Who would you do it from PowerShell or Cmdline?
⚠ Bearbeiten Sie diesen Abschnitt nicht. Er ist für die Verknüpfung von docs.microsoft.com zum GitHub-Artikel erforderlich.
Oh, you mean "How to Restore quarantined files in Windows Defender AV" by using PowerShell or command line (cmd).
I don't have a preference yet, but I would start by searching for what other people have done and what other pages recommend:: https://www.bing.com/search?q=Restore+quarantined+files+in+Windows+Defender+AV+from+command+line+or+PowerShell&qs=n&form=QBLH&sp=-1&pq=restore+quarantined+files+in+windows+defender+av+from+command+line+or+powershell&sc=0-80&sk=&cvid=B2A074B5558F495D85E5E95B7F3F7657
Yeah right, I know how to restore quarantine files, I just felt like this should be part of the documentation. ;)
If you or anyone else have got a good idea of the material needed to expand this documentation page, we could open a Pull Request to ask for it to be added. 💻 📂 📝
Open CMD and Goto below file path
cd C:\Program Files\Windows Defender
mpcmdrun -Restore -ListAll //shows all signature name and malware in quarantine
mpcmdrun -Restore -ListAll -Name HackTool:Win32/Keygen -All -Path E:\test //put the relavant signature name and export location
@officedocsbot assign @e0i
@vrdse @illfated @jai6684
Thank you all for your feedbacks productive discussion.
The issue is being routed to Windows PowerShell writing team for investigation. You'll be notified with relevant updates as content gets updated.
Kind regads.
Restore to a different location:
mpcmdrun -Restore -All -path %appdata%
C:\Program Files\Windows Defender>mpcmdrun -Restore -All -path %appdata%
Restoring the following quarantined items to C:\Users\Admin\AppData\Roaming:
ThreatName = HackTool:Win32/Keygen
file:\FileSHARE\Laptop backup\Downloads\keygen.exe quarantined at ?5/?21/?2019 11:17:18 PM (UTC) was restored
Go and open folder %Appdata% and retrieve from roaming in this example. ou could reall set any location, but I suggest sending to a folder you prefer within your profile.
Slightly modified, in terms of text formatting (using MarkDown to add code block fences):
Restore to a different location:
mpcmdrun -Restore -All -path %AppData%
See example below
C:\Program Files\Windows Defender>mpcmdrun -Restore -All -path %appdata%
Restoring the following quarantined items to C:\Users\Admin\AppData\Roaming:
ThreatName = HackTool:Win32/Keygen
file:\FileSHARE\Laptop backup\Downloads\keygen.exe quarantined at ?5/?21/?2019 11:17:18 PM (UTC) was restored
C:\Program Files\Windows Defender>
Go and open folder %AppData% and retrieve from roaming in this example.
You could really set any location, but I suggest sending to a folder you prefer within your profile.
@vrdse
Upon your feedback, We have updated the content with relevant changes accordingly. Thanks.
@officedocsbot close
Most helpful comment
Yeah right, I know how to restore quarantine files, I just felt like this should be part of the documentation. ;)