You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/enable-network-protection.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Turn on network protection
3
3
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 05/13/2025
6
+
ms.date: 05/15/2025
7
7
ms.topic: conceptual
8
8
author: emmwalshh
9
9
ms.author: ewalsh
@@ -192,7 +192,7 @@ Use the following procedure to enable network protection on domain-joined comput
192
192
193
193
| Windows Server version | Commands |
194
194
|---|---|
195
-
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true`|
195
+
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true`<br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
196
196
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
Copy file name to clipboardExpand all lines: defender-endpoint/gov.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -158,6 +158,7 @@ These are the known gaps:
158
158
|Microsoft Secure Score|<br/>See note following this table|||
Copy file name to clipboardExpand all lines: defender-office-365/anti-spam-protection-about.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -145,7 +145,7 @@ These settings aren't configured in the default anti-spam policy by default, or
145
145
146
146
² For **High confidence phishing**, the **Move message to Junk Email folder** action is effectively deprecated. Although you might be able to select the **Move message to Junk Email folder** action, high confidence phishing messages are always quarantined (equivalent to selecting **Quarantine message**).
147
147
148
-
³ You can use this value as a condition in [Mail flow rules in Exchange Server](/exchange/policy-and-compliance/mail-flow-rules/mail-flow-rules) to filter or route messages for mailboxes in on-premises Exchange environments.
148
+
³ You can use this value as a condition in [Mail flow rules in Exchange Server](/exchange/policy-and-compliance/mail-flow-rules/mail-flow-rules) to filter or route messages for mailboxes in on-premises Exchange environments only (not in Exchange Online).
149
149
150
150
⁴ If the spam filtering verdict quarantines messages by default (**Quarantine message** is already selected when you get to the page), the default quarantine policy name is shown in the **Select quarantine policy** box. If you _change_ the action of a spam filtering verdict to **Quarantine message**, the **Select quarantine policy** box is blank by default. A blank value means the default quarantine policy for that verdict is used. When you later view or edit the anti-spam policy settings, the quarantine policy name is shown. For more information about the quarantine policies that are used by default for spam filter verdicts, see [EOP anti-spam policy settings](recommended-settings-for-eop-and-office365.md#eop-anti-spam-policy-settings).
Copy file name to clipboardExpand all lines: defender-xdr/configure-attack-disruption.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ audience: ITPro
9
9
ms.topic: how-to
10
10
ms.service: defender-xdr
11
11
ms.localizationpriority: medium
12
-
ms.date: 04/25/2025
12
+
ms.date: 05/15/2025
13
13
ms.collection:
14
14
- m365-security
15
15
- tier2
@@ -45,6 +45,7 @@ The following are prerequisites for configuring automatic attack disruption in M
45
45
The Minimum Sense Agent version required for the **Contain User** action to work is v10.8470. You can identify the Sense Agent version on a device by running the following PowerShell command:
Copy file name to clipboardExpand all lines: defender-xdr/usgov.md
+2-14Lines changed: 2 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,8 +33,6 @@ Microsoft Defender XDR for US Government customers requires one of the following
33
33
34
34
### Desktop licensing
35
35
36
-
<br />
37
-
38
36
****
39
37
40
38
|GCC|GCC High|DoD|
@@ -48,64 +46,54 @@ Microsoft Defender XDR for US Government customers requires one of the following
48
46
|Microsoft Defender for Identity - GCC|Microsoft Defender for Identity for GCC High|Microsoft Defender for Identity for DOD|
49
47
|Microsoft Defender for Office 365 (Plan 2) GCC|Microsoft Defender for Office 365 (Plan 2) for GCC High|Microsoft Defender for Office 365 (Plan 2) for DOD|
50
48
|Windows 10 Enterprise E5 GCC|Windows 10 Enterprise E5 for GCC High|Windows 10 Enterprise E5 for DOD|
51
-
|
52
49
53
50
### Server licensing
54
51
55
-
<br />
56
-
57
52
****
58
53
59
54
|GCC|GCC High|DoD|
60
55
|---|---|---|
61
56
|Microsoft Defender for Endpoint Server GCC|Microsoft Defender for Endpoint Server for GCC High|Microsoft Defender for Endpoint Server for DOD|
62
57
|Microsoft Defender for servers|Microsoft Defender for servers - Government|Microsoft Defender for servers - Government|
63
-
|
64
58
65
59
## Portal URLs
66
60
67
61
The following are the Microsoft Defender portal URLs for US Government customers:
> If you are a GCC customer and in the process of moving from Microsoft Defender for Endpoint commercial to GCC, use https://transition.security.microsoft.com to access your Microsoft Defender for Endpoint commercial data.
81
73
82
74
## API
83
75
84
76
Instead of the public URIs listed in our [API documentation](api-overview.md), you'll need to use the following URIs:
Microsoft Defender XDR for US Government customers doesn't have complete parity with the commercial offering. While our goal is to deliver all commercial features and functionality to our US Government customers, there are some capabilities not yet available we want to highlight.
99
88
100
89
These are the known gaps:
101
90
102
-
<br />
103
-
104
91
****
105
92
106
93
|Feature name|GCC|GCC High|DoD|
107
94
|---|:---:|:---:|:---:|
108
95
|Microsoft Threat Experts| On engineering backlog| On engineering backlog| On engineering backlog|
96
+
|Microsoft Defender for IoT enterprise IoT security||||
109
97
110
98
For detailed list of Event Streaming API tables, see [Microsoft Defender XDR streaming event types supported in Event Streaming API](supported-event-types.md).
0 commit comments