Skip to content

Commit c71ab7a

Browse files
authored
Merge pull request #2904 from MicrosoftDocs/jweston-1-patch-1
Update Set-MpPreference.md - Per 5767573 - Docs update: Set-MpPreference (Defender)
2 parents a06d89a + ccccfe4 commit c71ab7a

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

docset/winserver2022-ps/defender/Set-MpPreference.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
description: The Set-MpPreference cmdlet configures preferences for Windows Defender scans and updates.
33
external help file: MSFT_MpPreference.cdxml-help.xml
44
Module Name: Defender
5-
ms.date: 01/28/2022
5+
ms.date: 03/02/2022
66
online version: https://docs.microsoft.com/powershell/module/defender/set-mppreference?view=windowsserver2022-ps&wt.mc_id=ps-gethelp
77
schema: 2.0.0
88
title: Set-MpPreference
@@ -453,6 +453,7 @@ Accept wildcard characters: False
453453

454454
### -DisableDnsParsing
455455
Specifies whether to disable inspection of DNS traffic that occurs over a UDP channel.
456+
Network protection inspects DNS traffic that occurs over a TCP channel to provide metadata for anti-malware behavior monitoring or to allow for DNS sink holing if the "-EnableDnsSinkhole" configuration is set. This can be disabled by setting this value to "$true".
456457

457458
```yaml
458459
Type: Boolean
@@ -701,8 +702,8 @@ Accept wildcard characters: False
701702
```
702703

703704
### -DisableTlsParsing
704-
Specifies whether to disable inspection of TLS traffic, also known as HTTPS.
705-
By default, Network Protection inspects TLS traffic.
705+
Specifies whether to disable inspection of TLS traffic.
706+
Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, network protection inspects TLS traffic.
706707

707708
```yaml
708709
Type: Boolean
@@ -732,7 +733,8 @@ Accept wildcard characters: False
732733
```
733734

734735
### -EnableDnsSinkhole
735-
Specifies whether to examine DNS traffic to detect and sinkhole DNS exfiltration attempts and other DNS based malicious attacks.
736+
Specifies whether to examine DNS traffic to detect and sinkhole DNS exfiltration attempts and other DNS based malicious attacks.
737+
Network protection can inspect the DNS traffic of a machine and, in conjunction with behavior monitoring, detect and sink hole DNS exfiltration attempts, and other DNS based malicious attacks. Set this configuration to "$true" to enable this feature.
736738

737739
```yaml
738740
Type: Boolean
@@ -793,7 +795,7 @@ Accept wildcard characters: False
793795
```
794796

795797
### -EnableNetworkProtection
796-
Specifies how the Network Protection Service handles web-based malicious threats, including phishing and malware.
798+
Specifies how the network protection service handles web-based malicious threats, including phishing and malware.
797799
Possible values are Disabled, Enabled, and AuditMode.
798800

799801
```yaml

0 commit comments

Comments
 (0)