Skip to content

Commit c6af8e4

Browse files
committed
Learn Editor: Update web-protection-overview.md
1 parent d473cbf commit c6af8e4

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

defender-endpoint/web-protection-overview.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -48,17 +48,14 @@ Web threat protection includes:
4848

4949
> [!NOTE]
5050
> For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage Network Protection for inspection and enforcement:
51-
>
5251
> - IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS)).
53-
> - Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
54-
> - Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
55-
> - Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
56-
> - Full URL path blocks can be applied for unencrypted URLs.
57-
>
58-
> There may be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
59-
60-
For more information, see [Web threat protection](web-threat-protection.md).
52+
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators.
53+
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge).
54+
- Encrypted URLs (FQDN only) can be blocked in third party browsers (i.e. other than Internet Explorer, Edge).
55+
- Full URL path blocks can be applied for unencrypted URLs.
6156

57+
> There may be up to 2 hours of latency (usually less) between the time the action is taken, and the URL and IP being blocked.
58+
> For more information, see [Web threat protection](web-threat-protection.md).
6259
### Custom indicators
6360

6461
Custom indicator detections are also summarized in your organizations web threat reports under **Web threat detections over time** and **Web threat summary**.
@@ -121,6 +118,8 @@ Internal IP addresses aren't supported by custom indicators. For a warn policy w
121118

122119
In all web protection scenarios, SmartScreen and Network Protection can be used together to ensure protection across both Microsoft and non-Microsoft browsers and processes. SmartScreen is built directly into Microsoft Edge, while Network Protection monitors traffic in non-Microsoft browsers and processes. The following diagram illustrates this concept. This diagram of the two clients working together to provide multiple browser/app coverages is accurate for all features of Web Protection (Indicators, Web Threats, Content Filtering).
123120

121+
> [!NOTE]
122+
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They cannot enforce any enterprise web protection policies.
124123
:::image type="content" source="/defender/media/web-protection-protect-browsers.png" alt-text="The usage of smartScreen and Network Protection together" lightbox="/defender/media/web-protection-protect-browsers.png":::
125124

126125
## Troubleshoot endpoint blocks

0 commit comments

Comments
 (0)