Skip to content

Commit 87f50f6

Browse files
authored
Merge pull request #2189 from MicrosoftDocs/fixes
network protection
2 parents 08b7152 + 6772598 commit 87f50f6

File tree

1 file changed

+52
-44
lines changed

1 file changed

+52
-44
lines changed

defender-endpoint/network-protection.md

Lines changed: 52 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 12/12/2024
6+
ms.date: 12/13/2024
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -40,37 +40,41 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial](h
4040

4141
Network protection helps protect devices from certain Internet-based events by preventing connections to malicious or suspicious sites. Network protection is an attack surface reduction capability that helps prevent people in your organization from accessing domains that are considered dangerous through applications. Examples of dangerous domains are domains that host phishing scams, exploits, and other malicious content on the Internet. Network protection expands the scope of [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP(S) traffic that attempts to connect to low-reputation sources (based on the domain or hostname).
4242

43-
Network protection extends the protection in [Web protection](web-protection-overview.md) to the operating system level, and is a core component for Web Content Filtering (WCF). It provides the web protection functionality found in Microsoft Edge to other supported browsers and non-browser applications. Network protection also provides visibility and blocking of indicators of compromise (IOCs) when used with [Endpoint detection and response](overview-endpoint-detection-response.md). For example, network protection works with your [custom indicators](indicators-overview.md) that you can use to block specific domains or host names.
43+
Network protection extends the protection in [Web protection](web-protection-overview.md) to the operating system level, and is a core component for [Web Content Filtering](web-content-filtering.md) (WCF). It provides the web protection functionality found in Microsoft Edge to other supported browsers and nonbrowser applications. Network protection also provides visibility and blocking of indicators of compromise (IOCs) when used with [Endpoint detection and response](overview-endpoint-detection-response.md). For example, network protection works with your [custom indicators](indicators-overview.md) that you can use to block specific domains or host names.
4444

4545
### Network protection coverage
4646

4747
The following table summarizes network protection areas of coverage.
4848

4949
| Feature | Microsoft Edge | Non-Microsoft browsers | Nonbrowser processes <br/> (for example, PowerShell) |
5050
|:---|:---|:---|:---|
51-
| Web Threat Protection | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
52-
| Custom Indicators | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
53-
| Web Content Filtering | SmartScreen must be enabled | Network protection must be in block mode | Not supported |
51+
| [Web Threat Protection](web-threat-protection.md) | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
52+
| [Custom Indicators](indicators-overview.md) | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
53+
| [Web Content Filtering](web-content-filtering.md) | SmartScreen must be enabled | Network protection must be in block mode | Not supported |
5454

5555
> [!NOTE]
56-
> On Mac and Linux, you must have network protection in block mode to get support for these features in Edge.
57-
> On Windows, network protection does not monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
58-
- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
56+
> On Mac and Linux, you must have network protection in block mode for these features to be supported in the Microsoft Edge browser.
57+
> On Windows, network protection doesn't monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
58+
59+
Here are a few important points to keep in mind:
60+
61+
- IP is supported for all three protocols (`TCP`, `HTTP`, and `HTTPS` (TLS)).
5962
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
60-
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
61-
> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
62-
> - URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, can only be blocked on first party browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
63-
> - Full URL path blocks can be applied for unencrypted URLs.
64-
>
65-
> There might be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
66-
>
67-
Watch this video to learn how Network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
63+
- Encrypted URLs (full path) are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge).
64+
- Encrypted URLs (FQDN only) are blocked in non-Microsoft browsers.
65+
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
66+
- Full URL path blocks are applied for unencrypted URLs.
67+
68+
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
69+
70+
Watch this video to learn how network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
6871

6972
> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4r4yZ]
7073
7174
## Requirements for network protection
7275

7376
Network protection requires devices running one of the following operating systems:
77+
7478
- Windows 10 or 11 (Pro or Enterprise) (see [Supported Windows versions](minimum-requirements.md#supported-windows-versions))
7579
- Windows Server, version 1803 or later (see [Supported Windows versions](minimum-requirements.md#supported-windows-versions))
7680
- macOS version 12 (Monterey) or later (see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md))
@@ -80,12 +84,12 @@ Network protection also requires Microsoft Defender Antivirus with real-time pro
8084

8185
| Windows version | Microsoft Defender Antivirus |
8286
|:---|:---|
83-
| Windows 10 version 1709 or later, Windows 11, Windows Server 1803 or later | Make sure that [Microsoft Defender Antivirus real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), [behavior monitoring](behavior-monitor.md) and [cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) are enabled (active) |
84-
| Windows Server 2012 R2 and Windows Server 2016 with the unified agent | Platform Update version 4.18.2001.x.x or newer |
87+
| Windows 10 version 1709 or later, Windows 11, Windows Server 1803 or later | Make sure that [Microsoft Defender Antivirus real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), [behavior monitoring](behavior-monitor.md), and [cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) are enabled (active) |
88+
| Windows Server 2012 R2 and Windows Server 2016 using the [modern unified agent](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution) | Platform update version `4.18.2001.x.x` or newer |
8589

8690
## Why network protection is important
8791

88-
Network protection is a part of the attack surface reduction group of solutions in Microsoft Defender for Endpoint. Network protection enables the network layer to block URLs and IP addresses. Network protection can block URLs from being accessed by using certain browsers and standard network connections. By default, network protection guards your computers from known malicious URLs using the SmartScreen feed, which blocks malicious URLs in a manner similar to SmartScreen in Microsoft Edge browser. The network protection functionality can be extended to:
92+
Network protection is a part of the [attack surface reduction](overview-attack-surface-reduction.md) group of solutions in Microsoft Defender for Endpoint. Network protection enables the network layer to block URLs and IP addresses. Network protection can block URLs from being accessed by using certain browsers and standard network connections. By default, network protection guards your computers from known malicious URLs using the SmartScreen feed, which blocks malicious URLs in a manner similar to SmartScreen in Microsoft Edge browser. The network protection functionality can be extended to:
8993

9094
- Block IP/URL addresses from your own threat intelligence ([indicators](indicator-ip-domain.md))
9195
- Block unsanctioned services from [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
@@ -119,24 +123,26 @@ Support for Command and Control servers (C2) is an important part of this ransom
119123

120124
| New mapping | Response category | Sources |
121125
| :--- | :--- | :--- |
122-
| phishing | Phishing | SmartScreen |
123-
| malicious | Malicious | SmartScreen |
124-
| command and control | C2 | SmartScreen |
125-
| command and control | COCO | SmartScreen |
126-
| malicious | Untrusted | SmartScreen |
127-
| by your IT admin | CustomBlockList | |
128-
| by your IT admin | CustomPolicy | |
126+
| `phishing` | `Phishing` | `SmartScreen` |
127+
| `malicious` | `Malicious` | `SmartScreen` |
128+
| `command and control` | `C2` | `SmartScreen` |
129+
| `command and control` | `COCO` | `SmartScreen` |
130+
| `malicious` | `Untrusted` | `SmartScreen` |
131+
| `by your IT admin` | `CustomBlockList` | |
132+
| `by your IT admin` | `CustomPolicy` | |
129133

130134
> [!NOTE]
131135
> **customAllowList** does not generate notifications on endpoints.
132136
133137
### New notifications for network protection determination
134138

135-
A new, publicly available capability in network protection utilizes functions in SmartScreen to block phishing activities from malicious command and control sites. When an end user attempts to visit a website in an environment in which network protection is enabled, three scenarios are possible:
139+
New capabilities in network protection use functions in SmartScreen to block phishing activities from malicious command and control sites. When an end user attempts to visit a website in an environment in which network protection is enabled, three scenarios are possible, as outlined in the following table:
136140

137-
- The URL has a **known good reputation** - In this case the user is permitted access without obstruction, and there's no toast notification presented on the endpoint. In effect, the domain or URL is set to _Allowed_.
138-
- The URL has an **unknown or uncertain reputation** - The user's access is blocked, but with the ability to circumvent (unblock) the block. In effect, the domain or url is set to _Audit_.
139-
- The URL has a **known bad (malicious) reputation** - The user is prevented from access. In effect, the domain or url is set to _Block_.
141+
| Scenario | What happens |
142+
|--|--|
143+
| The URL has a known good reputation | The user is permitted access without obstruction, and there's no toast notification presented on the endpoint. In effect, the domain or URL is set to *Allowed*. |
144+
| The URL has an unknown or uncertain reputation | The user's access is blocked, but with the ability to circumvent (unblock) the block. In effect, the domain or url is set to *Audit*. |
145+
| The URL has a known bad (malicious) reputation | The user is prevented from access. In effect, the domain or url is set to *Block*. |
140146

141147
#### Warn experience
142148

@@ -224,11 +230,11 @@ The Response category tells you what caused the event, as in this example:
224230

225231
| ResponseCategory | Feature responsible for the event |
226232
|:---|:---|
227-
| CustomPolicy | WCF |
228-
| CustomBlockList | Custom indicators |
229-
| CasbPolicy | Defender for Cloud Apps |
230-
| Malicious | Web threats |
231-
| Phishing | Web threats |
233+
| `CustomPolicy` | WCF |
234+
| `CustomBlockList` | Custom indicators |
235+
| `CasbPolicy` | Defender for Cloud Apps |
236+
| `Malicious` | Web threats |
237+
| `Phishing` | Web threats |
232238

233239
For more information, see [Troubleshoot endpoint blocks](web-protection-overview.md#troubleshoot-endpoint-blocks).
234240

@@ -247,12 +253,12 @@ You can use the resulting list of URLs and IPs to determine what would be blocke
247253

248254
Once you've created an indicator, you can look at resolving the underlying issue as follows:
249255

250-
- SmartScreen request review
251-
- Indicator modify existing indicator
252-
- MCA review unsanctioned app
253-
- WCF request recategorization
256+
- **SmartScreen**: request review
257+
- **Indicator**: modify existing indicator
258+
- **MCA**: review unsanctioned app
259+
- **WCF**: request recategorization
254260

255-
Using this data you can make an informed decision on enabling Network protection in Block mode. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
261+
Using this data you can make an informed decision on enabling network protection in Block mode. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
256262

257263
> [!NOTE]
258264
> As this is a per-device setting, if there are devices that cannot move to Block mode you can simply leave them on audit until you can rectify the challenge and you will still receive the auditing events.
@@ -339,8 +345,8 @@ For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified sol
339345
- `Set-MpPreference -AllowNetworkProtectionDownLevel 1`
340346
- `Set-MpPreference -AllowDatagramProcessingOnWinServer 1`
341347

342-
> [!NOTE]
343-
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
348+
> [!NOTE]
349+
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
344350
345351
### Network protection for Windows Servers
346352

@@ -350,7 +356,7 @@ Following is information specific to Windows Servers.
350356

351357
Verify whether network protection is enabled on a local device by using Registry Editor.
352358

353-
1. Select the **Start** button in the task bar and type **regedit** to open the Registry Editor.
359+
1. Select the **Start** button in the task bar and type `regedit` to open Registry Editor.
354360

355361
2. Select **HKEY_LOCAL_MACHINE** from the side menu.
356362

@@ -381,7 +387,7 @@ For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified sol
381387
> [!NOTE]
382388
> Depending on your infrastructure, volume of traffic, and other conditions, **HKEY_LOCAL_MACHINE** > **SOFTWARE** > **Policies** > **Microsoft** > **Windows Defender** > **NIS** > **Consumers** > **IPS** - **AllowDatagramProcessingOnWinServer (dword) 1 (hex)** can have an effect on network performance.
383389
384-
For more information, see: [Turn on network protection](enable-network-protection.md)
390+
For more information, see: [Turn on network protection](enable-network-protection.md).
385391

386392
#### Windows Servers and Windows Multi-session configuration requires PowerShell
387393

@@ -419,6 +425,7 @@ The most generic method to disable QUIC is to disable that feature in Windows Fi
419425

420426

421427
```powershell
428+
422429
Copy
423430
$ruleParams = @{
424431
DisplayName = "Block QUIC"
@@ -429,6 +436,7 @@ $ruleParams = @{
429436
RemotePort = 443
430437
}
431438
New-NetFirewallRule @ruleParams
439+
432440
```
433441

434442
### Disable QUIC in a web browser

0 commit comments

Comments
 (0)