Skip to content

Commit 8d70c8f

Browse files
authored
Merge pull request #1691 from tdoucett-ms/docs-editor/web-protection-overview-1729716405
Add note on Application Guard
2 parents 630342b + e3c7caa commit 8d70c8f

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

defender-endpoint/web-protection-overview.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,9 @@ search.appverid: met150
55
ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
8+
ms.reviewer: tdoucette
89
ms.localizationpriority: medium
9-
ms.date: 04/03/2024
10+
ms.date: 10/23/2024
1011
manager: deniseb
1112
audience: ITPro
1213
ms.collection:
@@ -48,16 +49,13 @@ Web threat protection includes:
4849

4950
> [!NOTE]
5051
> For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage Network Protection for inspection and enforcement:
51-
>
5252
> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
5353
> - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
5454
> - Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
5555
> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
5656
> - Full URL path blocks can be applied for unencrypted URLs.
57-
>
58-
> There may be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
5957
60-
For more information, see [Web threat protection](web-threat-protection.md).
58+
There might be up to two hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked. For more information, see [Web threat protection](web-threat-protection.md).
6159

6260
### Custom indicators
6361

@@ -121,7 +119,9 @@ Internal IP addresses aren't supported by custom indicators. For a warn policy w
121119

122120
In all web protection scenarios, SmartScreen and Network Protection can be used together to ensure protection across both Microsoft and non-Microsoft browsers and processes. SmartScreen is built directly into Microsoft Edge, while Network Protection monitors traffic in non-Microsoft browsers and processes. The following diagram illustrates this concept. This diagram of the two clients working together to provide multiple browser/app coverages is accurate for all features of Web Protection (Indicators, Web Threats, Content Filtering).
123121

124-
:::image type="content" source="/defender/media/web-protection-protect-browsers.png" alt-text="The usage of smartScreen and Network Protection together" lightbox="/defender/media/web-protection-protect-browsers.png":::
122+
> [!NOTE]
123+
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They cannot enforce any enterprise web protection policies.
124+
> :::image type="content" source="/defender/media/web-protection-protect-browsers.png" alt-text="The usage of smartScreen and Network Protection together" lightbox="/defender/media/web-protection-protect-browsers.png":::
125125
126126
## Troubleshoot endpoint blocks
127127

@@ -183,7 +183,7 @@ For WCF, you can dispute the category of a domain. Navigate to the **Domains** t
183183

184184
For more information on how to submit false positives/negatives, see [Address false positives/negatives in Microsoft Defender for Endpoint](defender-endpoint-false-positives-negatives.md).
185185

186-
## Related information
186+
## Related articles
187187

188188
|Article|Description|
189189
|---|---|

0 commit comments

Comments
 (0)