Skip to content

Commit 1856c74

Browse files
committed
Learn Editor: Update enable-network-protection.md
1 parent 3280a34 commit 1856c74

File tree

1 file changed

+39
-31
lines changed

1 file changed

+39
-31
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 39 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -64,42 +64,15 @@ You can use Registry Editor to check the status of network protection.
6464

6565
To enable network protection, you can use one of the following methods:
6666

67-
- [PowerShell](#powershell)
68-
- [Mobile Device Management (MDM)](#mobile-device-management-mdm)
67+
68+
6969
- [Microsoft Intune](#microsoft-intune)
70+
- [Mobile Device Management (MDM)](#mobile-device-management-mdm)
7071
- [Group Policy](#group-policy)
7172
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
73+
- [PowerShell](#powershell)
7274

73-
### PowerShell
74-
75-
1. On your Windows device, select Start, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
76-
77-
2. Run the following cmdlet:
78-
79-
```PowerShell
80-
Set-MpPreference -EnableNetworkProtection Enabled
81-
```
82-
83-
3. For Windows Server, use the additional commands that listed in the following table:
84-
85-
| Windows Server version | Commands |
86-
|---|---|
87-
| Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
88-
| Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
89-
90-
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
91-
92-
```PowerShell
93-
Set-MpPreference -EnableNetworkProtection AuditMode
94-
```
95-
96-
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
97-
98-
### Mobile device management (MDM)
99-
100-
1. Use the [EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
10175

102-
2. [Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
10376

10477
### Microsoft Intune
10578

@@ -155,6 +128,14 @@ To enable network protection, you can use one of the following methods:
155128

156129
8. Review all the information, and then select **Create**.
157130

131+
132+
### Mobile device management (MDM)
133+
134+
1. Use the [EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
135+
136+
2. [Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
137+
138+
158139
### Group Policy
159140

160141
Use the following procedure to enable network protection on domain-joined computers or on a standalone computer.
@@ -182,6 +163,7 @@ Use the following procedure to enable network protection on domain-joined comput
182163
183164
5. (This step is optional.) Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
184165

166+
185167
### Microsoft Configuration Manager
186168

187169
1. Open the Configuration Manager console.
@@ -203,6 +185,32 @@ Use the following procedure to enable network protection on domain-joined comput
203185

204186
7. From the ribbon, select **Deploy** to deploy the policy to a collection.
205187

188+
189+
### PowerShell
190+
191+
1. On your Windows device, select Start, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
192+
193+
2. Run the following cmdlet:
194+
195+
```PowerShell
196+
Set-MpPreference -EnableNetworkProtection Enabled
197+
```
198+
199+
3. For Windows Server, use the additional commands that listed in the following table:
200+
201+
| Windows Server version | Commands |
202+
|---|---|
203+
| Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
204+
| Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
205+
206+
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
207+
208+
```PowerShell
209+
Set-MpPreference -EnableNetworkProtection AuditMode
210+
```
211+
212+
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
213+
206214
#### Important information about removing Exploit Guard settings from a device
207215

208216
Once an Exploit Guard policy is deployed using Configuration Manager, Exploit Guard settings aren't removed from the clients if you remove the deployment. Furthermore, if you remove the client's Exploit Guard deployment, `Delete not supported` is recorded in the client's `ExploitGuardHandler.log` in Configuration Manager. <!--CMADO8538577-->

0 commit comments

Comments
 (0)