+Configuration action | Type of exclusion | PowerShell command |
+
+
+Create or overwrite a list | File extensions that should be excluded from scans |
+Set-MpPreference -ExclusionExtension ".extension1, .extension2, .extension3" |
+
+Files (including processes) and paths that should be excluded from scans |
+Set-MpPreference -ExclusionPath "c:\example, d:\test\process.exe, c:\test\file.bat" |
+
+Files opened by the specified processes (executables) |
+Set-MpPreference -ExclusionProcess "c:\example\test.exe" |
+
+
+
+Add to a list | File extensions that should be excluded from scans |
+Add-MpPreference -ExclusionExtension ".extension4, .extension5" |
+
+Files (including processes) and paths that should be excluded from scans |
+Add-MpPreference -ExclusionPath "d:\test, d:\example\file.png" |
+
+Files opened by specified processes (executables) |
+Add-MpPreference -ExclusionProcess "f:\test\sample.exe" |
+
+
+
+
+Remove items from a list | File extensions that should be excluded from scans |
+Remove-MpPreference -ExclusionExtension ".extension1, .extension4, .extension5" |
+
+Files (including processes) and paths that should be excluded from scans |
+Remove-MpPreference -ExclusionPath "c:\example, d:\example\file.png" |
+
+Files opened by specified processes (executables) |
+Remove-MpPreference -ExclusionProcess "c:\example\test.exe" |
+
+
+### Review the exclusion lists with PowerShell
+
+You can retrieve the items in any of the lists in two ways:
+- Retrieve the status of all Windows Defender AV preferences. Each of the three lists will be displayed on separate lines, but the items within the list will be combined into the same line.
+- Write the status of all preferences to a variable, and only call the specific list you are interested in. Each use of `Add-MpPreference` is written to a new line.
+
+In both instances the items are sorted alphabetically.
+
+The following sequence of code examples helps to show how this works.
+
+1. Create an example list of extensions that should be excluded from scans:
+ ```PowerShell
+ PS C:\> Set-MpPreference -ExclusionExtension ".test1, .test2"
+ ```
+
+2. Add some additional extensions:
+
+ ```PowerShell
+ PS C:\> Add-MpPreference -ExclusionExtension ".test40, test50"
+ ```
+
+3. Add another set of extensions:
+
+ ```PowerShell
+ PS C:\> Add-MpPreference -ExclusionExtension ".secondadd1, .secondadd2"
+ ```
+
+4. Review the list as a combined list:
+ ```PowerShell
+ PS C:\> Get-MpPreference
+ ```
+
+ 
+
+
+5. Use a variable to store and retrieve only the exclusions list:
+
+ ```PowerShell
+ PS C:\> $WDAVprefs = Get-MpPreference
+ PS C:\> $WDAVprefs.ExclusionExtension
+ ```
+
+ 
+
+
+See [Use PowerShell cmdlets to configure and run Windows Defender Antivirus](use-powershell-cmdlets-windows-defender-antivirus.md) and [Defender cmdlets](https://technet.microsoft.com/itpro/powershell/windows/defender/index) for more information on how to use PowerShell with Windows Defender Antivirus.
+
+### Use Windows Management Instruction (WMI) to configure file extension exclusions
+
+Use the [ **Set**, **Add**, and **Remove** methods of the **MSFT_MpPreference**](https://msdn.microsoft.com/en-us/library/dn455323(v=vs.85).aspx) class for the following properties:
+
+```WMI
+ExclusionExtension
+ExclusionPath
+ExclusionProcess
+```
+
+The use of **Set**, **Add**, and **Remove** are analogous to their counterparts in PowerShell: `Set-MpPreference`, `Add-MpPreference`, and `Remove-MpPreference`.
+
+See the following for more information and allowed parameters:
+- [Windows Defender WMIv2 APIs](https://msdn.microsoft.com/en-us/library/dn439477(v=vs.85).aspx)
+
+
Your enterprise data on USB drives might be tied to the device it was protected on, based on your Azure RMS configuration. |
If you’re using Azure RMS: Authenticated users can open enterprise data on USB drives, on computers running the latest build from the Windows Insider Program. If you’re not using Azure RMS: Data in the new location remains encrypted, but becomes inaccessible on other devices and for other users. For example, the file won't open or the file opens, but doesn't contain readable text. |
- Share files with fellow employees through enterprise file servers or enterprise cloud locations. If data must be shared via USB, employees can decrypt protected files, but it will be audited. We strongly recommend educating employees about how to limit or eliminate the need for this decryption. |
+ Share files with fellow employees through enterprise file servers or enterprise cloud locations. If data must be shared via USB, employees can decrypt protected files, but it will be audited. We strongly recommend educating employees about how to limit or eliminate the need for this decryption. Important If you're running WIP with Azure Rights Management (Azure RMS), you can open any enterprise data copied to a USB drive on computers running Windows 10, version 1703 and later. For more info about how to set up WIP with Azure RMS, see [Create a Windows Information Protection (WIP) policy using Microsoft Intune](https://technet.microsoft.com/en-us/itpro/windows/keep-secure/create-wip-policy-using-intune). |
Direct Access is incompatible with WIP. |
@@ -79,6 +79,27 @@ This table provides info about the most common problems you might encounter whil
Webpages that use ActiveX controls can potentially communicate with other outside processes that aren’t protected by using WIP. |
We recommend that you switch to using Microsoft Edge, the more secure and safer browser that prevents the use of ActiveX controls. We also recommend that you limit the usage of Internet Explorer 11 to only those line-of-business apps that require legacy technology. For more info, see [Out-of-date ActiveX control blocking](https://technet.microsoft.com/en-us/itpro/internet-explorer/ie11-deploy-guide/out-of-date-activex-control-blocking). |
+
+ WIP isn’t turned on if any of the following folders have the MakeFolderAvailableOfflineDisabled option set to False:
+
+ - AppDataRoaming
+ - Desktop
+ - StartMenu
+ - Documents
+ - Pictures
+ - Music
+ - Videos
+ - Favorites
+ - Contacts
+ - Downloads
+ - Links
+ - Searches
+ - SavedGames
+
+ |
+ WIP isn’t turned on for employees in your organization. |
+ Don’t set the MakeFolderAvailableOfflineDisabled option to False for any of the specified folders. If you currently use redirected folders, we recommend that you migrate to a file synchronization solution that supports WIP, such as Work Folders or OneDrive for Business. Additionally, if you apply redirected folders after WIP is already in place, you might be unable to open your files offline. For more info about these potential access errors, see [Can't open files offline when you use Offline Files and Windows Information Protection](https://support.microsoft.com/en-us/help/3187045/can-t-open-files-offline-when-you-use-offline-files-and-windows-information-protection). |
+