Windows-itpro-docs: PowerShell

Created on 15 Mar 2019  ·  10Comments  ·  Source: MicrosoftDocs/windows-itpro-docs

Who would you do it from PowerShell or Cmdline?


Dokumentdetails

Bearbeiten Sie diesen Abschnitt nicht. Er ist für die Verknüpfung von docs.microsoft.com zum GitHub-Artikel erforderlich.

security

Most helpful comment

Yeah right, I know how to restore quarantine files, I just felt like this should be part of the documentation. ;)

All 10 comments

Oh, you mean "How to Restore quarantined files in Windows Defender AV" by using PowerShell or command line (cmd).

I don't have a preference yet, but I would start by searching for what other people have done and what other pages recommend:: https://www.bing.com/search?q=Restore+quarantined+files+in+Windows+Defender+AV+from+command+line+or+PowerShell&qs=n&form=QBLH&sp=-1&pq=restore+quarantined+files+in+windows+defender+av+from+command+line+or+powershell&sc=0-80&sk=&cvid=B2A074B5558F495D85E5E95B7F3F7657

Yeah right, I know how to restore quarantine files, I just felt like this should be part of the documentation. ;)

If you or anyone else have got a good idea of the material needed to expand this documentation page, we could open a Pull Request to ask for it to be added. 💻 📂 📝

Open CMD and Goto below file path

cd C:\Program Files\Windows Defender

mpcmdrun -Restore -ListAll //shows all signature name and malware in quarantine
mpcmdrun -Restore -ListAll -Name HackTool:Win32/Keygen -All -Path E:\test //put the relavant signature name and export location

@officedocsbot assign @e0i

@vrdse @illfated @jai6684

Thank you all for your feedbacks productive discussion.

The issue is being routed to Windows PowerShell writing team for investigation. You'll be notified with relevant updates as content gets updated.

Kind regads.

Restore to a different location:
mpcmdrun -Restore -All -path %appdata%

See example below

C:\Program Files\Windows Defender>mpcmdrun -Restore -All -path %appdata%
Restoring the following quarantined items to C:\Users\Admin\AppData\Roaming:

ThreatName = HackTool:Win32/Keygen
file:\FileSHARE\Laptop backup\Downloads\keygen.exe quarantined at ?5/?21/?2019 11:17:18 PM (UTC) was restored

C:\Program Files\Windows Defender>

Go and open folder %Appdata% and retrieve from roaming in this example. ou could reall set any location, but I suggest sending to a folder you prefer within your profile.

Slightly modified, in terms of text formatting (using MarkDown to add code block fences):

Restore to a different location:

mpcmdrun -Restore -All -path %AppData%

See example below

C:\Program Files\Windows Defender>mpcmdrun -Restore -All -path %appdata%
Restoring the following quarantined items to C:\Users\Admin\AppData\Roaming:

ThreatName = HackTool:Win32/Keygen
file:\FileSHARE\Laptop backup\Downloads\keygen.exe quarantined at ?5/?21/?2019 11:17:18 PM (UTC) was restored

C:\Program Files\Windows Defender>

Go and open folder %AppData% and retrieve from roaming in this example.

You could really set any location, but I suggest sending to a folder you prefer within your profile.

@vrdse

Upon your feedback, We have updated the content with relevant changes accordingly. Thanks.

@officedocsbot close

Was this page helpful?
0 / 5 - 0 ratings

Related issues

RAJU2529 picture RAJU2529  ·  3Comments

ang216 picture ang216  ·  3Comments

ruffy91 picture ruffy91  ·  3Comments

zjalexander picture zjalexander  ·  3Comments

sundhaug92 picture sundhaug92  ·  3Comments