You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/enable-network-protection.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -196,13 +196,13 @@ Use the following procedure to enable network protection on domain-joined comput
196
196
Set-MpPreference -EnableNetworkProtection Enabled
197
197
```
198
198
199
-
3. For Windows Server, use the additional commands that listed in the following table:
199
+
1. For Windows Server, use the additional commands that listed in the following table:
200
200
201
201
| Windows Server version | Commands |
202
202
|---|---|
203
-
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true`|
204
-
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true`|
205
-
203
+
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true`|
204
+
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true`|
205
+
206
206
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
0 commit comments