Merge pull request #1299 from MicrosoftDocs/repo_sync_working_branch

Confirm merge from repo_sync_working_branch to master to sync with https://github.com/MicrosoftDocs/windows-itpro-docs (branch public)
This commit is contained in:
David Strome 2019-10-08 22:23:33 -07:00 committed by GitHub
commit a1ffd2179c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 24 additions and 8 deletions

View File

@ -60,7 +60,7 @@ If the error occurs again, check the error code against the following table to s
<tr class="odd">
<td align="left">0x80090036</td>
<td align="left">User cancelled an interactive dialog</td>
<td align="left">User canceled an interactive dialog</td>
<td align="left">User will be asked to try again</td>
</tr>
<tr class="even">
@ -206,6 +206,7 @@ If the error occurs again, check the error code against the following table to s
</table>
## Errors with unknown mitigation
For errors listed in this table, contact Microsoft Support for assistance.
| Hex | Cause |

View File

@ -35,12 +35,16 @@ The utility has the following commands:
```DOS
MpCmdRun.exe [command] [-options]
```
For example,
```
MpCmdRun.exe -scan -2
```
| Command | Description |
|:--------------------------------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------------------------|
| \-? **or** -h | Displays all available options for this tool |
| \-Scan [-ScanType [0\|1\|2\|3]] [-File \<path> [-DisableRemediation] [-BootSectorScan]] [-Timeout \<days>] [-Cancel] | Scans for malicious software. Values for **ScanType** are: **0** Default, according to your configuration, **1** Quick scan, **2** Full scan, **3** File and directory custom scan. |
| \-Scan [-ScanType [0\|1\|2\|3]] [-File \<path> [-DisableRemediation] [-BootSectorScan]] [-Timeout \<days>] [-Cancel] | Scans for malicious software. Values for **ScanType** are: **0** Default, according to your configuration, **-1** Quick scan, **-2** Full scan, **-3** File and directory custom scan. |
| \-Trace [-Grouping #] [-Level #] | Starts diagnostic tracing |
| \-GetFiles | Collects support information |
| \-GetFilesDiagTrack | Same as Getfiles but outputs to temporary DiagTrack folder |
@ -53,7 +57,10 @@ MpCmdRun.exe [command] [-options]
| \-ListAllDynamicSignatures | Lists the loaded dynamic Security intelligence |
| \-RemoveDynamicSignature [-SignatureSetID] | Removes dynamic Security intelligence |
| \-CheckExclusion -path \<path> | Checks whether a path is excluded |
For example,
```
mpcmdrun.exe -scan -2
```
## Related topics
- [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md)

View File

@ -18,6 +18,7 @@ ms.author: dansimp
**Applies to**
- Windows 10
- Windows Server 2016
- Windows Server 2019
Members of the security community<sup>\*</sup> continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control.
@ -1513,3 +1514,10 @@ Pick the correct version of each .dll for the Windows release you plan to suppor
</SiPolicy>
```
<br />
> [!Note]
> To create a policy that works on both Windows 10, version 1803 and version 1809, you can create two different policies, or merge them into one broader policy.
## More information
- [Merge Windows Defender Application Control policies](merge-windows-defender-application-control-policies.md)

View File

@ -20,8 +20,8 @@ ms.reviewer:
**Applies to**
- Windows 10
- Windows Server 2016
- Office 2016
- Windows Server
- Office 365 ProPlus
## Using security baselines in your organization