1
1
---
2
- description : Use this topic to help manage Windows and Windows Server technologies with Windows PowerShell.
2
+ description : Use this article to help manage Windows and Windows Server technologies with Windows PowerShell.
3
3
external help file : MSFT_MpPreference.cdxml-help.xml
4
4
Module Name : Defender
5
5
ms.date : 01/24/2022
@@ -42,7 +42,7 @@ Set-MpPreference [-ExclusionPath <String[]>] [-ExclusionExtension <String[]>] [-
42
42
[-HighThreatDefaultAction <ThreatAction>] [-SevereThreatDefaultAction <ThreatAction>] [-Force]
43
43
[-DisableBlockAtFirstSeen <Boolean>] [-PUAProtection <PUAProtectionType>] [-CimSession <CimSession[]>]
44
44
[-ThrottleLimit <Int32>] [-AsJob] [<CommonParameters>] [-DisableGradualRelease <Boolean>] [-DefinitionUpdatesChannel <UpdatesChannelType>] [-EngineUpdatesChannel <UpdatesChannelType>] [-PlatformUpdatesChannel <UpdatesChannelType>][-CloudBlockLevel <CloudBlockLevelType>][-ServiceHealthReportInterval <UInt32>]
45
- ```
45
+ ```
46
46
47
47
## DESCRIPTION
48
48
The ** Set-MpPreference** cmdlet configures preferences for Windows Defender scans and updates.
@@ -74,7 +74,7 @@ This command configures preferences to check for definition updates every day.
74
74
75
75
### Example 2: Schedule a time of day to check for definition updates
76
76
```
77
- PS C:\> Set-MpPreference -SignatureScheduleTime 120
77
+ PS C:\> Set-MpPreference -SignatureScheduleTime 02:00:00
78
78
```
79
79
80
80
This command configures preferences to check for definition updates 120 minutes after midnight on days when it is scheduled to check.
@@ -141,10 +141,10 @@ Accept wildcard characters: False
141
141
### -CloudBlockLevel
142
142
Configure this policy to specify the level of cloud protection to your endpoint.
143
143
144
- Default (0): provides strong detection without increasing risk of detecting legitamate files
144
+ Default (0): provides strong detection without increasing risk of detecting legitimate files
145
145
Moderate (1): provides moderate detection only for high confidence detections
146
146
High (2): applies a strong level of detection while optimizing client performance
147
- HighPlus (4): applies extra protection measures (might affect client peformance and increase your chance of false positives)
147
+ HighPlus (4): applies extra protection measures (might affect client performance and increase your chance of false positives)
148
148
ZeroTolerance (6): blocks all unknown executables
149
149
150
150
` ` ` yaml
@@ -571,7 +571,7 @@ Accept wildcard characters: False
571
571
` ` `
572
572
573
573
### -HighThreatDefaultAction
574
- Specifies which automatic remediation action to take for a high level threat.
574
+ Specifies which automatic remediation action to take for a high- level threat.
575
575
The acceptable values for this parameter are:
576
576
577
577
- Quarantine
@@ -592,7 +592,7 @@ Accept wildcard characters: False
592
592
` ` `
593
593
594
594
### -LowThreatDefaultAction
595
- Specifies which automatic remediation action to take for a low level threat.
595
+ Specifies which automatic remediation action to take for a low- level threat.
596
596
The acceptable values for this parameter are:
597
597
598
598
- Quarantine
0 commit comments