You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/configure-extension-file-exclusions-microsoft-defender-antivirus.md
+4-5Lines changed: 4 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Exclude files from Microsoft Defender Antivirus scans based on thei
4
4
ms.service: defender-endpoint
5
5
ms.subservice: ngp
6
6
ms.localizationpriority: medium
7
-
ms.date: 01/27/2025
7
+
ms.date: 05/19/2025
8
8
author: emmwalshh
9
9
ms.author: ewalsh
10
10
ms.topic: conceptual
@@ -38,10 +38,9 @@ You can define exclusions for Microsoft Defender Antivirus that apply to [schedu
38
38
-[Exclusions for files that are opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md)
39
39
40
40
> [!IMPORTANT]
41
-
> Microsoft Defender Antivirus exclusions do apply to some Microsoft Defender for Endpoint capabilities, such as [attack surface reduction rules](attack-surface-reduction.md). Some Microsoft Defender Antivirus exclusions are applicable to some ASR rule exclusions. See [Attack surface reduction rules reference - Microsoft Defender Antivirus exclusions and ASR rules](attack-surface-reduction-rules-reference.md#microsoft-defender-antivirus-exclusions-and-asr-rules).
42
-
> Files that you exclude using the methods described in this article can still trigger Endpoint Detection and Response (EDR) alerts and other detections.
43
-
> To exclude files broadly, add them to the Microsoft Defender for Endpoint [custom indicators](indicators-overview.md).
44
-
> Variables, such as `%USERPROFILE%` aren't interpreted in exclusion settings. We recommend using an explicit path format.
41
+
> - Microsoft Defender Antivirus exclusions do apply to some Microsoft Defender for Endpoint capabilities, such as [attack surface reduction rules](attack-surface-reduction.md). Some Microsoft Defender Antivirus exclusions are applicable to some ASR rule exclusions. See [Attack surface reduction rules reference - Microsoft Defender Antivirus exclusions and ASR rules](attack-surface-reduction-rules-reference.md#microsoft-defender-antivirus-exclusions-and-asr-rules).
42
+
> - Files that you exclude using the methods described in this article can still trigger Endpoint Detection and Response (EDR) alerts and other detections. To exclude files broadly, add them to the Microsoft Defender for Endpoint [custom indicators](indicators-overview.md).
43
+
> - Variables, such as `%USERPROFILE%` aren't interpreted in exclusion settings. We recommend using an explicit path format.
5. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
62
60
63
-
## Enable network protection
61
+
6. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
62
+
63
+
- Network Protection on Windows clients:
64
+
65
+
| Description| Setting|
66
+
| -------- | -------- |
67
+
| Enable Network Protection|Options:<br>- Enabled (block mode) Block mode is needed to block IP address/URL indicators and Web Content Filtering.<br>- Enabled (audit mode) <br>- Disabled (Default) <br>- Not Configured|
68
+
69
+
- Network Protection on Windows Server 2012 R2 and Windows Server 2016
70
+
71
+
| Description|Setting|
72
+
| -------- | -------- |
73
+
|Allow Network Protection Down Level|Options:<br>- Network protection will be enabled downlevel. <br>- Network Protection will be disabled downlevel. (Default) <br>- Not Configured|
74
+
75
+
- Optional Network Protection settings for Windows and Windows Server:
76
+
77
+
> [!WARNING]
78
+
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the **Allow Datagram Processing On WinServer** to **Datagram processing on Windows Server is disabled**. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
79
+
80
+
|Description| Setting|
81
+
| -------- | -------- |
82
+
|Allow Datagram Processing On Win Server|- Datagram processing on Windows Server is enabled. <br>- Datagram processing on Windows Server is disabled (Default). <br>- Not configured|
83
+
|Disable DNS over TCP parsing|- DNS over TCP parsing is disabled. <br>- DNS over TCP parsing is enabled (Default). <br>- Not configured|
84
+
|Disable HTTP parsing|- HTTP parsing is disabled. <br>- HTTP parsing is enabled (Default). <br>- Not configured|
85
+
|Disable SSH parsing|- SSH parsing is disabled. <br>- SSH parsing is enabled (Default). <br>- Not configured|
86
+
|Disable TLS parsing |- TLS parsing is disabled. <br>- TLS parsing is enabled (Default). <br>- Not configured|
87
+
|[Deprecated]Enable DNS Sinkhole|- DNS Sinkhole is disabled. <br>- DNS Sinkhole is enabled. (Default) <br>- Not configured|
88
+
89
+
7. When you're done configuring settings, select **Next**.
90
+
91
+
8. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
64
92
65
-
To enable network protection, you can use one of the following methods:
93
+
9. On the **Review + create** page, review the information, and then select **Save**.
The new profile is displayed in the list when you select the policy type for the profile you created.
72
96
73
97
### Microsoft Intune
74
98
@@ -188,15 +212,16 @@ Use the following procedure to enable network protection on domain-joined comput
188
212
Set-MpPreference -EnableNetworkProtection Enabled
189
213
```
190
214
191
-
3. For Windows Server, use the additional commands listed in the following table:
215
+
1. For Windows Server, use the additional commands listed in the following table:
192
216
193
-
| Windows Server version | Commands |
194
-
|---|---|
195
-
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
196
-
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
217
+
| Windows Server version | Commands |
218
+
|---|---|
219
+
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
220
+
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
197
221
198
222
> [!IMPORTANT]
199
-
> For Domain Controllers and Microsoft Exchange servers, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
223
+
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
224
+
200
225
201
226
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
202
227
@@ -206,6 +231,27 @@ Use the following procedure to enable network protection on domain-joined comput
206
231
207
232
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
208
233
234
+
235
+
## Check if network protection is enabled
236
+
237
+
You can use Registry Editor to check the status of network protection.
238
+
239
+
1. Select the **Start** button in the task bar and type `regedit`. In the list of results, select Registry editor to open it.
240
+
241
+
2. Choose **HKEY_LOCAL_MACHINE** from the side menu.
242
+
243
+
3. Navigate through the nested menus to **SOFTWARE**\>**Policies**\>**Microsoft**\>**Windows Defender**\>**Policy Manager**.
244
+
245
+
If the key is missing, navigate to **SOFTWARE**\>**Microsoft**\>**Windows Defender**\>**Windows Defender Exploit Guard**\>**Network Protection**.
246
+
247
+
4. Select **EnableNetworkProtection** to see the current state of network protection on the device:
#### Important information about removing Exploit Guard settings from a device
210
256
211
257
When you deploy an Exploit Guard policy using Configuration Manager, the settings remain on the client even if you later remove the deployment. If the deployment is removed, the client logs `Delete` not supported in the `ExploitGuardHandler.log` file.
Copy file name to clipboardExpand all lines: defender-endpoint/ios-configure-features.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.collection:
14
14
ms.topic: conceptual
15
15
ms.subservice: ios
16
16
search.appverid: met150
17
-
ms.date: 05/15/2025
17
+
ms.date: 05/19/2025
18
18
---
19
19
20
20
# Configure Microsoft Defender for Endpoint on iOS features
@@ -127,10 +127,10 @@ To set up network protection using MDM configuration for enrolled devices, follo
127
127
128
128
| Key | Value Type | Default (true-enable, false-disable) | Description |
129
129
| --- | --- | --- | --- |
130
-
|`DefenderOpenNetworkDetection`| Integer | 2 | 1 - Audit, 0 - Disable, 2 - Enable (default). This setting is managed by an IT Admin to audit, disable, or enable open network detection, respectively. In audit mode, alerts are sent only to the Microsoft Defender portal with no end-user experience. For end-user experience, set it to `Enable`.|
130
+
|`DefenderOpenNetworkDetection`| Integer | 2 | 1 - Audit; 0 - Disable; 2 - Enable (default). This setting is managed by an IT Admin to audit, disable, or enable open network detection, respectively. In audit mode, events are sent only to the Microsoft Defender portal with no end-user experience. For end-user experience, set it to `Enable`.|
131
131
|`DefenderEndUserTrustFlowEnable`| String | false | true - enable, false - disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks. |
132
-
|`DefenderNetworkProtectionAutoRemediation`| String | true | true - enable, false - disable; This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer WIFI access points.|
133
-
|`DefenderNetworkProtectionPrivacy`| String | true | true - enable, false - disable; This setting is managed by IT admin to enable or disable privacy in network protection. If privacy is disabled, then user consent to share the malicious wifi is shown. If privacy is enabled, then no user consent is shown and no app data is collected. |
132
+
|`DefenderNetworkProtectionAutoRemediation`| String | true | true - enable; false - disable. This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer Wi-Fi access points. This setting is only applied to alerts and not device timeline events. So, this is not applicable to open Wi-Fi detection.|
133
+
|`DefenderNetworkProtectionPrivacy`| String | true | true - enable; false - disable. This setting is managed by IT admin to enable or disable privacy in network protection. If privacy is disabled, then user consent to share the malicious Wi-Fi is shown. If privacy is enabled, then no user consent is shown and no app data is collected. |
134
134
135
135
7. In the **Assignments** section, an admin can choose groups of users to include and exclude from the policy.
136
136
@@ -156,10 +156,10 @@ Use the following procedure to set up MAM config for unenrolled devices for netw
|`DefenderOpenNetworkDetection`|2| 1 - Audit, 0 - Disable, 2 - Enable (default). This setting is managed by an IT admin to enable, audit, or disable open network detection. In Audit mode, alerts are sent only to the ATP portal with no user side experience. For user experience, set the config to "Enable" mode.|
160
-
|`DefenderEndUserTrustFlowEnable`| false | true - enable, false - disable; This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks.|
161
-
|`DefenderNetworkProtectionAutoRemediation`| true |true - enable, false - disable; This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer WIFI access points.|
162
-
|`DefenderNetworkProtectionPrivacy`| true |true - enable, false - disable; This setting is managed by IT admin to enable or disable privacy in network protection. If privacy is disabled, then user consent to share the malicious wifi is shown. If privacy is enabled, then no user consent is shown and no app data is collected. |
159
+
|`DefenderOpenNetworkDetection`|2| 1 - Audit; 0 - Disable; 2 - Enable (default). This setting is managed by an IT admin to enable, audit, or disable open network detection. In Audit mode, events are sent only to the ATP portal with no user side experience. For user experience, set the config to "Enable" mode.|
160
+
|`DefenderEndUserTrustFlowEnable`| false | true - enable; false - disable. This setting is used by IT admins to enable or disable the end user in-app experience to trust and untrust the unsecure and suspicious networks.|
161
+
|`DefenderNetworkProtectionAutoRemediation`| true |true - enable; false - disable. This setting is used by the IT admin to enable or disable the remediation alerts that are sent when a user performs remediation activities like switching to safer Wi-Fi access points. This setting is only applied to alerts and not the device timeline events. So, this is not applicable to open Wi-Fi detection.|
162
+
|`DefenderNetworkProtectionPrivacy`| true |true - enable; false - disable. This setting is managed by IT admin to enable or disable privacy in network protection. If privacy is disabled, then user consent to share the malicious wifi is shown. If privacy is enabled, then no user consent is shown and no app data is collected. |
163
163
164
164
5. In the **Assignments** section, an admin can choose groups of users to include and exclude from the policy.
165
165
@@ -170,7 +170,7 @@ Use the following procedure to set up MAM config for unenrolled devices for netw
170
170
> [!IMPORTANT]
171
171
> Starting May 19, 2025, alerts in the Microsoft Defender portal are no longer generated when users connect to an open wireless network. Instead, this activity now generates events and are viewable in the device timeline. With this change, security operations center (SOC) analysts can now view connection/disconnection to open wireless networks as events. If auto-remediation key is enabled, old alerts are resolved automatically after the changes take effect.</br></br>
172
172
> Here are key points about this change:</br>
173
-
> - For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on iOS available on May 2025. Otherwise, the previous experience of generating alerts will still be in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.</br>
173
+
> - For these changes to take effect, end-users must update to the latest version of Defender for Endpoint on iOS available on May 2025. Otherwise, the previous experience of generating alerts is still in place. If auto-remediation key is enabled by the admin, old alerts are resolved automatically after the changes take effect.</br>
174
174
> - When an end-user connects or disconnects to an open wireless network multiple times within the same 24-hour period, only one event each for the connection and disconnection is generated in that 24-hour period and sent to the device timeline.</br>
175
175
> - Enable Users to Trust Networks: After the update, connection and disconnection events to open wireless networks, including to user trusted networks, are sent to the device timeline as events.</br>
176
176
> - This change doesn't impact GCC customers. The previous experience of receiving alerts while connecting to open wireless networks still apply to them.
@@ -339,7 +339,7 @@ Defender for Endpoint on iOS supports vulnerability assessments of OS and apps.
339
339
340
340
2. To enable the feature in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Endpoint Security**\>**Microsoft Defender for Endpoint**\>**Enable App sync for iOS/iPadOS devices**.
> To get the list of all the apps including unmanaged apps, the admin has to enable **Send full application inventory data on personally owned iOS/iPadOS devices** setting in the Intune Admin Portal for the supervised devices marked as "Personal".
0 commit comments