Skip to content

Commit 4df40ba

Browse files
authored
Update date and link in documentation
1 parent 9740a2d commit 4df40ba

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Turn on network protection
33
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 10/14/2024
6+
ms.date: 01/22/2025
77
ms.topic: conceptual
88
author: denisebmsft
99
ms.author: deniseb
@@ -85,7 +85,7 @@ To enable network protection, you can use one of the following methods:
8585
| Windows Server version | Commands |
8686
|---|---|
8787
| Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
88-
| Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](https://learn.microsoft.com/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
88+
| Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
8989

9090
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
9191

0 commit comments

Comments
 (0)