mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-15 06:47:21 +00:00
Merge pull request #1299 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
commit
a1ffd2179c
@ -60,7 +60,7 @@ If the error occurs again, check the error code against the following table to s
|
||||
|
||||
<tr class="odd">
|
||||
<td align="left">0x80090036</td>
|
||||
<td align="left">User cancelled an interactive dialog</td>
|
||||
<td align="left">User canceled an interactive dialog</td>
|
||||
<td align="left">User will be asked to try again</td>
|
||||
</tr>
|
||||
<tr class="even">
|
||||
@ -204,8 +204,9 @@ If the error occurs again, check the error code against the following table to s
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
|
||||
## Errors with unknown mitigation
|
||||
|
||||
For errors listed in this table, contact Microsoft Support for assistance.
|
||||
|
||||
| Hex | Cause |
|
||||
|
@ -35,12 +35,16 @@ The utility has the following commands:
|
||||
```DOS
|
||||
MpCmdRun.exe [command] [-options]
|
||||
```
|
||||
For example,
|
||||
```
|
||||
MpCmdRun.exe -scan -2
|
||||
```
|
||||
|
||||
|
||||
| Command | Description |
|
||||
|:--------------------------------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------------------------|
|
||||
| \-? **or** -h | Displays all available options for this tool |
|
||||
| \-Scan [-ScanType [0\|1\|2\|3]] [-File \<path> [-DisableRemediation] [-BootSectorScan]] [-Timeout \<days>] [-Cancel] | Scans for malicious software. Values for **ScanType** are: **0** Default, according to your configuration, **1** Quick scan, **2** Full scan, **3** File and directory custom scan. |
|
||||
| \-Scan [-ScanType [0\|1\|2\|3]] [-File \<path> [-DisableRemediation] [-BootSectorScan]] [-Timeout \<days>] [-Cancel] | Scans for malicious software. Values for **ScanType** are: **0** Default, according to your configuration, **-1** Quick scan, **-2** Full scan, **-3** File and directory custom scan. |
|
||||
| \-Trace [-Grouping #] [-Level #] | Starts diagnostic tracing |
|
||||
| \-GetFiles | Collects support information |
|
||||
| \-GetFilesDiagTrack | Same as Getfiles but outputs to temporary DiagTrack folder |
|
||||
@ -53,7 +57,10 @@ MpCmdRun.exe [command] [-options]
|
||||
| \-ListAllDynamicSignatures | Lists the loaded dynamic Security intelligence |
|
||||
| \-RemoveDynamicSignature [-SignatureSetID] | Removes dynamic Security intelligence |
|
||||
| \-CheckExclusion -path \<path> | Checks whether a path is excluded |
|
||||
|
||||
For example,
|
||||
```
|
||||
mpcmdrun.exe -scan -2
|
||||
```
|
||||
## Related topics
|
||||
|
||||
- [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md)
|
||||
|
@ -18,6 +18,7 @@ ms.author: dansimp
|
||||
**Applies to**
|
||||
- Windows 10
|
||||
- Windows Server 2016
|
||||
- Windows Server 2019
|
||||
|
||||
Members of the security community<sup>\*</sup> continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control.
|
||||
|
||||
@ -69,8 +70,8 @@ Unless your use scenarios explicitly require them, Microsoft recommends that you
|
||||
|
||||
<br />
|
||||
|
||||
>[!Note]
|
||||
>This application list will be updated with the latest vendor information as application vulnerabilities are resolved and new issues are discovered.
|
||||
> [!Note]
|
||||
> This application list will be updated with the latest vendor information as application vulnerabilities are resolved and new issues are discovered.
|
||||
|
||||
Certain software applications may allow additional code to run by design.
|
||||
These types of applications should be blocked by your Windows Defender Application Control policy.
|
||||
@ -1513,3 +1514,10 @@ Pick the correct version of each .dll for the Windows release you plan to suppor
|
||||
</SiPolicy>
|
||||
```
|
||||
<br />
|
||||
|
||||
> [!Note]
|
||||
> To create a policy that works on both Windows 10, version 1803 and version 1809, you can create two different policies, or merge them into one broader policy.
|
||||
|
||||
## More information
|
||||
|
||||
- [Merge Windows Defender Application Control policies](merge-windows-defender-application-control-policies.md)
|
||||
|
@ -20,8 +20,8 @@ ms.reviewer:
|
||||
**Applies to**
|
||||
|
||||
- Windows 10
|
||||
- Windows Server 2016
|
||||
- Office 2016
|
||||
- Windows Server
|
||||
- Office 365 ProPlus
|
||||
|
||||
## Using security baselines in your organization
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user