Remove-MpPreference
Removes exclusions or default actions.
Syntax
Remove-MpPreference
[-ExclusionPath <String[]>]
[-ExclusionExtension <String[]>]
[-ExclusionProcess <String[]>]
[-ExclusionIpAddress <String[]>]
[-RealTimeScanDirection]
[-QuarantinePurgeItemsAfterDelay]
[-RemediationScheduleDay]
[-RemediationScheduleTime]
[-ReportingAdditionalActionTimeOut]
[-ReportingCriticalFailureTimeOut]
[-ReportingNonCriticalTimeOut]
[-ScanAvgCPULoadFactor]
[-CheckForSignaturesBeforeRunningScan]
[-ScanPurgeItemsAfterDelay]
[-ScanOnlyIfIdleEnabled]
[-ScanParameters]
[-ScanScheduleDay]
[-ScanScheduleQuickScanTime]
[-ScanScheduleTime]
[-SignatureFirstAuGracePeriod]
[-SignatureAuGracePeriod]
[-SignatureDefinitionUpdateFileSharesSources]
[-SignatureDisableUpdateOnStartupWithoutEngine]
[-SignatureFallbackOrder]
[-SharedSignaturesPath]
[-SignatureScheduleDay]
[-SignatureScheduleTime]
[-SignatureUpdateCatchupInterval]
[-SignatureUpdateInterval]
[-SignatureBlobUpdateInterval]
[-SignatureBlobFileSharesSources]
[-MeteredConnectionUpdates]
[-AllowNetworkProtectionOnWinServer]
[-DisableDatagramProcessing]
[-DisableCpuThrottleOnIdleScans]
[-MAPSReporting]
[-SubmitSamplesConsent]
[-DisableAutoExclusions]
[-DisablePrivacyMode]
[-RandomizeScheduleTaskTimes]
[-SchedulerRandomizationTime]
[-DisableBehaviorMonitoring]
[-DisableIntrusionPreventionSystem]
[-DisableIOAVProtection]
[-DisableRealtimeMonitoring]
[-DisableScriptScanning]
[-DisableArchiveScanning]
[-DisableCatchupFullScan]
[-DisableCatchupQuickScan]
[-DisableEmailScanning]
[-DisableRemovableDriveScanning]
[-DisableRestorePoint]
[-DisableScanningMappedNetworkDrivesForFullScan]
[-DisableScanningNetworkFiles]
[-UILockdown]
[-ThreatIDDefaultAction_Ids <Int64[]>]
[-ThreatIDDefaultAction_Actions <ThreatAction[]>]
[-UnknownThreatDefaultAction]
[-LowThreatDefaultAction]
[-ModerateThreatDefaultAction]
[-HighThreatDefaultAction]
[-SevereThreatDefaultAction]
[-DisableBlockAtFirstSeen]
[-PUAProtection]
[-CloudBlockLevel]
[-CloudExtendedTimeout]
[-EnableNetworkProtection]
[-EnableControlledFolderAccess]
[-AttackSurfaceReductionOnlyExclusions <String[]>]
[-ControlledFolderAccessAllowedApplications <String[]>]
[-ControlledFolderAccessProtectedFolders <String[]>]
[-AttackSurfaceReductionRules_Ids <String[]>]
[-AttackSurfaceReductionRules_Actions <ASRRuleActionType[]>]
[-EnableLowCpuPriority]
[-EnableFileHashComputation]
[-EnableFullScanOnBatteryPower]
[-ProxyPacUrl]
[-ProxyServer]
[-ProxyBypass]
[-ForceUseProxyOnly]
[-DisableTlsParsing]
[-DisableHttpParsing]
[-DisableDnsParsing]
[-DisableDnsOverTcpParsing]
[-DisableSshParsing]
[-PlatformUpdatesChannel]
[-EngineUpdatesChannel]
[-SignaturesUpdatesChannel]
[-DisableGradualRelease]
[-AllowNetworkProtectionDownLevel]
[-AllowDatagramProcessingOnWinServer]
[-EnableDnsSinkhole]
[-DisableInboundConnectionFiltering]
[-DisableRdpParsing]
[-Force]
[-CimSession <CimSession[]>]
[-ThrottleLimit <Int32>]
[-AsJob]
[<CommonParameters>]
Description
The Remove-MpPreference cmdlet removes exclusions for file name extensions, paths, and processes, or default actions for high, moderate, and low threats. If you attempt to remove an exclusion that is not in the list, this cmdlet reports the error.
Examples
Example 1: Remove a folder from the exclusion list
Remove-MpPreference -ExclusionPath "C:\Temp"
This command removes the folder C:\Temp from the exclusion list.
Example 2: Exclude a specific file
Remove-MpPreference -AttackSurfaceReductionOnlyExclusions "C:\Windows\App.exe"
This command will exclude only that specific file app.exe in that specific folder.
Parameters
-AllowDatagramProcessingOnWinServer
Indicates that the cmdlet removes whether to disable inspection of UDP connections on Windows Server.
Type: | SwitchParameter |
Aliases: | adpows |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AllowNetworkProtectionDownLevel
Indicates that the cmdlet removes whether to allow network protection to be set to Enabled or Audit Mode on Windows versions before 1709.
Type: | SwitchParameter |
Aliases: | anpdl |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AllowNetworkProtectionOnWinServer
Indicates that the cmdlet removes whether to allow network protection to be set to Enabled or Audit Mode for Windows Server.
Type: | SwitchParameter |
Aliases: | anpws |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AsJob
Runs the cmdlet as a background job. Use this parameter to run commands that take a long time to complete.
The cmdlet immediately returns an object that represents the job and then displays the command prompt.
You can continue to work in the session while the job completes.
To manage the job, use the *-Job
cmdlets.
To get the job results, use the Receive-Job cmdlet.
For more information about Windows PowerShell background jobs, see about_Jobs.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AttackSurfaceReductionOnlyExclusions
Specifies the files and paths to exclude from Attack Surface Reduction (ASR) rules. Specify the folders or files and resources that should be excluded from ASR rules. Enter a folder path or a fully qualified resource name. For example, ""C:\Windows"" will exclude all files in that directory. ""C:\Windows\App.exe"" will exclude only that specific file in that specific folder.
For more information about excluding files and folders from ASR rules.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AttackSurfaceReductionRules_Actions
Specifies the states of attack surface reduction rules specified by using the AttackSurfaceReductionRules_Ids parameter. If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
Type: | ASRRuleActionType[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-AttackSurfaceReductionRules_Ids
Specifies the states of attack surface reduction rules specified by using the AttackSurfaceReductionRules_Ids parameter. If you add multiple rules as a comma-separated list, specify their states separately as a comma-separated list.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-CheckForSignaturesBeforeRunningScan
Indicates that the cmdlet removes whether to check for new virus and spyware definitions before Windows Defender runs a scan.
Type: | SwitchParameter |
Aliases: | csbr |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-CimSession
Runs the cmdlet in a remote session or on a remote computer. Enter a computer name or a session object, such as the output of a New-CimSession or Get-CimSession cmdlet. The default is the current session on the local computer.
Type: | CimSession[] |
Aliases: | Session |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-CloudBlockLevel
Specifies a cloud block level. This value determines how aggressive Microsoft Defender Antivirus is in blocking and scanning suspicious files.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-CloudExtendedTimeout
Specifies the amount of extended time to block a suspicious file and scan it in the cloud. Standard time is 10 seconds. Extend by up to 50 seconds.
Type: | SwitchParameter |
Aliases: | cloudextimeout |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ControlledFolderAccessAllowedApplications
Specifies applications that can make changes in controlled folders.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ControlledFolderAccessProtectedFolders
Specifies more folders to protect.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableArchiveScanning
Indicates that the cmdlet removes whether to scan archive files, such as .zip and .cab files, for malicious and unwanted software.
Type: | SwitchParameter |
Aliases: | darchsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableAutoExclusions
Indicates that the cmdlet removes whether to disable the Automatic Exclusions feature for the server.
Type: | SwitchParameter |
Aliases: | dae |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableBehaviorMonitoring
Indicates that the cmdlet removes whether to enable behavior monitoring.
Type: | SwitchParameter |
Aliases: | dbm |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableBlockAtFirstSeen
Indicates that the cmdlet removes whether to enable block at first seen.
Type: | SwitchParameter |
Aliases: | dbaf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableCatchupFullScan
Indicates that the cmdlet removes whether Windows Defender runs catch-up scans for scheduled full scans.
Type: | SwitchParameter |
Aliases: | dcfsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableCatchupQuickScan
Indicates that the cmdlet removes whether Windows Defender runs catch-up scans for scheduled quick scans.
Type: | SwitchParameter |
Aliases: | dcqsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableCpuThrottleOnIdleScans
Indicates that the cmdlet removes whether the CPU will be throttled for scheduled scans while the device is idle.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableDatagramProcessing
Indicates that the cmdlet removes whether to disable inspection of UDP connections.
Type: | SwitchParameter |
Aliases: | ddtgp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableDnsOverTcpParsing
Indicates that the cmdlet removes whether to disable inspection of DNS traffic that occurs over a TCP channel.
Type: | SwitchParameter |
Aliases: | ddnstcpp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableDnsParsing
Indicates that the cmdlet removes whether to disable inspection of DNS traffic that occurs over a UDP channel.
Type: | SwitchParameter |
Aliases: | ddnsp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableEmailScanning
Indicates that the cmdlet removes whether Windows Defender parses the mailbox and mail files, according to their specific format, in order to analyze mail bodies and attachments.
Type: | SwitchParameter |
Aliases: | demsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableGradualRelease
Indicates that the cmdlet removes whether to disable gradual rollout of monthly and daily Windows Defender updates. If you enable this option, devices are offered all updates after the gradual release cycle finishes. Consider this option for datacenter computers that only receive limited updates.
This setting applies to both monthly and daily updates. It overrides any previously configured channel selections for platform and engine updates.
If you disable or do not configure this policy, the device remains in Current Channel (Default) unless specified otherwise in specific channels for platform and engine updates. The device stays up to date automatically during the gradual release cycle, which is suitable for most devices.
This policy is available starting with platform version 4.18.2106.5 and later.
Type: | SwitchParameter |
Aliases: | dgr |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableHttpParsing
Indicates that the cmdlet removes whether disable inspection of HTTP traffic.
If EnableNetworkProtection has the value Enabled
, HTTP connections to malicious websites can be blocked.
Type: | SwitchParameter |
Aliases: | dhttpp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableInboundConnectionFiltering
Indicates that the cmdlet removes whether to inspect only outbound connections. By default, Network Protection inspects both inbound and outbound connections.
Type: | SwitchParameter |
Aliases: | dicf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableIntrusionPreventionSystem
Indicates that the cmdlet removes whether to configure network protection against exploitation of known vulnerabilities.
Type: | SwitchParameter |
Aliases: | dips |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableIOAVProtection
Indicates that the cmdlet removes whether Windows Defender scans all downloaded files and attachments.
Type: | SwitchParameter |
Aliases: | dioavp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisablePrivacyMode
Indicates that the cmdlet removes whether to disable privacy mode.
Type: | SwitchParameter |
Aliases: | dpm |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableRdpParsing
Indicates that the cmdlet removes whether to inspect only outbound connections. By default, Network Protection inspects both inbound and outbound connections.
Type: | SwitchParameter |
Aliases: | drdpp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableRealtimeMonitoring
Indicates that the cmdlet removes whether to use real-time protection.
Type: | SwitchParameter |
Aliases: | drtm |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableRemovableDriveScanning
Indicates that the cmdlet removes whether to scan for malicious and unwanted software in removable drives, such as flash drives, during a full scan.
Type: | SwitchParameter |
Aliases: | drdsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableRestorePoint
Indicates that the cmdlet removes whether to disable scanning of restore points.
Type: | SwitchParameter |
Aliases: | drp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableScanningMappedNetworkDrivesForFullScan
Indicates that the cmdlet removes whether to scan mapped network drives.
If you specify a value of $False
or do not specify a value, Windows Defender scans mapped network drives.
Type: | SwitchParameter |
Aliases: | dsmndfsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableScanningNetworkFiles
Indicates that the cmdlet removes whether to scan for network files.
Type: | SwitchParameter |
Aliases: | dsnf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableScriptScanning
Indicates that the cmdlet removes whether to disable the scanning of scripts during malware scans. If you specify a value of $False or do not specify a value, Windows Defender does not scan scripts.
Type: | SwitchParameter |
Aliases: | dscrptsc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableSshParsing
Indicates that the cmdlet removes whether to disable inspection of SSH traffic. By default, Network Protection inspects SSH traffic.
Type: | SwitchParameter |
Aliases: | dsshp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-DisableTlsParsing
Indicates that the cmdlet removes whether to disable inspection of TLS traffic, also known as HTTPS. By default, Network Protection inspects TLS traffic.
Type: | SwitchParameter |
Aliases: | dtlsp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableControlledFolderAccess
Indicates that the cmdlet removes the state for the controlled folder access feature. Valid values are Disabled, Enabled, and Audit Mode.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableDnsSinkhole
Indicates that the cmdlet removes whether to examine DNS traffic to detect and sinkhole DNS exfiltration attempts and other DNS based malicious attacks.
Type: | SwitchParameter |
Aliases: | ednss |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableFileHashComputation
Indicates that the cmdlet removes whether to enable file hash computation. When this feature is enabled, Windows Defender computes hashes for files it scans.
Type: | SwitchParameter |
Aliases: | efhc |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableFullScanOnBatteryPower
Indicates that the cmdlet removes whether Windows Defender does a full scan while on battery power.
Type: | SwitchParameter |
Aliases: | efsobp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableLowCpuPriority
Indicates that the cmdlet removes whether Windows Defender uses low CPU priority for scheduled scans.
Type: | SwitchParameter |
Aliases: | elcp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EnableNetworkProtection
Specifies how the Network Protection Service handles web-based malicious threats, including phishing and malware. Possible values are Disabled, Enabled, and AuditMode.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-EngineUpdatesChannel
Specifies when devices receive Microsoft Defender engine updates during the monthly gradual rollout.
Valid values are:
- NotConfigured. Devices stay up to date automatically during the gradual release cycle. This value is suitable for most devices.
- Beta. Devices are the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. This value is for use in manual test environments only and a limited number of devices.
- Broad. Devices are offered updates only after the gradual release cycle completes. This value is suggested for a broad set of devices in your production population, from 10 to 100 percent.
- Preview. Devices are offered updates earliest during the monthly gradual release cycle. This value is suggested for pre-production or validation environments.
- Staged. Devices are offered updates after the monthly gradual release cycle. This value is suggested for a small, representative part of your production population, around 10 percent.
Type: | SwitchParameter |
Aliases: | erelr |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExclusionExtension
Specifies an array of file name extensions, such as obj or lib, to exclude from scheduled, custom, and real-time scanning. This cmdlet removes the exclusions that you specify.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExclusionIpAddress
Specifies an array of IP addresses to exclude from scheduled and real-time scanning.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExclusionPath
Specifies an array of file paths to exclude from scheduled and real-time scanning. This cmdlet removes the exclusions that you specify.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ExclusionProcess
Specifies an array of processes, as paths to process images. This cmdlet removes exclusions of files opened by the processes that you specify.
Type: | String[] |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-Force
Forces the command to run without asking for user confirmation.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ForceUseProxyOnly
Removes whether to force the device to use only the proxy.
Type: | SwitchParameter |
Aliases: | fupo |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-HighThreatDefaultAction
Indicates that this cmdlet removes the automatic remediation action specified for the high threat alert level.
Type: | SwitchParameter |
Aliases: | htdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-LowThreatDefaultAction
Indicates that this cmdlet removes the automatic remediation action specified for the low threat alert level.
Type: | SwitchParameter |
Aliases: | ltdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-MAPSReporting
Indicates that the cmdlet removes membership in Microsoft Active Protection Service.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-MeteredConnectionUpdates
Indicates that the cmdlet removes whether to update managed devices to update through metered connections. Data charges may apply.
Type: | SwitchParameter |
Aliases: | mcupd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ModerateThreatDefaultAction
Indicates that this cmdlet removes the automatic remediation action specified for the moderate threat alert level.
Type: | SwitchParameter |
Aliases: | mtdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-PlatformUpdatesChannel
Specifies when devices receive Microsoft Defender platform updates during the monthly gradual rollout.
Valid values are:
- NotConfigured. Devices stay up to date automatically during the gradual release cycle. This value is suitable for most devices.
- Beta. Devices are the first to receive new updates. Select Beta Channel to participate in identifying and reporting issues to Microsoft. Devices in the Windows Insider Program are subscribed to this channel by default. This value is for use in manual test environments only and a limited number of devices.
- Broad. Devices are offered updates only after the gradual release cycle completes. This value is suggested for a broad set of devices in your production population, from 10 to 100 percent.
- Preview. Devices are offered updates earliest during the monthly gradual release cycle. This value is suggested for pre-production or validation environments.
- Staged. Devices are offered updates after the monthly gradual release cycle. This value is suggested for a small, representative part of your production population, around 10 percent.
Type: | SwitchParameter |
Aliases: | prelr |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ProxyBypass
Specifies proxy bypasses.
Type: | SwitchParameter |
Aliases: | proxbps |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ProxyPacUrl
Specifies the Privilege Attribute Certificate (PAC) proxy.
Type: | SwitchParameter |
Aliases: | ppurl |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ProxyServer
Specifies the proxy server.
Type: | SwitchParameter |
Aliases: | proxsrv |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-PUAProtection
Specifies the level of detection for potentially unwanted applications. When potentially unwanted software is downloaded or attempts to install itself on your computer, you are warned.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-QuarantinePurgeItemsAfterDelay
Indicates that the cmdlet removes specified number of days to keep items in the Quarantine folder.
Type: | SwitchParameter |
Aliases: | qpiad |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RandomizeScheduleTaskTimes
Indicates that the cmdlet removes whether to select a random time for the scheduled start and scheduled update for definitions.
Type: | SwitchParameter |
Aliases: | rstt |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RealTimeScanDirection
Indicates that the cmdlet removes specified scanning configuration for incoming and outgoing files on NTFS volumes.
Type: | SwitchParameter |
Aliases: | rtsd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RemediationScheduleDay
Indicates that the cmdlet removes specified day of the week on which to perform a scheduled full scan in order to complete remediation.
Type: | SwitchParameter |
Aliases: | rsd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-RemediationScheduleTime
Indicates that the cmdlet removes specified time of day, as the number of minutes after midnight, to perform a scheduled scan.
Type: | SwitchParameter |
Aliases: | rst |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ReportingAdditionalActionTimeOut
Indicates that the cmdlet removes specified number of minutes before a detection in the additional action state changes to the cleared state.
Type: | SwitchParameter |
Aliases: | raat |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ReportingCriticalFailureTimeOut
Indicates that the cmdlet removes specified the number of minutes before a detection in the critically failed state changes to either the additional action state or the cleared state.
Type: | SwitchParameter |
Aliases: | rcto |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ReportingNonCriticalTimeOut
Indicates that the cmdlet removes specified number of minutes before a detection in the non-critically failed state changes to the cleared state.
Type: | SwitchParameter |
Aliases: | rncto |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanAvgCPULoadFactor
Indicates that the cmdlet removes specified maximum percentage CPU usage for a scan.
Type: | SwitchParameter |
Aliases: | saclf |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanOnlyIfIdleEnabled
Indicates that the cmdlet removes whether to start scheduled scans only when the computer is not in use.
Type: | SwitchParameter |
Aliases: | soiie |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanParameters
Indicates that the cmdlet removes specified scan type to use during a scheduled scan.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanPurgeItemsAfterDelay
Indicates that the cmdlet removes specified number of days to keep items in the scan history folder.
Type: | SwitchParameter |
Aliases: | spiad |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanScheduleDay
Indicates that the cmdlet removes specified the day of the week on which to perform a scheduled scan.
Type: | SwitchParameter |
Aliases: | scsd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanScheduleQuickScanTime
Indicates that the cmdlet removes specified time of day, as the number of minutes after midnight, to perform a scheduled quick scan.
Type: | SwitchParameter |
Aliases: | scsqst |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ScanScheduleTime
Indicates that the cmdlet removes specified time of day, as the number of minutes after midnight, to perform a scheduled scan.
Type: | SwitchParameter |
Aliases: | scst |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SchedulerRandomizationTime
Specifies the randomization time for the scheduler.
Type: | SwitchParameter |
Aliases: | srt |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SevereThreatDefaultAction
Indicates that this cmdlet removes the automatic remediation action specified for the severe threat alert level.
Type: | SwitchParameter |
Aliases: | stdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SharedSignaturesPath
Specifies the shared signatures path.
Type: | SwitchParameter |
Aliases: | ssp, SecurityIntelligenceLocation, ssl |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureAuGracePeriod
Indicates that the cmdlet removes specified grace period, in minutes, for the definition.
Type: | SwitchParameter |
Aliases: | sigagp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureBlobFileSharesSources
Specifies the file shares sources for signatures.
Type: | SwitchParameter |
Aliases: | sigbfs |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureBlobUpdateInterval
Indicates that the cmdlet removes the signature update interval.
Type: | SwitchParameter |
Aliases: | sigbui |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureDefinitionUpdateFileSharesSources
Indicates that the cmdlet removes specified file-share sources for definition updates.
Type: | SwitchParameter |
Aliases: | sigdufss |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureDisableUpdateOnStartupWithoutEngine
Indicates that the cmdlet removes whether to initiate definition updates even if no antimalware engine is present.
Type: | SwitchParameter |
Aliases: | sigduoswo |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureFallbackOrder
Indicates that the cmdlet removes specified order in which to contact different definition update sources.
Type: | SwitchParameter |
Aliases: | sfo |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureFirstAuGracePeriod
Indicates that the cmdlet removes specified grace period, in minutes, for the definition.
Type: | SwitchParameter |
Aliases: | sigfagp |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureScheduleDay
Indicates that the cmdlet removes specified day of the week on which to check for definition updates.
Type: | SwitchParameter |
Aliases: | sigsd |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureScheduleTime
Indicates that the cmdlet removes specified time of day, as the number of minutes after midnight, to check for definition updates.
Type: | SwitchParameter |
Aliases: | sigst |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignaturesUpdatesChannel
Specifies when devices receive daily Microsoft Defender definition updates during the monthly gradual rollout.
Valid values are:
- NotConfigured. Devices stay up to date automatically during the gradual release cycle. This value is suitable for most devices.
- Broad. Devices are offered updates only after the gradual release cycle completes. This value is suggested for a broad set of devices in your production population, from 10 to 100 percent.
- Staged. Devices are offered updates after the monthly gradual release cycle. This value is suggested for a small, representative part of your production population, around 10 percent.
This parameter name will be updated to DefinitionUpdatesChannel in a future release.
Type: | SwitchParameter |
Aliases: | srelr |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureUpdateCatchupInterval
Indicates that the cmdlet removes specified number of days after which Windows Defender requires a catch-up definition update.
Type: | SwitchParameter |
Aliases: | siguci |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SignatureUpdateInterval
Indicates that the cmdlet removes specified interval at which to check for definition updates.
Type: | SwitchParameter |
Aliases: | sigui |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-SubmitSamplesConsent
Indicates that the cmdlet removes how Windows Defender checks for user consent for certain samples.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ThreatIDDefaultAction_Actions
Specifies an array of the actions to take for the IDs specified by using the ThreatIDDefaultAction_Ids parameter. The acceptable values for this parameter are:
- 1: Clean
- 2: Quarantine
- 3: Remove
- 6: Allow
- 8: UserDefined
- 9: NoAction
- 10: Block
Note
A value of 0 (NULL) applies an action based on the Security Intelligence Update (SIU). This is the default value.
Type: | ThreatAction[] |
Aliases: | tiddefaca |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ThreatIDDefaultAction_Ids
Specifies an array of threat IDs. This cmdlet removes the default actions for the threat IDs that you specify.
Type: | Int64[] |
Aliases: | tiddefaci |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-ThrottleLimit
Specifies the maximum number of concurrent operations that can be established to run the cmdlet.
If this parameter is omitted or a value of 0
is entered, then Windows PowerShell® calculates an optimum throttle limit for the cmdlet based on the number of CIM cmdlets that are running on the computer.
The throttle limit applies only to the current cmdlet, not to the session or to the computer.
Type: | Int32 |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-UILockdown
Indicates that the cmdlet removes whether to disable UI lockdown mode.
Type: | SwitchParameter |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |
-UnknownThreatDefaultAction
Indicates that this cmdlet removes the automatic remediation action specified for the unknown threat alert level.
Type: | SwitchParameter |
Aliases: | unktdefac |
Position: | Named |
Default value: | None |
Required: | False |
Accept pipeline input: | False |
Accept wildcard characters: | False |