Skip to content

Commit 96e3e78

Browse files
Merge pull request #2704 from MicrosoftDocs/main
Publish main to live, 02/10/25, 10:30 AM PT
2 parents e00489d + 6360b81 commit 96e3e78

File tree

5 files changed

+58
-16
lines changed

5 files changed

+58
-16
lines changed

CloudAppSecurityDocs/network-requirements.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ dev.virtualearth.net
4646
flow.microsoft.com
4747
static2.sharepointonline.com
4848
*.blob.core.windows.net
49+
discoveryresources-cdn-prod.cloudappsecurity.com
50+
discoveryresources-cdn-gov.cloudappsecurity.com
51+
4952
```
5053

5154
Additionally, the following items should be allowed, depending on which data center you use:

defender-endpoint/edr-in-block-mode.md

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom:
1414
- next-gen
1515
- mde-edr
1616
- admindeeplinkDEFENDER
17-
ms.date: 06/25/2024
17+
ms.date: 02/10/2025
1818
ms.collection:
1919
- m365-security
2020
- tier2
@@ -80,16 +80,32 @@ When EDR in block mode is turned on, and a malicious artifact is detected, Defen
8080

8181
1. Go to the Microsoft Defender portal ([https://security.microsoft.com/](https://security.microsoft.com/)) and sign in.
8282

83-
2. Choose **Settings** \> **Endpoints** \> **General** \> **Advanced features**.
83+
1. Choose **Settings** > **Endpoints** > **General** > **Advanced features**.
8484

85-
3. Scroll down, and then turn on **Enable EDR in block mode**.
85+
1. Scroll down, and then turn on **Enable EDR in block mode**.
8686

8787
### Intune
8888

8989
To create a custom policy in Intune, see [Deploy OMA-URIs to target a CSP through Intune, and a comparison to on-premises](/troubleshoot/mem/intune/deploy-oma-uris-to-target-csp-via-intune).
9090

9191
For more information on the Defender CSP used for EDR in block mode, see "Configuration/PassiveRemediation" under [Defender CSP](/windows/client-management/mdm/defender-csp).
9292

93+
### Group Policy
94+
95+
You can use Group Policy to enable EDR in block mode.
96+
97+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
98+
99+
1. Right-click the Group Policy Object you want to configure, and then select **Edit**.
100+
101+
2. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
102+
103+
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Features**.
104+
105+
4. Double-click **Enable EDR in block mode** and set the option to **Enabled**.
106+
107+
5. Select **OK**.
108+
93109
## Requirements for EDR in block mode
94110

95111
The following table lists requirements for EDR in block mode:

defender-endpoint/indicator-file.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
66
ms.author: deniseb
77
author: denisebmsft
88
ms.localizationpriority: medium
9-
ms.date: 12/30/2024
9+
ms.date: 02/06/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -53,7 +53,7 @@ Understand the following prerequisites before you create indicators for files:
5353

5454
- [Behavior Monitoring is enabled](behavior-monitor.md)
5555

56-
- [Cloud-based protection is turned on](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
56+
- [Cloud-based protection is turned on](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus).
5757

5858
- [Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
5959

defender-endpoint/network-protection.md

Lines changed: 31 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 01/16/2025
6+
ms.date: 02/10/2025
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -63,9 +63,7 @@ The following table summarizes network protection areas of coverage.
6363
- Encrypted URLs (full path) are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge).
6464
- Encrypted URLs (FQDN only) are blocked in non-Microsoft browsers.
6565
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
66-
6766
- Network Protection will block connections on both standard and non-standard ports.
68-
6967
- Full URL path blocks are applied for unencrypted URLs.
7068

7169
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
@@ -125,7 +123,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
125123
#### Network protection: New toast notifications
126124

127125
| New mapping | Response category | Sources |
128-
| :--- | :--- | :--- |
126+
| --- | --- | --- |
129127
| `phishing` | `Phishing` | `SmartScreen` |
130128
| `malicious` | `Malicious` | `SmartScreen` |
131129
| `command and control` | `C2` | `SmartScreen` |
@@ -135,7 +133,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
135133
| `by your IT admin` | `CustomPolicy` | |
136134

137135
> [!NOTE]
138-
> **customAllowList** does not generate notifications on endpoints.
136+
> `customAllowList` does not generate notifications on endpoints.
139137
140138
### New notifications for network protection determination
141139

@@ -297,7 +295,7 @@ Defender for Endpoint provides detailed reporting into events and blocks as part
297295

298296
You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
299297

300-
1. [Copy the XML directly](overview-attack-surface-reduction.md).
298+
1. [Copy the XML directly](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
301299

302300
2. Select **OK**.
303301

@@ -454,9 +452,34 @@ You can disable QUIC at the web browser level. However, this method of disabling
454452

455453
## Optimizing network protection performance
456454

457-
Network protection includes performance optimization that allows `block` mode to asynchronously inspect long-lived connections, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default. You can turn off this capability by using the following PowerShell cmdlet:
455+
Network protection includes performance optimization that allows `block` mode to asynchronously inspect long-lived connections, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default.
456+
457+
#### Use CSP to enable AllowSwitchToAsyncInspection
458+
459+
[/windows/client-management/mdm/defender-csp](/windows/client-management/mdm/defender-csp#configurationallowswitchtoasyncinspection)
460+
461+
#### Use Group Policy to enable Turn on asynchronous inspection
462+
463+
This procedure enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
464+
465+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
466+
467+
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
468+
469+
3. In the Group Policy Management Editor, go to **Computer configuration**, and then select **Administrative templates**.
470+
471+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
472+
473+
5. Double-click **Turn on asynchronous inspection**, and then set the option to **Enabled**.
474+
475+
6. Select **OK**.
476+
477+
478+
#### Use Microsoft Defender Antivirus Powershell cmdlet to enable Turn on asynchronous inspection
479+
480+
You can turn on this capability by using the following PowerShell cmdlet:
458481

459-
`Set-MpPreference -AllowSwitchToAsyncInspection $false`
482+
`Set-MpPreference -AllowSwitchToAsyncInspection $true`
460483

461484
## See also
462485

defender-endpoint/web-content-filtering.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
66
author: denisebmsft
77
ms.reviewer: tdoucett
88
ms.localizationpriority: medium
9-
ms.date: 08/15/2024
9+
ms.date: 02/10/2025
1010
manager: deniseb
1111
audience: ITPro
1212
ms.collection:
@@ -99,7 +99,7 @@ Policies can be deployed to block any of the following parent or child categorie
9999
|---|---|
100100
| **Adult content** | - **Cults**: Sites related to groups or movements whose members demonstrate passion for a belief system that is different from those that are socially accepted.<br/><br/>- **Gambling**: Online gambling and sites that promote gambling skills and practice.<br/><br/>- **Nudity**: Sites that provide full-frontal and semi-nude images or videos, typically in artistic form, and might allow the download or sale of such materials.<br/><br/>- **Pornography / Sexually explicit**: Sites containing sexually explicit content in an image-based or textual form. Any form of sexually oriented material is also listed here.<br/><br/>- **Sex education**: Sites that discuss sex and sexuality in an informative and nonvoyeuristic way, including sites that provide education about human reproduction and contraception, sites that offer advice on preventing infection from sexual diseases, and sites that offer advice on sexual health matters.<br/><br/>- **Tasteless**: Sites oriented towards content unsuitable for school children to view or that an employer would be uncomfortable with their staff accessing, but not necessarily violent or pornographic.<br/><br/>- **Violence**: Sites that display or promote content related to violence against humans or animals. |
101101
| **High bandwidth** | - **Download sites**: Sites whose primary function is to allow users to download media content or programs, such as computer programs.<br/><br/>- **Image sharing**: Sites that are used primarily for searching or sharing photos, including those that have social aspects.<br/><br/>- **Peer-to-peer**: Sites that host peer-to-peer (P2P) software or facilitate the sharing of files using P2P software.<br/><br/>- **Streaming media & downloads**: Sites whose primary function is the distribution of streaming media, or sites that allow users to search, watch, or listen to streaming media. |
102-
| **Legal liability** | - **Child abuse images**: Sites that include child abuse images or pornography.<br/><br/>- **Criminal activity**: Sites that give instruction on, advice about, or promotion of illegal activities.<br/><br/>- **Hacking**: Sites that provide resources for illegal or questionable use of computer software or hardware, including sites that distribute copyrighted material that has been cracked.<br/><br/>- **Hate & intolerance**: Sites promoting aggressive, degrading, or abusive opinions about any section of the population that could be identified by race, religion, gender, age, nationality, physical disability, economic situation, sexual orientations or any other lifestyle choice.<br/><br/>- **Illegal drug**: Sites that sell illegal/controlled substances, promote substance abuse, or sell related paraphernalia.<br/><br/>- **Illegal software**: Sites that contain or promote the use of malware, spyware, botnets, phishing scams, or piracy & copyright theft.<br/><br/>- **School cheating**: Sites related to plagiarism or school cheating.<br/><br/>- **Self-harm**: Sites that promote self-harm, including cyberbullying sites that contain abusive and/or threatening messages towards users.<br/><br/>- **Weapons**: Any site that sells weapons or advocates the use of weapons, including but not limited to guns, knives, and ammunition. |
102+
| **Legal liability** | - **Child abuse images**: Sites that include child abuse images or pornography.<br/><br/>- **Criminal activity**: Sites that give instruction on, advise about, or promotion of illegal activities.<br/><br/>- **Hacking**: Sites that provide resources for illegal or questionable use of computer software or hardware, including sites that distribute copyrighted material that has been cracked.<br/><br/>- **Hate & intolerance**: Sites promoting aggressive, degrading, or abusive opinions about any section of the population that could be identified by race, religion, gender, age, nationality, physical disability, economic situation, sexual orientations or any other lifestyle choice.<br/><br/>- **Illegal drug**: Sites that sell illegal/controlled substances, promote substance abuse, or sell related paraphernalia.<br/><br/>- **Illegal software**: Sites that contain or promote the use of malware, spyware, botnets, phishing scams, or piracy & copyright theft.<br/><br/>- **School cheating**: Sites related to plagiarism or school cheating.<br/><br/>- **Self-harm**: Sites that promote self-harm, including cyberbullying sites that contain abusive and/or threatening messages towards users.<br/><br/>- **Weapons**: Any site that sells weapons or advocates the use of weapons, including but not limited to guns, knives, and ammunition. |
103103
| **Leisure** | - **Chat**: Sites that are primarily web-based chat rooms.<br/><br/>- **Games**: Sites relating to video or computer games, including sites that promote gaming through hosting online services or information related to gaming.<br/><br/>- **Instant messaging**: Sites that can be used to download instant messaging software or client based instant messaging.<br/><br/>- **Professional network**: Sites that provide professional networking services.<br/><br/>- **Social networking**: Sites that provide social networking services.<br/><br/>- **Web-based email**: Sites offering web-based mail services. |
104104
| **Uncategorized** | - **Newly registered domains**: Sites that are newly registered in the past 30 days and haven't yet been moved to another category.<br/><br/>- **Parked domains**: Sites that have no content or are parked for later use. |
105105

@@ -155,7 +155,7 @@ If you encounter a domain that has been incorrectly categorized, you can dispute
155155

156156
To dispute the category of a domain, navigate to **Reports** \> **Web protection** \> **Web content filtering categories details** \> **Domains**. On the domains tab of the Web Content Filtering reports, find the ellipsis beside each of the domains. Hover over the ellipsis and then select **Dispute Category**.
157157

158-
A panel opens where you can select the priority and add more details such as the suggested category for recategorization. Once you complete the form, select **Submit**. Our team will review the request within one business day. For immediate unblocking, create a [custom allow indicator](indicator-ip-domain.md).
158+
A panel opens where you can select the priority and add more details such as the suggested category for recategorization. Once you complete the form, select **Submit**. Our team will review the request within one business day. For manual unblocking, create a [custom allow indicator](indicator-ip-domain.md) .
159159

160160
## Web content filtering cards and details
161161

0 commit comments

Comments
 (0)