diff --git a/devices/surface/wake-on-lan-for-surface-devices.md b/devices/surface/wake-on-lan-for-surface-devices.md index ddc39aa7c2..0c63bbe4b5 100644 --- a/devices/surface/wake-on-lan-for-surface-devices.md +++ b/devices/surface/wake-on-lan-for-surface-devices.md @@ -6,12 +6,14 @@ ms.prod: w10 ms.mktglfcycl: manage ms.pagetype: surface, devices ms.sitesec: library +ms.localizationpriority: medium author: dansimp ms.author: dansimp ms.topic: article -ms.date: 01/03/2018 -ms.reviewer: +ms.date: 10/10/2019 +ms.reviewer: scottmca manager: dansimp +ms.audience: itpro --- # Wake On LAN for Surface devices @@ -41,6 +43,7 @@ The following devices are supported for WOL: * Surface Laptop 2 * Surface Go * Surface Go with LTE Advanced +* Surface Studio (see Surface Studio instructions below) ## WOL driver @@ -57,6 +60,26 @@ To extract the contents of SurfaceWOL.msi, use the MSIExec administrative instal `msiexec /a surfacewol.msi targetdir=C:\WOL /qn` +## Surface Studio instructions + +To enable WOL on Surface Studio, you must use the following procedure + +1. Create the following registry keys: + + ``` +; Set CONNECTIVITYINSTANDBY to 1: +[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power\PowerSettings\F15576E8-98B7-4186-B944-EAFA664402D9] +"Attributes"=dword:00000001 +; Set EnforceDisconnectedStandby to 0 and AllowSystemRequiredPowerRequests to 1: +[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Power] +"EnforceDisconnectedStandby"=dword:00000000 +"AllowSystemRequiredPowerRequests"=dword:00000001 +``` + +2. Run the following command + + ```powercfg /SETACVALUEINDEX SCHEME_BALANCED SUB_NONE CONNECTIVITYINSTANDBY 1``` + ## Using Surface WOL The Surface WOL driver conforms to the WOL standard, whereby the device is woken by a special network communication known as a magic packet. The magic packet consists of 6 bytes of 255 (or FF in hexadecimal) followed by 16 repetitions of the target computer’s MAC address. You can read more about the magic packet and the WOL standard on [Wikipedia](https://wikipedia.org/wiki/Wake-on-LAN#Magic_packet). diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index ef12771132..f8776c4535 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -301,7 +301,6 @@ #### [Manage next generation protection in your business]() ##### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md) -##### [Management overview](windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md) ##### [Use Microsoft Intune and System Center Configuration Manager to manage next generation protection](windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md) ##### [Use Group Policy settings to manage next generation protection](windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md) ##### [Use PowerShell cmdlets to manage next generation protection](windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md) diff --git a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md index 5760e380c9..6832c65573 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md @@ -21,46 +21,42 @@ manager: dansimp - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -You can perform various Windows Defender Antivirus functions with the dedicated command-line tool mpcmdrun.exe. +You can perform various Windows Defender Antivirus functions with the dedicated command-line tool *mpcmdrun.exe*. This utility can be useful when you want to automate Windows Defender Antivirus use. You can find the utility in _%ProgramFiles%\Windows Defender\MpCmdRun.exe_. You must run it from a command prompt. > [!NOTE] -> You may need to open an administrator-level version of the command prompt. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. +> You might need to open an administrator-level version of the command prompt. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. The utility has the following commands: ```DOS MpCmdRun.exe [command] [-options] ``` -For example, +Here's an example: ``` MpCmdRun.exe -scan -2 ``` +| Command | Description | +|:----|:----| +| \-? **or** -h | Displays all available options for this tool | +| \-Scan [-ScanType [0\|1\|2\|3]] [-File \ [-DisableRemediation] [-BootSectorScan]] [-Timeout \] [-Cancel] | Scans for malicious software. Values for **ScanType** are: **0** Default, according to your configuration, **-1** Quick scan, **-2** Full scan, **-3** File and directory custom scan. | +| \-Trace [-Grouping #] [-Level #] | Starts diagnostic tracing | +| \-GetFiles | Collects support information | +| \-GetFilesDiagTrack | Same as Getfiles but outputs to temporary DiagTrack folder | +| \-RemoveDefinitions [-All] | Restores the installed Security intelligence to a previous backup copy or to the original default set | +| \-RemoveDefinitions [-DynamicSignatures] | Removes only the dynamically downloaded Security intelligence | +| \-RemoveDefinitions [-Engine] | Restores the previous installed engine | +| \-SignatureUpdate [-UNC \| -MMPC] | Checks for new Security intelligence updates | +| \-Restore [-ListAll \| [[-Name \] [-All] \| [-FilePath \]] [-Path \]] | Restores or lists quarantined item(s) | +| \-AddDynamicSignature [-Path] | Loads dynamic Security intelligence | +| \-ListAllDynamicSignatures | Lists the loaded dynamic Security intelligence | +| \-RemoveDynamicSignature [-SignatureSetID] | Removes dynamic Security intelligence | +| \-CheckExclusion -path \ | Checks whether a path is excluded | -| Command | Description | -|:--------------------------------------------------------------------------------------------------------|:-------------------------------------------------------------------------------------------------------| -| \-? **or** -h | Displays all available options for this tool | -| \-Scan [-ScanType [0\|1\|2\|3]] [-File \ [-DisableRemediation] [-BootSectorScan]] [-Timeout \] [-Cancel] | Scans for malicious software. Values for **ScanType** are: **0** Default, according to your configuration, **-1** Quick scan, **-2** Full scan, **-3** File and directory custom scan. | -| \-Trace [-Grouping #] [-Level #] | Starts diagnostic tracing | -| \-GetFiles | Collects support information | -| \-GetFilesDiagTrack | Same as Getfiles but outputs to temporary DiagTrack folder | -| \-RemoveDefinitions [-All] | Restores the installed Security intelligence to a previous backup copy or to the original default set | -| \-RemoveDefinitions [-DynamicSignatures] | Removes only the dynamically downloaded Security intelligence | -| \-RemoveDefinitions [-Engine] | Restores the previous installed engine | -| \-SignatureUpdate [-UNC \| -MMPC] | Checks for new Security intelligence updates | -| \-Restore [-ListAll \| [[-Name \] [-All] \| [-FilePath \]] [-Path \]] | Restores or lists quarantined item(s) | -| \-AddDynamicSignature [-Path] | Loads dynamic Security intelligence | -| \-ListAllDynamicSignatures | Lists the loaded dynamic Security intelligence | -| \-RemoveDynamicSignature [-SignatureSetID] | Removes dynamic Security intelligence | -| \-CheckExclusion -path \ | Checks whether a path is excluded | -For example, -``` -mpcmdrun.exe -scan -2 -``` ## Related topics - [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md)