Skip to content

Commit 69ff990

Browse files
authored
Merge pull request #262 from ericlaw1979/patch-7
Update network-protection.md
2 parents 571655f + 26254fb commit 69ff990

File tree

1 file changed

+22
-23
lines changed

1 file changed

+22
-23
lines changed

defender-endpoint/network-protection.md

Lines changed: 22 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 04/08/2025
6+
ms.date: 04/25/2025
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -40,6 +40,10 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial](h
4040
Network protection helps protect devices by preventing connections to malicious or suspicious sites. Examples of dangerous domains are domains that host phishing scams, malicious downloads, tech scams, or other malicious content. Network protection expands the scope of [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP(S) traffic that attempts to connect to poor-reputation sources (based on the domain or hostname).
4141

4242
Network protection extends the protection in [Web protection](web-protection-overview.md) to the operating system level, and is a core component for [Web Content Filtering](web-content-filtering.md) (WCF). It provides the web protection functionality found in Microsoft Edge to other supported browsers and nonbrowser applications. Network protection also provides visibility and blocking of indicators of compromise (IOCs) when used with [Endpoint detection and response](overview-endpoint-detection-response.md). For example, network protection works with your [custom indicators](indicators-overview.md) to block specific domains or host names.
43+
44+
Watch this video to learn how network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
45+
46+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=2d0270f9-f216-4e9e-85c7-5e2b183c6d73]
4347
4448
### Network protection coverage
4549

@@ -51,9 +55,11 @@ The following table summarizes network protection areas of coverage.
5155
| [Custom Indicators](indicators-overview.md) | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
5256
| [Web Content Filtering](web-content-filtering.md) | SmartScreen must be enabled | Network protection must be in block mode | Not supported |
5357

58+
To ensure that SmartScreen is enabled for Microsoft Edge, use [Edge Policy: SmartScreen Enabled](/deployedge/microsoft-edge-policies#smartscreenenabled).
59+
5460
> [!NOTE]
55-
> On Mac and Linux, you must have network protection in block mode for these features to be supported in the Microsoft Edge browser.
5661
> On Windows, network protection doesn't monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
62+
> On Mac and Linux, the Microsoft Edge browser only integrates Web Threat Protection. Network protection must be enabled in block mode to support Custom Indicators and Web Content Filtering in Edge and other browsers.
5763
5864
### Known issues & limitations
5965
- IP addresses are supported for all three protocols (TCP, HTTP, and HTTPS (TLS))
@@ -64,11 +70,7 @@ The following table summarizes network protection areas of coverage.
6470
- FQDNs loaded via HTTP2 connection coalescing can only be blocked in Microsoft Edge
6571
- Network Protection will block connections on all ports (not just 80 and 443).
6672

67-
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
68-
69-
Watch this video to learn how network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
70-
71-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=2d0270f9-f216-4e9e-85c7-5e2b183c6d73]
73+
There might be up to two hours of latency (usually less) between when an indicator/policy is added and a matching URL/IP is blocked.
7274

7375
## Requirements for network protection
7476

@@ -112,7 +114,7 @@ The network protection component of Defender for Endpoint identifies and blocks
112114

113115
#### Network protection: C2 detection and remediation
114116

115-
In its initial form, ransomware is a commodity threat that's preprogrammed and focused on limited, specific outcomes (like encrypting a computer). However, ransomware has evolved into a sophisticated threat that is human-driven, adaptive, and focused on larger scale and more widespread outcomes, like holding an entire organization's assets or data for ransom.
117+
Ransomware has evolved into a sophisticated threat that is human-driven, adaptive, and focused on large scale outcomes, like holding an entire organization's assets or data for ransom.
116118

117119
Support for Command and Control servers (C2) is an important part of this ransomware evolution, and it's what enables these attacks to adapt to the environment they target. Breaking the link to the command-and-control infrastructure stops the progression of an attack to its next stage. For more information about C2 detection and remediation, see [Tech Community blog: Detecting and remediating command and control attacks at the network layer](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/detecting-and-remediating-command-and-control-attacks-at-the/ba-p/3650607).
118120

@@ -155,8 +157,10 @@ A user visits a website. If the url has an unknown or uncertain reputation, a to
155157
> The images shown in this article for both the `warn` experience and `block` experience use "blocked url" as example placeholder text. In a functioning environment, the actual url or domain is listed.
156158
157159
#### Use CSP to enable `Convert warn verdict to block`
160+
By default, SmartScreen verdicts for malicious sites result in a warning that can be overridden by the user. A policy can be set to convert the warning to blocks, preventing such overrides.
158161

159-
[Defender CSP: Configuration/EnableConvertWarnToBlock](/windows/client-management/mdm/defender-csp#configurationenableconvertwarntoblock)
162+
For non-Edge browsers, see [Defender CSP: Configuration/EnableConvertWarnToBlock](/windows/client-management/mdm/defender-csp#configurationenableconvertwarntoblock).
163+
For Edge browsers, see [Edge Policy: Prevent SmartScreen Prompt Override](/en-us/deployedge/microsoft-edge-policies#preventsmartscreenpromptoverride).
160164

161165
#### Use Group Policy to enable Convert warn verdict to block
162166

@@ -202,7 +206,7 @@ Network protection is enabled per device, which is typically done using your man
202206
> [!NOTE]
203207
> Microsoft Defender Antivirus must be in active mode to enable network protection.
204208
205-
You can enable network protection in `audit` mode or `block` mode. If you want to evaluate the impact of enabling network protection before actually blocking IP addresses or URLs, you can enable network protection in audit mode, and gather data on what would be blocked. Audit mode logs whenever end users connect to an address or site that would otherwise be blocked by network protection. In order for indicators of compromise (IoC) or Web content filtering (WCF) to work, network protection must be in `block` mode.
209+
You can enable network protection in `audit` mode or `block` mode. If you want to evaluate the impact of enabling network protection before actually blocking IP addresses or URLs, you can enable network protection in [audit mode](overview-attack-surface-reduction.md). Audit mode logs whenever end users connect to an address or site that would otherwise be blocked by network protection. To enforce blocking of custom indicators or Web content filtering categories, network protection must be in `block` mode.
206210

207211
For information about network protection for Linux and macOS see the following articles:
208212

@@ -229,7 +233,7 @@ DeviceEvents
229233
:::image type="content" source="media/network-protection-advanced-hunting.png" alt-text="Advanced hunting for auditing and identifying events." lightbox="media/network-protection-advanced-hunting.png":::
230234

231235
> [!TIP]
232-
> These entries have data in the **AdditionalFields** column which gives you great info around the action, if you expand **AdditionalFields** you can also get the fields: **IsAudit**, **ResponseCategory**, and **DisplayName**.
236+
> These entries have data in the **AdditionalFields** column which supplies more info around the action, including the fields: **IsAudit**, **ResponseCategory**, and **DisplayName**.
233237
234238
Here's another example:
235239

@@ -266,21 +270,19 @@ DeviceEvents
266270
267271
```
268272

269-
You can use the resulting list of URLs and IPs to determine what would be blocked if network protection is set to block mode on the device. You can also see which features would block URLs and IPs. Review the list to identify any URLS or IPs that are necessary for your environment. You can then create an allow indicator for those URLs or IP addresses. Allow indicators take precedence over any blocks.
273+
You can use the resulting list of URLs and IPs to determine what would be blocked if network protection is set to block mode on the device. You can also see which features would block URLs and IPs. Review the list to identify any URLS or IPs that are necessary for your environment. You can then create an allow indicator for those URLs or IP addresses. Allow indicators take precedence over any blocks. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
270274

271-
Once you've created an indicator, you can look at resolving the underlying issue as follows:
275+
After creating an indicator to unblock a site, you may attempt to resolve the original block as follows:
272276

273-
- **SmartScreen**: request review
277+
- **SmartScreen**: report false positive, if appropriate
274278
- **Indicator**: modify existing indicator
275279
- **MCA**: review unsanctioned app
276280
- **WCF**: request recategorization
277281

278-
Using this data you can make an informed decision on enabling network protection in Block mode. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
279-
280282
> [!NOTE]
281-
> As this is a per-device setting, if there are devices that cannot move to Block mode you can simply leave them on audit until you can rectify the challenge and you will still receive the auditing events.
283+
> As this is a per-device setting, if there are devices that cannot move to Block mode you can simply leave them on audit to receive the auditing events.
282284
283-
For information about how to report false positives see [Report false positives](web-protection-overview.md#report-false-positives).
285+
For information about how to report false positives in SmartScreen data, see [Report false positives](web-protection-overview.md#report-false-positives).
284286

285287
For details on how to create your own Power BI reports, see [Create custom reports using Power BI](api/api-power-bi.md).
286288

@@ -301,9 +303,7 @@ In non-Microsoft Edge processes, Network Protection determines the fully qualifi
301303

302304
Network protection works best with [Microsoft Defender for Endpoint](microsoft-defender-endpoint.md), which gives you detailed reporting into exploit protection events and blocks as part of [alert investigation scenarios](investigate-alerts.md).
303305

304-
When network protection blocks a connection, a notification is displayed from the Action Center. Your security operations team can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) with your organization's details and contact information.
305-
306-
You can also use [audit mode](overview-attack-surface-reduction.md) to evaluate how network protection would impact your organization if it were enabled.
306+
When network protection blocks a connection, a notification is displayed on the client. Your security operations team can [customize the notification](attack-surface-reduction-rules-deployment-implement.md#customize-attack-surface-reduction-rules) with your organization's details and contact information.
307307

308308
<a name='review-network-protection-events-in-the-microsoft-365-defender-portal'></a>
309309

@@ -315,7 +315,7 @@ Defender for Endpoint provides detailed reporting into events and blocks as part
315315

316316
You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
317317

318-
1. [Copy the XML directly](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
318+
1. [Create an XML query](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
319319

320320
2. Select **OK**.
321321

@@ -344,7 +344,6 @@ Here's an example of how that works:
344344
Due to the multi-user nature of Windows 10 Enterprise, keep the following points in mind:
345345

346346
- Network protection is a device-wide feature and can't be targeted to specific user sessions.
347-
- Web content filtering policies are also device-wide.
348347
- If you need to differentiate between user groups, consider creating separate Windows Virtual Desktop host pools and assignments.
349348
- Test network protection in audit mode to assess its behavior before rolling out.
350349
- Consider resizing your deployment if you have a large number of users or a large number of multi-user sessions.

0 commit comments

Comments
 (0)