Skip to content

Commit bb96437

Browse files
committed
Update network-protection.md
1 parent 0e60c5a commit bb96437

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

defender-endpoint/network-protection.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -167,9 +167,9 @@ With indicators in Defender for Endpoint, administrators can allow end users to
167167

168168
:::image type="content" source="media/network-protection-smart-screen-block-notification.png" alt-text="Windows Security notification for network protection.":::
169169

170-
Microsoft Defender for Endpoint administrators can configure SmartScreen Unblock functionality in the [Microsoft Defender portal](https://security.microsoft.com) using an "allow" indicator for IPs, URLs, and domains.
170+
Microsoft Defender for Endpoint administrators can configure SmartScreen Unblock functionality in the [Microsoft Defender portal](https://security.microsoft.com) using an allow indicator for IPs, URLs, and domains.
171171

172-
:::image type="content" source="media/network-protection-smart-screen-block-configuration.png" alt-text="Network protection SmartScreen block configuration ULR and IP form.":::
172+
:::image type="content" source="media/network-protection-smart-screen-block-configuration.png" alt-text="Network protection SmartScreen block configuration URL and IP form.":::
173173

174174
See [Create indicators for IPs and URLs/domains](indicator-ip-domain.md).
175175

@@ -178,7 +178,7 @@ See [Create indicators for IPs and URLs/domains](indicator-ip-domain.md).
178178
Network protection is enabled per device, which is typically done using your management infrastructure. For supported methods, see [Turn on network protection](enable-network-protection.md).
179179

180180
> [!NOTE]
181-
> Microsoft Defender Antivirus must be active to enable network protection.
181+
> Microsoft Defender Antivirus must be in active mode to enable network protection.
182182
183183
You can enable network protection in **Audit** mode or **Block** mode. If you want to evaluate the impact of enabling network protection before actually blocking IP addresses or URLs, you can enable network protection in Audit mode for time to gather data on what would be blocked. Audit mode logs when end users have connected to an address or site that would otherwise have been blocked by network protection. Note that in order for indicators of compromise (IoC) or Web content filtering (WCF) to work, network protection must be in "Block mode"
184184

0 commit comments

Comments
 (0)