Skip to content

Commit 65c5b4f

Browse files
author
denisebmsft
committed
Update Set-MpPreference.md
1 parent bb3111e commit 65c5b4f

File tree

1 file changed

+18
-11
lines changed

1 file changed

+18
-11
lines changed

docset/winserver2019-ps/defender/Set-MpPreference.md

Lines changed: 18 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ You can modify exclusion file name extensions, paths, or processes, and specify
5353
The following table provides remediation action values for detected threats at low, medium, high, and severe alert levels.
5454

5555
|Value |Action |
56-
|------|-------------------------------------------------------------------------|
56+
|------|-------------------|
5757
|1 |Clean the detected threat. |
5858
|2 |Quarantine the detected threat. |
5959
|3 |Remove the detected threat. |
@@ -66,13 +66,15 @@ The following table provides remediation action values for detected threats at l
6666
## EXAMPLES
6767

6868
### Example 1: Schedule to check for definition updates everyday
69+
6970
```
7071
PS C:\> Set-MpPreference -SignatureScheduleDay Everyday
7172
```
7273

7374
This command configures preferences to check for definition updates every day.
7475

7576
### Example 2: Schedule a time of day to check for definition updates
77+
7678
```
7779
PS C:\> Set-MpPreference -SignatureScheduleTime 02:00:00
7880
```
@@ -85,8 +87,11 @@ This command configures preferences to check for definition updates 120 minutes
8587
Runs the cmdlet as a background job. Use this parameter to run commands that take a long time to complete.
8688

8789
The cmdlet immediately returns an object that represents the job and then displays the command prompt.
90+
8891
You can continue to work in the session while the job completes.
92+
8993
To manage the job, use the `*-Job` cmdlets.
94+
9095
To get the job results, use the [Receive-Job](https://go.microsoft.com/fwlink/?LinkID=113372) cmdlet.
9196

9297
For more information about Windows PowerShell background jobs, see [about_Jobs](https://go.microsoft.com/fwlink/?LinkID=113251).
@@ -105,7 +110,7 @@ Accept wildcard characters: False
105110
106111
### -CheckForSignaturesBeforeRunningScan
107112
Indicates whether to check for new virus and spyware definitions before Windows Defender runs a scan.
108-
If you specify a value of $True, Windows Defender checks for new definitions.
113+
If you specify a value of `$True`, Windows Defender checks for new definitions.
109114
If you specify `$False` or don’t specify a value, the scan begins with existing definitions.
110115
This value applies to scheduled scans, but it doesn’t affect scans that you start from the user interface or to scans that you start from the command line.
111116

@@ -123,7 +128,9 @@ Accept wildcard characters: False
123128

124129
### -CimSession
125130
Runs the cmdlet in a remote session or on a remote computer.
131+
126132
Enter a computer name or a session object, such as the output of a [New-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227967) or [Get-CimSession](https://go.microsoft.com/fwlink/p/?LinkId=227966) cmdlet.
133+
127134
The default is the current session on the local computer.
128135

129136
```yaml
@@ -248,7 +255,7 @@ Accept wildcard characters: False
248255
### -DisableCatchupFullScan
249256
Indicates whether Windows Defender runs catch-up scans for scheduled full scans.
250257
A computer can miss a scheduled scan, usually because the computer is turned off at the scheduled time.
251-
If you specify a value of $False, after the computer misses two scheduled full scans, Windows Defender runs a catch-up scan the next time someone signs in the computer. If you specify a value of $True, the computer doesn’t run catch-up scans for scheduled full scans.
258+
If you specify a value of `$False`, after the computer misses two scheduled full scans, Windows Defender runs a catch-up scan the next time someone signs in the computer. If you specify a value of `$True`, the computer doesn’t run catch-up scans for scheduled full scans.
252259

253260
```yaml
254261
Type: Boolean
@@ -265,7 +272,7 @@ Accept wildcard characters: False
265272
### -DisableCatchupQuickScan
266273
Indicates whether Windows Defender runs catch-up scans for scheduled quick scans.
267274
A computer can miss a scheduled scan, usually because the computer is off at the scheduled time.
268-
If you specify a value of $False, after the computer misses two scheduled quick scans, Windows Defender runs a catch-up scan the next time someone signs in the computer. If you specify a value of $True, the computer doesn’t run catch-up scans for scheduled quick scans.
275+
If you specify a value of `$False`, after the computer misses two scheduled quick scans, Windows Defender runs a catch-up scan the next time someone signs in the computer. If you specify a value of `$True`, the computer doesn’t run catch-up scans for scheduled quick scans.
269276

270277
```yaml
271278
Type: Boolean
@@ -294,7 +301,7 @@ Accept wildcard characters: False
294301
### -DisableEmailScanning
295302
Indicates whether Windows Defender parses the mailbox and mail files, according to their specific format, in order to analyze mail bodies and attachments.
296303
Windows Defender supports several formats, including .pst, .dbx, .mbx, .mime, and .binhex.
297-
If you specify a value of `$False` or don’t specify a value, Windows Defender performs email scanning. If you specify a value of $True, Windows Defender doesn’t perform email scanning.
304+
If you specify a value of `$False` or don’t specify a value, Windows Defender performs email scanning. If you specify a value of `$True`, Windows Defender doesn’t perform email scanning.
298305
This configuration isn’t applicable to modern email clients.
299306

300307
```yaml
@@ -399,7 +406,7 @@ Accept wildcard characters: False
399406

400407
### -DisableRemovableDriveScanning
401408
Indicates whether to scan for malicious and unwanted software in removable drives, such as flash drives, during a full scan.
402-
If you specify a value of `$False` or don’t specify a value, Windows Defender scans removable drives during any type of scan. If you specify a value of $True, Windows Defender doesn’t scan removable drives during a full scan. Windows Defender can still scan removable drives during quick scans or custom scans.
409+
If you specify a value of `$False` or don’t specify a value, Windows Defender scans removable drives during any type of scan. If you specify a value of `$True`, Windows Defender doesn’t scan removable drives during a full scan. Windows Defender can still scan removable drives during quick scans or custom scans.
403410

404411
```yaml
405412
Type: Boolean
@@ -430,7 +437,7 @@ Accept wildcard characters: False
430437
```
431438

432439
### -DisableScanningMappedNetworkDrivesForFullScan
433-
Indicates whether to scan mapped network drives. If you specify a value of `$False` or don’t specify a value, Windows Defender scans mapped network drives. If you specify a value of $True, Windows Defender doesn’t scan mapped network drives.
440+
Indicates whether to scan mapped network drives. If you specify a value of `$False` or don’t specify a value, Windows Defender scans mapped network drives. If you specify a value of `$True`, Windows Defender doesn’t scan mapped network drives.
434441

435442
```yaml
436443
Type: Boolean
@@ -445,7 +452,7 @@ Accept wildcard characters: False
445452
```
446453

447454
### -DisableScanningNetworkFiles
448-
Indicates whether to scan for network files. If you specify a value of `$False` or don’t specify a value, Windows Defender scans network files. If you specify a value of $True, Windows Defender doesn’t scan network files. We don’t recommend scanning network files.
455+
Indicates whether to scan for network files. If you specify a value of `$False` or don’t specify a value, Windows Defender scans network files. If you specify a value of `$True`, Windows Defender doesn’t scan network files. We don’t recommend scanning network files.
449456

450457
```yaml
451458
Type: Boolean
@@ -1061,7 +1068,7 @@ Accept wildcard characters: False
10611068

10621069
### -SignatureDefinitionUpdateFileSharesSources
10631070
Specifies file-share sources for definition updates.
1064-
Specify sources as a bracketed sequence of Universal Naming Convention (UNC) locations, separated by the pipeline symbol; for example, { \\\\Server01\Share01 | \\\\Server02\Share02 | \\\\Server03\Share03}.
1071+
Specify sources as a bracketed sequence of Universal Naming Convention (UNC) locations, separated by the pipeline symbol; for example, `{ \\\\Server01\Share01 | \\\\Server02\Share02 | \\\\Server03\Share03}`.
10651072
If you specify a value for this parameter, Windows Defender attempts to connect to the shares in the order that you specify.
10661073
After Windows Defender updates a definition, it stops attempting to connect to shares on the list.
10671074
If you don’t specify a value for this parameter, the list is empty.
@@ -1081,7 +1088,7 @@ Accept wildcard characters: False
10811088
### -SignatureDisableUpdateOnStartupWithoutEngine
10821089
Indicates whether to initiate definition updates even if no antimalware engine is present.
10831090
If you specify a value of `$True` or don’t specify a value, Windows Defender doesn’t initiate definition updates on startup.
1084-
If you specify a value of $False, and if no antimalware engine is present, Windows Defender initiates definition updates on startup.
1091+
If you specify a value of `$False`, and if no antimalware engine is present, Windows Defender initiates definition updates on startup.
10851092

10861093
```yaml
10871094
Type: Boolean
@@ -1310,7 +1317,7 @@ Accept wildcard characters: False
13101317

13111318
### -UILockdown
13121319
Indicates whether to disable UI lockdown mode.
1313-
If you specify a value of $True, Windows Defender disables UI lockdown mode.
1320+
If you specify a value of `$True`, Windows Defender disables UI lockdown mode.
13141321
If you specify `$False` or don’t specify a value, UI lockdown mode is enabled.
13151322

13161323
```yaml

0 commit comments

Comments
 (0)