Skip to content

Commit 31f3a28

Browse files
authored
Fixed alert format
1 parent e98fb88 commit 31f3a28

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,7 @@ Use the following procedure to enable network protection on domain-joined comput
180180

181181
### PowerShell
182182

183-
1. On your Windows device, click Start, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
183+
1. On your Windows device, click **Start**, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
184184

185185
2. Run the following cmdlet:
186186

@@ -195,7 +195,7 @@ Use the following procedure to enable network protection on domain-joined comput
195195
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
196196
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
197197

198-
[!IMPORTANT]
198+
> [!IMPORTANT]
199199
> For Domain Controllers and Microsoft Exchange servers, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
200200
201201
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:

0 commit comments

Comments
 (0)