Merge pull request #1299 from MicrosoftDocs/repo_sync_working_branch

Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
David Strome 2019-10-08 22:23:33 -07:00 committed by GitHub
commit a1ffd2179c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 24 additions and 8 deletions

View File

@ -60,7 +60,7 @@ If the error occurs again, check the error code against the following table to s
<tr class="odd"> <tr class="odd">
<td align="left">0x80090036</td> <td align="left">0x80090036</td>
<td align="left">User cancelled an interactive dialog</td> <td align="left">User canceled an interactive dialog</td>
<td align="left">User will be asked to try again</td> <td align="left">User will be asked to try again</td>
</tr> </tr>
<tr class="even"> <tr class="even">
@ -204,8 +204,9 @@ If the error occurs again, check the error code against the following table to s
</tr> </tr>
</tbody> </tbody>
</table> </table>
## Errors with unknown mitigation ## Errors with unknown mitigation
For errors listed in this table, contact Microsoft Support for assistance. For errors listed in this table, contact Microsoft Support for assistance.
| Hex | Cause | | Hex | Cause |

View File

@ -35,12 +35,16 @@ The utility has the following commands:
```DOS ```DOS
MpCmdRun.exe [command] [-options] MpCmdRun.exe [command] [-options]
``` ```
For example,
```
MpCmdRun.exe -scan -2
```
| Command | Description | | Command | Description |
|:--------------------------------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------------------------| |:--------------------------------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------------------------|
| \-? **or** -h | Displays all available options for this tool | | \-? **or** -h | Displays all available options for this tool |
| \-Scan [-ScanType [0\|1\|2\|3]] [-File \<path> [-DisableRemediation] [-BootSectorScan]] [-Timeout \<days>] [-Cancel] | Scans for malicious software. Values for **ScanType** are: **0** Default, according to your configuration, **1** Quick scan, **2** Full scan, **3** File and directory custom scan. | | \-Scan [-ScanType [0\|1\|2\|3]] [-File \<path> [-DisableRemediation] [-BootSectorScan]] [-Timeout \<days>] [-Cancel] | Scans for malicious software. Values for **ScanType** are: **0** Default, according to your configuration, **-1** Quick scan, **-2** Full scan, **-3** File and directory custom scan. |
| \-Trace [-Grouping #] [-Level #] | Starts diagnostic tracing | | \-Trace [-Grouping #] [-Level #] | Starts diagnostic tracing |
| \-GetFiles | Collects support information | | \-GetFiles | Collects support information |
| \-GetFilesDiagTrack | Same as Getfiles but outputs to temporary DiagTrack folder | | \-GetFilesDiagTrack | Same as Getfiles but outputs to temporary DiagTrack folder |
@ -53,7 +57,10 @@ MpCmdRun.exe [command] [-options]
| \-ListAllDynamicSignatures | Lists the loaded dynamic Security intelligence | | \-ListAllDynamicSignatures | Lists the loaded dynamic Security intelligence |
| \-RemoveDynamicSignature [-SignatureSetID] | Removes dynamic Security intelligence | | \-RemoveDynamicSignature [-SignatureSetID] | Removes dynamic Security intelligence |
| \-CheckExclusion -path \<path> | Checks whether a path is excluded | | \-CheckExclusion -path \<path> | Checks whether a path is excluded |
For example,
```
mpcmdrun.exe -scan -2
```
## Related topics ## Related topics
- [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md) - [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md)

View File

@ -18,6 +18,7 @@ ms.author: dansimp
**Applies to** **Applies to**
- Windows 10 - Windows 10
- Windows Server 2016 - Windows Server 2016
- Windows Server 2019
Members of the security community<sup>\*</sup> continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control. Members of the security community<sup>\*</sup> continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control.
@ -69,8 +70,8 @@ Unless your use scenarios explicitly require them, Microsoft recommends that you
<br /> <br />
>[!Note] > [!Note]
>This application list will be updated with the latest vendor information as application vulnerabilities are resolved and new issues are discovered. > This application list will be updated with the latest vendor information as application vulnerabilities are resolved and new issues are discovered.
Certain software applications may allow additional code to run by design. Certain software applications may allow additional code to run by design.
These types of applications should be blocked by your Windows Defender Application Control policy. These types of applications should be blocked by your Windows Defender Application Control policy.
@ -1513,3 +1514,10 @@ Pick the correct version of each .dll for the Windows release you plan to suppor
</SiPolicy> </SiPolicy>
``` ```
<br /> <br />
> [!Note]
> To create a policy that works on both Windows 10, version 1803 and version 1809, you can create two different policies, or merge them into one broader policy.
## More information
- [Merge Windows Defender Application Control policies](merge-windows-defender-application-control-policies.md)

View File

@ -20,8 +20,8 @@ ms.reviewer:
**Applies to** **Applies to**
- Windows 10 - Windows 10
- Windows Server 2016 - Windows Server
- Office 2016 - Office 365 ProPlus
## Using security baselines in your organization ## Using security baselines in your organization