Skip to content

Commit 5c86814

Browse files
committed
Update network-protection.md
1 parent 7cab385 commit 5c86814

File tree

1 file changed

+26
-18
lines changed

1 file changed

+26
-18
lines changed

defender-endpoint/network-protection.md

Lines changed: 26 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -329,7 +329,7 @@ Due to the multi-user nature of Windows 10 Enterprise, keep the following points
329329

330330
### Alternative option for network protection
331331

332-
For Windows Server 2012R2/2016 unified MDE client, Windows Server version 1803 or newer, Windows Server 2019 or newer, and Windows 10 Enterprise Multi-Session 1909 and up, used in Windows Virtual Desktop on Azure, network protection for Microsoft Edge can be enabled using the following method:
332+
For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified solution](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution), Windows Server version 1803 or later, and Windows 10 Enterprise Multi-Session 1909 and later, used in Windows Virtual Desktop on Azure, network protection for Microsoft Edge can be enabled using the following method:
333333

334334
1. Use [Turn on network protection](enable-network-protection.md) and follow the instructions to apply your policy.
335335

@@ -352,28 +352,32 @@ Following is information specific to Windows Servers.
352352
Verify whether network protection is enabled on a local device by using Registry Editor.
353353

354354
1. Select the **Start** button in the task bar and type **regedit** to open the Registry Editor.
355-
1. Select **HKEY_LOCAL_MACHINE** from the side menu.
356-
1. Navigate through the nested menus to **SOFTWARE** > **Policies** > **Microsoft** > **Windows defender** > **Windows Defender Exploit Guard** > **Network Protection**.
355+
356+
2. Select **HKEY_LOCAL_MACHINE** from the side menu.
357+
358+
3. Navigate through the nested menus to **SOFTWARE** > **Policies** > **Microsoft** > **Windows Defender** > **Windows Defender Exploit Guard** > **Network Protection**.
357359

358360
(If the key isn't present, navigate to **SOFTWARE** > **Microsoft** > **Windows Defender** > **Windows Defender Exploit Guard** > **Network Protection**)
359361

360362
4. Select **EnableNetworkProtection** to see the current state of network protection on the device:
361363

362-
- 0 = Off
363-
- 1 = On (enabled)
364-
- 2 = Audit mode
364+
- `0` = Off
365+
- `1` = On (enabled)
366+
- `2` = Audit mode
365367

366368
For more information, see [Turn on network protection](enable-network-protection.md).
367369

368-
#### Network protection suggestion
370+
#### Network protection suggested registry keys
371+
372+
For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified solution](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution), Windows Server version 1803 or later, and Windows 10 Enterprise Multi-Session 1909 and later (used in Windows Virtual Desktop on Azure), enable additional registry keys, as follows:
369373

370-
For Windows Server 2012R2/2016 unified MDE client, Windows Server version 1803 or newer, Windows Server 2019 or newer, and Windows 10 Enterprise Multi-Session 1909 and up (used in Windows Virtual Desktop on Azure), there are additional registry keys that must be enabled:
374+
1. Go to **HKEY_LOCAL_MACHINE** > **SOFTWARE** > **Microsoft** > **Windows Defender** > **Windows Defender Exploit Guard** > **Network Protection**.
371375

372-
**HKEY_LOCAL_MACHINE** > **SOFTWARE** > **Microsoft** > **Windows Defender** > **Windows Defender Exploit Guard** > **Network Protection**
376+
2. Configure the following keys:
373377

374-
- **AllowNetworkProtectionOnWinServer** (dword) 1 (hex)
375-
- **EnableNetworkProtection** (dword) 1 (hex)
376-
- **AllowNetworkProtectionDownLevel** (dword) 1 (hex) - Windows Server 2012R2 and Windows Server 2016 only
378+
- `AllowNetworkProtectionOnWinServer` (DWORD) set to `1` (hex)
379+
- `EnableNetworkProtection` (DWORD) set to `1` (hex)
380+
- (On Windows Server 2012 R2 and Windows Server 2016 only) `AllowNetworkProtectionDownLevel` (DWORD) set to `1` (hex)
377381

378382
> [!NOTE]
379383
> Depending on your infrastructure, volume of traffic, and other conditions, **HKEY_LOCAL_MACHINE** > **SOFTWARE** > **Policies** > **Microsoft** > **Windows Defender** > **NIS** > **Consumers** > **IPS** - **AllowDatagramProcessingOnWinServer (dword) 1 (hex)** can have an effect on network performance.
@@ -382,16 +386,18 @@ For additional information, see: [Turn on network protection](enable-network-pro
382386

383387
#### Windows Servers and Windows Multi-session configuration requires PowerShell
384388

385-
For Windows Servers and Windows Multi-session, there are additional items that you must enable by using PowerShell cmdlets. For Windows Server 2012R2/2016 unified MDE client, Windows Server version 1803 or newer, Windows Server 2019 or newer, and Windows 10 Enterprise Multi-Session 1909 and up, used in Windows Virtual Desktop on Azure.
389+
For Windows Servers and Windows Multi-session, there are additional items that you must enable by using PowerShell cmdlets. For Windows Server 2012 R2 and Windows Server 2016 unified client, Windows Server version 1803 or newer, Windows Server 2019 or newer, and Windows 10 Enterprise Multi-Session 1909 and up, used in Windows Virtual Desktop on Azure.
386390

387391
1. Set-MpPreference -EnableNetworkProtection Enabled
392+
388393
1. Set-MpPreference -AllowNetworkProtectionOnWinServer 1
394+
389395
1. Set-MpPreference -AllowNetworkProtectionDownLevel 1
396+
390397
1. Set-MpPreference -AllowDatagramProcessingOnWinServer 1
391398

392399
> [!NOTE]
393-
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, **Set-MpPreference -AllowDatagramProcessingOnWinServer 1** can have an effect on network performance.
394-
400+
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
395401
396402
## Network protection troubleshooting
397403

@@ -426,9 +432,11 @@ New-NetFirewallRule @ruleParams
426432

427433
You can disable QUIC at the web browser level. However, this method of disabling QUIC means that QUIC continues to work on non-browser applications. To disable QUIC in Microsoft Edge or Google Chrome, open the browser, locate the Experimental QUIC protocol setting (#enable-quic flag), and then change the setting to Disabled. The following table shows which URI to enter in the browser's address bar so that you can access that setting.
428434

429-
Browser URI
430-
Microsoft Edge edge://flags/#enable-quic
431-
Google Chrome chrome://flags/#enable-quic
435+
| Browser | URI |
436+
|---|---|
437+
| Microsoft Edge | `edge://flags/#enable-quic` |
438+
| Google Chrome | `chrome://flags/#enable-quic` |
439+
432440

433441
## Optimizing network protection performance
434442

0 commit comments

Comments
 (0)