Skip to content

Commit 03cafc6

Browse files
Merge pull request #3354 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/defender-docs (branch public)
2 parents 2977a89 + 98e4f7d commit 03cafc6

File tree

1 file changed

+26
-27
lines changed

1 file changed

+26
-27
lines changed

defender-endpoint/web-protection-overview.md

Lines changed: 26 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ search.appverid: met150
55
ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
8-
ms.reviewer: tdoucette
8+
ms.reviewer: ericlaw
99
ms.localizationpriority: medium
10-
ms.date: 12/18/2024
10+
ms.date: 04/02/2025
1111
manager: deniseb
1212
audience: ITPro
1313
ms.collection:
@@ -49,39 +49,41 @@ Web threat protection includes:
4949

5050
> [!NOTE]
5151
> For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage Network Protection for inspection and enforcement:
52-
> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
52+
> - IP addresses are supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
5353
> - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
54-
> - Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
55-
> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
56-
> - URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
57-
> - Network Protection will block connections on both standard and non-standard ports.
58-
> - Full URL path blocks can be applied for unencrypted URLs.
54+
> - HTTP URLs (including a full URL path) can be blocked for any browser or process
55+
> - HTTPS fully-qualified domain names (FQDN) can be blocked in non-Microsoft browsers (indicators specifying a full URL path can only be blocked in Microsoft Edge)
56+
> - Blocking FQDNs in non-Microsoft browsers requires that QUIC and Encrypted Client Hello be disabled in those browsers
57+
> - FQDNs loaded via HTTP2 connection coalescing can only be blocked in Microsoft Edge.
58+
> - Network Protection will block connections on all ports (not just 80 and 443).
5959
60-
There might be up to two hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked. For more information, see [Web threat protection](web-threat-protection.md).
60+
In non-Microsoft Edge processes, Network Protection determines the fully qualified domain name for each HTTPS connection by examining the content of the TLS handshake that occurs after a TCP/IP handshake. This requires that the HTTPS connection use TCP/IP (not UDP/QUIC) and that the ClientHello message not be encrypted. To disable QUIC and Encrypted Client Hello in Google Chrome, see [QuicAllowed](https://chromeenterprise.google/policies/#QuicAllowed) and [EncryptedClientHelloEnabled](https://chromeenterprise.google/policies/#EncryptedClientHelloEnabled). For Mozilla Firefox, see [Disable EncryptedClientHello](https://mozilla.github.io/policy-templates/#disableencryptedclienthello) and [network.http.http3.enable](https://support.mozilla.org/ml/questions/1408003#answer-1571474).
61+
62+
There might be up to two hours of latency (usually less) between the time an indicator is added and it being enforced on the client. For more information, see [Web threat protection](web-threat-protection.md).
6163

6264
### Custom indicators
6365

64-
Custom indicator detections are also summarized in your organizations web threat reports under **Web threat detections over time** and **Web threat summary**.
66+
Custom indicator detections are summarized in web threat reports under **Web threat detections over time** and **Web threat summary**.
6567

66-
Custom indicator includes:
68+
Custom indicators provide:
6769

68-
- Ability to create IP and URL-based indicators of compromise to protect your organization against threats.
69-
- Investigation capabilities over activities related to your custom IP/URL profiles and the devices that access these URLs.
70-
- The ability to create Allow, Block, and Warn policies for IPs and URLs.
70+
- The ability to create IP and URL-based indicators of compromise to protect your organization against threats.
71+
- The ability to specify Allow, Block, or Warn behavior.
72+
- Investigative capabilities over activities related to your custom IP/URL indicators and the devices that access these URLs.
7173

7274
For more information, see [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
7375

7476
### Web content filtering
7577

76-
Web content filtering includes **Web activity by category**, **Web content filtering summary**, and **Web activity summary**.
78+
Web content filtering blocks are summarized under **Web activity by category**, **Web content filtering summary**, and **Web activity summary**.
7779

78-
Web content filtering includes:
80+
Web content filtering provides:
7981

80-
- Users are prevented from accessing websites in blocked categories, whether they're browsing on-premises or away.
81-
- You can conveniently deploy varied policies to various sets of users using the device groups defined in the [Microsoft Defender for Endpoint role-based access control settings](rbac.md).
82+
- The ability to block users from accessing websites in blocked categories, whether they're browsing on-premises or away.
83+
- Support for targeting different policies to different device groups defined in the [Microsoft Defender for Endpoint role-based access control settings](rbac.md).
8284
> [!NOTE]
8385
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
84-
- You can access web reports in the same central location, with visibility over actual blocks and web usage.
86+
- Web reporting in the same central location, with visibility into both blocks and web usage.
8587

8688
For more information, see [Web content filtering](web-content-filtering.md).
8789

@@ -95,8 +97,7 @@ Web protection is made up of the following components, listed in order of preced
9597
- Block
9698

9799
- Web threats (malware, phish)
98-
- SmartScreen Intel, including Exchange Online Protection (EOP)
99-
- Escalations
100+
- SmartScreen Intel
100101

101102
- Web Content Filtering (WCF)
102103

@@ -121,13 +122,11 @@ Internal IP addresses aren't supported by custom indicators. For a warn policy w
121122

122123
In all web protection scenarios, SmartScreen and Network Protection can be used together to ensure protection across both Microsoft and non-Microsoft browsers and processes. SmartScreen is built directly into Microsoft Edge, while Network Protection monitors traffic in non-Microsoft browsers and processes. The following diagram illustrates this concept. This diagram of the two clients working together to provide multiple browser/app coverages is accurate for all features of Web Protection (Indicators, Web Threats, Content Filtering).
123124

124-
> [!NOTE]
125-
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They cannot enforce any enterprise web protection policies.
126125
> :::image type="content" source="/defender/media/web-protection-protect-browsers.png" alt-text="The usage of smartScreen and Network Protection together" lightbox="/defender/media/web-protection-protect-browsers.png":::
127126
128127
## Troubleshoot endpoint blocks
129128

130-
Responses from the SmartScreen cloud are standardized. Tools like Fiddler can be used to inspect the response from the cloud service, which helps determine the source of the block.
129+
Responses from the SmartScreen cloud are standardized. Tools like Telerik Fiddler can be used to inspect the response from the cloud service, which helps determine the source of the block.
131130

132131
When the SmartScreen cloud service responds with an allow, block, or warn response, a response category and server context is relayed back to the client. In Microsoft Edge, the response category is what is used to determine the appropriate block page to show (malicious, phishing, organizational policy).
133132

@@ -167,21 +166,21 @@ To list blocks that are due to other features (like Custom Indicators), refer to
167166

168167
## User experience
169168

170-
If a user visits a web page that poses a risk of malware, phishing, or other web threats, Microsoft Edge triggers a block page that resembles the following image:
169+
If a user visits a web page that poses a risk of malware, phishing, or other web threats, Microsoft Edge displays a block page that resembles the following image:
171170

172171
:::image type="content" source="media/web-protection-indicators-new-block-page.jpg" alt-text="Screenshot showing new block notification for a website." lightbox="media/web-protection-indicators-new-block-page.jpg":::
173172

174173
Beginning with Microsoft Edge 124, the following block page is shown for all Web Content Filtering category blocks.
175174

176175
:::image type="content" source="media/web-protection-new-content-blocked-page.jpg" alt-text="Screenshot showing content blocked." lightbox="media/web-protection-new-content-blocked-page.jpg":::
177176

178-
In any case, no block pages are shown in non-Microsoft browsers, and the user sees a "Secure Connection Failed" page along with a toast notification. Depending on the policy responsible for the block, a user sees a different message in the toast notification. For example, web content filtering displays the message, "This content is blocked."
177+
In any case, no block pages are shown in non-Microsoft browsers, and the user instead sees a "Secure Connection Failed" page along with a Windows toast notification. Depending on the policy responsible for the block, a user sees a different message in the toast notification. For example, web content filtering displays the message, "This content is blocked."
179178

180179
## Report false positives
181180

182181
To report a false positive for sites that have been deemed dangerous by SmartScreen, use the link that appears on the block page in Microsoft Edge (as shown earlier in this article).
183182

184-
For WCF, you can dispute the category of a domain. Navigate to the **Domains** tab of the WCF reports. You see an ellipsis beside each of the domains. Hover over this ellipsis and select **Dispute Category**. A flyout opens. Set the priority of the incident and provide some other details, such as the suggested category. For more information on how to turn on WCF and how to dispute categories, see [Web content filtering](web-content-filtering.md).
183+
For WCF, you can override a block using an Allow indicator, and optionally dispute the category of a domain. Navigate to the **Domains** tab of the WCF reports. You see an ellipsis beside each of the domains. Hover over this ellipsis and select **Dispute Category**. A flyout opens. Set the priority of the incident and provide some other details, such as the suggested category. For more information on how to turn on WCF and how to dispute categories, see [Web content filtering](web-content-filtering.md).
185184

186185
For more information on how to submit false positives/negatives, see [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md).
187186

0 commit comments

Comments
 (0)