You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection.md
+36-30Lines changed: 36 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
3
3
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 12/12/2024
6
+
ms.date: 12/13/2024
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -53,24 +53,28 @@ The following table summarizes network protection areas of coverage.
53
53
| Web Content Filtering | SmartScreen must be enabled | Network protection must be in block mode | Not supported |
54
54
55
55
> [!NOTE]
56
-
> On Mac and Linux, you must have network protection in block mode to get support for these features in Edge.
56
+
> On Mac and Linux, you must have network protection in block mode for these features to be supported in the Microsoft Edge browser.
57
57
> On Windows, network protection does not monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
58
-
- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
58
+
59
+
Here are a few important points to keep in mind:
60
+
61
+
- IP is supported for all three protocols (`TCP`, `HTTP`, and `HTTPS` (TLS)).
59
62
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
60
-
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
61
-
> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
62
-
> - URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, can only be blocked on first party browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
63
-
> - Full URL path blocks can be applied for unencrypted URLs.
64
-
>
65
-
> There might be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
66
-
>
63
+
- Encrypted URLs (full path) are only blocked on Microsoft browsers (Internet Explorer, Edge).
64
+
- Encrypted URLs (FQDN only) are blocked in non-Microsoft browsers.
65
+
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, are only blocked on Microsoft browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
66
+
- Full URL path blocks are applied for unencrypted URLs.
67
+
68
+
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
69
+
67
70
Watch this video to learn how Network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
Network protection requires devices running one of the following operating systems:
77
+
74
78
- Windows 10 or 11 (Pro or Enterprise) (see [Supported Windows versions](minimum-requirements.md#supported-windows-versions))
75
79
- Windows Server, version 1803 or later (see [Supported Windows versions](minimum-requirements.md#supported-windows-versions))
76
80
- macOS version 12 (Monterey) or later (see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md))
@@ -119,13 +123,13 @@ Support for Command and Control servers (C2) is an important part of this ransom
119
123
120
124
| New mapping | Response category | Sources |
121
125
| :--- | :--- | :--- |
122
-
| phishing | Phishing | SmartScreen |
123
-
| malicious | Malicious | SmartScreen |
124
-
| command and control | C2 | SmartScreen |
125
-
| command and control | COCO | SmartScreen |
126
-
| malicious | Untrusted | SmartScreen |
127
-
| by your IT admin | CustomBlockList ||
128
-
| by your IT admin | CustomPolicy ||
126
+
|`phishing`| Phishing |`SmartScreen`|
127
+
|`malicious`| Malicious |`SmartScreen`|
128
+
|`command and control`| C2 |`SmartScreen`|
129
+
|`command and control`| COCO |`SmartScreen`|
130
+
|`malicious`| Untrusted |`SmartScreen`|
131
+
|`by your IT admin`|`CustomBlockList`||
132
+
|`by your IT admin`|`CustomPolicy`||
129
133
130
134
> [!NOTE]
131
135
> **customAllowList** does not generate notifications on endpoints.
@@ -224,11 +228,11 @@ The Response category tells you what caused the event, as in this example:
224
228
225
229
| ResponseCategory | Feature responsible for the event |
226
230
|:---|:---|
227
-
| CustomPolicy | WCF |
228
-
| CustomBlockList | Custom indicators |
229
-
| CasbPolicy | Defender for Cloud Apps |
230
-
| Malicious | Web threats |
231
-
| Phishing | Web threats |
231
+
|`CustomPolicy`| WCF |
232
+
|`CustomBlockList`| Custom indicators |
233
+
|`CasbPolicy`| Defender for Cloud Apps |
234
+
|`Malicious`| Web threats |
235
+
|`Phishing`| Web threats |
232
236
233
237
For more information, see [Troubleshoot endpoint blocks](web-protection-overview.md#troubleshoot-endpoint-blocks).
234
238
@@ -247,12 +251,12 @@ You can use the resulting list of URLs and IPs to determine what would be blocke
247
251
248
252
Once you've created an indicator, you can look at resolving the underlying issue as follows:
249
253
250
-
- SmartScreen – request review
251
-
- Indicator – modify existing indicator
252
-
- MCA – review unsanctioned app
253
-
- WCF – request recategorization
254
+
-**SmartScreen**: request review
255
+
-**Indicator**: modify existing indicator
256
+
-**MCA**: review unsanctioned app
257
+
-**WCF**: request recategorization
254
258
255
-
Using this data you can make an informed decision on enabling Network protection in Block mode. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
259
+
Using this data you can make an informed decision on enabling network protection in Block mode. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
256
260
257
261
> [!NOTE]
258
262
> As this is a per-device setting, if there are devices that cannot move to Block mode you can simply leave them on audit until you can rectify the challenge and you will still receive the auditing events.
@@ -339,8 +343,8 @@ For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified sol
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
346
+
> [!NOTE]
347
+
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
344
348
345
349
### Network protection for Windows Servers
346
350
@@ -350,7 +354,7 @@ Following is information specific to Windows Servers.
350
354
351
355
Verify whether network protection is enabled on a local device by using Registry Editor.
352
356
353
-
1. Select the **Start** button in the task bar and type **regedit** to open the Registry Editor.
357
+
1. Select the **Start** button in the task bar and type `regedit` to open Registry Editor.
354
358
355
359
2. Select **HKEY_LOCAL_MACHINE** from the side menu.
356
360
@@ -419,6 +423,7 @@ The most generic method to disable QUIC is to disable that feature in Windows Fi
0 commit comments