Skip to content

Commit 9740a2d

Browse files
Update enable-network-protection.md
Updated the Windows Server info, where Windows Server 2019 was missing in the PoSh cmdlet. And added that for the downlevel servers, it requires the unified agent for MDE.
1 parent 1532936 commit 9740a2d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -84,8 +84,8 @@ To enable network protection, you can use one of the following methods:
8484

8585
| Windows Server version | Commands |
8686
|---|---|
87-
| Windows Server 2022 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
88-
| Windows Server 2016 <br/>Windows Server 2012 R2 | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
87+
| Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
88+
| Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](https://learn.microsoft.com/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
8989

9090
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
9191

0 commit comments

Comments
 (0)