Replies: 2 comments
-
Release notes specify for you to do this already. |
Beta Was this translation helpful? Give feedback.
0 replies
-
I'll pull this prerelease. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
This issue can be resolved by adding a file exclusion in Windows Defender. Assuming that the file ep_setup.exe will be downloaded to the Downloads folder of the user that is currently logged in to Windows, running the command below in an elevated command prompt will prevent Windows Defender from detecting the file.
"%WinDir%\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command if([Security.Principal.WindowsIdentity]::GetCurrent().Groups -contains 'S-1-5-32-544'){Add-MpPreference -ExclusionPath '%UserProfile%\Downloads\ep_setup.exe' -force;(Get-MpPreference).ExclusionPath}else{'Please run with Administrator privileges.'}
Beta Was this translation helpful? Give feedback.
All reactions