Remove-MpPreference
Removes values from multi-valued properties (for example, exclusions and protected folders) and returns settings in Windows Defender to their default values.
Note
You need to run this cmdlet in an elevated PowerShell window (a PowerShell window you opened by selecting Run as administrator).
Syntax
Remove-MpPreference
[-AllowDatagramProcessingOnWinServer]
[-AllowNetworkProtectionDownLevel]
[-AllowNetworkProtectionOnWinServer]
[-AllowSwitchToAsyncInspection]
[-AsJob]
[-AttackSurfaceReductionOnlyExclusions <String[]>]
[-AttackSurfaceReductionRules_Actions <ASRRuleActionType[]>]
[-AttackSurfaceReductionRules_Ids <String[]>]
[-CheckForSignaturesBeforeRunningScan]
[-CimSession <CimSession[]>]
[-CloudBlockLevel]
[-CloudExtendedTimeout]
[-ControlledFolderAccessAllowedApplications <String[]>]
[-ControlledFolderAccessProtectedFolders <String[]>]
[-DefinitionUpdatesChannel]
[-DisableArchiveScanning]
[-DisableAutoExclusions]
[-DisableBehaviorMonitoring]
[-DisableBlockAtFirstSeen]
[-DisableCacheMaintenance]
[-DisableCatchupFullScan]
[-DisableCatchupQuickScan]
[-DisableCpuThrottleOnIdleScans]
[-DisableDatagramProcessing]
[-DisableDnsOverTcpParsing]
[-DisableDnsParsing]
[-DisableEmailScanning]
[-DisableFtpParsing]
[-DisableGradualRelease]
[-DisableHttpParsing]
[-DisableInboundConnectionFiltering]
[-DisableIntrusionPreventionSystem]
[-DisableIOAVProtection]
[-DisableNetworkProtectionPerfTelemetry]
[-DisablePrivacyMode]
[-DisableRdpParsing]
[-DisableRealtimeMonitoring]
[-DisableRemovableDriveScanning]
[-DisableRestorePoint]
[-DisableScanningMappedNetworkDrivesForFullScan]
[-DisableScanningNetworkFiles]
[-DisableScriptScanning]
[-DisableSmtpParsing]
[-DisableSshParsing]
[-DisableTlsParsing]
[-EnableControlledFolderAccess]
[-EnableConvertWarnToBlock]
[-EnableDnsSinkhole]
[-EnableFileHashComputation]
[-EnableFullScanOnBatteryPower]
[-EnableLowCpuPriority]
[-EnableNetworkProtection]
[-EnableUdpReceiveOffload]
[-EnableUdpSegmentationOffload]
[-EngineUpdatesChannel]
[-ExclusionExtension <String[]>]
[-ExclusionIpAddress <String[]>]
[-ExclusionPath <String[]>]
[-ExclusionProcess <String[]>]
[-Force]
[-ForceUseProxyOnly]
[-HighThreatDefaultAction]
[-IntelTDTEnabled]
[-LowThreatDefaultAction]
[-MAPSReporting]
[-MeteredConnectionUpdates]
[-ModerateThreatDefaultAction]
[-OobeEnableRtpAndSigUpdate]
[-PlatformUpdatesChannel]
[-ProxyBypass]
[-ProxyPacUrl]
[-ProxyServer]
[-PUAProtection]
[-QuarantinePurgeItemsAfterDelay]
[-RandomizeScheduleTaskTimes]
[-RealTimeScanDirection]
[-RemediationScheduleDay]
[-RemediationScheduleTime]
[-ReportingAdditionalActionTimeOut]
[-ReportingCriticalFailureTimeOut]
[-ReportingNonCriticalTimeOut]
[-ScanAvgCPULoadFactor]
[-ScanOnlyIfIdleEnabled]
[-ScanParameters]
[-ScanPurgeItemsAfterDelay]
[-ScanScheduleDay]
[-ScanScheduleOffset]
[-ScanScheduleQuickScanTime]
[-ScanScheduleTime]
[-SchedulerRandomizationTime]
[-ServiceHealthReportInterval]
[-SevereThreatDefaultAction]
[-SharedSignaturesPath]
[-SignatureAuGracePeriod]
[-SignatureBlobFileSharesSources]
[-SignatureBlobUpdateInterval]
[-SignatureDefinitionUpdateFileSharesSources]
[-SignatureDisableUpdateOnStartupWithoutEngine]
[-SignatureFallbackOrder]
[-SignatureFirstAuGracePeriod]
[-SignatureScheduleDay]
[-SignatureScheduleTime]
[-SignatureUpdateCatchupInterval]
[-SignatureUpdateInterval]
[-SubmitSamplesConsent]
[-ThreatIDDefaultAction_Actions <ThreatAction[]>]
[-ThreatIDDefaultAction_Ids <Int64[]>]
[-ThrottleForScheduledScanOnly]
[-ThrottleLimit <Int32>]
[-UILockdown]
[-UnknownThreatDefaultAction]
[<CommonParameters>]
Description
The Remove-MpPreference cmdlet removes values from multi-valued properties (for example, exclusions and protected folders) and returns settings in Windows Defender to their default values.
Examples
Example 1
Remove-MpPreference -ExclusionPath "C:\Temp"
This example removes the folder C:\Temp from the exclusion list.
Example 2
Remove-MpPreference -AttackSurfaceReductionOnlyExclusions "C:\Windows\App.exe"
This example excludes only the file app.exe in in the Windows folder on the C drive.
Parameters
-AllowDatagramProcessingOnWinServer
Specifies whether to disable the inspection of UDP connections on Windows Server. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the AllowDatagramProcessingOnWinServer property is True (enabled). If the value is already False (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | adpows |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AllowNetworkProtectionDownLevel
Specifies whether to disable control of network protection on Windows Server 2016 or Windows Server 2012 R2 by the EnableNetworkProtection parameter (Enabled, Disabled, or AuditMode). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the AllowNetworkProtectionDownLevel property is True (enabled). If the value is already False (disabled), this switch does nothing.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | anpdl |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AllowNetworkProtectionOnWinServer
Specifies whether to disable control of network protection on Windows Server by the EnableNetworkProtection parameter (Enabled, Disabled, or AuditMode). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the AllowNetworkProtectionOnWinServer property is True (enabled). If the value is already False (disabled), this switch does nothing.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | anpws |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AllowSwitchToAsyncInspection
Specifies whether to enable a performance optimization that changes synchronously inspected network flows to asynchronous inspection after they're checked and validated. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the AllowSwitchToAsyncInspection property is False (disabled). If the value is already True (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | astai |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AsJob
Runs the cmdlet as a background job. Use this parameter to run commands that take a long time to complete.
The cmdlet immediately returns an object that represents the job and then displays the command prompt.
You can continue to work in the session while the job completes.
To manage the job, use the *-Job
cmdlets.
To get the job results, use the Receive-Job cmdlet.
For more information about Windows PowerShell background jobs, see about_Jobs.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AttackSurfaceReductionOnlyExclusions
Specifies the existing folders or files to remove from the exclusion list for Attack Surface Reduction (ASR) rules. Enter a folder path or a fully qualified resource name. For example:
"C:\Windows"
"C:\Windows\App.exe"
To remove values without affecting other existing values, use the following syntax:
"Value1","Value2",..."ValueN"
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -AttackSurfaceReductionOnlyExclusions "Value1","Value2",..."ValueN"
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -AttackSurfaceReductionOnlyExclusions "Value1","Value2",..."ValueN"
.
For more information, see Exclude files and folders from attack surface reduction rules.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AttackSurfaceReductionRules_Actions
Use the AttackSurfaceReductionRules_Ids and AttackSurfaceReductionRules_Actions parameters together in the same command to remove existing attack surface reduction (ASR) rules.
The AttackSurfaceReductionRules_Ids parameter identifies the ASR rule by GUID value. For example, the GUID value of the "Block Office communication application from creating child processes" ASR rule is
26190899-1602-49e8-8b27-eb1d0a1ce869
. For more information, see ASR rule to GUID matrix.The AttackSurfaceReductionRules_Actions parameter identifies ASR rule action. Valid values are:
• 0 or Deactivated
• 1 or Activated
• 2 or Audit mode
• 6 or Warning
To remove values without affecting other existing values, use the following syntax:
Remove-MpPreference -AttackSurfaceReductionRules_IdsRule1,Rule2,...RuleN -AttackSurfaceReductionRules_Actions Action1,Action2,...ActionN
For each ID value, there's a corresponding action value. The order determines which action goes with what ID. The first action goes with the first ID, the second action goes with the second ID, and so on.
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -AttackSurfaceReductionRules_Ids Rule1,Rule2,...RuleN -AttackSurfaceReductionRules_Actions Action1,Action2,...ActionN
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -AttackSurfaceReductionRules_Ids Rule1,Rule2,...RuleN -AttackSurfaceReductionRules_Actions Action1,Action2,...ActionN
Type: | ASRRuleActionType[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AttackSurfaceReductionRules_Ids
Use the AttackSurfaceReductionRules_Ids and AttackSurfaceReductionRules_Actions parameters together in the same command to remove existing attack surface reduction (ASR) rules.
The AttackSurfaceReductionRules_Ids parameter identifies the ASR rule by GUID value. For example, the GUID value of the "Block Office communication application from creating child processes" ASR rule is
26190899-1602-49e8-8b27-eb1d0a1ce869
. For more information, see ASR rule to GUID matrix.The AttackSurfaceReductionRules_Actions parameter identifies ASR rule action for the corresponding ASR rule. Valid values are:
• 0 or Disabled
• 1 or Enabled
• 2 or AuditMode
• 5 or NotConfigured
• 6 or Warn
To remove values without affecting other existing values, use the following syntax:
Remove-MpPreference -AttackSurfaceReductionRules_IdsRule1,Rule2,...RuleN -AttackSurfaceReductionRules_Actions Action1,Action2,...ActionN
For each ID value, there's a corresponding action value. The order determines which action goes with what ID. The first action goes with the first ID, the second action goes with the second ID, and so on.
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -AttackSurfaceReductionRules_Ids Rule1,Rule2,...RuleN -AttackSurfaceReductionRules_Actions Action1,Action2,...ActionN
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -AttackSurfaceReductionRules_Ids Rule1,Rule2,...RuleN -AttackSurfaceReductionRules_Actions Action1,Action2,...ActionN
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-CheckForSignaturesBeforeRunningScan
Specifies whether to disable the check for new virus and spyware definitions before Windows Defender runs a scan. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the CheckForSignaturesBeforeRunningScan property is True (enabled). If the value is already False (disabled), the command returns an error.
This parameter applies to scheduled scans, but it has no effect on scans initiated manually from the
user interface from the command line using mpcmdrun -Scan
.
Type: | SwitchParameter |
Aliases: | csbr |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-CimSession
Runs the cmdlet in a remote session or on a remote computer that were created by the New-CimSession cmdlet and specified by the Get-CimSession cmdlet. For example:
Set-MpPreference -CimSession (Get-CimSession -ID 1),(Get-CimSession -ID 2),...(Get-CimSession -ID N)
or
Set-MpPreference -CimSession (Get-CimSession -ID Server1),(Get-CimSession -ID Server2),...(Get-CimSession -ID ServerN)
Type: | CimSession[] |
Aliases: | Session |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-CloudBlockLevel
Specifies the value 0 (Default) for the cloud block level that determines how aggressively Microsoft Defender scans and blocks suspicious files. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the CloudBlockLevel property isn't 0. If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-CloudExtendedTimeout
Specifies the value 0 for the amount of extended time in seconds to block a suspicious file and scan it in the cloud. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the CloudExtendedTimeout property isn't 0. If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Aliases: | cloudextimeout |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ControlledFolderAccessAllowedApplications
Specifies the entries to remove from the list of applications that are allowed to make changes in
controlled folders. You can use absolute folder paths (for example C:\Windows\...
) or environment
variables (for example, %appdata%...
) for path names.
To remove values without affecting other existing values, use the following syntax:
"PathAndFileName1","PathAndFileName2",..."PathAndFileNameN"
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -ControlledFolderAccessAllowedApplications "PathAndFileName1","PathAndFileName2",..."PathAndFileNameN"
To replace all existing values with the values you specify, use the following syntax:
"PathAndFileName1","PathAndFileName2",..."PathAndFileNameN"
.
To remove custom folders that are protected by controlled folder access, use the ControlledFolderAccessProtectedFolders parameter.
For more information about controlled folder access, see Protect important folders with controlled folder access.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ControlledFolderAccessProtectedFolders
Specifies the entries to remove from the list of controlled access folders. You can use absolute
folder paths (for example C:\Windows\...
) or environment variables (for example, %appdata%...
)
for path names.
To remove values without affecting other existing values, use the following syntax:
"Path1","Path2",..."PathN"
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -ControlledFolderAccessAllowedApplications "Path1","Path2",..."PathN"
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -ControlledFolderAccessAllowedApplications"Path1","Path2"..."PathN"
.
To remove applications that are allowed to access controlled folders, use the ControlledFolderAccessAllowedApplications parameter.
For more information about controlled folder access, see Protect important folders with controlled folder access.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DefinitionUpdatesChannel
Specifies the value 0 (NotConfigured) for when devices receive daily Microsoft Defender definition updates during the monthly gradual rollout. Devices stay up to date automatically during the gradual release cycle. This value is suitable for most devices.
Tip: This switch works only if the current value of the DefinitionUpdatesChannel property isn't 0 (NotConfigured). If the value is already 0, this switch does nothing.
This parameter replaces the SignaturesUpdatesChannel parameter.
Type: | DefinitionUpdatesChannelType |
Aliases: | duc |
Accepted values: | NotConfigured, Staged, Broad |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableArchiveScanning
Specifies whether to enable the scanning of archive files (for example, .zip and .cab files) for malicious and unwanted software. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableArchiveScanning property is True (disabled). If the value is already False (enabled), this switch does nothing.
The value True for the DisableArchiveScanning property is available only if Tamper Protection is disabled. For more information, see How do I configure or manage Tamper Protection?.
Type: | SwitchParameter |
Aliases: | darchsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableAutoExclusions
Specifies whether to enable the Automatic Exclusions feature. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableAutoExclusions property is True (disabled). If the value is already False (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | dae |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableBehaviorMonitoring
Specifies whether to enable behavior monitoring. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableBehaviorMonitoring property is True (disabled). If the value is already False (enabled), this switch does nothing.
The value True for the DisableBehaviorMonitoring property is available only if Tamper Protection is disabled. For more information, see How do I configure or manage Tamper Protection?.
Type: | SwitchParameter |
Aliases: | dbm |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableBlockAtFirstSeen
Specifies whether to enable block at first seen. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableBlockAtFirstSeen property is True (disabled). If the value is already False (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | dbaf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableCacheMaintenance
Specifies whether to enable cache maintenance by the cache maintenance idle task. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableCacheMaintenance property is True (disabled). If the value is already False (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | dcm |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableCatchupFullScan
Specifies whether to disable catch-up scans for missed scheduled full scans. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableCatchupFullScan property is False (enabled). If the value is already True (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | dcfsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableCatchupQuickScan
Specifies whether to disable catch-up scans for missed scheduled quick scans. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableCatchupQuickScan property is False (enabled). If the value is already True (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | dcqsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableCpuThrottleOnIdleScans
Specifies whether to disable CPU throttling for scheduled scans while the device is idle. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableCpuThrottleOnIdleScans property is False (enabled). If the value is already True (disabled), this switch does nothing.
This setting doesn't affect other types scheduled scans. Normal CPU throttling occurs on other types of scheduled scans.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableDatagramProcessing
Specifies whether to enable inspection of UDP connections. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableDatagramProcessing property is True (disabled). If the value is already False (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | ddtgp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableDnsOverTcpParsing
Specifies whether to enable inspection of DNS traffic that occurs over TCP. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableDnsOverTcpParsing property is True (disabled). If the value is already False (enabled), this switch does nothing.
Network protection needs to inspect DNS traffic over TCP in the following scenarios:
- To provide metadata for anti-malware behavior monitoring.
- To allow for a DNS sinkhole if the EnableDnsSinkhole parameter is set to the value $true.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | ddnstcpp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableDnsParsing
Specifies whether to enable inspection of DNS traffic that occurs over UDP. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableDnsParsing property is True (disabled). If the value is already False (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | ddnsp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableEmailScanning
Specifies whether to disable the parsing of mailbox and email message files to analyze message bodies and email attachments. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableEmailScanning property is False (enabled). If the value is already True (disabled), this switch does nothing.
Windows Defender supports several mailbox and email message file formats. For example:
- .binhex
- .dbx
- .mbx
- .mime
- .pst
Type: | SwitchParameter |
Aliases: | demsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableFtpParsing
Specifies whether to enable FTP parsing by network protection. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableFtpParsing property is True (disabled). If the value is already False (enabled), this switch does nothing.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | dftpp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableGradualRelease
Specifies whether to enable gradual rollout of monthly and daily Windows Defender updates. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableGradualRelease property is True (disabled). If the value is already False (enabled), this switch does nothing.
When you enable this setting, devices remain in the Current Channel unless otherwise specified in specific channels. The device stays up to date automatically during the gradual release cycle, which is suitable for most devices.
This setting applies to both monthly and daily updates. This setting overrides configured channel selections for platform and engine updates.
This policy is available starting with platform version 4.18.2106.5 and later.
Type: | SwitchParameter |
Aliases: | dgr |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableHttpParsing
Specifies whether to enable inspection of HTTP traffic. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableHttpParsing property is True (disabled). If the value is already False (enabled), this switch does nothing.
If the value of the EnableNetworkProtection parameter is Enabled
, HTTP connections to
malicious websites can be blocked.
Type: | SwitchParameter |
Aliases: | dhttpp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableInboundConnectionFiltering
Specifies whether to enable inspection of inbound connections by network protection. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableInboundConnectionFiltering property is True (disabled). If the value is already False (enabled), this switch does nothing.
When you enable this setting, network protection inspects inbound and outbound connections. This is the default value.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | dicf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableIntrusionPreventionSystem
Specifies whether to enable the intrusion prevention system in network protection. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableIntrusionPreventionSystem property is True (disabled). If the value is already False (enabled), this switch does nothing.
When this setting is enabled, the system is protected against the exploitation of known vulnerabilities.
Type: | SwitchParameter |
Aliases: | dips |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableIOAVProtection
Specifies whether to enable the automatic scanning of all downloaded files and attachments. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableIOAVProtection property is True (disabled). If the value is already False (enabled), this switch does nothing.
The value True for the DisableIOAVProtection property is available only if Tamper Protection is disabled. For more information, see How do I configure or manage Tamper Protection?.
Type: | SwitchParameter |
Aliases: | dioavp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableNetworkProtectionPerfTelemetry
Specifies whether to enable the gathering and sending of performance telemetry from Network Protection. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableNetworkProtectionPerfTelemetry property is True (disabled). If the value is already False (enabled), this switch does nothing.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | dnppt |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisablePrivacyMode
Note: This switch is a legacy setting that doesn't affect current platforms.
The intent of this switch was to enable privacy mode if it was disabled. Disabled privacy mode prevented users (not admins) from displaying the threat history.
Type: | SwitchParameter |
Aliases: | dpm |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableRdpParsing
Specifies whether to enable parsing RDP traffic to look for malicious attacks using the RDP protocol. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableRdpParsing property is True (disabled). If the value is already False (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | drdpp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableRealtimeMonitoring
Specifies whether to enable real-time protection. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableRealtimeMonitoring property is True (disabled). If the value is already False (enabled), this switch does nothing.
The default and recommended value for this setting is enabled (False).
The value True for the DisableRealtimeMonitoring property is available only if Tamper Protection is disabled. For more information, see How do I configure or manage Tamper Protection?.
Type: | SwitchParameter |
Aliases: | drtm |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableRemovableDriveScanning
Specifies whether to disable scanning for malicious and unwanted software on removable drives (for example, flash drives) during a full scan (quick scans and custom scans aren't affected). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableRemovableDriveScanning property is False (enabled). If the value is already True (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | drdsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableRestorePoint
Specifies whether to disable scanning of restore points. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableRestorePoint property is False (enabled). If the value is already True (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | drp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableScanningMappedNetworkDrivesForFullScan
Specifies whether to disable scanning mapped network drives. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableScanningMappedNetworkDrivesForFullScan property is False (enabled). If the value is already True (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | dsmndfsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableScanningNetworkFiles
Specifies whether to enable scanning network files. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableScanningNetworkFiles property is True (disabled). If the value is already False (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | dsnf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableScriptScanning
Specifies whether to enable the scanning of scripts during malware scans. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableScriptScanning property is True (disabled). If the value is already False (enabled), this switch does nothing.
The value True for the DisableScriptScanning property is available only if Tamper Protection is disabled. For more information, see How do I configure or manage Tamper Protection?.
Type: | SwitchParameter |
Aliases: | dscrptsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableSmtpParsing
Specifies whether to enable SMTP parsing by network protection. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableSmtpParsing property is True (disabled). If the value is already False (enabled), this switch does nothing.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | dsmtpp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableSshParsing
Specifies whether to enable the inspection of SSH traffic. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableSshParsing property is True (disabled). If the value is already False (enabled), this switch does nothing.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | dsshp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableTlsParsing
Specifies whether to enable the inspection of TLS traffic. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the DisableTlsParsing property is True (disabled). If the value is already False (disabled), this switch does nothing.
When this setting is False (disabled) Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring.
TLS connections to malicious websites can also be blocked if the value of the
EnableNetworkProtection parameter is Enabled
.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | dtlsp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableControlledFolderAccess
Specifies whether to disable the controlled folder access feature. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EnableControlledFolderAccess property isn't 0 (Disabled). If the value is already 0, this switch does nothing.
To remove folders that are protected by controlled folder access, use the ControlledFolderAccessProtectedFolders parameter.
To remove applications that are allowed to access controlled folders, use the ControlledFolderAccessAllowedApplications parameter.
For more information about controlled folder access, see Protect important folders with controlled folder access.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableConvertWarnToBlock
Specifies whether to disable blocking network traffic by network protection instead of displaying a warning. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EnableConvertWarnToBlock property is True (enabled). If the value is already False (disabled), this switch does nothing.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | ecwtb |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableDnsSinkhole
Note: This parameter has been deprecated.
Specifies whether to enable examining DNS traffic to detect and sinkhole DNS exfiltration attempts and other DNS based malicious attacks. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EnableDnsSinkhole property is False (disabled). If the value is already True (enabled), this switch does nothing.
When this setting is enabled. network protection can inspect the DNS traffic of a machine and, in conjunction with behavior monitoring, detect and sinkhole DNS exfiltration attempts, and other DNS based malicious attacks.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Aliases: | ednss |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableFileHashComputation
Specifies whether to disable file hash computation for scanned files. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EnableFileHashComputation property is True (enabled). If the value is already False (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | efhc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableFullScanOnBatteryPower
Specifies whether to disable full scans while on battery power. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EnableFullScanOnBatteryPower property is True (enabled). If the value is already False (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | efsobp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableLowCpuPriority
Specifies whether to disable using low CPU priority for scheduled scans. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EnableLowCpuPriority property is True (enabled). If the value is already False (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | elcp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableNetworkProtection
Specifies whether to disable the network protection service. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EnableNetworkProtection property isn't 0 (Disabled). If the value is already 0, this switch does nothing.
For more information about network protection, see Protect your network.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableUdpReceiveOffload
Specifies whether to disable UDP receive offload support in network protection. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EnableUdpReceiveOffload property is True (enabled). If the value is already False (disabled), this switch does nothing.
Starting with platform version 4.18.24030
, we're gradually moving the default value of this
setting to True (enabled).
Type: | SwitchParameter |
Aliases: | euro |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableUdpSegmentationOffload
Specifies whether to disable UDP segmentation offload support in network protection (the value 0 or Disabled). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EnableUdpSegmentationOffload property is True (enabled). If the value is already False (disabled), this switch does nothing.
Starting with platform version 4.18.24030
, we're gradually moving the default value to $true
(enabled).
Type: | SwitchParameter |
Aliases: | euso |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EngineUpdatesChannel
Specifies that devices receive Microsoft Defender engine updates automatically during the gradual release cycle (the value 0 or NotConfigured). This value is suitable for most devices. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the EngineUpdatesChannel property isn't 0 (NotConfigured). If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Aliases: | erelr |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExclusionExtension
Specifies the filename extensions (for example, obj
or lib
) to remove from the list of
exclusions from scheduled, custom, and real-time scanning.
To remove values without affecting other existing values, use the following syntax:
"Extension1","Extension2"..."ExtensionN"
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -ExclusionExtension "Extension1","Extension2"..."ExtensionN"
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -ExclusionExtension "Extension1","Extension2",..."ExtensionN"
.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExclusionIpAddress
Specifies the IP addresses to remove from the list of exclusions from scheduled, custom, and real-time scanning.
To remove values without affecting other existing values, use the following syntax:
"IPAddress1","IPAddress2",..."IPAddressN"
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -ExclusionIpAddress "IPAddress1","IPAddress",..."IPAddressN"
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -ExclusionIpAddress "IPAddress1","IPAddress2",..."IPAddresseN"
.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExclusionPath
Specifies the path and filename or path only entries to remove from the list of exclusions from scheduled and real-time scanning.
To remove values without affecting other existing values, use the following syntax:
"Value1","Value2",..."ValueN"
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -ExclusionPath "Value1","Value2",..."ValuehN"
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -ExclusionPath "Value1","Value2"..."ValueN"
.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExclusionProcess
Specifies the path to process image entries to remove from the list of exclusions from scheduled and real-time scanning.
To remove values without affecting other existing values, use the following syntax:
"Path1","Path2",..."PathN"
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -ExclusionProcess "Path1","Path2",..."PathhN"
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -ExclusionProcess "Path1","Path2"..."PathN"
.
Process image entries exclude files opened by executable programs only, not the processes themselves. To remove processes from the list of exclusions, use the ExclusionPath parameter.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Force
Forces the command to run without asking for user confirmation. You don't need to specify a value with this switch.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ForceUseProxyOnly
Specifies the device isn't forced to use the proxy only (the value $false). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ForceUseProxyOnly property is True (enabled). If the value is already False (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | fupo |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-HighThreatDefaultAction
Specifies the remediation action value 0 for high level threats. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the HighThreatDefaultAction property isn't 0. If the value is already 0, this switch does nothing.
The value 0 means Windows Defender uses the default action based on the Security Intelligence Update (SIU) definitions to determine how to handle the detected threat.
Type: | SwitchParameter |
Aliases: | htdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-IntelTDTEnabled
Specifies Intel Threat Detection Technology (TDT) integration in Windows Defender is controlled by the system (typically, disabled). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the IntelTDTEnabled property isn't blank (default behavior controlled by the system). If the value is already blank, this switch does nothing.
Type: | SwitchParameter |
Aliases: | itdte |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-LowThreatDefaultAction
Specifies the remediation action value 0 for low level threats. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the LowThreatDefaultAction property isn't 0. If the value is already 0, this switch does nothing.
The value 0 means Windows Defender uses the default action based on the Security Intelligence Update (SIU) definitions to determine how to handle the detected threat.
Type: | SwitchParameter |
Aliases: | ltdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-MAPSReporting
Specifies Advanced membership (2) in the Microsoft Active Protection Service. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the MAPSReporting property isn't 2 (Advanced). If the value is already 2, this switch does nothing.
MAPS is an online community that helps you choose how to respond to potential threats. The community also helps prevent the spread of new malicious software.
The value 2 or Advanced for this setting sends the following information about detected software to Microsoft:
- Where the software came from.
- Actions you applied (manually or automatically).
- Whether the action succeeded.
- The location of the software.
- Filenames.
- How the software operates.
- How the software affected your computer.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-MeteredConnectionUpdates
Specifies whether to disable updates to Windows Defender over metered connections. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the MeteredConnectionUpdates property is True (enabled). If the value is already False (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | mcupd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ModerateThreatDefaultAction
Specifies the automatic remediation action value 0 for moderate level threats. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ModerateThreatDefaultAction property isn't 0. If the value is already 0, this switch does nothing.
The value 0 means Windows Defender uses the default action based on the Security Intelligence Update (SIU) definitions to determine how to handle the detected threat.
Type: | SwitchParameter |
Aliases: | mtdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-OobeEnableRtpAndSigUpdate
Specifies whether to disable real-time protection and Security Intelligence Updates during Out of Box experience (OOBE). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the OobeEnableRtpAndSigUpdate property is True (enabled). If the value is already False (disabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | oobers |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-PlatformUpdatesChannel
Specifies that devices receive Microsoft Defender platform updates automatically during the gradual release cycle (the value 0 or NotConfigured). This value is suitable for most devices. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the PlatformUpdatesChannel property isn't 0 (NotConfigured). If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Aliases: | prelr |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ProxyBypass
Specifies whether to empty the list of entries for proxy bypass. You don't need to specify a value with this switch.
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -ProxyBypass "Value1","Value2",..."ValueN"
.
To add values without affecting existing values, run the following commands:
$a = Get-MpPreference | Select-Object -Expand ProxyBypass
$ += "Value1","Value2"..."ValueN"
Set-MpPreference -ProxyBypass $a
To remove values without affecting existing values, do the following steps:
Run the following commands to see the existing list of values in order:
$x = Get-MpPreference
$r = [System.Collections.ArrayList]($x.ProxyBypass)
$r
The first value in the list has the index number 0, the second has the index number 1, and so on.
Use the index number to specify the value to remove. For example, to remove the seventh value in the list, run the following commands:
$r.RemoveAt(6)
Set-MpPreference -ProxyBypass $r
Type: | SwitchParameter |
Aliases: | proxbps |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ProxyPacUrl
Specifies whether to remove the Privilege Attribute Certificate (PAC) proxy value. You don't need to specify a value with this switch.
Type: | SwitchParameter |
Aliases: | ppurl |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ProxyServer
Specifies whether to remove the proxy server value. You don't need to specify a value with this switch.
Type: | SwitchParameter |
Aliases: | proxsrv |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-PUAProtection
Specifies whether to disable detection for potentially unwanted applications (the value 0 or Disabled). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the PUAProtection property isn't 0 (Disabled). If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-QuarantinePurgeItemsAfterDelay
Specifies the value 0 as the number of days to keep items in the Quarantine folder before they're automatically removed. You don't need to specify a value with this switch.
The value 0 means items stay in the Quarantine folder indefinitely (items aren't automatically removed).
Tip: This switch works only if the current value of the QuarantinePurgeItemsAfterDelay property isn't 0. If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Aliases: | qpiad |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RandomizeScheduleTaskTimes
Specifies whether to enable selecting a random time within 30 minutes before or after scheduled task times (the value True). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the RandomizeScheduleTaskTimes property is False (disabled). If the value is already True (enabled), this switch does nothing.
Randomized start times can distribute the impact of scanning. For example, if several virtual machines share the same host, randomized start times prevent all virtual machines from starting the scheduled tasks at the same time.
Type: | SwitchParameter |
Aliases: | rstt |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RealTimeScanDirection
Specifies scanning for incoming and outgoing files on NTFS volumes (the value 0 or Both). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the RealTimeScanDirection property isn't 0. If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Aliases: | rtsd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RemediationScheduleDay
Specifies running scheduled full scans every day to complete remediation (the value 0 or Everyday). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the RemediationScheduleDay property isn't 0 (Everyday). If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Aliases: | rsd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RemediationScheduleTime
Specifies 02:00:00
(2:00 AM) as the time on the local computer to run scheduled scans for
remediation. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the RemediationScheduleTime
property isn't 02:00:00
(2:00 AM). If the value is already 02:00:00
, this switch does nothing.
The value of this parameter is meaningful only if the value of the RemediationScheduleDay parameter isn't 8 or Never.
Type: | SwitchParameter |
Aliases: | rst |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ReportingAdditionalActionTimeOut
Specifies 10080 as the number of minutes that Windows Defender waits before detections that require additional action time out (detections in the additional action state change to the cleared state). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ReportingAdditionalActionTimeOut property isn't 10080. If the value is already 10080, this switch does nothing.
Type: | SwitchParameter |
Aliases: | raat |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ReportingCriticalFailureTimeOut
Specifies 10080 as the number of minutes that Windows Defender waits before reporting a critical failure (detections in the critically failed state change to the additional action state or the cleared state).
Tip: This switch works only if the current value of the ReportingCriticalFailureTimeOut property isn't 10080. If the value is already 10080, this switch does nothing.
Type: | SwitchParameter |
Aliases: | rcto |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ReportingNonCriticalTimeOut
Specifies 1440 as the number of minutes that Windows Defender waits before reporting a non-critical failure (detections in the non-critically failed state change the cleared state).
Tip: This switch works only if the current value of the ReportingNonCriticalTimeOut property isn't 1440. If the value is already 1440, this switch does nothing.
Type: | SwitchParameter |
Aliases: | rncto |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanAvgCPULoadFactor
Specifies 50 as the maximum percentage CPU usage for a scan. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ScanAvgCPULoadFactor property isn't 50. If the value is already 50, this switch does nothing.
This value isn't a hard limit, but rather guidance for the scanning engine to not exceed the specified value on average.
The value of this setting is ignored if both of the following conditions are true:
- The value of the ScanOnlyIfIdleEnabled setting is True (scan only when the computer isn't in use).
- The value of the DisableCpuThrottleOnIdleScans setting is False (disable CPU throttling on idle scans).
Type: | SwitchParameter |
Aliases: | saclf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanOnlyIfIdleEnabled
Specifies whether to enable starting scheduled scans only when the computer is not in use. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ScanOnlyIfIdleEnabled property is False (disabled). If the value is already True (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | soiie |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanParameters
Specifies quick scan as the scan type to use during a scheduled scan (the value 1 or QuickScan). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ScanParameters property is 2 (FullScan). If the value is already 1 (QuickScan), this switch does nothing.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanPurgeItemsAfterDelay
Specifies 15 as the number of days to keep items in the scan history folder. After this time, Windows Defender removes the items. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ScanPurgeItemsAfterDelay property isn't 15. If the value is already 15, this switch does nothing.
Type: | SwitchParameter |
Aliases: | spiad |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanScheduleDay
Specifies running full scans every day (the value 0 or Everyday). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ScanScheduleDay property isn't 0 (Everyday). If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Aliases: | scsd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanScheduleOffset
Specifies 120 as the fixed number of minutes to delay scheduled scan start times on the device. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ScanScheduleOffset property isn't 120. If the value is already 120, this switch does nothing.
The value 120 for this setting means sScheduled scans on this device start 2 hours after the times specified by the ScanScheduleTime and ScanScheduleQuickScanTime settings.
Scheduled scans are also affected by the SchedulerRandomizationTime parameter.
Staggering start times on devices can help reduce the impact on network and system performance.
Type: | SwitchParameter |
Aliases: | scso |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanScheduleQuickScanTime
Specifies 00:00:00
(12:00 AM) as the time on the local computer to run scheduled quick scans. You
don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ScanScheduleQuickScanTime
property isn't 00:00:00
(12:00 AM). If the value is already 00:00:00
this switch does nothing.
The time scheduled quick scans start is also affected by the value of the ScanScheduleOffset and SchedulerRandomizationTime parameters.
Type: | SwitchParameter |
Aliases: | scsqst |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanScheduleTime
Specifies 02:00:00
(2:00 AM) as the time on the local computer to run scheduled full scans. You
don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ScanScheduleTime
property isn't 02:00:00
(2:00 AM). If the value is already 02:00:00
this switch does nothing.
The time scheduled full scans start is also affected by the value of the ScanScheduleOffset and SchedulerRandomizationTime parameters.
Type: | SwitchParameter |
Aliases: | scst |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SchedulerRandomizationTime
Specifies 4 minutes as the time window within which scheduled tasks in Microsoft Defender (for example, scans and updates) can randomly start. You don't need to specify a value with this switch.
Scheduled tasks can start within the specified number of minutes before or after the time of the scheduled task.
The randomization time window is used around specific start time value (for example, the ScanScheduleTime and ScanScheduleQuickScanTime parameters) or around the number of minutes specified by the ScanScheduleOffset parameter.
Staggering start times on devices can help reduce the impact on network and system performance.
Type: | SwitchParameter |
Aliases: | srt |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ServiceHealthReportInterval
Specifies the time interval in minutes for the service health reports to be sent from endpoints. These reports are for Microsoft Defender Antivirus events 1150 and 1151.
A valid value is an integer from 0 to 4294967295. The default value is 60 minutes. The value 0 means no service health reports are sent.
For more information, see Microsoft Defender Antivirus event IDs.
Type: | SwitchParameter |
Aliases: | shri |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SevereThreatDefaultAction
Specifies the remediation action value 0 for severe level threats. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SevereThreatDefaultAction property isn't 0. If the value is already 0, this switch does nothing.
The value 0 means Windows Defender uses the default action based on the Security Intelligence Update (SIU) definitions to determine how to handle the detected threat.
Type: | SwitchParameter |
Aliases: | stdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SharedSignaturesPath
Specifies whether to remove the shared signatures path value. You don't need to specify a value with this switch.
The value of this setting is meaningful only if the SignatureFallBackOrder parameter contains
the value FileShares
.
Type: | SwitchParameter |
Aliases: | ssp, SecurityIntelligenceLocation, ssl |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureAuGracePeriod
Specifies the value 0 minutes for the grace period applied to all signature updates after the initial, first-time application. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SignatureAuGracePeriod property isn't 0. If the value is already 0, this switch does nothing.
Type: | SwitchParameter |
Aliases: | sigagp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureBlobFileSharesSources
Specifies whether to remove the file share sources for signatures blob files. You don't need to specify a value with this switch.
The value of this setting is meaningful only if the SignatureFallBackOrder parameter contains
the value FileShares
.
Type: | SwitchParameter |
Aliases: | sigbfs |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureBlobUpdateInterval
Specifies the value 60 minutes for checking and updating signature blob files. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SignatureBlobUpdateInterval property isn't 60. If the value is already 60, this switch does nothing.
Type: | SwitchParameter |
Aliases: | sigbui |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureDefinitionUpdateFileSharesSources
Specifies whether to remove the file share sources for signature definition update files. You don't need to specify a value with this switch.
The value of this setting is meaningful only if the SignatureFallBackOrder parameter contains
the value FileShares
.
Type: | SwitchParameter |
Aliases: | sigdufss |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureDisableUpdateOnStartupWithoutEngine
Specifies whether to enable signature updates on startup when the Windows Defender engine isn't available. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SignatureDisableUpdateOnStartupWithoutEngine property is True (disabled). If the value is already False (enabled), this switch does nothing.
Type: | SwitchParameter |
Aliases: | sigduoswo |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureFallbackOrder
Specifies the value {MicrosoftUpdateServer|MMPC}
as the order in which to contact different
definition update sources. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SignatureFallbackOrder
property isn't {MicrosoftUpdateServer|MMPC}
. If the value is already
{MicrosoftUpdateServer|MMPC}
, this switch does nothing.
Type: | SwitchParameter |
Aliases: | sfo |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureFirstAuGracePeriod
Specifies the value 120 minutes (2 hours) for the grace period in minutes immediately after the first installation of the service, during which any service-initiated signature update is aborted if the update occurs successfully within this amount of time. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SignatureFirstAuGracePeriod property isn't 120. If the value is already 120, this switch does nothing.
Type: | SwitchParameter |
Aliases: | sigfagp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureScheduleDay
Specifies the value 8 or Never for the day of the week that Windows Defender checks for definition updates. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SignatureScheduleDay property isn't 8. If the value is already 8, this switch does nothing.
Although the value 8 or Never means Windows Defender doesn't check for updates on specific days, definition updates still happen through other means (for example, manual updates or other system events).
Type: | SwitchParameter |
Aliases: | sigsd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureScheduleTime
Specifies the value 01:45:00
(1:45 AM) for the time on the local computer to check for definition
updates. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SignatureScheduleTime
property isn't 01:45:00
. If the value is already 01:45:00
, this switch does nothing.
The value of this setting is meaningful only if the value of the SignatureScheduleDay isn't 8 or Never (the default value).
Type: | SwitchParameter |
Aliases: | sigst |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureUpdateCatchupInterval
Specifies the value 1 (one day) for catching up on missed signature updates. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SignatureUpdateCatchupInterval property isn't 1. If the value is already 1, this switch does nothing.
Even when the value of the SignatureScheduleDay setting is 8 or Never (the default value), this setting still controls the behavior of updates through other means (for example, manual updates or other system events).
Type: | SwitchParameter |
Aliases: | siguci |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureUpdateInterval
Specifies the value 0 as the interval in hours to check for definition updates. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SignatureUpdateInterval property isn't 0. If the value is already 0, this switch does nothing.
The value 0 means Windows Defender uses the default interval for update checks, which is typically every 24 hours.
Even when the value of the SignatureScheduleDay setting is 8 or Never (the default value), this setting still controls the behavior of updates through other means (for example, manual updates or other system events).
Type: | SwitchParameter |
Aliases: | sigui |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SubmitSamplesConsent
Specifies the value 0 or AlwaysPrompt as the interval in hours to check for definition updates. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the SubmitSamplesConsent property isn't 0. If the value is already 0, this switch does nothing.
If consent was previously granted, Windows Defender submits the samples. Otherwise, Windows Defender prompts the user for consent if the value of the MAPSReporting parameter isn't Disabled.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ThreatIDDefaultAction_Actions
Use the ThreatIDDefaultAction_Ids and ThreatIDDefaultAction_Actions parameters together in the same command to remove the actions to take on the corresponding threats.
The ThreatIDDefaultAction_Ids parameter identifies the threat from the output of the Get-MpThreatCatalog cmdlet. For example, the ThreatID value of the threat named Trojan:Win32/BlueFire is
3229
.The ThreatIDDefaultAction_Actions parameter identifies the action to take on the corresponding threat ID. Valid values are:
• 1 or Clean
• 2 or Quarantine
• 3 or Remove
• 6 or Allow
• 8 or UserDefined
• 9 or NoAction
• 10 or Block
To remove values without affecting other existing values, use the following syntax:
Remove-MpPreference -ThreatIDDefaultAction_Ids ThreatID1,ThreatID2,...ThreatIDN -ThreatIDDefaultAction_Actions Action1,Action2,...ActionN
For each ID value, there's a corresponding action value. The order determines which action goes with what ID. The first action goes with the first ID, the second action goes with the second ID, and so on.
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -ThreatIDDefaultAction_Ids ThreatID1,ThreatID2,...ThreatIDN -ThreatIDDefaultAction_Actions Action1,Action2,...ActionN
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -ThreatIDDefaultAction_Ids ThreatID1,ThreatID2,...ThreatIDN -ThreatIDDefaultAction_Actions Action1,Action2,...ActionN
Note: When a threat and corresponding action aren't specified in the ThreatIDDefaultAction_Ids and ThreatIDDefaultAction_Actions parameters, the action that's applied to the threat is based on the Security Intelligence Update (SIU). By default, no threats or corresponding actions are specified in the parameters.
Type: | ThreatAction[] |
Aliases: | tiddefaca |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ThreatIDDefaultAction_Ids
Use the ThreatIDDefaultAction_Ids and ThreatIDDefaultAction_Actions parameters together in the same command to remove the actions to take on the corresponding threats.
The ThreatIDDefaultAction_Ids parameter identifies the threat from the output of the Get-MpThreatCatalog cmdlet. For example, the ThreatID value of the threat named Trojan:Win32/BlueFire is
3229
.The ThreatIDDefaultAction_Actions parameter identifies the action to take on the corresponding threat ID. Valid values are:
• 1 or Clean
• 2 or Quarantine
• 3 or Remove
• 6 or Allow
• 8 or UserDefined
• 9 or NoAction
• 10 or Block
To remove values without affecting other existing values, use the following syntax:
Remove-MpPreference -ThreatIDDefaultAction_Ids ThreatID1,ThreatID2,...ThreatIDN -ThreatIDDefaultAction_Actions Action1,Action2,...ActionN
For each ID value, there's a corresponding action value. The order determines which action goes with what ID. The first action goes with the first ID, the second action goes with the second ID, and so on.
To add values without affecting existing values, use the Add-MpPreference cmdlet:
Add-MpPreference -ThreatIDDefaultAction_Ids ThreatID1,ThreatID2,...ThreatIDN -ThreatIDDefaultAction_Actions Action1,Action2,...ActionN
To replace all existing values with the values you specify, use the Set-MpPreference cmdlet:
Set-MpPreference -ThreatIDDefaultAction_Ids ThreatID1,ThreatID2,...ThreatIDN -ThreatIDDefaultAction_Actions Action1,Action2,...ActionN
Note: When a threat and corresponding action aren't specified in the ThreatIDDefaultAction_Ids and ThreatIDDefaultAction_Actions parameters, the action that's applied to the threat is based on the Security Intelligence Update (SIU). By default, no threats or corresponding actions are specified in the parameters.
Type: | Int64[] |
Aliases: | tiddefaci |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ThrottleForScheduledScanOnly
Specifies whether to apply CPU throttling to scheduled scans only (custom scans aren't affected). You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the ThrottleForScheduledScanOnly property is False (CPU throttling applies to scheduled scans and custom scans). If the value is already True (CPU throttling applies to scheduled scans only), this switch does nothing.
Type: | SwitchParameter |
Aliases: | tfsso |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ThrottleLimit
Specifies the maximum number of concurrent operations that can be established to run this cmdlet.
A valid value is an integer from 0 to 2147483647. The default value is 0, which means PowerShell calculates an optimum throttle limit for the cmdlet based on the number of CIM cmdlets that are running on the computer.
The throttle limit applies only to the current cmdlet, not to the session or to the computer.
Type: | Int32 |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-UILockdown
Specifies whether to disable UI lockdown mode. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the UILockdown property is True (enabled). If the value is already False (disabled), this switch does nothing.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-UnknownThreatDefaultAction
Specifies the remediation action value 0 for unknown level threats. You don't need to specify a value with this switch.
Tip: This switch works only if the current value of the UnknownThreatDefaultAction property isn't 0. If the value is already 0, this switch does nothing.
The value 0 means Windows Defender uses the default action based on the Security Intelligence Update (SIU) definitions to determine how to handle the detected threat.
Type: | SwitchParameter |
Aliases: | unktdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |