You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection.md
+52-44Lines changed: 52 additions & 44 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
3
3
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 12/12/2024
6
+
ms.date: 12/13/2024
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -40,37 +40,41 @@ Want to experience Microsoft Defender for Endpoint? [Sign up for a free trial](h
40
40
41
41
Network protection helps protect devices from certain Internet-based events by preventing connections to malicious or suspicious sites. Network protection is an attack surface reduction capability that helps prevent people in your organization from accessing domains that are considered dangerous through applications. Examples of dangerous domains are domains that host phishing scams, exploits, and other malicious content on the Internet. Network protection expands the scope of [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview) to block all outbound HTTP(S) traffic that attempts to connect to low-reputation sources (based on the domain or hostname).
42
42
43
-
Network protection extends the protection in [Web protection](web-protection-overview.md) to the operating system level, and is a core component for Web Content Filtering (WCF). It provides the web protection functionality found in Microsoft Edge to other supported browsers and non-browser applications. Network protection also provides visibility and blocking of indicators of compromise (IOCs) when used with [Endpoint detection and response](overview-endpoint-detection-response.md). For example, network protection works with your [custom indicators](indicators-overview.md) that you can use to block specific domains or host names.
43
+
Network protection extends the protection in [Web protection](web-protection-overview.md) to the operating system level, and is a core component for [Web Content Filtering](web-content-filtering.md) (WCF). It provides the web protection functionality found in Microsoft Edge to other supported browsers and nonbrowser applications. Network protection also provides visibility and blocking of indicators of compromise (IOCs) when used with [Endpoint detection and response](overview-endpoint-detection-response.md). For example, network protection works with your [custom indicators](indicators-overview.md) that you can use to block specific domains or host names.
44
44
45
45
### Network protection coverage
46
46
47
47
The following table summarizes network protection areas of coverage.
48
48
49
49
| Feature | Microsoft Edge | Non-Microsoft browsers | Nonbrowser processes <br/> (for example, PowerShell) |
50
50
|:---|:---|:---|:---|
51
-
| Web Threat Protection | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
52
-
| Custom Indicators | SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
53
-
| Web Content Filtering | SmartScreen must be enabled | Network protection must be in block mode | Not supported |
51
+
|[Web Threat Protection](web-threat-protection.md)| SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
52
+
|[Custom Indicators](indicators-overview.md)| SmartScreen must be enabled | Network protection must be in block mode | Network protection must be in block mode |
53
+
|[Web Content Filtering](web-content-filtering.md)| SmartScreen must be enabled | Network protection must be in block mode | Not supported |
54
54
55
55
> [!NOTE]
56
-
> On Mac and Linux, you must have network protection in block mode to get support for these features in Edge.
57
-
> On Windows, network protection does not monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
58
-
- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
56
+
> On Mac and Linux, you must have network protection in block mode for these features to be supported in the Microsoft Edge browser.
57
+
> On Windows, network protection doesn't monitor Microsoft Edge. For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage network protection for inspection and enforcement.
58
+
59
+
Here are a few important points to keep in mind:
60
+
61
+
- IP is supported for all three protocols (`TCP`, `HTTP`, and `HTTPS` (TLS)).
59
62
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
60
-
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
61
-
> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
62
-
> - URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, can only be blocked on first party browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
63
-
> - Full URL path blocks can be applied for unencrypted URLs.
64
-
>
65
-
> There might be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
66
-
>
67
-
Watch this video to learn how Network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
63
+
- Encrypted URLs (full path) are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge).
64
+
- Encrypted URLs (FQDN only) are blocked in non-Microsoft browsers.
65
+
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
66
+
- Full URL path blocks are applied for unencrypted URLs.
67
+
68
+
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
69
+
70
+
Watch this video to learn how network protection helps reduce the attack surface of your devices from phishing scams, exploits, and other malicious content:
Network protection requires devices running one of the following operating systems:
77
+
74
78
- Windows 10 or 11 (Pro or Enterprise) (see [Supported Windows versions](minimum-requirements.md#supported-windows-versions))
75
79
- Windows Server, version 1803 or later (see [Supported Windows versions](minimum-requirements.md#supported-windows-versions))
76
80
- macOS version 12 (Monterey) or later (see [Microsoft Defender for Endpoint on Mac](microsoft-defender-endpoint-mac.md))
@@ -80,12 +84,12 @@ Network protection also requires Microsoft Defender Antivirus with real-time pro
80
84
81
85
| Windows version | Microsoft Defender Antivirus |
82
86
|:---|:---|
83
-
| Windows 10 version 1709 or later, Windows 11, Windows Server 1803 or later | Make sure that [Microsoft Defender Antivirus real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), [behavior monitoring](behavior-monitor.md) and [cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) are enabled (active) |
84
-
| Windows Server 2012 R2 and Windows Server 2016 with the unified agent | Platform Update version 4.18.2001.x.x or newer |
87
+
| Windows 10 version 1709 or later, Windows 11, Windows Server 1803 or later | Make sure that [Microsoft Defender Antivirus real-time protection](configure-real-time-protection-microsoft-defender-antivirus.md), [behavior monitoring](behavior-monitor.md), and [cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) are enabled (active) |
88
+
| Windows Server 2012 R2 and Windows Server 2016 using the [modern unified agent](/defender-endpoint/configure-server-endpoints#functionality-in-the-modern-unified-solution)| Platform update version `4.18.2001.x.x` or newer |
85
89
86
90
## Why network protection is important
87
91
88
-
Network protection is a part of the attack surface reduction group of solutions in Microsoft Defender for Endpoint. Network protection enables the network layer to block URLs and IP addresses. Network protection can block URLs from being accessed by using certain browsers and standard network connections. By default, network protection guards your computers from known malicious URLs using the SmartScreen feed, which blocks malicious URLs in a manner similar to SmartScreen in Microsoft Edge browser. The network protection functionality can be extended to:
92
+
Network protection is a part of the [attack surface reduction](overview-attack-surface-reduction.md) group of solutions in Microsoft Defender for Endpoint. Network protection enables the network layer to block URLs and IP addresses. Network protection can block URLs from being accessed by using certain browsers and standard network connections. By default, network protection guards your computers from known malicious URLs using the SmartScreen feed, which blocks malicious URLs in a manner similar to SmartScreen in Microsoft Edge browser. The network protection functionality can be extended to:
89
93
90
94
- Block IP/URL addresses from your own threat intelligence ([indicators](indicator-ip-domain.md))
91
95
- Block unsanctioned services from [Microsoft Defender for Cloud Apps](/defender-cloud-apps/what-is-defender-for-cloud-apps)
@@ -119,24 +123,26 @@ Support for Command and Control servers (C2) is an important part of this ransom
119
123
120
124
| New mapping | Response category | Sources |
121
125
| :--- | :--- | :--- |
122
-
| phishing | Phishing | SmartScreen |
123
-
| malicious | Malicious | SmartScreen |
124
-
| command and control |C2| SmartScreen |
125
-
| command and control | COCO | SmartScreen |
126
-
| malicious | Untrusted | SmartScreen |
127
-
| by your IT admin | CustomBlockList ||
128
-
| by your IT admin | CustomPolicy ||
126
+
|`phishing`|`Phishing`|`SmartScreen`|
127
+
|`malicious`|`Malicious`|`SmartScreen`|
128
+
|`command and control`|`C2`|`SmartScreen`|
129
+
|`command and control`|`COCO`|`SmartScreen`|
130
+
|`malicious`|`Untrusted`|`SmartScreen`|
131
+
|`by your IT admin`|`CustomBlockList`||
132
+
|`by your IT admin`|`CustomPolicy`||
129
133
130
134
> [!NOTE]
131
135
> **customAllowList** does not generate notifications on endpoints.
132
136
133
137
### New notifications for network protection determination
134
138
135
-
A new, publicly available capability in network protection utilizes functions in SmartScreen to block phishing activities from malicious command and control sites. When an end user attempts to visit a website in an environment in which network protection is enabled, three scenarios are possible:
139
+
New capabilities in network protection use functions in SmartScreen to block phishing activities from malicious command and control sites. When an end user attempts to visit a website in an environment in which network protection is enabled, three scenarios are possible, as outlined in the following table:
136
140
137
-
- The URL has a **known good reputation** - In this case the user is permitted access without obstruction, and there's no toast notification presented on the endpoint. In effect, the domain or URL is set to _Allowed_.
138
-
- The URL has an **unknown or uncertain reputation** - The user's access is blocked, but with the ability to circumvent (unblock) the block. In effect, the domain or url is set to _Audit_.
139
-
- The URL has a **known bad (malicious) reputation** - The user is prevented from access. In effect, the domain or url is set to _Block_.
141
+
| Scenario | What happens |
142
+
|--|--|
143
+
| The URL has a known good reputation | The user is permitted access without obstruction, and there's no toast notification presented on the endpoint. In effect, the domain or URL is set to *Allowed*. |
144
+
| The URL has an unknown or uncertain reputation | The user's access is blocked, but with the ability to circumvent (unblock) the block. In effect, the domain or url is set to *Audit*. |
145
+
| The URL has a known bad (malicious) reputation | The user is prevented from access. In effect, the domain or url is set to *Block*. |
140
146
141
147
#### Warn experience
142
148
@@ -224,11 +230,11 @@ The Response category tells you what caused the event, as in this example:
224
230
225
231
| ResponseCategory | Feature responsible for the event |
226
232
|:---|:---|
227
-
| CustomPolicy | WCF |
228
-
| CustomBlockList | Custom indicators |
229
-
| CasbPolicy | Defender for Cloud Apps |
230
-
| Malicious | Web threats |
231
-
| Phishing | Web threats |
233
+
|`CustomPolicy`| WCF |
234
+
|`CustomBlockList`| Custom indicators |
235
+
|`CasbPolicy`| Defender for Cloud Apps |
236
+
|`Malicious`| Web threats |
237
+
|`Phishing`| Web threats |
232
238
233
239
For more information, see [Troubleshoot endpoint blocks](web-protection-overview.md#troubleshoot-endpoint-blocks).
234
240
@@ -247,12 +253,12 @@ You can use the resulting list of URLs and IPs to determine what would be blocke
247
253
248
254
Once you've created an indicator, you can look at resolving the underlying issue as follows:
249
255
250
-
- SmartScreen – request review
251
-
- Indicator – modify existing indicator
252
-
- MCA – review unsanctioned app
253
-
- WCF – request recategorization
256
+
-**SmartScreen**: request review
257
+
-**Indicator**: modify existing indicator
258
+
-**MCA**: review unsanctioned app
259
+
-**WCF**: request recategorization
254
260
255
-
Using this data you can make an informed decision on enabling Network protection in Block mode. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
261
+
Using this data you can make an informed decision on enabling network protection in Block mode. See [Order of precedence for Network protection blocks](web-protection-overview.md#order-of-precedence).
256
262
257
263
> [!NOTE]
258
264
> As this is a per-device setting, if there are devices that cannot move to Block mode you can simply leave them on audit until you can rectify the challenge and you will still receive the auditing events.
@@ -339,8 +345,8 @@ For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified sol
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
348
+
> [!NOTE]
349
+
> In some cases, depending on your infrastructure, volume of traffic, and other conditions, `Set-MpPreference -AllowDatagramProcessingOnWinServer 1` can have an effect on network performance.
344
350
345
351
### Network protection for Windows Servers
346
352
@@ -350,7 +356,7 @@ Following is information specific to Windows Servers.
350
356
351
357
Verify whether network protection is enabled on a local device by using Registry Editor.
352
358
353
-
1. Select the **Start** button in the task bar and type **regedit** to open the Registry Editor.
359
+
1. Select the **Start** button in the task bar and type `regedit` to open Registry Editor.
354
360
355
361
2. Select **HKEY_LOCAL_MACHINE** from the side menu.
356
362
@@ -381,7 +387,7 @@ For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified sol
381
387
> [!NOTE]
382
388
> Depending on your infrastructure, volume of traffic, and other conditions, **HKEY_LOCAL_MACHINE** > **SOFTWARE** > **Policies** > **Microsoft** > **Windows Defender** > **NIS** > **Consumers** > **IPS** - **AllowDatagramProcessingOnWinServer (dword) 1 (hex)** can have an effect on network performance.
383
389
384
-
For more information, see: [Turn on network protection](enable-network-protection.md)
390
+
For more information, see: [Turn on network protection](enable-network-protection.md).
385
391
386
392
#### Windows Servers and Windows Multi-session configuration requires PowerShell
387
393
@@ -419,6 +425,7 @@ The most generic method to disable QUIC is to disable that feature in Windows Fi
0 commit comments