You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This command allows the specified application to make changes in controlled folders.
47
+
38
48
## PARAMETERS
39
49
40
50
### -AsJob
@@ -59,6 +69,56 @@ Accept pipeline input: False
59
69
Accept wildcard characters: False
60
70
```
61
71
72
+
### -AttackSurfaceReductionOnlyExclusions
73
+
Specifies the files or folders to exclude from attack surface reduction (ASR) rules. Enter a folder path or a fully qualified resource name. For example, `C:\Windows` excludes all files in that directory. `C:\Windows\App.exe` excludes only that specific file in that specific folder.
74
+
75
+
See the [ASR rules](/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) topic for more information about excluding files and folders from ASR rules.
76
+
77
+
```yaml
78
+
Type: String[]
79
+
Parameter Sets: (All)
80
+
Aliases:
81
+
82
+
Required: False
83
+
Position: Named
84
+
Default value: None
85
+
Accept pipeline input: False
86
+
Accept wildcard characters: False
87
+
```
88
+
89
+
### -AttackSurfaceReductionRules_Actions
90
+
Specifies the states of attack surface reduction rules specified by using the **AttackSurfaceReductionRules_Ids** parameter.
91
+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
92
+
93
+
```yaml
94
+
Type: ASRRuleActionType[]
95
+
Parameter Sets: (All)
96
+
Aliases:
97
+
98
+
Required: False
99
+
Position: Named
100
+
Default value: None
101
+
Accept pipeline input: False
102
+
Accept wildcard characters: False
103
+
```
104
+
105
+
### -AttackSurfaceReductionRules_Ids
106
+
Specifies the IDs of attack surface reduction rules.
107
+
Use the **AttackSurfaceReductionRules_Actions** parameter to specify the state for each rule.
108
+
If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
109
+
110
+
```yaml
111
+
Type: String[]
112
+
Parameter Sets: (All)
113
+
Aliases:
114
+
115
+
Required: False
116
+
Position: Named
117
+
Default value: None
118
+
Accept pipeline input: False
119
+
Accept wildcard characters: False
120
+
```
121
+
62
122
### -CimSession
63
123
Runs the cmdlet in a remote session or on a remote computer.
64
124
Enter a computer name or a session object, such as the output of a [New-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227967) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
@@ -76,6 +136,36 @@ Accept pipeline input: False
76
136
Accept wildcard characters: False
77
137
```
78
138
139
+
### -ControlledFolderAccessAllowedApplications
140
+
Specifies applications that can make changes in controlled folders.
141
+
142
+
```yaml
143
+
Type: String[]
144
+
Parameter Sets: (All)
145
+
Aliases:
146
+
147
+
Required: False
148
+
Position: Named
149
+
Default value: None
150
+
Accept pipeline input: False
151
+
Accept wildcard characters: False
152
+
```
153
+
154
+
### -ControlledFolderAccessProtectedFolders
155
+
Specifies more folders to protect.
156
+
157
+
```yaml
158
+
Type: String[]
159
+
Parameter Sets: (All)
160
+
Aliases:
161
+
162
+
Required: False
163
+
Position: Named
164
+
Default value: None
165
+
Accept pipeline input: False
166
+
Accept wildcard characters: False
167
+
```
168
+
79
169
### -ExclusionExtension
80
170
Specifies an array of file name extensions, such as obj or lib, to exclude from scheduled, custom, and real-time scanning.
81
171
This cmdlet adds these file name extensions to the exclusions.
@@ -92,6 +182,21 @@ Accept pipeline input: False
92
182
Accept wildcard characters: False
93
183
```
94
184
185
+
### -ExclusionIpAddress
186
+
Specifies an array of IP addresses to exclude from scheduled and real-time scanning.
187
+
188
+
```yaml
189
+
Type: String[]
190
+
Parameter Sets: (All)
191
+
Aliases:
192
+
193
+
Required: False
194
+
Position: Named
195
+
Default value: None
196
+
Accept pipeline input: False
197
+
Accept wildcard characters: False
198
+
```
199
+
95
200
### -ExclusionPath
96
201
Specifies an array of file paths to exclude from scheduled and real-time scanning.
97
202
You can specify a folder to exclude all the files under the folder.
Specifies the files and paths to exclude from Attack Surface Reduction (ASR) rules. Specify the folders or files and resources that should be excluded from ASR rules. Enter a folder path or a fully qualified resource name. For example, ""C:\Windows"" will exclude all files in that directory. ""C:\Windows\App.exe"" will exclude only that specific file in that specific folder.
73
+
Specifies the files and paths to exclude from attack surface reduction (ASR) rules. Specifies the folders or files and resources that should be excluded from ASR rules. Enter a folder path or a fully qualified resource name. For example, `C:\Windows` excludes all files in that directory. `C:\Windows\App.exe` excludes only that specific file in that specific folder.
74
74
75
-
For more information about excluding files and folders from [ASR rules](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules).
75
+
See the [ASR rules](/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction#exclude-files-and-folders-from-asr-rules) topic for more information about excluding files and folders from ASR rules.
0 commit comments