameter Sets: (All)
96+
Aliases:
97+
98+
Required: False
99+
Position: Named
100+
Default value: None
101+
Accept pipeline input: False
102+
Accept wildcard characters: False
103+
```
104+
105+
### -AttackSurfaceReductionRules_Ids
106+
Specifies the IDs of attack surface reduction rules.
107+
Use the **AttackSurfaceReductionRules_Actions** parameter to specify the state for each rule.
108+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
109+
110+
```yaml
111+
Type: String[]
112+
Parameter Sets: (All)
113+
Aliases:
114+
115+
Required: False
116+
Position: Named
117+
Default value: None
118+
Accept pipeline input: False
119+
Accept wildcard characters: False
120+
```
121+
62122
### -CimSession
63123
Runs the cmdlet in a remote session or on a remote computer.
64124
Enter a computer name or a session object, such as the output of a [New-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227967) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
@@ -76,6 +136,36 @@ Accept pipeline input: False
76136
Accept wildcard characters: False
77137
```
78138

139+
### -ControlledFolderAccessAllowedApplications
140+
Specifies applications that can make changes in controlled folders.
141+
142+
```yaml
143+
Type: String[]
144+
Parameter Sets: (All)
145+
Aliases:
146+
147+
Required: False
148+
Position: Named
149+
Default value: None
150+
Accept pipeline input: False
151+
Accept wildcard characters: False
152+
```
153+
154+
### -ControlledFolderAccessProtectedFolders
155+
Specifies more folders to protect.
156+
157+
```yaml
158+
Type: String[]
159+
Parameter Sets: (All)
160+
Aliases:
161+
162+
Required: False
163+
Position: Named
164+
Default value: None
165+
Accept pipeline input: False
166+
Accept wildcard characters: False
167+
```
168+
79169
### -ExclusionExtension
80170
Specifies an array of file name extensions, such as obj or lib, to exclude from scheduled, custom, and real-time scanning.
81171
This cmdlet adds these file name extensions to the exclusions.
@@ -92,6 +182,21 @@ Accept pipeline input: False
92182
Accept wildcard characters: False
93183
```
94184

185+
### -ExclusionIpAddress
186+
Specifies an array of IP addresses to exclude from scheduled and real-time scanning.
187+
188+
```yaml
189+
Type: String[]
190+
Parameter Sets: (All)
191+
Aliases:
192+
193+
Required: False
194+
Position: Named
195+
Default value: None
196+
Accept pipeline input: False
197+
Accept wildcard characters: False
198+
```
199+
95200
### -ExclusionPath
96201
Specifies an array of file paths to exclude from scheduled and real-time scanning.
97202
You can specify a folder to exclude all the files under the folder.

docset/winserver2022-ps/defender/Add-MpPreference.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -70,9 +70,9 @@ Accept wildcard characters: False
7070
```
7171
7272
### -AttackSurfaceReductionOnlyExclusions
73-
Specifies the files and paths to exclude from Attack Surface Reduction (ASR) rules. Specify the folders or files and resources that should be excluded from ASR rules. Enter a folder path or a fully qualified resource name. For example, ""C:\Windows"" will exclude all files in that directory. ""C:\Windows\App.exe"" will exclude only that specific file in that specific folder.
73+
Specifies the files and paths to exclude from attack surface reduction (ASR) rules. Specifies the folders or files and resources that should be excluded from ASR rules. Enter a folder path or a fully qualified resource name. For example, `C:\Windows` excludes all files in that directory. `C:\Windows\App.exe` excludes only that specific file in that specific folder.
7474

75-
For more information about excluding files and folders from [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules).
75+
See the [ASR rules](/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) topic for more information about excluding files and folders from ASR rules.
7676

7777
```yaml
7878
Type: String[]

0 commit comments

Comments
 (0)