Skip to content

Commit 9ff76a2

Browse files
committed
Update network-protection.md
1 parent f07949d commit 9ff76a2

File tree

1 file changed

+13
-14
lines changed

1 file changed

+13
-14
lines changed

defender-endpoint/network-protection.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 01/16/2025
6+
ms.date: 02/10/2025
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -63,9 +63,7 @@ The following table summarizes network protection areas of coverage.
6363
- Encrypted URLs (full path) are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge).
6464
- Encrypted URLs (FQDN only) are blocked in non-Microsoft browsers.
6565
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
66-
6766
- Network Protection will block connections on both standard and non-standard ports.
68-
6967
- Full URL path blocks are applied for unencrypted URLs.
7068

7169
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
@@ -125,7 +123,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
125123
#### Network protection: New toast notifications
126124

127125
| New mapping | Response category | Sources |
128-
| :--- | :--- | :--- |
126+
| --- | --- | --- |
129127
| `phishing` | `Phishing` | `SmartScreen` |
130128
| `malicious` | `Malicious` | `SmartScreen` |
131129
| `command and control` | `C2` | `SmartScreen` |
@@ -135,7 +133,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
135133
| `by your IT admin` | `CustomPolicy` | |
136134

137135
> [!NOTE]
138-
> **customAllowList** does not generate notifications on endpoints.
136+
> `customAllowList` does not generate notifications on endpoints.
139137
140138
### New notifications for network protection determination
141139

@@ -297,7 +295,7 @@ Defender for Endpoint provides detailed reporting into events and blocks as part
297295

298296
You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
299297

300-
1. [Copy the XML directly](overview-attack-surface-reduction.md).
298+
1. [Copy the XML directly](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
301299

302300
2. Select **OK**.
303301

@@ -460,25 +458,26 @@ Network protection includes performance optimization that allows `block` mode to
460458

461459
[https://learn.microsoft.com/en-us/windows/client-management/mdm/defender-csp#configurationallowswitchtoasyncinspection](/windows/client-management/mdm/defender-csp)
462460

463-
#### __Use Group Policy to enable Turn on asynchronous inspection__
461+
#### Use Group Policy to enable Turn on asynchronous inspection
462+
463+
This procedure enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
464464

465465
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
466466

467-
1. Right-click the Group Policy Object you want to configure, and then select __Edit__.
467+
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
468468

469-
1. In the __Group Policy Management Editor__ go to __Computer configuration__ and then select __Administrative templates__.
469+
3. In the Group Policy Management Editor, go to **Computer configuration**, and then select **Administrative templates**.
470470

471-
1. Expand the tree to __Windows components__ > __Microsoft Defender Antivirus__ > __Network inspection system__.
471+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
472472

473-
1. Double-click __Turn on asynchronous inspection__ and set the option to __Enabled__.
473+
5. Double-click **Turn on asynchronous inspection**, and then set the option to **Enabled**.
474474

475-
1. Select __OK__.
475+
6. Select **OK**.
476476

477-
1. This enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
478477

479478
#### Use Microsoft Defender Antivirus Powershell cmdlet to enable Turn on asynchronous inspection
480479

481-
#### You can turn on this capability by using the following PowerShell cmdlet:
480+
You can turn on this capability by using the following PowerShell cmdlet:
482481

483482
`Set-MpPreference -AllowSwitchToAsyncInspection $true`
484483

0 commit comments

Comments
 (0)