Skip to content

Commit ccccfe4

Browse files
authored
Update Set-MpPreference.md
1 parent a5a28f1 commit ccccfe4

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

docset/winserver2022-ps/defender/Set-MpPreference.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -453,7 +453,7 @@ Accept wildcard characters: False
453453

454454
### -DisableDnsParsing
455455
Specifies whether to disable inspection of DNS traffic that occurs over a UDP channel.
456-
Network Protection inspects DNS traffic that occurs over a TCP channel, to provide metadata for Anti-malware Behavior Monitoring or to allow for DNS sink holing if the "-EnableDnsSinkhole" configuration is set. This can be disabled by setting this value to "$true".
456+
Network protection inspects DNS traffic that occurs over a TCP channel to provide metadata for anti-malware behavior monitoring or to allow for DNS sink holing if the "-EnableDnsSinkhole" configuration is set. This can be disabled by setting this value to "$true".
457457

458458
```yaml
459459
Type: Boolean
@@ -703,7 +703,7 @@ Accept wildcard characters: False
703703

704704
### -DisableTlsParsing
705705
Specifies whether to disable inspection of TLS traffic.
706-
Network Protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to Behavior Monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, Network Protection inspects TLS traffic.
706+
Network protection inspects TLS traffic (also known as HTTPS traffic) to see if a connection is being made to a malicious website, and to provide metadata to behavior monitoring. TLS connections to malicious websites can also be blocked if "-EnableNetworkProtection" is set to enabled. HTTP inspection can be disabled by setting this value to "$true". By default, network protection inspects TLS traffic.
707707

708708
```yaml
709709
Type: Boolean
@@ -734,7 +734,7 @@ Accept wildcard characters: False
734734

735735
### -EnableDnsSinkhole
736736
Specifies whether to examine DNS traffic to detect and sinkhole DNS exfiltration attempts and other DNS based malicious attacks.
737-
Network Protection can inspect the DNS traffic of a machine and, in conjunction with behavior monitoring, detect and sink hole DNS exfiltration attempts, and other DNS based malicious attacks. Set this configuration to "$true" to enable this feature.
737+
Network protection can inspect the DNS traffic of a machine and, in conjunction with behavior monitoring, detect and sink hole DNS exfiltration attempts, and other DNS based malicious attacks. Set this configuration to "$true" to enable this feature.
738738

739739
```yaml
740740
Type: Boolean
@@ -795,7 +795,7 @@ Accept wildcard characters: False
795795
```
796796

797797
### -EnableNetworkProtection
798-
Specifies how the Network Protection Service handles web-based malicious threats, including phishing and malware.
798+
Specifies how the network protection service handles web-based malicious threats, including phishing and malware.
799799
Possible values are Disabled, Enabled, and AuditMode.
800800

801801
```yaml

0 commit comments

Comments
 (0)