Skip to content

Commit ce03458

Browse files
committed
Learn Editor: Update network-protection.md
1 parent e6d48fe commit ce03458

File tree

1 file changed

+6
-1
lines changed

1 file changed

+6
-1
lines changed

defender-endpoint/network-protection.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,14 +147,19 @@ When an end user attempts to visit a website in an environment in which network
147147
A user visits a website. If the url has an unknown or uncertain reputation, a toast notification presents the user with the following options:
148148

149149
- **Ok**: The toast notification is released (removed), and the attempt to access the site is ended.
150-
- **Unblock**: The user has access to the site for 24 hours; at which point the block is reenabled. The user can continue to use **Unblock** to access the site until such time that the administrator prohibits (blocks) the site, thus removing the option to **Unblock**.
150+
- **Unblock**: The user has access to the site for 24 hours; at which point the block is re-enabled. The user can continue to use **Unblock** to access the site until such time that the administrator prohibits (blocks) the site, thus removing the option to **Unblock**.
151151
- **Feedback**: The toast notification presents the user with a link to submit a ticket, which the user can use to submit feedback to the administrator in an attempt to justify access to the site.
152152

153153
:::image type="content" source="media/network-protection-phishing-warn-2.png" alt-text="Shows a network protection phishing content warn notification.":::
154154

155155
> [!NOTE]
156156
> The images shown in this article for both the `warn` experience and `block` experience use "blocked url" as example placeholder text. In a functioning environment, the actual url or domain is listed.
157157
158+
> [!NOTE]
159+
> To receive this toast notification, make sure the **“Files or activities are blocked”** option is enabled under **Virus & Threat Protection notifications**. The corresponding registry key should be set as follows:
160+
> HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Defender Security Center\Virus and threat protection\FilesBlockedNotificationDisabled = 0
161+
> More details see [Windows Security app settings](https://support.microsoft.com/windows/windows-security-app-settings-1ec98620-4e41-4b6b-b055-3c4bb115d4ee#bkmk_notifications).
162+
158163
#### Use CSP to enable `Convert warn verdict to block`
159164
By default, SmartScreen verdicts for malicious sites result in a warning that can be overridden by the user. A policy can be set to convert the warning to blocks, preventing such overrides.
160165

0 commit comments

Comments
 (0)