You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
3. Scroll down, and then turn on **Enable EDR in block mode**.
85
+
1. Scroll down, and then turn on **Enable EDR in block mode**.
86
86
87
87
### Intune
88
88
89
89
To create a custom policy in Intune, see [Deploy OMA-URIs to target a CSP through Intune, and a comparison to on-premises](/troubleshoot/mem/intune/deploy-oma-uris-to-target-csp-via-intune).
90
90
91
91
For more information on the Defender CSP used for EDR in block mode, see "Configuration/PassiveRemediation" under [Defender CSP](/windows/client-management/mdm/defender-csp).
92
92
93
+
### Group Policy
94
+
95
+
You can use Group Policy to enable EDR in block mode.
96
+
97
+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
98
+
99
+
1. Right-click the Group Policy Object you want to configure, and then select **Edit**.
100
+
101
+
2. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
102
+
103
+
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Features**.
104
+
105
+
4. Double-click **Enable EDR in block mode** and set the option to **Enabled**.
106
+
107
+
5. Select **OK**.
108
+
93
109
## Requirements for EDR in block mode
94
110
95
111
The following table lists requirements for EDR in block mode:
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-file.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: defender-endpoint
6
6
ms.author: deniseb
7
7
author: denisebmsft
8
8
ms.localizationpriority: medium
9
-
ms.date: 12/30/2024
9
+
ms.date: 02/06/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -53,7 +53,7 @@ Understand the following prerequisites before you create indicators for files:
53
53
54
54
-[Behavior Monitoring is enabled](behavior-monitor.md)
55
55
56
-
-[Cloud-based protection is turned on](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus).
56
+
-[Cloud-based protection is turned on](/defender-endpoint/enable-cloud-protection-microsoft-defender-antivirus).
57
57
58
58
-[Cloud Protection network connectivity is functional](configure-network-connections-microsoft-defender-antivirus.md)
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection.md
+31-8Lines changed: 31 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
3
3
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 01/16/2025
6
+
ms.date: 02/10/2025
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -63,9 +63,7 @@ The following table summarizes network protection areas of coverage.
63
63
- Encrypted URLs (full path) are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge).
64
64
- Encrypted URLs (FQDN only) are blocked in non-Microsoft browsers.
65
65
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
66
-
67
66
- Network Protection will block connections on both standard and non-standard ports.
68
-
69
67
- Full URL path blocks are applied for unencrypted URLs.
70
68
71
69
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
@@ -125,7 +123,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
125
123
#### Network protection: New toast notifications
126
124
127
125
| New mapping | Response category | Sources |
128
-
|:--- |:--- |:--- |
126
+
| --- | --- | --- |
129
127
|`phishing`|`Phishing`|`SmartScreen`|
130
128
|`malicious`|`Malicious`|`SmartScreen`|
131
129
|`command and control`|`C2`|`SmartScreen`|
@@ -135,7 +133,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
135
133
|`by your IT admin`|`CustomPolicy`||
136
134
137
135
> [!NOTE]
138
-
> **customAllowList** does not generate notifications on endpoints.
136
+
> `customAllowList` does not generate notifications on endpoints.
139
137
140
138
### New notifications for network protection determination
141
139
@@ -297,7 +295,7 @@ Defender for Endpoint provides detailed reporting into events and blocks as part
297
295
298
296
You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
299
297
300
-
1.[Copy the XML directly](overview-attack-surface-reduction.md).
298
+
1.[Copy the XML directly](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
301
299
302
300
2. Select **OK**.
303
301
@@ -454,9 +452,34 @@ You can disable QUIC at the web browser level. However, this method of disabling
454
452
455
453
## Optimizing network protection performance
456
454
457
-
Network protection includes performance optimization that allows `block` mode to asynchronously inspect long-lived connections, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default. You can turn off this capability by using the following PowerShell cmdlet:
455
+
Network protection includes performance optimization that allows `block` mode to asynchronously inspect long-lived connections, which might provide a performance improvement. This optimization can also help with app compatibility problems. This capability is on by default.
456
+
457
+
#### Use CSP to enable AllowSwitchToAsyncInspection
#### Use Group Policy to enable Turn on asynchronous inspection
462
+
463
+
This procedure enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
464
+
465
+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
466
+
467
+
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
468
+
469
+
3. In the Group Policy Management Editor, go to **Computer configuration**, and then select **Administrative templates**.
470
+
471
+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
472
+
473
+
5. Double-click **Turn on asynchronous inspection**, and then set the option to **Enabled**.
474
+
475
+
6. Select **OK**.
476
+
477
+
478
+
#### Use Microsoft Defender Antivirus Powershell cmdlet to enable Turn on asynchronous inspection
479
+
480
+
You can turn on this capability by using the following PowerShell cmdlet:
Copy file name to clipboardExpand all lines: defender-endpoint/web-content-filtering.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: deniseb
6
6
author: denisebmsft
7
7
ms.reviewer: tdoucett
8
8
ms.localizationpriority: medium
9
-
ms.date: 08/15/2024
9
+
ms.date: 02/10/2025
10
10
manager: deniseb
11
11
audience: ITPro
12
12
ms.collection:
@@ -99,7 +99,7 @@ Policies can be deployed to block any of the following parent or child categorie
99
99
|---|---|
100
100
| **Adult content** | - **Cults**: Sites related to groups or movements whose members demonstrate passion for a belief system that is different from those that are socially accepted.<br/><br/>- **Gambling**: Online gambling and sites that promote gambling skills and practice.<br/><br/>- **Nudity**: Sites that provide full-frontal and semi-nude images or videos, typically in artistic form, and might allow the download or sale of such materials.<br/><br/>- **Pornography / Sexually explicit**: Sites containing sexually explicit content in an image-based or textual form. Any form of sexually oriented material is also listed here.<br/><br/>- **Sex education**: Sites that discuss sex and sexuality in an informative and nonvoyeuristic way, including sites that provide education about human reproduction and contraception, sites that offer advice on preventing infection from sexual diseases, and sites that offer advice on sexual health matters.<br/><br/>- **Tasteless**: Sites oriented towards content unsuitable for school children to view or that an employer would be uncomfortable with their staff accessing, but not necessarily violent or pornographic.<br/><br/>- **Violence**: Sites that display or promote content related to violence against humans or animals. |
101
101
|**High bandwidth**| - **Download sites**: Sites whose primary function is to allow users to download media content or programs, such as computer programs.<br/><br/>- **Image sharing**: Sites that are used primarily for searching or sharing photos, including those that have social aspects.<br/><br/>- **Peer-to-peer**: Sites that host peer-to-peer (P2P) software or facilitate the sharing of files using P2P software.<br/><br/>- **Streaming media & downloads**: Sites whose primary function is the distribution of streaming media, or sites that allow users to search, watch, or listen to streaming media. |
102
-
| **Legal liability** | - **Child abuse images**: Sites that include child abuse images or pornography.<br/><br/>- **Criminal activity**: Sites that give instruction on, advice about, or promotion of illegal activities.<br/><br/>- **Hacking**: Sites that provide resources for illegal or questionable use of computer software or hardware, including sites that distribute copyrighted material that has been cracked.<br/><br/>- **Hate & intolerance**: Sites promoting aggressive, degrading, or abusive opinions about any section of the population that could be identified by race, religion, gender, age, nationality, physical disability, economic situation, sexual orientations or any other lifestyle choice.<br/><br/>- **Illegal drug**: Sites that sell illegal/controlled substances, promote substance abuse, or sell related paraphernalia.<br/><br/>- **Illegal software**: Sites that contain or promote the use of malware, spyware, botnets, phishing scams, or piracy & copyright theft.<br/><br/>- **School cheating**: Sites related to plagiarism or school cheating.<br/><br/>- **Self-harm**: Sites that promote self-harm, including cyberbullying sites that contain abusive and/or threatening messages towards users.<br/><br/>- **Weapons**: Any site that sells weapons or advocates the use of weapons, including but not limited to guns, knives, and ammunition. |
102
+
| **Legal liability** | - **Child abuse images**: Sites that include child abuse images or pornography.<br/><br/>- **Criminal activity**: Sites that give instruction on, advise about, or promotion of illegal activities.<br/><br/>- **Hacking**: Sites that provide resources for illegal or questionable use of computer software or hardware, including sites that distribute copyrighted material that has been cracked.<br/><br/>- **Hate & intolerance**: Sites promoting aggressive, degrading, or abusive opinions about any section of the population that could be identified by race, religion, gender, age, nationality, physical disability, economic situation, sexual orientations or any other lifestyle choice.<br/><br/>- **Illegal drug**: Sites that sell illegal/controlled substances, promote substance abuse, or sell related paraphernalia.<br/><br/>- **Illegal software**: Sites that contain or promote the use of malware, spyware, botnets, phishing scams, or piracy & copyright theft.<br/><br/>- **School cheating**: Sites related to plagiarism or school cheating.<br/><br/>- **Self-harm**: Sites that promote self-harm, including cyberbullying sites that contain abusive and/or threatening messages towards users.<br/><br/>- **Weapons**: Any site that sells weapons or advocates the use of weapons, including but not limited to guns, knives, and ammunition. |
103
103
|**Leisure**| - **Chat**: Sites that are primarily web-based chat rooms.<br/><br/>- **Games**: Sites relating to video or computer games, including sites that promote gaming through hosting online services or information related to gaming.<br/><br/>- **Instant messaging**: Sites that can be used to download instant messaging software or client based instant messaging.<br/><br/>- **Professional network**: Sites that provide professional networking services.<br/><br/>- **Social networking**: Sites that provide social networking services.<br/><br/>- **Web-based email**: Sites offering web-based mail services. |
104
104
|**Uncategorized**| - **Newly registered domains**: Sites that are newly registered in the past 30 days and haven't yet been moved to another category.<br/><br/>- **Parked domains**: Sites that have no content or are parked for later use. |
105
105
@@ -155,7 +155,7 @@ If you encounter a domain that has been incorrectly categorized, you can dispute
155
155
156
156
To dispute the category of a domain, navigate to **Reports**\>**Web protection**\>**Web content filtering categories details**\>**Domains**. On the domains tab of the Web Content Filtering reports, find the ellipsis beside each of the domains. Hover over the ellipsis and then select **Dispute Category**.
157
157
158
-
A panel opens where you can select the priority and add more details such as the suggested category for recategorization. Once you complete the form, select **Submit**. Our team will review the request within one business day. For immediate unblocking, create a [custom allow indicator](indicator-ip-domain.md).
158
+
A panel opens where you can select the priority and add more details such as the suggested category for recategorization. Once you complete the form, select **Submit**. Our team will review the request within one business day. For manual unblocking, create a [custom allow indicator](indicator-ip-domain.md).
0 commit comments