

You must use the CLI to assign a password for management privilege levels. Read Only level – Allows access to the Privileged EXEC mode and CONFIG mode of the CLI but only with read access.Port Configuration level – Allows read-and-write access for specific ports but not for global (system-wide) parameters.This is generally for system administrators and is the only management privilege level that allows you to configure passwords. Super User level – Allows complete read-and-write access to the system.

The following are the management privilege levels:

NOTE: To know the exact spelling of a threat name, use the following syntax to generate the list of threat names currently in the quarantine folder:Ĭ:\Program Files\Microsoft Security Client>mpcmdrun -restore -listallįile:C:\Cases\Qakbot1\bjlgoma.exe quarantined at 10:39:07 PM (UTC)įile:C:\Cases\Qakbot1\bsfsvesx.You can setup a single password for each of the management level of Foundry FastIron Edge X448 switch.

This syntax is not correct and will not work: MpCmdRun.exe -Restore -Name RemoteAccess:Win32/reallvnc This syntax is correct: MpCmdRun.exe -Restore -Name RemoteAccess:Win32/RealVNC There is no method to restore only a single file. Your restore results will be that all files in the quarantine that have the same threat name get restored. When attempting to restore a file you can only restore by “threat name”, not by file name! Where -name is the threat name, not the name of the file to restore. Specify the path where the quarantined items will be restored. If not specified, the item will be restored to the original path. Restores all the quarantined items based on name Restores the most recently quarantined item based on threat name. One threat can map to more than one file How to restore files quarantined by Endpoint Protection to an alternative locationĪ file quarantined by Forefront Endpoint Protection 2010 (FEP 2010) or System Center 2012 Endpoint Protection (SCEP 2012) may be restored to an alternative location by using the MPCMDRUN command-line tool.
