You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/web-protection-overview.md
+25-26Lines changed: 25 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ search.appverid: met150
5
5
ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
-
ms.reviewer: tdoucette
8
+
ms.reviewer: ericlaw
9
9
ms.localizationpriority: medium
10
10
ms.date: 12/18/2024
11
11
manager: deniseb
@@ -49,39 +49,41 @@ Web threat protection includes:
49
49
50
50
> [!NOTE]
51
51
> For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage Network Protection for inspection and enforcement:
52
-
> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
52
+
> - IP addresses are supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
53
53
> - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
54
-
> -Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
55
-
> -Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
56
-
> -URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
57
-
> -Network Protection will block connections on both standard and non-standard ports.
58
-
> -Full URL path blocks can be applied for unencrypted URLs.
54
+
> -HTTP URLs (including a full URL path) can be blocked for any browser or process
55
+
> -HTTPS fully-qualified domain names (FQDN) can be blocked in non-Microsoft browsers (indicators specifying a full URL path can only be blocked in Microsoft Edge)
56
+
> -Blocking FQDNs in non-Microsoft browsers requires that QUIC and Encrypted Client Hello be disabled in those browsers
57
+
> -FQDNs loaded via HTTP2 connection coalescing can only be blocked in Microsoft Edge.
58
+
> -Network Protection will block connections on all ports (not just 80 and 443).
59
59
60
-
There might be up to two hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked. For more information, see [Web threat protection](web-threat-protection.md).
60
+
In non-Microsoft Edge processes, Network Protection determines the fully qualified domain name for each HTTPS connection by examining the content of the TLS handshake that occurs after a TCP/IP handshake. This requires that the HTTPS connection use TCP/IP (not UDP/QUIC) and that the ClientHello message not be encrypted. To disable QUIC and Encrypted Client Hello in Google Chrome, see [QuicAllowed](https://chromeenterprise.google/policies/#QuicAllowed) and [EncryptedClientHelloEnabled](https://chromeenterprise.google/policies/#EncryptedClientHelloEnabled). For Mozilla Firefox, see [Disable EncryptedClientHello](https://mozilla.github.io/policy-templates/#disableencryptedclienthello) and [network.http.http3.enable](https://support.mozilla.org/ml/questions/1408003#answer-1571474).
61
+
62
+
There might be up to two hours of latency (usually less) between the time an indicator is added and it being enforced on the client. For more information, see [Web threat protection](web-threat-protection.md).
61
63
62
64
### Custom indicators
63
65
64
-
Custom indicator detections are also summarized in your organizations web threat reports under **Web threat detections over time** and **Web threat summary**.
66
+
Custom indicator detections are summarized in web threat reports under **Web threat detections over time** and **Web threat summary**.
65
67
66
-
Custom indicator includes:
68
+
Custom indicators provide:
67
69
68
-
-Ability to create IP and URL-based indicators of compromise to protect your organization against threats.
69
-
-Investigation capabilities over activities related to your custom IP/URL profiles and the devices that access these URLs.
70
-
-The ability to create Allow, Block, and Warn policies for IPs and URLs.
70
+
-The ability to create IP and URL-based indicators of compromise to protect your organization against threats.
71
+
-The ability to specify Allow, Block, or Warn behavior.
72
+
-Investigative capabilities over activities related to your custom IP/URL indicators and the devices that access these URLs.
71
73
72
74
For more information, see [Create indicators for IPs and URLs/domains](indicator-ip-domain.md)
73
75
74
76
### Web content filtering
75
77
76
-
Web content filtering includes**Web activity by category**, **Web content filtering summary**, and **Web activity summary**.
78
+
Web content filtering blocks are summarized under**Web activity by category**, **Web content filtering summary**, and **Web activity summary**.
77
79
78
-
Web content filtering includes:
80
+
Web content filtering provides:
79
81
80
-
-Users are prevented from accessing websites in blocked categories, whether they're browsing on-premises or away.
81
-
-You can conveniently deploy varied policies to various sets of users using the device groups defined in the [Microsoft Defender for Endpoint role-based access control settings](rbac.md).
82
+
-The ability to block users from accessing websites in blocked categories, whether they're browsing on-premises or away.
83
+
-Support for targeting different policies to different device groups defined in the [Microsoft Defender for Endpoint role-based access control settings](rbac.md).
82
84
> [!NOTE]
83
85
> Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.
84
-
-You can access web reports in the same central location, with visibility over actual blocks and web usage.
86
+
-Web reporting in the same central location, with visibility into both blocks and web usage.
85
87
86
88
For more information, see [Web content filtering](web-content-filtering.md).
87
89
@@ -95,8 +97,7 @@ Web protection is made up of the following components, listed in order of preced
95
97
- Block
96
98
97
99
- Web threats (malware, phish)
98
-
- SmartScreen Intel, including Exchange Online Protection (EOP)
99
-
- Escalations
100
+
- SmartScreen Intel
100
101
101
102
- Web Content Filtering (WCF)
102
103
@@ -121,13 +122,11 @@ Internal IP addresses aren't supported by custom indicators. For a warn policy w
121
122
122
123
In all web protection scenarios, SmartScreen and Network Protection can be used together to ensure protection across both Microsoft and non-Microsoft browsers and processes. SmartScreen is built directly into Microsoft Edge, while Network Protection monitors traffic in non-Microsoft browsers and processes. The following diagram illustrates this concept. This diagram of the two clients working together to provide multiple browser/app coverages is accurate for all features of Web Protection (Indicators, Web Threats, Content Filtering).
123
124
124
-
> [!NOTE]
125
-
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They cannot enforce any enterprise web protection policies.
126
125
> :::image type="content" source="/defender/media/web-protection-protect-browsers.png" alt-text="The usage of smartScreen and Network Protection together" lightbox="/defender/media/web-protection-protect-browsers.png":::
127
126
128
127
## Troubleshoot endpoint blocks
129
128
130
-
Responses from the SmartScreen cloud are standardized. Tools like Fiddler can be used to inspect the response from the cloud service, which helps determine the source of the block.
129
+
Responses from the SmartScreen cloud are standardized. Tools like Telerik Fiddler can be used to inspect the response from the cloud service, which helps determine the source of the block.
131
130
132
131
When the SmartScreen cloud service responds with an allow, block, or warn response, a response category and server context is relayed back to the client. In Microsoft Edge, the response category is what is used to determine the appropriate block page to show (malicious, phishing, organizational policy).
133
132
@@ -167,21 +166,21 @@ To list blocks that are due to other features (like Custom Indicators), refer to
167
166
168
167
## User experience
169
168
170
-
If a user visits a web page that poses a risk of malware, phishing, or other web threats, Microsoft Edge triggers a block page that resembles the following image:
169
+
If a user visits a web page that poses a risk of malware, phishing, or other web threats, Microsoft Edge displays a block page that resembles the following image:
171
170
172
171
:::image type="content" source="media/web-protection-indicators-new-block-page.jpg" alt-text="Screenshot showing new block notification for a website." lightbox="media/web-protection-indicators-new-block-page.jpg":::
173
172
174
173
Beginning with Microsoft Edge 124, the following block page is shown for all Web Content Filtering category blocks.
In any case, no block pages are shown in non-Microsoft browsers, and the user sees a "Secure Connection Failed" page along with a toast notification. Depending on the policy responsible for the block, a user sees a different message in the toast notification. For example, web content filtering displays the message, "This content is blocked."
177
+
In any case, no block pages are shown in non-Microsoft browsers, and the user instead sees a "Secure Connection Failed" page along with a Windows toast notification. Depending on the policy responsible for the block, a user sees a different message in the toast notification. For example, web content filtering displays the message, "This content is blocked."
179
178
180
179
## Report false positives
181
180
182
181
To report a false positive for sites that have been deemed dangerous by SmartScreen, use the link that appears on the block page in Microsoft Edge (as shown earlier in this article).
183
182
184
-
For WCF, you can dispute the category of a domain. Navigate to the **Domains** tab of the WCF reports. You see an ellipsis beside each of the domains. Hover over this ellipsis and select **Dispute Category**. A flyout opens. Set the priority of the incident and provide some other details, such as the suggested category. For more information on how to turn on WCF and how to dispute categories, see [Web content filtering](web-content-filtering.md).
183
+
For WCF, you can override a block using an Allow indicator, and optionally dispute the category of a domain. Navigate to the **Domains** tab of the WCF reports. You see an ellipsis beside each of the domains. Hover over this ellipsis and select **Dispute Category**. A flyout opens. Set the priority of the incident and provide some other details, such as the suggested category. For more information on how to turn on WCF and how to dispute categories, see [Web content filtering](web-content-filtering.md).
185
184
186
185
For more information on how to submit false positives/negatives, see [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md).
0 commit comments