You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27
25
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
26
-[Microsoft Defender XDR](/defender-xdr)
27
+
- Microsoft Defender for Servers
29
28
- Microsoft Defender Antivirus
30
29
31
30
**Platforms**
32
31
33
32
- Windows
34
-
- Linux \(See [Network protection for Linux](network-protection-linux.md)\)
35
-
- macOS \(See [Network protection for macOS](network-protection-macos.md)\)
33
+
- Linux (See [Network protection for Linux](network-protection-linux.md))
34
+
- macOS (See [Network protection for macOS](network-protection-macos.md))
36
35
37
36
> [!TIP]
38
37
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
@@ -43,27 +42,27 @@ search.appverid: met150
43
42
44
43
## Check if network protection is enabled
45
44
46
-
Check to see if network protection is enabled on a local device by using Registry editor.
45
+
You can use Registry Editor to check the status of network protection.
47
46
48
-
1. Select the **Start** button in the task bar and type **regedit** to open Registry editor.
47
+
1. Select the **Start** button in the task bar and type `regedit`. In the list of results, select Registry editor to open it.
49
48
50
49
2. Choose **HKEY_LOCAL_MACHINE** from the side menu.
51
50
52
51
3. Navigate through the nested menus to **SOFTWARE**\>**Policies**\>**Microsoft**\>**Windows Defender**\>**Policy Manager**.
53
52
54
-
If the Key is missing, Navigate to **SOFTWARE**\>**Microsoft**\>**Windows Defender**\>**Windows Defender Exploit Guard**\>**Network Protection**.
53
+
If the key is missing, navigate to **SOFTWARE**\>**Microsoft**\>**Windows Defender**\>**Windows Defender Exploit Guard**\>**Network Protection**.
55
54
56
55
4. Select **EnableNetworkProtection** to see the current state of network protection on the device:
@@ -73,25 +72,33 @@ Enable network protection by using any of these methods:
73
72
74
73
### PowerShell
75
74
76
-
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
75
+
1. On your Windows device, select Start, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
76
+
77
+
2. Run the following cmdlet:
78
+
79
+
```PowerShell
80
+
Set-MpPreference -EnableNetworkProtection Enabled
81
+
```
82
+
83
+
3. For Windows Server, use the additional commands that listed in the following table:
77
84
78
-
2. Enter the following cmdlet:
85
+
| Windows Server version | Commands |
86
+
|---|---|
87
+
| Windows Server 2022 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true`|
88
+
| Windows Server 2016 <br/>Windows Server 2012 R2 |`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true`|
79
89
80
-
```PowerShell
81
-
Set-MpPreference -EnableNetworkProtection Enabled
82
-
```
90
+
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
83
91
84
-
3. Optional: Enable the feature in audit mode using the following cmdlet:
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
89
97
90
-
To turn off the feature, use `Disabled` instead of `AuditMode` or `Enabled`.
91
98
92
99
### Mobile device management (MDM)
93
100
94
-
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
101
+
Use the [EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
95
102
96
103
[Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
97
104
@@ -163,8 +170,7 @@ Use the following procedure to enable network protection on domain-joined comput
163
170
164
171
3. Expand the tree to **Windows components**\>**Microsoft Defender Antivirus**\>**Microsoft Defender Exploit Guard**\>**Network protection**.
165
172
166
-
> [!NOTE]
167
-
> On older versions of Windows, the group policy path may say "Windows Defender Antivirus" instead of "Microsoft Defender Antivirus."
173
+
Note that on older versions of Windows, the Group Policy path might have *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus*.
168
174
169
175
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
170
176
@@ -175,8 +181,7 @@ Use the following procedure to enable network protection on domain-joined comput
175
181
> [!IMPORTANT]
176
182
> To fully enable network protection, you must set the Group Policy option to **Enabled** and also select **Block** in the options drop-down menu.
177
183
178
-
> [!NOTE]
179
-
> Optional: Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
184
+
5. (This step is optional.) Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
180
185
181
186
### Microsoft Configuration Manager
182
187
@@ -199,38 +204,34 @@ Use the following procedure to enable network protection on domain-joined comput
199
204
200
205
7. From the ribbon, select **Deploy** to deploy the policy to a collection.
201
206
202
-
> [!IMPORTANT]
203
-
> Once you deploy an Exploit Guard policy from Configuration Manager, the Exploit Guard settings will not be removed from the clients if you remove the deployment. `Delete not supported` is recorded in the Configuration Manager client's ExploitGuardHandler.log if you remove the client's Exploit Guard deployment. <!--CMADO8538577-->
204
-
> The following PowerShell script can be run under SYSTEM context to remove these settings:<!--CMADO9907132-->
#### Important information about removing Exploit Guard settings from a device
208
+
209
+
Once an Exploit Guard policy is deployed using Configuration Manager, Exploit Guard settings aren't removed from the clients if you remove the deployment. Furthermore, if you remove the client's Exploit Guard deployment, `Delete not supported` is recorded in the client's `ExploitGuardHandler.log` in Configuration Manager. <!--CMADO8538577-->
210
+
211
+
Use the following PowerShell script in the SYSTEM context to remove Exploit Guard settings correctly:<!--CMADO9907132-->
0 commit comments