You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection.md
+13-14Lines changed: 13 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
3
3
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 01/16/2025
6
+
ms.date: 02/10/2025
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -63,9 +63,7 @@ The following table summarizes network protection areas of coverage.
63
63
- Encrypted URLs (full path) are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge).
64
64
- Encrypted URLs (FQDN only) are blocked in non-Microsoft browsers.
65
65
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, are only blocked on Microsoft browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
66
-
67
66
- Network Protection will block connections on both standard and non-standard ports.
68
-
69
67
- Full URL path blocks are applied for unencrypted URLs.
70
68
71
69
There might be up to two hours of latency (usually less) between the time when the action is taken and the URL/IP is blocked.
@@ -125,7 +123,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
125
123
#### Network protection: New toast notifications
126
124
127
125
| New mapping | Response category | Sources |
128
-
|:--- |:--- |:--- |
126
+
| --- | --- | --- |
129
127
|`phishing`|`Phishing`|`SmartScreen`|
130
128
|`malicious`|`Malicious`|`SmartScreen`|
131
129
|`command and control`|`C2`|`SmartScreen`|
@@ -135,7 +133,7 @@ Support for Command and Control servers (C2) is an important part of this ransom
135
133
|`by your IT admin`|`CustomPolicy`||
136
134
137
135
> [!NOTE]
138
-
> **customAllowList** does not generate notifications on endpoints.
136
+
> `customAllowList` does not generate notifications on endpoints.
139
137
140
138
### New notifications for network protection determination
141
139
@@ -297,7 +295,7 @@ Defender for Endpoint provides detailed reporting into events and blocks as part
297
295
298
296
You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
299
297
300
-
1.[Copy the XML directly](overview-attack-surface-reduction.md).
298
+
1.[Copy the XML directly](/defender-endpoint/overview-attack-surface-reduction#copy-the-xml-directly).
301
299
302
300
2. Select **OK**.
303
301
@@ -460,25 +458,26 @@ Network protection includes performance optimization that allows `block` mode to
#### __Use Group Policy to enable Turn on asynchronous inspection__
461
+
#### Use Group Policy to enable Turn on asynchronous inspection
462
+
463
+
This procedure enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
464
464
465
465
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
466
466
467
-
1. Right-click the Group Policy Object you want to configure, and then select __Edit__.
467
+
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
468
468
469
-
1. In the __Group Policy Management Editor__go to __Computer configuration__ and then select __Administrative templates__.
469
+
3. In the Group Policy Management Editor, go to **Computer configuration**, and then select **Administrative templates**.
470
470
471
-
1. Expand the tree to __Windows components__ > __Microsoft Defender Antivirus__ > __Network inspection system__.
471
+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
472
472
473
-
1. Double-click __Turn on asynchronous inspection__and set the option to __Enabled__.
473
+
5. Double-click **Turn on asynchronous inspection**, and then set the option to **Enabled**.
474
474
475
-
1. Select __OK__.
475
+
6. Select **OK**.
476
476
477
-
1. This enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
478
477
479
478
#### Use Microsoft Defender Antivirus Powershell cmdlet to enable Turn on asynchronous inspection
480
479
481
-
#### You can turn on this capability by using the following PowerShell cmdlet:
480
+
You can turn on this capability by using the following PowerShell cmdlet:
0 commit comments