|
5 | 5 | Import-Module Microsoft.Graph.DeviceManagement
|
6 | 6 |
|
7 | 7 | $params = @{
|
8 |
| - "@odata.type" = "#microsoft.graph.windows10EndpointProtectionConfiguration" |
| 8 | + "@odata.type" = "#microsoft.graph.windowsDefenderAdvancedThreatProtectionConfiguration" |
9 | 9 | description = "Description value"
|
10 | 10 | displayName = "Display Name value"
|
11 | 11 | version = 7
|
12 |
| - firewallBlockStatefulFTP = $true |
13 |
| - firewallIdleTimeoutForSecurityAssociationInSeconds = |
14 |
| - firewallPreSharedKeyEncodingMethod = "none" |
15 |
| - firewallIPSecExemptionsAllowNeighborDiscovery = $true |
16 |
| - firewallIPSecExemptionsAllowICMP = $true |
17 |
| - firewallIPSecExemptionsAllowRouterDiscovery = $true |
18 |
| - firewallIPSecExemptionsAllowDHCP = $true |
19 |
| - firewallCertificateRevocationListCheckMethod = "none" |
20 |
| - firewallMergeKeyingModuleSettings = $true |
21 |
| - firewallPacketQueueingMethod = "disabled" |
22 |
| - firewallProfileDomain = @{ |
23 |
| - "@odata.type" = "microsoft.graph.windowsFirewallNetworkProfile" |
24 |
| - firewallEnabled = "blocked" |
25 |
| - stealthModeBlocked = $true |
26 |
| - incomingTrafficBlocked = $true |
27 |
| - unicastResponsesToMulticastBroadcastsBlocked = $true |
28 |
| - inboundNotificationsBlocked = $true |
29 |
| - authorizedApplicationRulesFromGroupPolicyMerged = $true |
30 |
| - globalPortRulesFromGroupPolicyMerged = $true |
31 |
| - connectionSecurityRulesFromGroupPolicyMerged = $true |
32 |
| - outboundConnectionsBlocked = $true |
33 |
| - inboundConnectionsBlocked = $true |
34 |
| - securedPacketExemptionAllowed = $true |
35 |
| - policyRulesFromGroupPolicyMerged = $true |
36 |
| - } |
37 |
| - firewallProfilePublic = @{ |
38 |
| - "@odata.type" = "microsoft.graph.windowsFirewallNetworkProfile" |
39 |
| - firewallEnabled = "blocked" |
40 |
| - stealthModeBlocked = $true |
41 |
| - incomingTrafficBlocked = $true |
42 |
| - unicastResponsesToMulticastBroadcastsBlocked = $true |
43 |
| - inboundNotificationsBlocked = $true |
44 |
| - authorizedApplicationRulesFromGroupPolicyMerged = $true |
45 |
| - globalPortRulesFromGroupPolicyMerged = $true |
46 |
| - connectionSecurityRulesFromGroupPolicyMerged = $true |
47 |
| - outboundConnectionsBlocked = $true |
48 |
| - inboundConnectionsBlocked = $true |
49 |
| - securedPacketExemptionAllowed = $true |
50 |
| - policyRulesFromGroupPolicyMerged = $true |
51 |
| - } |
52 |
| - firewallProfilePrivate = @{ |
53 |
| - "@odata.type" = "microsoft.graph.windowsFirewallNetworkProfile" |
54 |
| - firewallEnabled = "blocked" |
55 |
| - stealthModeBlocked = $true |
56 |
| - incomingTrafficBlocked = $true |
57 |
| - unicastResponsesToMulticastBroadcastsBlocked = $true |
58 |
| - inboundNotificationsBlocked = $true |
59 |
| - authorizedApplicationRulesFromGroupPolicyMerged = $true |
60 |
| - globalPortRulesFromGroupPolicyMerged = $true |
61 |
| - connectionSecurityRulesFromGroupPolicyMerged = $true |
62 |
| - outboundConnectionsBlocked = $true |
63 |
| - inboundConnectionsBlocked = $true |
64 |
| - securedPacketExemptionAllowed = $true |
65 |
| - policyRulesFromGroupPolicyMerged = $true |
66 |
| - } |
67 |
| - defenderAttackSurfaceReductionExcludedPaths = @( |
68 |
| - "Defender Attack Surface Reduction Excluded Paths value" |
69 |
| -) |
70 |
| -defenderGuardedFoldersAllowedAppPaths = @( |
71 |
| -"Defender Guarded Folders Allowed App Paths value" |
72 |
| -) |
73 |
| -defenderAdditionalGuardedFolders = @( |
74 |
| -"Defender Additional Guarded Folders value" |
75 |
| -) |
76 |
| -defenderExploitProtectionXml = "ZGVmZW5kZXJFeHBsb2l0UHJvdGVjdGlvblhtbA==" |
77 |
| -defenderExploitProtectionXmlFileName = "Defender Exploit Protection Xml File Name value" |
78 |
| -defenderSecurityCenterBlockExploitProtectionOverride = $true |
79 |
| -appLockerApplicationControl = "enforceComponentsAndStoreApps" |
80 |
| -smartScreenEnableInShell = $true |
81 |
| -smartScreenBlockOverrideForFiles = $true |
82 |
| -applicationGuardEnabled = $true |
83 |
| -applicationGuardBlockFileTransfer = "blockImageAndTextFile" |
84 |
| -applicationGuardBlockNonEnterpriseContent = $true |
85 |
| -applicationGuardAllowPersistence = $true |
86 |
| -applicationGuardForceAuditing = $true |
87 |
| -applicationGuardBlockClipboardSharing = "blockBoth" |
88 |
| -applicationGuardAllowPrintToPDF = $true |
89 |
| -applicationGuardAllowPrintToXPS = $true |
90 |
| -applicationGuardAllowPrintToLocalPrinters = $true |
91 |
| -applicationGuardAllowPrintToNetworkPrinters = $true |
92 |
| -bitLockerDisableWarningForOtherDiskEncryption = $true |
93 |
| -bitLockerEnableStorageCardEncryptionOnMobile = $true |
94 |
| -bitLockerEncryptDevice = $true |
95 |
| -bitLockerRemovableDrivePolicy = @{ |
96 |
| -"@odata.type" = "microsoft.graph.bitLockerRemovableDrivePolicy" |
97 |
| -encryptionMethod = "aesCbc256" |
98 |
| -requireEncryptionForWriteAccess = $true |
99 |
| -blockCrossOrganizationWriteAccess = $true |
100 |
| -} |
| 12 | + allowSampleSharing = $true |
| 13 | + enableExpeditedTelemetryReporting = $true |
101 | 14 | }
|
102 | 15 |
|
103 | 16 | New-MgDeviceManagementDeviceConfiguration -BodyParameter $params
|
|
0 commit comments