Skip to content

Commit 8dfa818

Browse files
committed
Update enable-network-protection.md
1 parent ba523bb commit 8dfa818

File tree

1 file changed

+16
-23
lines changed

1 file changed

+16
-23
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 16 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -42,56 +42,49 @@ search.appverid: met150
4242

4343
## Enable network protection
4444

45-
To enable network protection, you can use one of the following methods:
46-
47-
- [Microsoft Defender for Endpoint Security Settings Management](#Microsoft-Defender-for-Endpoint-Security-Settings-Management)
48-
- [Microsoft Intune](#microsoft-intune)
49-
- [Mobile Device Management (MDM)](#mobile-device-management-mdm)
50-
- [Group Policy](#group-policy)
51-
- [Microsoft Configuration Manager](#microsoft-configuration-manager)
52-
- [PowerShell](#powershell)
45+
To enable network protection, you can use any of the methods described in this article.
5346

5447
### Microsoft Defender for Endpoint Security Settings Management
5548

5649
#### Create an endpoint security policy
5750

58-
- Sign in to the [Microsoft Defender portal](https://security.microsoft.com/) using at least a Security Administrator role assigned.
51+
1. Sign in to the [Microsoft Defender portal](https://security.microsoft.com/) using at least a Security Administrator role assigned.
5952

60-
- Select Endpoints > Configuration management > Endpoint security policies and then select Create new Policy.
53+
2. Go to **Endpoints** > **Configuration management** > **Endpoint security policies**, and then select **Create new policy**.
6154

62-
- Under Select Platform, select "Windows 10, Windows 11, and Windows Server".
55+
3. Under **Select Platform**, select **Windows 10, Windows 11, and Windows Server**.
6356

64-
- Under Select Template, select Microsoft Defender Antivirus, then select Create policy.
57+
4. Under **Select Template**, select **Microsoft Defender Antivirus**, then select **Create policy**.
6558

66-
- On the Basics page, enter a name and description for the profile, then choose Next.
59+
5. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
6760

68-
- On the Settings page, expand each group of settings, and configure the settings you want to manage with this profile.
61+
6. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
6962

7063
### Network Protection on Windows clients:
7164

7265
| Description| Setting|
7366
| -------- | -------- |
74-
| Enable Network Protection|Options:<br>Enabled (block mode) Note: Block mode is needed to block IP address/URL indicators and Web Content Filtering.<br>Enabled (audit mode) <br>Disabled (Default) <br>Not Configured|
67+
| Enable Network Protection|Options:<br>- Enabled (block mode) Block mode is needed to block IP address/URL indicators and Web Content Filtering.<br>- Enabled (audit mode) <br>- Disabled (Default) <br>- Not Configured|
7568

7669
#### Network Protection on Windows Server 2012 R2 and Windows Server 2016:
7770

7871
| Description|Setting|
7972
| -------- | -------- |
80-
|Allow Network Protection Down Level|Options:<br>Network protection will be enabled downlevel. <br>Network Protection will be disabled downlevel. (Default) <br>Not Configured|
73+
|Allow Network Protection Down Level|Options:<br>- Network protection will be enabled downlevel. <br>- Network Protection will be disabled downlevel. (Default) <br>- Not Configured|
8174

8275
#### Optional Network Protection settings for Windows and Windows Server:
8376

8477
> [!WARNING]
85-
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the "Allow Datagram Processing On WinServer" to **"Datagram processing on Windows Server is disabled"**. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
78+
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the **Allow Datagram Processing On WinServer** to **Datagram processing on Windows Server is disabled**. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
8679
8780
|Description| Setting|
8881
| -------- | -------- |
89-
|Allow Datagram Processing On Win Server|Datagram processing on Windows Server is enabled. <br>Datagram processing on Windows Server is disabled (Default). <br>Not configured|
90-
|Disable DNS over TCP parsing|DNS over TCP parsing is disabled. <br>DNS over TCP parsing is enabled (Default). <br>Not configured|
91-
|Disable HTTP parsing|HTTP parsing is disabled. <br>HTTP parsing is enabled (Default). <br>Not configured|
92-
|Disable SSH parsing|SSH parsing is disabled. <br>SSH parsing is enabled (Default). <br>Not configured|
93-
|Disable TLS parsing |TLS parsing is disabled. <br>TLS parsing is enabled (Default). <br>Not configured|
94-
|[Deprecated]Enable DNS Sinkhole|DNS Sinkhole is disabled. <br>DNS Sinkhole is enabled. (Default) <br>Not configured|
82+
|Allow Datagram Processing On Win Server|- Datagram processing on Windows Server is enabled. <br>- Datagram processing on Windows Server is disabled (Default). <br>- Not configured|
83+
|Disable DNS over TCP parsing|- DNS over TCP parsing is disabled. <br>- DNS over TCP parsing is enabled (Default). <br>- Not configured|
84+
|Disable HTTP parsing|- HTTP parsing is disabled. <br>- HTTP parsing is enabled (Default). <br>- Not configured|
85+
|Disable SSH parsing|- SSH parsing is disabled. <br>- SSH parsing is enabled (Default). <br>- Not configured|
86+
|Disable TLS parsing |- TLS parsing is disabled. <br>- TLS parsing is enabled (Default). <br>- Not configured|
87+
|[Deprecated]Enable DNS Sinkhole|- DNS Sinkhole is disabled. <br>- DNS Sinkhole is enabled. (Default) <br>- Not configured|
9588

9689
- When you're done configuring settings, select Next.
9790

0 commit comments

Comments
 (0)