Skip to content

Latest commit

 

History

History
231 lines (163 loc) · 5.49 KB

New-CMWdacSetting.md

File metadata and controls

231 lines (163 loc) · 5.49 KB
external help file Module Name ms.date online version schema
AdminUI.PS.dll-Help.xml
ConfigurationManager
08/20/2020
2.0.0

New-CMWdacSetting

SYNOPSIS

Create a Microsoft Defender Application Control settings policy object.

SYNTAX

New-CMWdacSetting [-EnforcementMode <CMWDACEnforcementMode>] [-EnforceRestart <Boolean>]
 [-EnableIntelligentSecurityGraph] [-TrustedFolders <DirectoryInfo[]>] [-TrustedFiles <FileInfo[]>]
 -Name <String> [-Description <String>] [-DisableWildcardHandling] [-ForceWildcardHandling]
 [<CommonParameters>]

DESCRIPTION

Create a Microsoft Defender Application Control settings policy object.

Use the New-CMSettingDeployment cmdlet to deploy this setting to a collection.

EXAMPLES

Example 1: New audit mode Application Control policy

This example creates a new policy object to put Application Control in audit mode.

New-CMWdacSetting -Name "NewAudit" -EnforcementMode AuditMode

Example 2: New policy that doesn't reboot the client

This example creates a new policy that doesn't force the client to restart when it applies the policy.

New-CMWdacSetting -Name "NewNoReboot" -EnforceRestart $false

Example 3: New policy custom trusted binaries

This example creates a new policy that adds specific files to the list of trusted files.

New-CMWdacSetting -Name "NewTrustedFiles" -TrustedFiles "abc.exe", "xyz.dll"

PARAMETERS

-Description

Specify an optional description to better identify this policy.

Type: String
Parameter Sets: (All)
Aliases:

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-DisableWildcardHandling

This parameter treats wildcard characters as literal character values. You can't combine it with ForceWildcardHandling.

Type: SwitchParameter
Parameter Sets: (All)
Aliases:

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-EnableIntelligentSecurityGraph

Add this parameter to authorize software that the Microsoft Intelligent Security Graph trusts. This service includes Windows Defender SmartScreen and other Microsoft services. For this software to be trusted, the device must be running Windows Defender SmartScreen and Windows 10 version 1709 or later.

Type: SwitchParameter
Parameter Sets: (All)
Aliases:

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-EnforcementMode

Choose one of the following enforcement methods for Microsoft Defender Application Control:

  • EnforceMode: Only trusted executables can run.
  • AuditMode: Allow all executables to run. Add an entry to the Windows event log when untrusted executables run.
Type: CMWDACEnforcementMode
Parameter Sets: (All)
Aliases:
Accepted values: AuditMode, EnforceMode

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-EnforceRestart

After the client processes the policy, a restart is scheduled on the client. It follows the client settings for Computer Restart. Applications currently running on the device won't have the new Application Control policy applied to them until after the device restarts.

Set this parameter to $true to force the device to restart after the client applies the policy.

Type: Boolean
Parameter Sets: (All)
Aliases:

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-ForceWildcardHandling

This parameter processes wildcard characters and may lead to unexpected behavior (not recommended). You can't combine it with DisableWildcardHandling.

Type: SwitchParameter
Parameter Sets: (All)
Aliases:

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-Name

Specify a name for this policy to identify it.

Type: String
Parameter Sets: (All)
Aliases:

Required: True
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-TrustedFiles

Add trust for specific files.

Type: FileInfo[]
Parameter Sets: (All)
Aliases:

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

-TrustedFolders

Add trust for specific folders.

Type: DirectoryInfo[]
Parameter Sets: (All)
Aliases:

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTS

None

OUTPUTS

Microsoft.ConfigurationManagement.PowerShell.Cmdlets.EP.WDAC.CMWdacSettings

NOTES

RELATED LINKS

Copy-CMWdacSetting

Get-CMWdacSetting

Remove-CMWdacSetting

Set-CMWdacSetting

New-CMSettingDeployment

Windows Defender Application Control management with Configuration Manager