Skip to content

Commit cb5ef78

Browse files
committed
Updated the article as per task 5700467
1 parent 12d9d2b commit cb5ef78

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

docset/winserver2019-ps/defender/Set-MpPreference.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
description: Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
2+
description: Use this article to help manage Windows and Windows Server technologies with Windows PowerShell.
33
external help file: MSFT_MpPreference.cdxml-help.xml
44
Module Name: Defender
55
ms.date: 01/24/2022
@@ -42,7 +42,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
4242
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
4343
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
4444
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>][-CloudBlockLevel <CloudBlockLevelType>][-ServiceHealthReportInterval <UInt32>]
45-
```
45+
```
4646

4747
## DESCRIPTION
4848
The **Set-MpPreference** cmdlet configures preferences for Windows Defender scans and updates.
@@ -74,7 +74,7 @@ This command configures preferences to check for definition updates every day.
7474

7575
### Example 2: Schedule a time of day to check for definition updates
7676
```
77-
PS C:\> Set-MpPreference -SignatureScheduleTime 120
77+
PS C:\> Set-MpPreference -SignatureScheduleTime 02:00:00
7878
```
7979

8080
This command configures preferences to check for definition updates 120 minutes after midnight on days when it is scheduled to check.
@@ -141,10 +141,10 @@ Accept wildcard characters: False
141141
### -CloudBlockLevel
142142
Configure this policy to specify the level of cloud protection to your endpoint.
143143
144-
Default (0): provides strong detection without increasing risk of detecting legitamate files
144+
Default (0): provides strong detection without increasing risk of detecting legitimate files
145145
Moderate (1): provides moderate detection only for high confidence detections
146146
High (2): applies a strong level of detection while optimizing client performance
147-
HighPlus (4): applies extra protection measures (might affect client peformance and increase your chance of false positives)
147+
HighPlus (4): applies extra protection measures (might affect client performance and increase your chance of false positives)
148148
ZeroTolerance (6): blocks all unknown executables
149149
150150
```yaml
@@ -571,7 +571,7 @@ Accept wildcard characters: False
571571
```
572572
573573
### -HighThreatDefaultAction
574-
Specifies which automatic remediation action to take for a high level threat.
574+
Specifies which automatic remediation action to take for a high-level threat.
575575
The acceptable values for this parameter are:
576576
577577
- Quarantine
@@ -592,7 +592,7 @@ Accept wildcard characters: False
592592
```
593593
594594
### -LowThreatDefaultAction
595-
Specifies which automatic remediation action to take for a low level threat.
595+
Specifies which automatic remediation action to take for a low-level threat.
596596
The acceptable values for this parameter are:
597597
598598
- Quarantine

0 commit comments

Comments
 (0)