Fixed formatting

This commit is contained in:
v-dihans 2021-05-20 12:27:42 -06:00
parent 721cd2943e
commit 73521cb17a

View File

@ -136,45 +136,45 @@ The SasUrl value is the target URI to which the CSP uploads the zip file contain
- Expected input value: The full command line including path and any arguments, such as `%windir%\\system32\\ipconfig.exe /all`.
- Output format: Console text output from the command is captured in a text file and included in the overall output archive. For commands which may generate file output rather than console output, a subsequent FolderFiles directive would be used to capture that output. The example XML above demonstrates this pattern with mdmdiagnosticstool.exe's -out parameter.
- Privacy guardrails: To enable diagnostic data capture while reducing the risk of an IT admin inadvertently capturing user-generated documents, only the following commands are allowed:
- %windir%\\system32\\certutil.exe
- %windir%\\system32\\dxdiag.exe
- %windir%\\system32\\gpresult.exe
- %windir%\\system32\\msinfo32.exe
- %windir%\\system32\\netsh.exe
- %windir%\\system32\\nltest.exe
- %windir%\\system32\\ping.exe
- %windir%\\system32\\powercfg.exe
- %windir%\\system32\\w32tm.exe
- %windir%\\system32\\wpr.exe
- %windir%\\system32\\dsregcmd.exe
- %windir%\\system32\\dispdiag.exe
- %windir%\\system32\\ipconfig.exe
- %windir%\\system32\\logman.exe
- %windir%\\system32\\tracelog.exe
- %programfiles%\\windows defender\\mpcmdrun.exe
- %windir%\\system32\\MdmDiagnosticsTool.exe
- %windir%\\system32\\pnputil.exe
- %windir%\\system32\\certutil.exe
- %windir%\\system32\\dxdiag.exe
- %windir%\\system32\\gpresult.exe
- %windir%\\system32\\msinfo32.exe
- %windir%\\system32\\netsh.exe
- %windir%\\system32\\nltest.exe
- %windir%\\system32\\ping.exe
- %windir%\\system32\\powercfg.exe
- %windir%\\system32\\w32tm.exe
- %windir%\\system32\\wpr.exe
- %windir%\\system32\\dsregcmd.exe
- %windir%\\system32\\dispdiag.exe
- %windir%\\system32\\ipconfig.exe
- %windir%\\system32\\logman.exe
- %windir%\\system32\\tracelog.exe
- %programfiles%\\windows defender\\mpcmdrun.exe
- %windir%\\system32\\MdmDiagnosticsTool.exe
- %windir%\\system32\\pnputil.exe
- **FoldersFiles**
- Captures log files from a given path (without recursion).
- Expected input value: File path with or without wildcards, such as "%windir%\\System32", or "%programfiles%\\*.log".
- Privacy guardrails: To enable diagnostic log capture while reducing the risk of an IT admin inadvertently capturing user-generated documents, only paths under the following roots are allowed:
- %PROGRAMFILES%
- %PROGRAMDATA%
- %PUBLIC%
- %WINDIR%
- %TEMP%
- %TMP%
- %PROGRAMFILES%
- %PROGRAMDATA%
- %PUBLIC%
- %WINDIR%
- %TEMP%
- %TMP%
- Additionally, only files with the following extensions are captured:
- .log
- .txt
- .dmp
- .cab
- .zip
- .xml
- .html
- .evtx
- .etl
- .log
- .txt
- .dmp
- .cab
- .zip
- .xml
- .html
- .evtx
- .etl
<a href="" id="diagnosticarchive-archiveresults"></a>**DiagnosticArchive/ArchiveResults**
Added in version 1.4 of the CSP in Windows 10, version 1903. This policy setting displays the results of the last archive run.