You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-proxy-internet.md
+41-51Lines changed: 41 additions & 51 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ ms.collection:
13
13
- tier1
14
14
ms.topic: conceptual
15
15
ms.subservice: onboard
16
-
ms.date: 10/25/2023
16
+
ms.date: 07/01/2024
17
17
---
18
18
19
19
# STEP 2: Configure your devices to connect to the Defender for Endpoint service using a proxy
@@ -31,24 +31,29 @@ ms.date: 10/25/2023
31
31
> [!IMPORTANT]
32
32
> Devices that are configured for IPv6-only traffic are not supported.
33
33
34
-
Depending on the operating system, the proxy to be used for Microsoft Defender for Endpoint can be configured automatically, typically by using autodiscovery or an autoconfig file, or statically specific to Defender for Endpoint services running on the device.
34
+
> [!NOTE]
35
+
> To use the proxy correctly, configure these two different proxy settings in Defender for Endpoint:
36
+
> -[Endpoint Detection and Response (EDR)](/defender-endpoint/configure-proxy-internet)
Depending on the operating system, the proxy to be used for Microsoft Defender for Endpoint can be configured automatically. You can use autodiscovery, an autoconfig file, or a method statically specific to Defender for Endpoint services running on the device.
35
40
36
-
- For Windows devices, see [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md) (this article)
37
-
- For Linux devices, see [Configure Microsoft Defender for Endpoint on Linux for static proxy discovery](linux-static-proxy-configuration.md)
38
-
- For macOS devices, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md#network-connections)
41
+
- For Windows devices, see [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md) (in this article).
42
+
- For Linux devices, see [Configure Microsoft Defender for Endpoint on Linux for static proxy discovery](linux-static-proxy-configuration.md).
43
+
- For macOS devices, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md#network-connections).
39
44
40
-
The Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Defender for Endpoint service. The embedded Defender for Endpoint sensor runs in system context using the LocalSystem account.
45
+
The Defender for Endpoint sensor requires Microsoft Windows HTTP (`WinHTTP`) to report sensor data and communicate with the Defender for Endpoint service. The embedded Defender for Endpoint sensor runs in system context using the `LocalSystem` account.
41
46
42
47
> [!TIP]
43
-
> For organizations that use forward proxies as a gateway to the Internet, you can use network protection to [investigate connection events that occur behind forward proxies](investigate-behind-proxy.md).
48
+
> If you use forward proxies as a gateway to the Internet, you can use network protection to [investigate connection events that occur behind forward proxies](investigate-behind-proxy.md).
44
49
45
-
The WinHTTP configuration setting is independent of the Windows Internet (WinINet) browsing proxy settings (see,[WinINet vs. WinHTTP](/windows/win32/wininet/wininet-vs-winhttp)). It can only discover a proxy server by using the following discovery methods:
50
+
The `WinHTTP` configuration setting is independent of the Windows Internet (`WinINet`) browsing proxy settings (see [WinINet vs. WinHTTP](/windows/win32/wininet/wininet-vs-winhttp)). It can only discover a proxy server by using the following discovery methods:
46
51
47
52
- Autodiscovery methods:
48
53
49
54
- Transparent proxy
50
55
51
-
- Web Proxy Auto-discovery Protocol (WPAD)
56
+
- Web Proxy Autodiscovery Protocol (WPAD)
52
57
53
58
> [!NOTE]
54
59
> If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings.
@@ -60,7 +65,7 @@ The WinHTTP configuration setting is independent of the Windows Internet (WinINe
60
65
- WinHTTP configured using netsh command: Suitable only for desktops in a stable topology (for example: a desktop in a corporate network behind the same proxy)
61
66
62
67
> [!NOTE]
63
-
> Defender antivirus and EDR proxies can be set independently. In the sections that follow, be aware of those distinctions.
68
+
> Microsoft Defender Antivirus and EDR proxies can be set independently. In the sections that follow, be aware of those distinctions.
64
69
65
70
## Configure the proxy server manually using a registry-based static proxy setting
66
71
@@ -90,71 +95,59 @@ The static proxy settings are configurable through group policy (GP), both setti
90
95
| Configure connected user experiences and telemetry |`HKLM\Software\Policies\Microsoft\Windows\DataCollection`|`TelemetryProxyServer`|```servername:port or ip:port``` <br> <br> For example: ```10.0.0.6:8080``` (REG_SZ) |
91
96
92
97
> [!NOTE]
93
-
> If you are using 'TelemetryProxyServer' setting on devices that are otherwise **completely offline**, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then it is required to add the additional registry setting `PreferStaticProxyForHttpRequest` with a value of `1`.
98
+
> If you are using `TelemetryProxyServer` setting on devices that are otherwise completely offline, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then you must add the additional registry setting `PreferStaticProxyForHttpRequest` with a value of `1`.
94
99
>
95
-
> Parent registry path location for "PreferStaticProxyForHttpRequest" is "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection"
100
+
> Parent registry path location for `PreferStaticProxyForHttpRequest` is `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
96
101
>
97
102
> The following command can be used to insert the registry value in the correct location:
> The above registry value is applicable only starting with MsSense.exe version 10.8210.* and later, or version 10.8049.* and later.
104
-
105
-
108
+
> The registry value mentioned earlier is applicable only starting with MsSense.exe version `10.8210.*` and later, or version `10.8049.*` and later.
106
109
107
110
## Configure a static proxy for Microsoft Defender Antivirus
108
111
109
-
Microsoft Defender Antivirus [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) provides near-instant, automated protection against new and emerging threats. Note, the connectivity is required for [custom indicators](manage-indicators.md) when Defender Antivirus is your active anti-malware solution as well as [EDR in block mode](edr-in-block-mode.md) which provides a fallback option when a non-Microsoft solution did not perform a block.
112
+
Microsoft Defender Antivirus [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) provides near-instant, automated protection against new and emerging threats. Connectivity is required for [custom indicators](manage-indicators.md) when Microsoft Defender Antivirus is your active anti-malware solution and [EDR in block mode](edr-in-block-mode.md), which provides a fallback option when a non-Microsoft solution didn't perform a block.
110
113
111
114
Configure the static proxy using the Group Policy available in Administrative Templates:
112
115
113
116
1. **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy server for connecting to the network**.
114
117
115
-
2. Set it to **Enabled** and define the proxy server. Note, the URL must have either http:// or https://. For supported versions for https://, see [Manage Microsoft Defender Antivirus updates](microsoft-defender-antivirus-updates.md).
118
+
2. Set it to **Enabled** and define the proxy server. The URL must have either `http://` or `https://`. For supported versions for `https://`, see [Manage Microsoft Defender Antivirus updates](microsoft-defender-antivirus-updates.md).
116
119
117
120
:::image type="content" source="media/proxy-server-mdav.png" alt-text="The proxy server for Microsoft Defender Antivirus" lightbox="media/proxy-server-mdav.png":::
118
121
119
-
3. Under the registry key `HKLM\Software\Policies\Microsoft\Windows Defender`, the policy sets the registry value `ProxyServer` as REG_SZ.
122
+
3. Under the registry key `HKLM\Software\Policies\Microsoft\Windows Defender`, the policy sets the registry value `ProxyServer` as `REG_SZ`.
120
123
121
124
The registry value `ProxyServer` takes the following string format:
122
125
123
126
`<server name or ip>:<port>`
124
127
125
-
For example: http://10.0.0.6:8080
128
+
For example, `http://10.0.0.6:8080`
126
129
127
-
>[!NOTE]
128
-
>If you are using static proxy setting on devices that are otherwise completely offline, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then it is required to add the additional registry setting SSLOptions with a dword value of 0. Parent registry path location for "SSLOptions" is "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" <br>
129
-
>For resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus will cache the last known working proxy. Ensure your proxy solution does not perform SSL inspection. This will break the secure cloud connection.
130
-
>
131
-
>Microsoft Defender Antivirus will not use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it will use a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md).
132
-
>
133
-
>If required, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses** to bypass proxy server and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
130
+
> [!NOTE]
131
+
> If you are using static proxy setting on devices that are otherwise completely offline, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then it is required to add the additional registry setting `SSLOptions` with a DWORD value of `2`. The parent registry path location for`SSLOptions` is `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet`. For more information about the `SSLOptions`, see [Cloud Protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
134
132
>
135
-
>You can use PowerShell with the `Set-MpPreference` cmdlet to configure these options:
133
+
>For resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus caches the last known working proxy. Ensure your proxy solution does not perform SSL inspection, as that breaks the secure cloud connection.
136
134
>
137
-
>- ProxyBypass
138
-
>- ProxyPacUrl
139
-
>- ProxyServer
135
+
> Microsoft Defender Antivirus doesn't use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it uses a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md). If necessary, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses** to bypass proxy server and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
136
+
>
137
+
> You can use PowerShell with the `Set-MpPreference` cmdlet to configure these options:
138
+
> - `ProxyBypass`
139
+
> - `ProxyPacUrl`
140
+
> - `ProxyServer`
140
141
141
-
>[!NOTE]
142
-
>To use the proxy correctly, configure these three different proxy settings:
143
-
> - Microsoft Defender for Endpoint (MDE)
144
-
> - AV (Antivirus)
145
-
> - Endpoint Detection and Response (EDR)
142
+
## Configure the proxy server manually using `netsh` command
146
143
147
-
148
-
## Configure the proxy server manually using netsh command
149
-
150
-
Use netsh to configure a system-wide static proxy.
144
+
Use `netsh` to configure a system-wide static proxy.
151
145
152
146
> [!NOTE]
153
-
>
154
-
> - This will affect all applications including Windows services which use WinHTTP with default proxy.</br>
147
+
> This configuration affects all applications, including Windows services which use `WinHTTP` with default proxy.
155
148
156
149
1. Open an elevated command line:
157
-
1. Go to **Start** and type **cmd**.
150
+
1. Go to **Start** and type `cmd`.
158
151
1. Right-click **Command prompt** and select **Run as administrator**.
159
152
160
153
2. Enter the following command and press **Enter**:
@@ -165,21 +158,19 @@ Use netsh to configure a system-wide static proxy.
165
158
166
159
For example: `netsh winhttp set proxy 10.0.0.6:8080`
167
160
168
-
To reset the winhttp proxy, enter the following command and press **Enter**:
161
+
3.To reset the `winhttp` proxy, enter the following command and press **Enter**:
169
162
170
-
```cmd
171
-
netsh winhttp reset proxy
172
-
```
163
+
```cmd
164
+
netsh winhttp reset proxy
165
+
```
173
166
174
167
See [Netsh Command Syntax, Contexts, and Formatting](/windows-server/networking/technologies/netsh/netsh-contexts) to learn more.
175
168
176
169
### Windows devices running the previous MMA-based solution
177
-
Devices running on Windows 7, Windows 8.1, Windows Server 2008 R2, and servers not upgraded to Unified Agent leverage the Microsoft Monitoring Agent / also known as Log Analytics Agent to connect to the Defender for Endpoint service.
178
170
179
-
You can either leverage a system-wide proxy setting, configure the agent to connect through a proxy or a log analytics gateway.
171
+
For devices running Windows 7, Windows 8.1, Windows Server 2008 R2, and servers that aren't upgraded to Unified Agent and use the Microsoft Monitoring Agent (also known as Log Analytics Agent) to connect to the Defender for Endpoint service, you can either use a system-wide proxy setting, or configure the agent to connect through a proxy or a log analytics gateway.
180
172
181
173
- Configure the agent to use a proxy: [Proxy configuration](/azure/azure-monitor/agents/log-analytics-agent#proxy-configuration)
182
-
183
174
- Set up Azure Log Analytics (formerly known as OMS Gateway) to act as proxy or hub: [Azure Log Analytics Agent](/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway)
184
175
185
176
[Onboard previous versions of Windows](onboard-downlevel.md)
@@ -188,10 +179,9 @@ You can either leverage a system-wide proxy setting, configure the agent to conn
188
179
189
180
[STEP 3: Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md)
190
181
191
-
192
182
## Related articles
193
183
194
-
-[Disconnected environments, proxies and Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/disconnected-environments-proxies-and-microsoft-defender-for/ba-p/3710502)
184
+
-[Disconnected environments, proxies, and Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/disconnected-environments-proxies-and-microsoft-defender-for/ba-p/3710502)
195
185
-[Use Group Policy settings to configure and manage Microsoft Defender Antivirus](use-group-policy-microsoft-defender-antivirus.md)
196
186
-[Onboard Windows devices](onboard-windows-client.md)
197
187
-[Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)
Copy file name to clipboardExpand all lines: defender-for-iot/device-discovery.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -46,7 +46,7 @@ The key device discovery capabilities are:
46
46
|OT device management |[Manage OT devices](manage-devices-inventory.md):<br>- Build an up-to-date inventory that includes all your managed and unmanaged devices.<br>- Classify critical devices to ensure that the most important assets in your organization are protected.<br>- Add organization-specific information to emphasize your organization preferences. |
47
47
|Device protection with risk-based approach |Identify risks such as missing patches, vulnerabilities and prioritize fixes based on risk scoring and automated threat modeling. |
48
48
|Device alignment with physical sites |Allows contextual security monitoring. Use the **Site** filter to manage each site separately. Learn more about [filters](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views). |
49
-
|Device groups |Allows different teams in your organization to monitor and manage relevant assets only. Learn more about [creating a device group](/defender-endpoint/machine-groups.md#create-a-device-group). |
49
+
|Device groups |Allows different teams in your organization to monitor and manage relevant assets only. Learn more about [creating a device group](/defender-endpoint/machine-groups#create-a-device-group).|
50
50
|Device criticality |Reflects how critical a device is for your organization and allows you to identify a device as a business critical asset. Learn more about [device criticality](/defender-endpoint/machines-view-overview#device-inventory-overview). |
0 commit comments