Skip to content

Commit 6072f21

Browse files
authored
Merge branch 'main' into WI493429-standardizing-mde-operating-systems
2 parents f31e3d2 + 58be19b commit 6072f21

File tree

3 files changed

+15
-20
lines changed

3 files changed

+15
-20
lines changed

defender-endpoint/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -285,6 +285,8 @@
285285
href: linux-deploy-defender-for-endpoint-using-golden-images.md
286286
- name: Direct onboarding with Defender for Cloud
287287
href: /azure/defender-for-cloud/onboard-machines-with-defender-for-endpoint?toc=/defender-endpoint/toc.json&bc=/defender-endpoint/breadcrumb/toc.json
288+
- name: Deployment guidance for Defender for Endpoint on Linux for SAP
289+
href: mde-linux-deployment-on-sap.md
288290
- name: Configure Defender for Endpoint on Linux
289291
items:
290292
- name: Configure security policies and settings

defender-endpoint/network-protection.md

Lines changed: 12 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ There might be up to two hours of latency (usually less) between when an indicat
7676
Network protection requires devices running one of the following operating systems:
7777

7878
- Windows 10 or 11 (Pro or Enterprise) (see [Supported Windows versions](minimum-requirements.md#windows-versions-supported-by-defender-for-endpoint))
79-
- Windows Server, version 1803 or later (see [Supported Windows versions](minimum-requirements.md#windows-versions-supported-by-defender-for-endpoint))
79+
- Windows Server 2012 R2, Windows Server 2016, or Windows Server version 1803 or later (see [Supported Windows versions](minimum-requirements.md#windows-versions-supported-by-defender-for-endpoint))
8080
- macOS version 12 (Monterey) or later (see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md))
8181
- A supported Linux version (see [Microsoft Defender for Endpoint on Linux](microsoft-defender-endpoint-linux.md))
8282

@@ -89,7 +89,7 @@ Network protection also requires Microsoft Defender Antivirus with real-time pro
8989

9090
## Why network protection is important
9191

92-
Network protection is a part of the [attack surface reduction](overview-attack-surface-reduction.md) group of solutions in Microsoft Defender for Endpoint. Network protection enables the network layer to block connections to domains and IP addresses. By default, network protection guards your computers from known malicious domains using the SmartScreen feed, which blocks malicious URLs in a manner similar to SmartScreen in Microsoft Edge browser. The network protection functionality can be extended to:
92+
Network protection is a part of the [attack surface reduction](overview-attack-surface-reduction.md) group of solutions in Microsoft Defender for Endpoint. Network protection enables the network layer to block connections to domains and IP addresses. By default, network protection guards your computers from known malicious domains using the SmartScreen feed, which blocks malicious URLs in a manner similar to SmartScreen in the Microsoft Edge browser. The network protection functionality can be extended to:
9393

9494
- Block IP/URL addresses from your own threat intelligence ([indicators](indicator-ip-domain.md))
9595
- Block unsanctioned services from [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
@@ -184,15 +184,15 @@ When a user visits a website whose url has a bad reputation, a toast notificatio
184184
- **Ok**: The toast notification is released (removed), and the attempt to access the site is ended.
185185
- **Feedback**: The toast notification presents the user with a link to submit a ticket, which the user can use to submit feedback to the administrator in an attempt to justify access to the site.
186186

187-
:::image type="content" source="media/network-protection-phishing-blocked.png" alt-text="Shows a network protection known phishing content blocked notification." lightbox="media/network-protection-phishing-blocked.png":::
187+
:::image type="content" source="media/network-protection-phishing-blocked.png" alt-text="Shows a network protection known phishing content blocked notification." lightbox="media/network-protection-phishing-blocked.png":::Your security operations team can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) shown for a blocked connection with your organization's details and contact information.
188188

189189
## SmartScreen Unblock
190190

191191
With indicators in Defender for Endpoint, administrators can allow end users to bypass warnings that are generated for some URLs and IPs. Depending on why the URL is blocked, when a SmartScreen block is encountered, it could offer the user the ability to unblock the site for up to 24 hours. In such cases, a Windows Security toast notification appears, permitting the user to select **Unblock**. In such cases, the URL or IP is unblocked for the specified period of time.
192192

193193
:::image type="content" source="media/network-protection-smart-screen-block-notification.png" alt-text="Windows Security notification for network protection.":::
194194

195-
Microsoft Defender for Endpoint administrators can configure SmartScreen Unblock functionality in the [Microsoft Defender portal](https://security.microsoft.com) using an allow indicator for IPs, URLs, and domains.
195+
Microsoft Defender for Endpoint administrators can unblock any URL in the [Microsoft Defender portal](https://security.microsoft.com) using an allow indicator for IPs, URLs, and domains.
196196

197197
:::image type="content" source="media/network-protection-smart-screen-block-configuration.png" alt-text="Network protection SmartScreen block configuration URL and IP form.":::
198198

@@ -271,16 +271,13 @@ DeviceEvents
271271

272272
You can use the resulting list of URLs and IPs to determine what would be blocked if network protection is set to block mode on the device. You can also see which features would block URLs and IPs. Review the list to identify any URLS or IPs that are necessary for your environment. You can then create an allow indicator for those URLs or IP addresses. Allow indicators take precedence over any blocks. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
273273

274-
After creating an indicator to unblock a site, you may attempt to resolve the original block as follows:
274+
After creating an allow indicator to unblock a site, you may attempt to resolve the original block as follows:
275275

276276
- **SmartScreen**: report false positive, if appropriate
277277
- **Indicator**: modify existing indicator
278278
- **MCA**: review unsanctioned app
279279
- **WCF**: request recategorization
280280

281-
> [!NOTE]
282-
> As this is a per-device setting, if there are devices that cannot move to Block mode you can simply leave them on audit to receive the auditing events.
283-
284281
For information about how to report false positives in SmartScreen data, see [Report false positives](web-protection-overview.md#report-false-positives).
285282

286283
For details on how to create your own Power BI reports, see [Create custom reports using Power BI](api/api-power-bi.md).
@@ -300,11 +297,7 @@ In non-Microsoft Edge processes, Network Protection determines the fully qualifi
300297

301298
## Viewing network protection events
302299

303-
Network protection works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into exploit protection events and blocks as part of [alert investigation scenarios](investigate-alerts.md).
304-
305-
When network protection blocks a connection, a notification is displayed on the client. Your security operations team can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) with your organization's details and contact information.
306-
307-
<a name='review-network-protection-events-in-the-microsoft-365-defender-portal'></a>
300+
Network protection works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting as part of [alert investigation scenarios](investigate-alerts.md).<a name='review-network-protection-events-in-the-microsoft-365-defender-portal'></a>
308301

309302
## Review network protection events in the Microsoft Defender portal
310303

@@ -349,7 +342,7 @@ Due to the multi-user nature of Windows 10 Enterprise, keep the following points
349342

350343
### Alternative option for network protection
351344

352-
For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), Windows Server version 1803 or later, and Windows 10 Enterprise Multi-Session 1909 and later, used in Windows Virtual Desktop on Azure, network protection for Microsoft Edge can be enabled using the following method:
345+
For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), Windows Server version 1803 or later, and Windows 10 Enterprise Multi-Session 1909 and later, used in Windows Virtual Desktop on Azure, network protection can be enabled using the following method:
353346

354347
1. Use [Turn on network protection](enable-network-protection.md) and follow the instructions to apply your policy.
355348

@@ -361,8 +354,8 @@ For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified sol
361354
- `Set-MpPreference -AllowDatagramProcessingOnWinServer 1`
362355

363356
> [!NOTE]
364-
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
365-
357+
> Depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
358+
366359
### Network protection for Windows Servers
367360

368361
The following information is specific to Windows Servers.
@@ -387,7 +380,7 @@ Verify whether network protection is enabled on a local device by using Registry
387380

388381
For more information, see [Turn on network protection](enable-network-protection.md).
389382

390-
#### Network protection suggested registry keys
383+
#### Network protection registry keys
391384

392385
For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified solution](onboard-server.md#functionality-in-the-modern-unified-solution-for-windows-server-2016-and-windows-server-2012-r2), Windows Server version 1803 or later, and Windows 10 Enterprise Multi-Session 1909 and later (used in Windows Virtual Desktop on Azure), enable other registry keys, as follows:
393386

@@ -421,7 +414,7 @@ Set-MpPreference -AllowDatagramProcessingOnWinServer 1
421414
```
422415

423416
> [!NOTE]
424-
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can affect network performance.
417+
> Depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can affect network performance.
425418
426419
## Network protection troubleshooting
427420

@@ -453,7 +446,7 @@ New-NetFirewallRule @ruleParams
453446

454447
## Optimizing network protection performance
455448

456-
Network protection includes performance optimization that allows `block` mode to asynchronously inspect long-lived connections, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default.
449+
Network protection includes a performance optimization that allows `block` mode to inspect long-lived connections asynchronously, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default.
457450

458451
#### Use CSP to enable AllowSwitchToAsyncInspection
459452

defender-office-365/attack-simulation-training-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ Watch this short video to learn more about Attack simulation training.
8080

8181
- There are no corresponding PowerShell cmdlets for Attack simulation training.
8282

83-
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, NZL, POL, QAT, SGP, SWE, TWN and ZAF.
83+
- Attack simulation and training related data is stored with other customer data for Microsoft 365 services. For more information, see [Microsoft 365 data locations](/microsoft-365/enterprise/o365-data-locations). Attack simulation training is available in the following regions: APC, EUR, and NAM. Countries within these regions where Attack simulation training is available include ARE, AUS, BRA, CAN, CHE, DEU, ESP, FRA, GBR, IDN, IND, ISR, ITA, JPN, KOR, LAM, MEX, NOR, NZL, POL, QAT, SGP, SWE, TWN and ZAF.
8484

8585
> [!NOTE]
8686
> NOR, ZAF, ARE and DEU are the latest additions. All features except reported email telemetry are available in these regions. We're working to enable the features and we'll notify customers as soon as reported email telemetry becomes available.

0 commit comments

Comments
 (0)