Skip to content

Commit 6fedaa6

Browse files
committed
2 parents f4c02d8 + 34916cd commit 6fedaa6

11 files changed

+62
-71
lines changed

defender-endpoint/configure-proxy-internet.md

Lines changed: 41 additions & 51 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- tier1
1414
ms.topic: conceptual
1515
ms.subservice: onboard
16-
ms.date: 10/25/2023
16+
ms.date: 07/01/2024
1717
---
1818

1919
# STEP 2: Configure your devices to connect to the Defender for Endpoint service using a proxy
@@ -31,24 +31,29 @@ ms.date: 10/25/2023
3131
> [!IMPORTANT]
3232
> Devices that are configured for IPv6-only traffic are not supported.
3333
34-
Depending on the operating system, the proxy to be used for Microsoft Defender for Endpoint can be configured automatically, typically by using autodiscovery or an autoconfig file, or statically specific to Defender for Endpoint services running on the device.
34+
> [!NOTE]
35+
> To use the proxy correctly, configure these two different proxy settings in Defender for Endpoint:
36+
> - [Endpoint Detection and Response (EDR)](/defender-endpoint/configure-proxy-internet)
37+
> - [Microsoft Defender Antivirus](/defender-endpoint/configure-proxy-internet)
38+
39+
Depending on the operating system, the proxy to be used for Microsoft Defender for Endpoint can be configured automatically. You can use autodiscovery, an autoconfig file, or a method statically specific to Defender for Endpoint services running on the device.
3540

36-
- For Windows devices, see [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md) (this article)
37-
- For Linux devices, see [Configure Microsoft Defender for Endpoint on Linux for static proxy discovery](linux-static-proxy-configuration.md)
38-
- For macOS devices, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md#network-connections)
41+
- For Windows devices, see [Configure device proxy and Internet connectivity settings](configure-proxy-internet.md) (in this article).
42+
- For Linux devices, see [Configure Microsoft Defender for Endpoint on Linux for static proxy discovery](linux-static-proxy-configuration.md).
43+
- For macOS devices, see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md#network-connections).
3944

40-
The Defender for Endpoint sensor requires Microsoft Windows HTTP (WinHTTP) to report sensor data and communicate with the Defender for Endpoint service. The embedded Defender for Endpoint sensor runs in system context using the LocalSystem account.
45+
The Defender for Endpoint sensor requires Microsoft Windows HTTP (`WinHTTP`) to report sensor data and communicate with the Defender for Endpoint service. The embedded Defender for Endpoint sensor runs in system context using the `LocalSystem` account.
4146

4247
> [!TIP]
43-
> For organizations that use forward proxies as a gateway to the Internet, you can use network protection to [investigate connection events that occur behind forward proxies](investigate-behind-proxy.md).
48+
> If you use forward proxies as a gateway to the Internet, you can use network protection to [investigate connection events that occur behind forward proxies](investigate-behind-proxy.md).
4449
45-
The WinHTTP configuration setting is independent of the Windows Internet (WinINet) browsing proxy settings (see, [WinINet vs. WinHTTP](/windows/win32/wininet/wininet-vs-winhttp)). It can only discover a proxy server by using the following discovery methods:
50+
The `WinHTTP` configuration setting is independent of the Windows Internet (`WinINet`) browsing proxy settings (see [WinINet vs. WinHTTP](/windows/win32/wininet/wininet-vs-winhttp)). It can only discover a proxy server by using the following discovery methods:
4651

4752
- Autodiscovery methods:
4853

4954
- Transparent proxy
5055

51-
- Web Proxy Auto-discovery Protocol (WPAD)
56+
- Web Proxy Autodiscovery Protocol (WPAD)
5257

5358
> [!NOTE]
5459
> If you're using Transparent proxy or WPAD in your network topology, you don't need special configuration settings.
@@ -60,7 +65,7 @@ The WinHTTP configuration setting is independent of the Windows Internet (WinINe
6065
- WinHTTP configured using netsh command: Suitable only for desktops in a stable topology (for example: a desktop in a corporate network behind the same proxy)
6166

6267
> [!NOTE]
63-
> Defender antivirus and EDR proxies can be set independently. In the sections that follow, be aware of those distinctions.
68+
> Microsoft Defender Antivirus and EDR proxies can be set independently. In the sections that follow, be aware of those distinctions.
6469
6570
## Configure the proxy server manually using a registry-based static proxy setting
6671

@@ -90,71 +95,59 @@ The static proxy settings are configurable through group policy (GP), both setti
9095
| Configure connected user experiences and telemetry | `HKLM\Software\Policies\Microsoft\Windows\DataCollection` | `TelemetryProxyServer` | ```servername:port or ip:port``` <br> <br> For example: ```10.0.0.6:8080``` (REG_SZ) |
9196

9297
> [!NOTE]
93-
> If you are using 'TelemetryProxyServer' setting on devices that are otherwise **completely offline**, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then it is required to add the additional registry setting `PreferStaticProxyForHttpRequest` with a value of `1`.
98+
> If you are using `TelemetryProxyServer` setting on devices that are otherwise completely offline, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then you must add the additional registry setting `PreferStaticProxyForHttpRequest` with a value of `1`.
9499
>
95-
> Parent registry path location for "PreferStaticProxyForHttpRequest" is "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection"
100+
> Parent registry path location for `PreferStaticProxyForHttpRequest` is `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
96101
>
97102
> The following command can be used to insert the registry value in the correct location:
98103
>
99104
> ```console
100105
> reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection" /v PreferStaticProxyForHttpRequest /t REG_DWORD /d 1 /f
101106
> ```
102107
>
103-
> The above registry value is applicable only starting with MsSense.exe version 10.8210.* and later, or version 10.8049.* and later.
104-
105-
108+
> The registry value mentioned earlier is applicable only starting with MsSense.exe version `10.8210.*` and later, or version `10.8049.*` and later.
106109
107110
## Configure a static proxy for Microsoft Defender Antivirus
108111
109-
Microsoft Defender Antivirus [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) provides near-instant, automated protection against new and emerging threats. Note, the connectivity is required for [custom indicators](manage-indicators.md) when Defender Antivirus is your active anti-malware solution as well as [EDR in block mode](edr-in-block-mode.md) which provides a fallback option when a non-Microsoft solution did not perform a block.
112+
Microsoft Defender Antivirus [cloud-delivered protection](cloud-protection-microsoft-defender-antivirus.md) provides near-instant, automated protection against new and emerging threats. Connectivity is required for [custom indicators](manage-indicators.md) when Microsoft Defender Antivirus is your active anti-malware solution and [EDR in block mode](edr-in-block-mode.md), which provides a fallback option when a non-Microsoft solution didn't perform a block.
110113
111114
Configure the static proxy using the Group Policy available in Administrative Templates:
112115
113116
1. **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy server for connecting to the network**.
114117
115-
2. Set it to **Enabled** and define the proxy server. Note, the URL must have either http:// or https://. For supported versions for https://, see [Manage Microsoft Defender Antivirus updates](microsoft-defender-antivirus-updates.md).
118+
2. Set it to **Enabled** and define the proxy server. The URL must have either `http://` or `https://`. For supported versions for `https://`, see [Manage Microsoft Defender Antivirus updates](microsoft-defender-antivirus-updates.md).
116119
117120
:::image type="content" source="media/proxy-server-mdav.png" alt-text="The proxy server for Microsoft Defender Antivirus" lightbox="media/proxy-server-mdav.png":::
118121
119-
3. Under the registry key `HKLM\Software\Policies\Microsoft\Windows Defender`, the policy sets the registry value `ProxyServer` as REG_SZ.
122+
3. Under the registry key `HKLM\Software\Policies\Microsoft\Windows Defender`, the policy sets the registry value `ProxyServer` as `REG_SZ`.
120123
121124
The registry value `ProxyServer` takes the following string format:
122125
123126
`<server name or ip>:<port>`
124127
125-
For example: http://10.0.0.6:8080
128+
For example, `http://10.0.0.6:8080`
126129
127-
>[!NOTE]
128-
>If you are using static proxy setting on devices that are otherwise completely offline, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then it is required to add the additional registry setting SSLOptions with a dword value of 0. Parent registry path location for "SSLOptions" is "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" <br>
129-
>For resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus will cache the last known working proxy. Ensure your proxy solution does not perform SSL inspection. This will break the secure cloud connection.
130-
>
131-
>Microsoft Defender Antivirus will not use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it will use a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md).
132-
>
133-
>If required, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses** to bypass proxy server and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
130+
> [!NOTE]
131+
> If you are using static proxy setting on devices that are otherwise completely offline, meaning the operating system is unable to connect for the online certificate revocation list or Windows Update, then it is required to add the additional registry setting `SSLOptions` with a DWORD value of `2`. The parent registry path location for `SSLOptions` is `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet`. For more information about the `SSLOptions`, see [Cloud Protection](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
134132
>
135-
>You can use PowerShell with the `Set-MpPreference` cmdlet to configure these options:
133+
> For resiliency purposes and the real-time nature of cloud-delivered protection, Microsoft Defender Antivirus caches the last known working proxy. Ensure your proxy solution does not perform SSL inspection, as that breaks the secure cloud connection.
136134
>
137-
>- ProxyBypass
138-
>- ProxyPacUrl
139-
>- ProxyServer
135+
> Microsoft Defender Antivirus doesn't use the static proxy to connect to Windows Update or Microsoft Update for downloading updates. Instead, it uses a system-wide proxy if configured to use Windows Update, or the configured internal update source according to the [configured fallback order](manage-protection-updates-microsoft-defender-antivirus.md). If necessary, you can use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define proxy auto-config (.pac)** for connecting to the network. If you need to set up advanced configurations with multiple proxies, use **Administrative Templates > Windows Components > Microsoft Defender Antivirus > Define addresses** to bypass proxy server and prevent Microsoft Defender Antivirus from using a proxy server for those destinations.
136+
>
137+
> You can use PowerShell with the `Set-MpPreference` cmdlet to configure these options:
138+
> - `ProxyBypass`
139+
> - `ProxyPacUrl`
140+
> - `ProxyServer`
140141
141-
>[!NOTE]
142-
>To use the proxy correctly, configure these three different proxy settings:
143-
> - Microsoft Defender for Endpoint (MDE)
144-
> - AV (Antivirus)
145-
> - Endpoint Detection and Response (EDR)
142+
## Configure the proxy server manually using `netsh` command
146143
147-
148-
## Configure the proxy server manually using netsh command
149-
150-
Use netsh to configure a system-wide static proxy.
144+
Use `netsh` to configure a system-wide static proxy.
151145
152146
> [!NOTE]
153-
>
154-
> - This will affect all applications including Windows services which use WinHTTP with default proxy.</br>
147+
> This configuration affects all applications, including Windows services which use `WinHTTP` with default proxy.
155148
156149
1. Open an elevated command line:
157-
1. Go to **Start** and type **cmd**.
150+
1. Go to **Start** and type `cmd`.
158151
1. Right-click **Command prompt** and select **Run as administrator**.
159152
160153
2. Enter the following command and press **Enter**:
@@ -165,21 +158,19 @@ Use netsh to configure a system-wide static proxy.
165158
166159
For example: `netsh winhttp set proxy 10.0.0.6:8080`
167160

168-
To reset the winhttp proxy, enter the following command and press **Enter**:
161+
3. To reset the `winhttp` proxy, enter the following command and press **Enter**:
169162

170-
```cmd
171-
netsh winhttp reset proxy
172-
```
163+
```cmd
164+
netsh winhttp reset proxy
165+
```
173166

174167
See [Netsh Command Syntax, Contexts, and Formatting](/windows-server/networking/technologies/netsh/netsh-contexts) to learn more.
175168

176169
### Windows devices running the previous MMA-based solution
177-
Devices running on Windows 7, Windows 8.1, Windows Server 2008 R2, and servers not upgraded to Unified Agent leverage the Microsoft Monitoring Agent / also known as Log Analytics Agent to connect to the Defender for Endpoint service.
178170

179-
You can either leverage a system-wide proxy setting, configure the agent to connect through a proxy or a log analytics gateway.
171+
For devices running Windows 7, Windows 8.1, Windows Server 2008 R2, and servers that aren't upgraded to Unified Agent and use the Microsoft Monitoring Agent (also known as Log Analytics Agent) to connect to the Defender for Endpoint service, you can either use a system-wide proxy setting, or configure the agent to connect through a proxy or a log analytics gateway.
180172

181173
- Configure the agent to use a proxy: [Proxy configuration](/azure/azure-monitor/agents/log-analytics-agent#proxy-configuration)
182-
183174
- Set up Azure Log Analytics (formerly known as OMS Gateway) to act as proxy or hub: [Azure Log Analytics Agent](/azure/azure-monitor/platform/gateway#download-the-log-analytics-gateway)
184175

185176
[Onboard previous versions of Windows](onboard-downlevel.md)
@@ -188,10 +179,9 @@ You can either leverage a system-wide proxy setting, configure the agent to conn
188179

189180
[STEP 3: Verify client connectivity to Microsoft Defender for Endpoint service URLs](verify-connectivity.md)
190181

191-
192182
## Related articles
193183

194-
- [Disconnected environments, proxies and Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/disconnected-environments-proxies-and-microsoft-defender-for/ba-p/3710502)
184+
- [Disconnected environments, proxies, and Microsoft Defender for Endpoint](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/disconnected-environments-proxies-and-microsoft-defender-for/ba-p/3710502)
195185
- [Use Group Policy settings to configure and manage Microsoft Defender Antivirus](use-group-policy-microsoft-defender-antivirus.md)
196186
- [Onboard Windows devices](onboard-windows-client.md)
197187
- [Troubleshoot Microsoft Defender for Endpoint onboarding issues](troubleshoot-onboarding.md)

defender-for-iot/device-discovery.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ The key device discovery capabilities are:
4646
|OT device management |[Manage OT devices](manage-devices-inventory.md):<br>- Build an up-to-date inventory that includes all your managed and unmanaged devices.<br>- Classify critical devices to ensure that the most important assets in your organization are protected.​<br>- Add organization-specific information to emphasize your organization preferences. |
4747
|Device protection with risk-based approach |Identify risks such as missing patches, vulnerabilities and prioritize fixes based on risk scoring and automated threat modeling. |
4848
|Device alignment with physical sites |Allows contextual security monitoring. Use the **Site** filter to manage each site separately. Learn more about [filters](/defender-endpoint/machines-view-overview#use-filters-to-customize-the-device-inventory-views). |
49-
|Device groups |Allows different teams in your organization to monitor and manage relevant assets only.​ Learn more about [creating a device group](/defender-endpoint/machine-groups.md#create-a-device-group). |
49+
|Device groups |Allows different teams in your organization to monitor and manage relevant assets only.​ Learn more about [creating a device group](/defender-endpoint/machine-groups#create-a-device-group). |
5050
|Device criticality |Reflects how critical a device is for your organization and allows you to identify a device as a business critical asset. Learn more about [device criticality](/defender-endpoint/machines-view-overview#device-inventory-overview). |
5151

5252
## Supported devices

0 commit comments

Comments
 (0)