Skip to content

Commit 4dba218

Browse files
authored
Merge pull request #178 from YongRhee-MSFT/patch-2
Update evaluate-mdav-using-gp.md -- Emm is reviewing
2 parents 1bb73a2 + 7ee7577 commit 4dba218

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

defender-endpoint/evaluate-mdav-using-gp.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -180,13 +180,13 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
180180
| --- | --- |
181181
| Prevent users and apps from accessing dangerous websites | Enabled, Block |
182182
| This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled |
183-
| Allow Network Protection Down Level | Network protection is enabled downlevel |
184-
| Allow Datagram Processing On Win Server | Datagram processing on Windows Server is enabled |
185-
| Disable DNS over TCP parsing | DNS over TCP parsing is enabled |
186-
| Disable HTTP parsing | HTTP parsing is enabled |
187-
| Disable SSH parsing | SSH parsing is enabled |
188-
| Disable TLS parsing | TLS parsing is enabled |
189-
| Enable DNS Sinkhole | DNS Sinkhole is enabled |
183+
184+
To enable Network Protection for Windows Servers, for now, please use Powershell:
185+
186+
| OS | Powershell cmdlet |
187+
| --- | --- |
188+
| Windows Server 2012 R2Windows Server 2022 and later | set-mpPreference -AllowNetworkProtectionOnWinServer $true |
189+
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true
190190

191191
## Attack Surface Reduction Rules
192192

0 commit comments

Comments
 (0)