Skip to content

Commit 4ba4ea9

Browse files
authored
Fixed indentation
1 parent ae36a83 commit 4ba4ea9

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -69,8 +69,8 @@ To enable network protection, you can use any of the methods described in this a
6969
- Network Protection on Windows Server 2012 R2 and Windows Server 2016, use the additional policy listed in the following table:
7070

7171
| Description|Setting|
72-
| -------- | -------- |
73-
|Allow Network Protection Down Level|Options:<br>- Network protection will be enabled downlevel. <br>- Network Protection will be disabled downlevel. (Default) <br>- Not Configured|
72+
| -------- | -------- |
73+
|Allow Network Protection Down Level|Options:<br>- Network protection will be enabled downlevel. <br>- Network Protection will be disabled downlevel. (Default) <br>- Not Configured|
7474

7575
- Optional Network Protection settings for Windows and Windows Server:
7676

@@ -207,23 +207,23 @@ Use the following procedure to enable network protection on domain-joined comput
207207

208208
1. On your Windows device, click **Start**, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
209209

210-
2. Run the following cmdlet:
210+
1. Run the following cmdlet:
211211

212212
```PowerShell
213213
Set-MpPreference -EnableNetworkProtection Enabled
214214
```
215215

216216
1. For Windows Server, use the additional commands listed in the following table:
217217

218-
| Windows Server version | Commands |
219-
|---|---|
220-
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
221-
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
218+
| Windows Server version | Commands |
219+
|---|---|
220+
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
221+
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
222222

223223
> [!IMPORTANT]
224224
> Disable the "AllowDatagramProcessingOnWinServer" setting. This is important for any roles that generate high volumes of UDP traffic such as Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others. Enabling datagram processing in these cases can reduce network performance and reliability. Disabling it helps keep the network stable and ensures better use of system resources in high-demand environments.
225225
226-
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
226+
1. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
227227

228228
```PowerShell
229229
Set-MpPreference -EnableNetworkProtection AuditMode

0 commit comments

Comments
 (0)