Attempt to mitigate Windows Defender detections by making provision-image.ps1 not a powershell script (#11978)

* Remove C:\ exclusion since we do all the interesting work on D: now.

* Rename provision-image.ps1 to remove executable extension.
This commit is contained in:
Billy O'Neal 2020-06-17 10:08:30 -07:00 committed by GitHub
parent 6185aa7650
commit 6a8d2cb4a1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 1 additions and 2 deletions

View File

@ -202,7 +202,7 @@ Invoke-AzVMRunCommand `
-ResourceGroupName $ResourceGroupName `
-VMName $ProtoVMName `
-CommandId 'RunPowerShellScript' `
-ScriptPath "$PSScriptRoot\provision-image.ps1" `
-ScriptPath "$PSScriptRoot\provision-image.txt" `
-Parameter @{AdminUserPassword = $AdminPW; `
StorageAccountName=$StorageAccountName; `
StorageAccountKey=$StorageAccountKey;}

View File

@ -438,7 +438,6 @@ if ($null -eq $av) {
Write-Host 'AntiVirus not installed, skipping exclusions.'
} else {
Write-Host 'Configuring AntiVirus exclusions...'
Add-MPPreference -ExclusionPath C:\
Add-MPPreference -ExclusionPath D:\
Add-MPPreference -ExclusionProcess ninja.exe
Add-MPPreference -ExclusionProcess clang-cl.exe