You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-ip-domain.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,13 +99,13 @@ For processes other than Microsoft Edge and Internet Explorer, web protection sc
99
99
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators
100
100
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer or Microsoft Edge)
101
101
- Encrypted URLs (FQDN only) can be blocked in non-Microsoft browsers (that is, other than Internet Explorer or Microsoft Edge)
102
-
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, can only be blocked on first party browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
102
+
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, can only be blocked on first party browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
103
103
- Full URL path blocks can be applied for unencrypted URLs
104
104
- If there are conflicting URL indicator policies, the longer path is applied. For example, the URL indicator policy `https://support.microsoft.com/office` takes precedence over the URL indicator policy `https://support.microsoft.com`.
105
-
-In the case of URL indicator policy conflicts, the longer path may not be applied due to redirection. In such cases, register a non-redirected URL.
105
+
-If URL indicator policy conflicts occur, the longer path might not be applied due to redirection. In such cases, register a non-redirected URL.
106
106
107
107
> [!NOTE]
108
-
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They cannot enforce any enterprise web protection policies.
108
+
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They can't enforce any enterprise web protection policies.
109
109
110
110
## Network protection and the TCP three-way handshake
111
111
@@ -124,14 +124,14 @@ Here's an example of how that works:
124
124
When using warn mode, you can configure the following controls:
125
125
126
126
-**Bypass ability**
127
-
- Allow button in Edge
127
+
- Allow button in Microsoft Edge
128
128
- Allow button on toast (Non-Microsoft browsers)
129
129
- Bypass duration parameter on the indicator
130
130
- Bypass enforcement across Microsoft and Non-Microsoft browsers
131
131
132
132
-**Redirect URL**
133
133
- Redirect URL parameter on the indicator
134
-
- Redirect URL in Edge
134
+
- Redirect URL in Microsoft Edge
135
135
- Redirect URL on toast (Non-Microsoft browsers)
136
136
137
137
For more information, see [Govern apps discovered by Microsoft Defender for Endpoint](/cloud-app-security/mde-govern).
@@ -179,9 +179,9 @@ The result is that categories 1-4 are all blocked. This is illustrated in the fo
179
179
180
180
4. Specify the following details:
181
181
182
-
- Indicator - Specify the entity details and define the expiration of the indicator.
183
-
- Action - Specify the action to be taken and provide a description.
184
-
- Scope - Define the scope of the machine group.
182
+
-**Indicator**: Specify the entity details and define the expiration of the indicator.
183
+
-**Action**: Specify the action to be taken and provide a description.
184
+
-**Scope**: Define the scope of the machine group.
185
185
186
186
5. Review the details in the **Summary** tab, then select **Save**.
0 commit comments