Skip to content

Commit 0495fa2

Browse files
authored
Merge pull request #1591 from RaluRalu/docs-editor/enable-network-protection-1728942955
Update enable-network-protection.md
2 parents 0b2f2f7 + 6778297 commit 0495fa2

File tree

1 file changed

+53
-52
lines changed

1 file changed

+53
-52
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 53 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Turn on network protection
33
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 07/25/2024
6+
ms.date: 10/14/2024
77
ms.topic: conceptual
88
author: denisebmsft
99
ms.author: deniseb
@@ -19,20 +19,19 @@ search.appverid: met150
1919

2020
# Turn on network protection
2121

22-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
23-
2422
**Applies to:**
2523

2624
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2725
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2826
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
2928
- Microsoft Defender Antivirus
3029

3130
**Platforms**
3231

3332
- Windows
34-
- Linux \(See [Network protection for Linux](network-protection-linux.md)\)
35-
- macOS \(See [Network protection for macOS](network-protection-macos.md)\)
33+
- Linux (See [Network protection for Linux](network-protection-linux.md))
34+
- macOS (See [Network protection for macOS](network-protection-macos.md))
3635

3736
> [!TIP]
3837
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
@@ -43,27 +42,27 @@ search.appverid: met150
4342

4443
## Check if network protection is enabled
4544

46-
Check to see if network protection is enabled on a local device by using Registry editor.
45+
You can use Registry Editor to check the status of network protection.
4746

48-
1. Select the **Start** button in the task bar and type **regedit** to open Registry editor.
47+
1. Select the **Start** button in the task bar and type `regedit`. In the list of results, select Registry editor to open it.
4948

5049
2. Choose **HKEY_LOCAL_MACHINE** from the side menu.
5150

5251
3. Navigate through the nested menus to **SOFTWARE** \> **Policies** \> **Microsoft** \> **Windows Defender** \> **Policy Manager**.
5352

54-
If the Key is missing, Navigate to **SOFTWARE** \> **Microsoft** \> **Windows Defender** \> **Windows Defender Exploit Guard** \> **Network Protection**.
53+
If the key is missing, navigate to **SOFTWARE** \> **Microsoft** \> **Windows Defender** \> **Windows Defender Exploit Guard** \> **Network Protection**.
5554

5655
4. Select **EnableNetworkProtection** to see the current state of network protection on the device:
5756

58-
- 0, or **Off**
59-
- 1, or **On**
60-
- 2, or **Audit** mode
57+
- **0**, or **Off**
58+
- **1**, or **On**
59+
- **2**, or **Audit** mode
6160

62-
:::image type="content" source="/defender/media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png" alt-text="Network Protection registry key" lightbox="/defender/media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png":::
61+
:::image type="content" source="/defender/media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png" alt-text="Network Protection registry key" lightbox="/defender/media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png":::
6362

6463
## Enable network protection
6564

66-
Enable network protection by using any of these methods:
65+
To enable network protection, you can use one of the following methods:
6766

6867
- [PowerShell](#powershell)
6968
- [Mobile Device Management (MDM)](#mobile-device-management-mdm)
@@ -73,25 +72,33 @@ Enable network protection by using any of these methods:
7372

7473
### PowerShell
7574

76-
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
75+
1. On your Windows device, select Start, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
76+
77+
2. Run the following cmdlet:
78+
79+
```PowerShell
80+
Set-MpPreference -EnableNetworkProtection Enabled
81+
```
82+
83+
3. For Windows Server, use the additional commands that listed in the following table:
7784

78-
2. Enter the following cmdlet:
85+
| Windows Server version | Commands |
86+
|---|---|
87+
| Windows Server 2022 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
88+
| Windows Server 2016 <br/>Windows Server 2012 R2 | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
7989

80-
```PowerShell
81-
Set-MpPreference -EnableNetworkProtection Enabled
82-
```
90+
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
8391

84-
3. Optional: Enable the feature in audit mode using the following cmdlet:
92+
```PowerShell
93+
Set-MpPreference -EnableNetworkProtection AuditMode
94+
```
8595

86-
```PowerShell
87-
Set-MpPreference -EnableNetworkProtection AuditMode
88-
```
96+
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
8997

90-
To turn off the feature, use `Disabled` instead of `AuditMode` or `Enabled`.
9198

9299
### Mobile device management (MDM)
93100

94-
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
101+
Use the [EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
95102

96103
[Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
97104

@@ -163,8 +170,7 @@ Use the following procedure to enable network protection on domain-joined comput
163170

164171
3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Microsoft Defender Exploit Guard** \> **Network protection**.
165172

166-
> [!NOTE]
167-
> On older versions of Windows, the group policy path may say "Windows Defender Antivirus" instead of "Microsoft Defender Antivirus."
173+
Note that on older versions of Windows, the Group Policy path might have *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus*.
168174

169175
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
170176

@@ -175,8 +181,7 @@ Use the following procedure to enable network protection on domain-joined comput
175181
> [!IMPORTANT]
176182
> To fully enable network protection, you must set the Group Policy option to **Enabled** and also select **Block** in the options drop-down menu.
177183
178-
> [!NOTE]
179-
> Optional: Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
184+
5. (This step is optional.) Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
180185

181186
### Microsoft Configuration Manager
182187

@@ -199,38 +204,34 @@ Use the following procedure to enable network protection on domain-joined comput
199204

200205
7. From the ribbon, select **Deploy** to deploy the policy to a collection.
201206

202-
> [!IMPORTANT]
203-
> Once you deploy an Exploit Guard policy from Configuration Manager, the Exploit Guard settings will not be removed from the clients if you remove the deployment. `Delete not supported` is recorded in the Configuration Manager client's ExploitGuardHandler.log if you remove the client's Exploit Guard deployment. <!--CMADO8538577-->
204-
> The following PowerShell script can be run under SYSTEM context to remove these settings:<!--CMADO9907132-->
205-
>
206-
> ```powershell
207-
> $defenderObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_Defender02" -Filter "InstanceID='Defender' and ParentID='./Vendor/MSFT/Policy/Config'"
208-
> $defenderObject.AttackSurfaceReductionRules = $null
209-
> $defenderObject.AttackSurfaceReductionOnlyExclusions = $null
210-
> $defenderObject.EnableControlledFolderAccess = $null
211-
> $defenderObject.ControlledFolderAccessAllowedApplications = $null
212-
> $defenderObject.ControlledFolderAccessProtectedFolders = $null
213-
> $defenderObject.EnableNetworkProtection = $null
214-
> $defenderObject.Put()
215-
>
216-
> $exploitGuardObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_ExploitGuard02" -Filter "InstanceID='ExploitGuard' and ParentID='./Vendor/MSFT/Policy/Config'"
217-
> $exploitGuardObject.ExploitProtectionSettings = $null
218-
> $exploitGuardObject.Put()
219-
>```
207+
#### Important information about removing Exploit Guard settings from a device
208+
209+
Once an Exploit Guard policy is deployed using Configuration Manager, Exploit Guard settings aren't removed from the clients if you remove the deployment. Furthermore, if you remove the client's Exploit Guard deployment, `Delete not supported` is recorded in the client's `ExploitGuardHandler.log` in Configuration Manager. <!--CMADO8538577-->
210+
211+
Use the following PowerShell script in the SYSTEM context to remove Exploit Guard settings correctly:<!--CMADO9907132-->
212+
213+
```powershell
214+
$defenderObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_Defender02" -Filter "InstanceID='Defender' and ParentID='./Vendor/MSFT/Policy/Config'"
215+
$defenderObject.AttackSurfaceReductionRules = $null
216+
$defenderObject.AttackSurfaceReductionOnlyExclusions = $null
217+
$defenderObject.EnableControlledFolderAccess = $null
218+
$defenderObject.ControlledFolderAccessAllowedApplications = $null
219+
$defenderObject.ControlledFolderAccessProtectedFolders = $null
220+
$defenderObject.EnableNetworkProtection = $null
221+
$defenderObject.Put()
222+
223+
$exploitGuardObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_ExploitGuard02" -Filter "InstanceID='ExploitGuard' and ParentID='./Vendor/MSFT/Policy/Config'"
224+
$exploitGuardObject.ExploitProtectionSettings = $null
225+
$exploitGuardObject.Put()
226+
```
220227

221228
## See also
222229

223230
- [Network protection](network-protection.md)
224-
225231
- [Network protection for Linux](network-protection-linux.md)
226-
227232
- [Network protection for macOS](network-protection-macos.md)
228-
229233
- [Network protection and the TCP three-way handshake](network-protection.md#network-protection-and-the-tcp-three-way-handshake)
230-
231234
- [Evaluate network protection](evaluate-network-protection.md)
232-
233235
- [Troubleshoot network protection](troubleshoot-np.md)
234236

235-
236237
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)