Skip to content

Commit da779ca

Browse files
committed
Update Set-MpPreference.md
1 parent c1b2611 commit da779ca

File tree

1 file changed

+80
-14
lines changed

1 file changed

+80
-14
lines changed

docset/winserver2022-ps/defender/Set-MpPreference.md

Lines changed: 80 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -193,12 +193,19 @@ Accept wildcard characters: False
193193
194194
### -AllowNetworkProtectionDownLevel
195195
196-
Specifies whether to allow network protection to be set to Enabled or Audit Mode on Windows versions
197-
before 1709. Valid values are:
196+
Specifies whether network protection on Windows Server 2012 R2 is controlled by the
197+
**EnableNetworkProtection** parameter. Valid values are:
198198
199-
- $true: Allow network protection to be set to Enabled or Audit Mode on Windows v1709 or earlier.
200-
- $false: Don't allow network protection to be set to Enabled or Audit Mode on Windows v1709 or
201-
earlier.
199+
- $true: Network protection is controlled by the **EnableNetworkProtection**
200+
parameter (Enabled, Disabled, or AuditMode).
201+
202+
**Tip**: For Windows Server 2016 or Windows Server 2012 R2, you also need to set the
203+
**AllowNetworkProtectionOnWinServer** parameter to the value $true.
204+
205+
- $false: Network protection isn't controlled by the **EnableNetworkProtection**
206+
parameter.
207+
208+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
202209
203210
```yaml
204211
Type: Boolean
@@ -214,11 +221,19 @@ Accept wildcard characters: False
214221
215222
### -AllowNetworkProtectionOnWinServer
216223
217-
Specifies whether to allow network protection to be set to Enabled or Audit Mode for Windows Server.
218-
Valid values are:
224+
Specifies whether network protection on Windows Server is controlled by the
225+
**EnableNetworkProtection** parameter. Valid values are:
219226
220-
- $true: Allow network protection to be set to Enabled or Audit Mode on Windows Server.
221-
- $false: Don't allow network protection to be set to Enabled or Audit Mode on Windows Server.
227+
- $true: Network protection is controlled by the **EnableNetworkProtection**
228+
parameter (Enabled, Disabled, or AuditMode).
229+
230+
**Tip**: For Windows Server 2016 or Windows Server 2012 R2, you also need to set the
231+
**AllowNetworkProtectionDownLevel** parameter to the value $true.
232+
233+
- $false: Network protection isn't controlled by the **EnableNetworkProtection**
234+
parameter.
235+
236+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
222237
223238
```yaml
224239
Type: Boolean
@@ -509,6 +524,15 @@ To remove values without affecting other existing values, use the **Remove-MPPre
509524

510525
`Remove-MpPreference -ControlledFolderAccessAllowedApplications "PathAndFileName1","PathAndFileName2",..."PathAndFileNameN"`
511526

527+
The value parameter is meaningful only if the value of the **EnableControlledFolderAccess**
528+
parameter isn't `Disabled`.
529+
530+
To specify additional folders that are protected by controlled folder access, use the
531+
**ControlledFolderAccessProtectedFolders** parameter.
532+
533+
For more information about controlled folder access, see [Protect important folders with controlled
534+
folder access](/defender-endpoint/controlled-folders).
535+
512536
```yaml
513537
Type: String[]
514538
Parameter Sets: (All)
@@ -538,6 +562,15 @@ To remove values without affecting other existing values, use the **Remove-MPPre
538562

539563
`Remove-MpPreference -ControlledFolderAccessAllowedApplications "Path1","Path2",..."PathN"`
540564

565+
The value parameter is meaningful only if the value of the **EnableControlledFolderAccess**
566+
parameter isn't `Disabled`.
567+
568+
To specify applications that are allowed to access controlled folders, use the
569+
**ControlledFolderAccessAllowedApplications** parameter.
570+
571+
For more information about controlled folder access, see [Protect important folders with controlled
572+
folder access](/defender-endpoint/controlled-folders).
573+
541574
```yaml
542575
Type: String[]
543576
Parameter Sets: (All)
@@ -769,6 +802,8 @@ Network protection needs to inspect DNS traffic over TCP in the following scenar
769802
- To provide metadata for anti-malware behavior monitoring.
770803
- To allow for a DNS sinkhole if the **EnableDnsSinkhole** parameter is set to the value $true.
771804

805+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
806+
772807
```yaml
773808
Type: Boolean
774809
Parameter Sets: (All)
@@ -836,6 +871,8 @@ Specifies whether to disable FTP parsing for network protection. Valid values ar
836871
- $true: FTP parsing for network protection is disabled.
837872
- $false: FTP parsing for network protection is enabled.
838873

874+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
875+
839876
```yaml
840877
Type: Boolean
841878
Parameter Sets: (All)
@@ -905,6 +942,8 @@ Specifies whether Network Protection inspects only outbound connections. Valid v
905942
- $true: Network Protection inspects only outbound connections.
906943
- $false: Network Protection inspects inbound and outbound connections. This is the default value.
907944

945+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
946+
908947
```yaml
909948
Type: Boolean
910949
Parameter Sets: (All)
@@ -944,6 +983,8 @@ Valid values are:
944983
- $true: Network protection telemetry is disabled.
945984
- $false: Network protection telemetry is enabled. This is the default value.
946985

986+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
987+
947988
```yaml
948989
Type: Boolean
949990
Parameter Sets: (All)
@@ -1114,11 +1155,13 @@ Accept wildcard characters: False
11141155

11151156
### -DisableSmtpParsing
11161157

1117-
This setting disables SMTP parsing by Network Protection. Valid values are:
1158+
This setting disables SMTP parsing by network protection. Valid values are:
11181159

11191160
- $true: SMTP parsing is disabled.
11201161
- $false: SMTP parsing is enabled. This is the default value
11211162

1163+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1164+
11221165
```yaml
11231166
Type: Boolean
11241167
Parameter Sets: (All)
@@ -1135,8 +1178,10 @@ Accept wildcard characters: False
11351178

11361179
Specifies whether to disable the inspection of SSH traffic. Valid values are:
11371180

1138-
- $true: Network Protection doesn't inspect SSH traffic.
1139-
- $false: Network Protection inspects SSH traffic. This is the default value.
1181+
- $true: Network protection doesn't inspect SSH traffic.
1182+
- $false: Network protection inspects SSH traffic. This is the default value.
1183+
1184+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
11401185

11411186
```yaml
11421187
Type: Boolean
@@ -1163,6 +1208,8 @@ being made to a malicious website, and to provide metadata to behavior monitorin
11631208
TLS connections to malicious websites can also be blocked if the value of the
11641209
**EnableNetworkProtection** parameter is `Enabled`.
11651210

1211+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1212+
11661213
```yaml
11671214
Type: Boolean
11681215
Parameter Sets: (All)
@@ -1187,6 +1234,15 @@ Specifies the state for the controlled folder access feature. Valid values are:
11871234
- BlockDiskModificationOnly
11881235
- AuditDiskModificationOnly
11891236

1237+
To specify additional folders that are protected by controlled folder access, use the
1238+
**ControlledFolderAccessProtectedFolders** parameter.
1239+
1240+
To specify applications that are allowed to access controlled folders, use the
1241+
**ControlledFolderAccessAllowedApplications** parameter.
1242+
1243+
For more information about controlled folder access, see [Protect important folders with controlled
1244+
folder access](/defender-endpoint/controlled-folders).
1245+
11901246
```yaml
11911247
Type: ControlledFolderAccessType
11921248
Parameter Sets: (All)
@@ -1207,6 +1263,8 @@ warning. Valid values are:
12071263
- $true: Network Protection blocks network traffic instead of displaying a warning.
12081264
- $false: Network Protection displaying a warning.
12091265

1266+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1267+
12101268
```yaml
12111269
Type: Boolean
12121270
Parameter Sets: (All)
@@ -1231,6 +1289,8 @@ in conjunction with behavior monitoring, detect and sinkhole DNS exfiltration at
12311289
DNS based malicious attacks.
12321290
- $false: DNS sinkhole is disabled.
12331291

1292+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1293+
12341294
```yaml
12351295
Type: Boolean
12361296
Parameter Sets: (All)
@@ -1309,6 +1369,12 @@ and malware. Valid values are:
13091369
- 1 or Enabled
13101370
- 2 or AuditMode
13111371

1372+
**Tip**: Network protection on Windows Server also requires that the
1373+
**AllowNetworkProtectionOnWinServer** and (for Windows Server 2016 or Windows Server 2012 R2)
1374+
**AllowNetworkProtectionDownLevel** parameters are set to the value $true.
1375+
1376+
For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1377+
13121378
```yaml
13131379
Type: ASRRuleActionType
13141380
Parameter Sets: (All)
@@ -1329,8 +1395,8 @@ potentially higher inbound UDP bandwidth. Valid values are:
13291395
- $true: UDP receive offload support in Network Protection is enabled.
13301396
- $false: UDP receive offload support in Network Protection is disabled.
13311397

1332-
Starting with platform version `4.18.24030`, Microsoft will gradually move the default value from
1333-
disabled to enabled.
1398+
Starting with platform version `4.18.24030`, we're gradually moving the default value from
1399+
$false (disabled) to $true (enabled).
13341400

13351401
```yaml
13361402
Type: Boolean

0 commit comments

Comments
 (0)