You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection.md
+31-8Lines changed: 31 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
3
3
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 01/16/2025
6
+
ms.date: 02/10/2025
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -63,9 +63,7 @@ The following table summarizes network protection areas of coverage.
63
63
- Encrypted URLs (full path) are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge).
64
64
- Encrypted URLs (FQDN only) are blocked in non-Microsoft browsers.
65
65
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
66
-
67
66
- Network Protection will block connections on both standard and non-standard ports.
68
-
69
67
- Full URL path blocks are applied for unencrypted URLs.
70
68
71
69
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
@@ -125,7 +123,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
125
123
#### Network protection: New toast notifications
126
124
127
125
| New mapping | Response category | Sources |
128
-
|:--- |:--- |:--- |
126
+
| --- | --- | --- |
129
127
|`phishing`|`Phishing`|`SmartScreen`|
130
128
|`malicious`|`Malicious`|`SmartScreen`|
131
129
|`command and control`|`C2`|`SmartScreen`|
@@ -135,7 +133,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
135
133
|`by your IT admin`|`CustomPolicy`||
136
134
137
135
> [!NOTE]
138
-
> **customAllowList** does not generate notifications on endpoints.
136
+
> `customAllowList` does not generate notifications on endpoints.
139
137
140
138
### New notifications for network protection determination
141
139
@@ -297,7 +295,7 @@ Defender for Endpoint provides detailed reporting into events and blocks as part
297
295
298
296
You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
299
297
300
-
1.[Copy the XML directly](overview-attack-surface-reduction.md).
298
+
1.[Copy the XML directly](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
301
299
302
300
2. Select **OK**.
303
301
@@ -454,9 +452,34 @@ You can disable QUIC at the web browser level. However, this method of disabling
454
452
455
453
## Optimizing network protection performance
456
454
457
-
Network protection includes performance optimization that allows `block` mode to asynchronously inspect long-lived connections, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default. You can turn off this capability by using the following PowerShell cmdlet:
455
+
Network protection includes performance optimization that allows `block` mode to asynchronously inspect long-lived connections, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default.
456
+
457
+
#### Use CSP to enable AllowSwitchToAsyncInspection
#### Use Group Policy to enable Turn on asynchronous inspection
462
+
463
+
This procedure enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
464
+
465
+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
466
+
467
+
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
468
+
469
+
3. In the Group Policy Management Editor, go to **Computer configuration**, and then select **Administrative templates**.
470
+
471
+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
472
+
473
+
5. Double-click **Turn on asynchronous inspection**, and then set the option to **Enabled**.
474
+
475
+
6. Select **OK**.
476
+
477
+
478
+
#### Use Microsoft Defender Antivirus Powershell cmdlet to enable Turn on asynchronous inspection
479
+
480
+
You can turn on this capability by using the following PowerShell cmdlet:
0 commit comments