Skip to content

Commit 6360b81

Browse files
Merge pull request #2693 from YongRhee-MSFT/docs-editor/network-protection-1738977705
Update network-protection.md
2 parents e107ff0 + dc21519 commit 6360b81

File tree

1 file changed

+31
-8
lines changed

1 file changed

+31
-8
lines changed

defender-endpoint/network-protection.md

Lines changed: 31 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 01/16/2025
6+
ms.date: 02/10/2025
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -63,9 +63,7 @@ The following table summarizes network protection areas of coverage.
6363
- Encrypted URLs (full path) are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge).
6464
- Encrypted URLs (FQDN only) are blocked in non-Microsoft browsers.
6565
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
66-
6766
- Network Protection will block connections on both standard and non-standard ports.
68-
6967
- Full URL path blocks are applied for unencrypted URLs.
7068

7169
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
@@ -125,7 +123,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
125123
#### Network protection: New toast notifications
126124

127125
| New mapping | Response category | Sources |
128-
| :--- | :--- | :--- |
126+
| --- | --- | --- |
129127
| `phishing` | `Phishing` | `SmartScreen` |
130128
| `malicious` | `Malicious` | `SmartScreen` |
131129
| `command and control` | `C2` | `SmartScreen` |
@@ -135,7 +133,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
135133
| `by your IT admin` | `CustomPolicy` | |
136134

137135
> [!NOTE]
138-
> **customAllowList** does not generate notifications on endpoints.
136+
> `customAllowList` does not generate notifications on endpoints.
139137
140138
### New notifications for network protection determination
141139

@@ -297,7 +295,7 @@ Defender for Endpoint provides detailed reporting into events and blocks as part
297295

298296
You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
299297

300-
1. [Copy the XML directly](overview-attack-surface-reduction.md).
298+
1. [Copy the XML directly](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
301299

302300
2. Select **OK**.
303301

@@ -454,9 +452,34 @@ You can disable QUIC at the web browser level. However, this method of disabling
454452

455453
## Optimizing network protection performance
456454

457-
Network protection includes performance optimization that allows `block` mode to asynchronously inspect long-lived connections, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default. You can turn off this capability by using the following PowerShell cmdlet:
455+
Network protection includes performance optimization that allows `block` mode to asynchronously inspect long-lived connections, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default.
456+
457+
#### Use CSP to enable AllowSwitchToAsyncInspection
458+
459+
[/windows/client-management/mdm/defender-csp](/windows/client-management/mdm/defender-csp#configurationallowswitchtoasyncinspection)
460+
461+
#### Use Group Policy to enable Turn on asynchronous inspection
462+
463+
This procedure enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
464+
465+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
466+
467+
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
468+
469+
3. In the Group Policy Management Editor, go to **Computer configuration**, and then select **Administrative templates**.
470+
471+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
472+
473+
5. Double-click **Turn on asynchronous inspection**, and then set the option to **Enabled**.
474+
475+
6. Select **OK**.
476+
477+
478+
#### Use Microsoft Defender Antivirus Powershell cmdlet to enable Turn on asynchronous inspection
479+
480+
You can turn on this capability by using the following PowerShell cmdlet:
458481

459-
`Set-MpPreference -AllowSwitchToAsyncInspection $false`
482+
`Set-MpPreference -AllowSwitchToAsyncInspection $true`
460483

461484
## See also
462485

0 commit comments

Comments
 (0)