diff --git a/docset/winserver2022-ps/defender/Set-MpPreference.md b/docset/winserver2022-ps/defender/Set-MpPreference.md index 050b94e09e..26c5c9b90f 100644 --- a/docset/winserver2022-ps/defender/Set-MpPreference.md +++ b/docset/winserver2022-ps/defender/Set-MpPreference.md @@ -19,6 +19,7 @@ Configures preferences for Windows Defender scans and updates. ```powershell Set-MpPreference [-ExclusionPath ] [-ExclusionExtension ] [-ExclusionProcess ] [-ExclusionIpAddress ] [-RealTimeScanDirection ] + [-IntelTDTEnabled ] [-QuarantinePurgeItemsAfterDelay ] [-RemediationScheduleDay ] [-RemediationScheduleTime ] [-ReportingAdditionalActionTimeOut ] [-ReportingCriticalFailureTimeOut ] [-ReportingNonCriticalTimeOut ] @@ -57,8 +58,9 @@ Set-MpPreference [-ExclusionPath ] [-ExclusionExtension ] [- [-ProxyServer ] [-ProxyBypass ] [-ForceUseProxyOnly ] [-OobeEnableRtpAndSigUpdate ] [-DisableTlsParsing ] [-DisableHttpParsing ] [-DisableDnsParsing ] - [-DisableFtpParsing ] + [-DisableFtpParsing ] [-DisableSmtpParsing ] [-DisableDnsOverTcpParsing ] [-DisableSshParsing ] + [-DisableNetworkProtectionPerfTelemetry ] [-PlatformUpdatesChannel ] [-EngineUpdatesChannel ] [-SignaturesUpdatesChannel ] [-DisableGradualRelease ] [-AllowNetworkProtectionDownLevel ] [-AllowDatagramProcessingOnWinServer ] @@ -613,6 +615,24 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -DisableNetworkProtectionPerfTelemetry +This setting disables the gathering and sending of performance telemetry from network protection. +The accepted values are 0 and 1. +- 1- Network protection telemetry is disabled. +- 0 (Default) - Network protection telemetry is enabled. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: dnpp + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisablePrivacyMode **This is a legacy setting that does not have any affect on current platforms**. The intent of this parameter was to disable privacy mode, which prevented users, other than administrators, from displaying threat history. When this parameter was in use, if you specified a value of $False or did not specify a value, privacy mode was enabled. @@ -754,6 +774,24 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -DisableSmtpParsing +This setting disables SMTP parsing for network protection. +The accepted values are 0 and 1. +- 1 - SMTP parsing is disabled. +- 0 (Default) - SMTP parsing is enabled. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: dsp + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -DisableTlsParsing Specifies whether to disable inspection of TLS traffic. Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, network protection inspects TLS traffic. @@ -1002,6 +1040,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -IntelTDTEnabled +This policy setting configures the Intel TDT integration level for Intel TDT-capable devices. +The acceptable values for this parameter are: +- 0 (Default) - If you don't configure this setting, the default value will be applied. The default value is controlled by Microsoft security intelligence updates. Microsoft will enable Intel TDT if there is a known threat. +- 1 - If you configure this setting to enabled, Intel TDT integration will turn on. +- 2 - If you configure this setting to disabled, Intel TDT integration will turn off. + +```yaml +Type: UInt32 +Parameter Sets: (All) +Aliases: itdte +Accepted values: 0,1 and 2 + +Required: False +Position: Named +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -LowThreatDefaultAction Specifies which automatic remediation action to take for a low level threat. The acceptable values for this parameter are: @@ -1884,6 +1942,25 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ThrottleForScheduledScanOnly +A CPU usage limit can be applied to scheduled scans only, or to scheduled and custom scans. The default value applies a CPU usage limit to scheduled scans only. +The acceptable values for this parameter are: +- 1 (Default) - If you enable this setting, CPU throttling will apply only to scheduled scans. +- 0 - If you disable this setting, CPU throttling will apply to scheduled and custom scans. + +```yaml +Type: Boolean +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: 1 +Accept pipeline input: False +Accept wildcard characters: False +``` + + ### -UILockdown Indicates whether to disable UI lockdown mode. If you specify a value of $True, Windows Defender disables UI lockdown mode.