Jaa


Remove method of the MSFT_MpPreference class

TBD

Syntax

uint32 Remove(
  [in] string  ExclusionPath[],
  [in] string  ExclusionExtension[],
  [in] string  ExclusionProcess[],
  [in] sint64  ThreatIDDefaultAction_Ids[],
  [in] boolean UnknownThreatDefaultAction,
  [in] boolean LowThreatDefaultAction,
  [in] boolean ModerateThreatDefaultAction,
  [in] boolean HighThreatDefaultAction,
  [in] boolean SevereThreatDefaultAction,
  [in] boolean Force
);

Parameters

ExclusionPath [in]

Allows an administrator to explicitly disable a scan from checking any of the paths listed.

ExclusionExtension [in]

Allows an administrator to explicitly disable a scan from checking any of the extensions listed.

ExclusionProcess [in]

Allows an administrator to explicitly disable a scan from checking any of the processes listed.

ThreatIDDefaultAction_Ids [in]

The Ids of threats upon which default action should not be taken when detected. The actions in ThreatIDDefaultAction_Actions need to be specified in the same order as the Ids in ThreatIDDefaultAction_Ids

UnknownThreatDefaultAction [in]

Default action for unknown threats.

Clean (1)

Quarantine (2)

Remove (3)

Allow (6)

UserDefined (8)

NoAction (9)

Block (10)

LowThreatDefaultAction [in]

Default action for low severity threats.

Clean (1)

Quarantine (2)

Remove (3)

Allow (6)

UserDefined (8)

NoAction (9)

Block (10)

ModerateThreatDefaultAction [in]

Default action for moderate severity threats.

Clean (1)

Quarantine (2)

Remove (3)

Allow (6)

UserDefined (8)

NoAction (9)

Block (10)

HighThreatDefaultAction [in]

Default action for high severity threats.

Clean (1)

Quarantine (2)

Remove (3)

Allow (6)

UserDefined (8)

NoAction (9)

Block (10)

SevereThreatDefaultAction [in]

Default action for severe severity threats.

Clean (1)

Quarantine (2)

Remove (3)

Allow (6)

UserDefined (8)

NoAction (9)

Block (10)

Force [in]

A user confirmation is sought by default by this cmdlet. If -Force is specified, the default confirmation is not sought from the user.

Requirements

Minimum supported client
Windows 8.1 [desktop apps only]
Minimum supported server
Windows Server 2012 R2 [desktop apps only]
Namespace
Root\Microsoft\Windows\Defender
MOF
ProtectionManagement.mof
DLL
ProtectionManagement.dll

See also

MSFT_MpPreference