Skip to content

Commit 715852d

Browse files
committed
Learn Editor: Update enable-network-protection.md
1 parent 981b856 commit 715852d

File tree

1 file changed

+65
-6
lines changed

1 file changed

+65
-6
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 65 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -44,12 +44,70 @@ search.appverid: met150
4444

4545
To enable network protection, you can use one of the following methods:
4646

47+
- [Microsoft Defender for Endpoint Security Settings Management](#Microsoft-Defender-for-Endpoint-Security-Settings-Management)
4748
- [Microsoft Intune](#microsoft-intune)
4849
- [Mobile Device Management (MDM)](#mobile-device-management-mdm)
4950
- [Group Policy](#group-policy)
5051
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
5152
- [PowerShell](#powershell)
5253

54+
### Microsoft Defender for Endpoint Security Settings Management
55+
56+
#### Create an endpoint security policy
57+
58+
-
59+
Sign in to the [Microsoft Defender portal](https://security.microsoft.com/) using at least a Security Administrator role assigned.
60+
61+
Select Endpoints > Configuration management > Endpoint security policies and then select Create new Policy.
62+
63+
- Under Select Platform, select "Windows 10, Windows 11, and Windows Server".
64+
65+
- Under Select Template, select Microsoft Defender Antivirus, then select Create policy.
66+
67+
On the Basics page, enter a name and description for the profile, then choose Next.
68+
69+
- On the Settings page, expand each group of settings, and configure the settings you want to manage with this profile.
70+
71+
####
72+
Network Protection on Windows clients:
73+
74+
| Description| Setting|
75+
| -------- | -------- |
76+
| Enable Network Protection| Options: Enabled (block mode) Enabled (audit mode) Disabled (Default) Not Configured|
77+
|<Delete me> | <Delete me> |
78+
79+
#### Network Protection on Windows Server 2012 R2 and Windows Server 2016:
80+
81+
| Description|Setting|
82+
| -------- | -------- |
83+
|Allow Network Protection Down Level|Options: Network protection will be enabled downlevel. Network Protection will be disabled downlevel. (Default) Not Configured|
84+
|<Delete me> |<Delete me> |
85+
86+
#### Optional Network Protection settings for Windows and Windows Server:
87+
88+
> [!WARNING]
89+
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the "Allow Datagram Processing On WinServer" to . These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
90+
91+
|Description| Setting|
92+
| -------- | -------- |
93+
|Allow Datagram Processing On Win Server|Datagram processing on Windows Server is enabled. Datagram processing on Windows Server is disabled. Not configured|
94+
|Disable DNS over TCP parsing|DNS over TCP parsing is enabled (Default). DNS over TCP parsing is enabled. Not configured|
95+
|Disable HTTP parsing|HTTP parsing is enabled (Default). HTTP parsing is disabled. Not configured|
96+
|Disable SSH parsing|SSH parsing is enabled.|
97+
|Disable TLS parsing |TLS parsing is enabled.|
98+
|Enable DNS Sinkhole|DNS Sinkhole is enabled.|
99+
100+
- When you're done configuring settings, select Next.
101+
102+
- On the Assignments page, select the groups that will receive this profile.
103+
104+
- Select Next.
105+
106+
- On the Review + create page, when you're done, select Save.
107+
108+
- The new profile is displayed in the list when you select the policy type for the profile you created.
109+
110+
53111
### Microsoft Intune
54112

55113
#### Microsoft Defender for Endpoint Baseline method
@@ -168,15 +226,16 @@ Use the following procedure to enable network protection on domain-joined comput
168226
Set-MpPreference -EnableNetworkProtection Enabled
169227
```
170228

171-
3. For Windows Server, use the additional commands listed in the following table:
229+
1. For Windows Server, use the additional commands listed in the following table:
172230

173-
| Windows Server version | Commands |
174-
|---|---|
175-
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
176-
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
231+
| Windows Server version | Commands |
232+
|---|---|
233+
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
234+
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
177235

178236
> [!IMPORTANT]
179-
> For Domain Controllers and Microsoft Exchange servers, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
237+
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
238+
180239

181240
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
182241

0 commit comments

Comments
 (0)