Skip to content

Commit d02d84b

Browse files
committed
Merge branch 'main' into pr/1590
2 parents ca9f897 + 0495fa2 commit d02d84b

File tree

1 file changed

+57
-65
lines changed

1 file changed

+57
-65
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 57 additions & 65 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Turn on network protection
33
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 07/25/2024
6+
ms.date: 10/14/2024
77
ms.topic: conceptual
88
author: denisebmsft
99
ms.author: deniseb
@@ -19,20 +19,19 @@ search.appverid: met150
1919

2020
# Turn on network protection
2121

22-
[!INCLUDE [Microsoft Defender XDR rebranding](../includes/microsoft-defender.md)]
23-
2422
**Applies to:**
2523

2624
- [Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
2725
- [Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
2826
- [Microsoft Defender XDR](/defender-xdr)
27+
- Microsoft Defender for Servers
2928
- Microsoft Defender Antivirus
3029

3130
**Platforms**
3231

3332
- Windows
34-
- Linux \(See [Network protection for Linux](network-protection-linux.md)\)
35-
- macOS \(See [Network protection for macOS](network-protection-macos.md)\)
33+
- Linux (See [Network protection for Linux](network-protection-linux.md))
34+
- macOS (See [Network protection for macOS](network-protection-macos.md))
3635

3736
> [!TIP]
3837
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
@@ -43,27 +42,27 @@ search.appverid: met150
4342

4443
## Check if network protection is enabled
4544

46-
Check to see if network protection is enabled on a local device by using Registry editor.
45+
You can use Registry Editor to check the status of network protection.
4746

48-
1. Select the **Start** button in the task bar and type **regedit** to open Registry editor.
47+
1. Select the **Start** button in the task bar and type `regedit`. In the list of results, select Registry editor to open it.
4948

5049
2. Choose **HKEY_LOCAL_MACHINE** from the side menu.
5150

5251
3. Navigate through the nested menus to **SOFTWARE** \> **Policies** \> **Microsoft** \> **Windows Defender** \> **Policy Manager**.
5352

54-
If the Key is missing, Navigate to **SOFTWARE** \> **Microsoft** \> **Windows Defender** \> **Windows Defender Exploit Guard** \> **Network Protection**.
53+
If the key is missing, navigate to **SOFTWARE** \> **Microsoft** \> **Windows Defender** \> **Windows Defender Exploit Guard** \> **Network Protection**.
5554

5655
4. Select **EnableNetworkProtection** to see the current state of network protection on the device:
5756

58-
- 0, or **Off**
59-
- 1, or **On**
60-
- 2, or **Audit** mode
57+
- **0**, or **Off**
58+
- **1**, or **On**
59+
- **2**, or **Audit** mode
6160

62-
:::image type="content" source="/defender/media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png" alt-text="Network Protection registry key" lightbox="/defender/media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png":::
61+
:::image type="content" source="/defender/media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png" alt-text="Network Protection registry key" lightbox="/defender/media/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png":::
6362

6463
## Enable network protection
6564

66-
Enable network protection by using any of these methods:
65+
To enable network protection, you can use one of the following methods:
6766

6867
- [PowerShell](#powershell)
6968
- [Mobile Device Management (MDM)](#mobile-device-management-mdm)
@@ -73,36 +72,34 @@ Enable network protection by using any of these methods:
7372

7473
### PowerShell
7574

76-
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and select **Run as administrator**.
75+
1. On your Windows device, select Start, type `powershell`, right-click **Windows PowerShell**, and then select **Run as administrator**.
7776

78-
1. Enter the following cmdlet:
77+
2. Run the following cmdlet:
7978

80-
```PowerShell
79+
```PowerShell
8180
Set-MpPreference -EnableNetworkProtection Enabled
82-
```
83-
84-
1. Optional: Enable the feature in audit mode using the following cmdlet:
81+
```
8582

86-
```PowerShell
87-
Set-MpPreference -EnableNetworkProtection AuditMode
88-
```
89-
90-
To turn off the feature, use `Disabled` instead of `AuditMode` or `Enabled`.
91-
92-
> [!TIP]
93-
> For Windows Server (Windows Server 2022 and above ) , youan extra setting
83+
3. For Windows Server, use the additional commands that listed in the following table:
84+
85+
| Windows Server version | Commands |
86+
|---|---|
87+
| Windows Server 2022 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
88+
| Windows Server 2016 <br/>Windows Server 2012 R2 | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
89+
90+
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
9491

95-
```
96-
set-mpPreference -AllowNetworkProtectionOnWinServer $true
97-
```
92+
```PowerShell
93+
Set-MpPreference -EnableNetworkProtection AuditMode
94+
```
9895

99-
**Mobile device management (MDM)**
96+
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
10097

101-
Mobile device management (MDM)
98+
### Mobile device management (MDM)
10299

103-
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
100+
1. Use the [EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
104101

105-
[Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
102+
2. [Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
106103

107104
### Microsoft Intune
108105

@@ -150,13 +147,13 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/
150147

151148
4. In the **Template name**, Choose **Endpoint protection** from the list of templates, and then select **Create**.
152149

153-
4. Go to **Endpoint protection** > **Basics**, provide a name for your profile, and then select **Next**.
150+
5. Go to **Endpoint protection** > **Basics**, provide a name for your profile, and then select **Next**.
154151

155-
5. In the **Configuration settings** section, go to **Microsoft Defender Exploit Guard** > **Network filtering** > **Network protection** > **Enable** or **Audit**. Select **Next**.
152+
6. In the **Configuration settings** section, go to **Microsoft Defender Exploit Guard** > **Network filtering** > **Network protection** > **Enable** or **Audit**. Select **Next**.
156153

157-
6. Select the appropriate **Scope tags**, **Assignments**, and **Applicability rules** as required by your organization. Admins can set more requirements.
154+
7. Select the appropriate **Scope tags**, **Assignments**, and **Applicability rules** as required by your organization. Admins can set more requirements.
158155

159-
7. Review all the information, and then select **Create**.
156+
8. Review all the information, and then select **Create**.
160157

161158
### Group Policy
162159

@@ -172,8 +169,7 @@ Use the following procedure to enable network protection on domain-joined comput
172169

173170
3. Expand the tree to **Windows components** \> **Microsoft Defender Antivirus** \> **Microsoft Defender Exploit Guard** \> **Network protection**.
174171

175-
> [!NOTE]
176-
> On older versions of Windows, the group policy path may say "Windows Defender Antivirus" instead of "Microsoft Defender Antivirus."
172+
Note that on older versions of Windows, the Group Policy path might have *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus*.
177173

178174
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
179175

@@ -184,8 +180,7 @@ Use the following procedure to enable network protection on domain-joined comput
184180
> [!IMPORTANT]
185181
> To fully enable network protection, you must set the Group Policy option to **Enabled** and also select **Block** in the options drop-down menu.
186182
187-
> [!NOTE]
188-
> Optional: Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
183+
5. (This step is optional.) Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
189184

190185
### Microsoft Configuration Manager
191186

@@ -208,37 +203,34 @@ Use the following procedure to enable network protection on domain-joined comput
208203

209204
7. From the ribbon, select **Deploy** to deploy the policy to a collection.
210205

211-
> [!IMPORTANT]
212-
> Once you deploy an Exploit Guard policy from Configuration Manager, the Exploit Guard settings will not be removed from the clients if you remove the deployment. `Delete not supported` is recorded in the Configuration Manager client's ExploitGuardHandler.log if you remove the client's Exploit Guard deployment. <!--CMADO8538577-->
213-
> The following PowerShell script can be run under SYSTEM context to remove these settings:<!--CMADO9907132-->
214-
>
215-
> ```powershell
216-
> $defenderObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_Defender02" -Filter "InstanceID='Defender' and ParentID='./Vendor/MSFT/Policy/Config'"
217-
> $defenderObject.AttackSurfaceReductionRules = $null
218-
> $defenderObject.AttackSurfaceReductionOnlyExclusions = $null
219-
> $defenderObject.EnableControlledFolderAccess = $null
220-
> $defenderObject.ControlledFolderAccessAllowedApplications = $null
221-
> $defenderObject.ControlledFolderAccessProtectedFolders = $null
222-
> $defenderObject.EnableNetworkProtection = $null
223-
> $defenderObject.Put()
224-
>
225-
> $exploitGuardObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_ExploitGuard02" -Filter "InstanceID='ExploitGuard' and ParentID='./Vendor/MSFT/Policy/Config'"
226-
> $exploitGuardObject.ExploitProtectionSettings = $null
227-
> $exploitGuardObject.Put()
228-
>```
206+
#### Important information about removing Exploit Guard settings from a device
207+
208+
Once an Exploit Guard policy is deployed using Configuration Manager, Exploit Guard settings aren't removed from the clients if you remove the deployment. Furthermore, if you remove the client's Exploit Guard deployment, `Delete not supported` is recorded in the client's `ExploitGuardHandler.log` in Configuration Manager. <!--CMADO8538577-->
209+
210+
Use the following PowerShell script in the SYSTEM context to remove Exploit Guard settings correctly:<!--CMADO9907132-->
211+
212+
```powershell
213+
$defenderObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_Defender02" -Filter "InstanceID='Defender' and ParentID='./Vendor/MSFT/Policy/Config'"
214+
$defenderObject.AttackSurfaceReductionRules = $null
215+
$defenderObject.AttackSurfaceReductionOnlyExclusions = $null
216+
$defenderObject.EnableControlledFolderAccess = $null
217+
$defenderObject.ControlledFolderAccessAllowedApplications = $null
218+
$defenderObject.ControlledFolderAccessProtectedFolders = $null
219+
$defenderObject.EnableNetworkProtection = $null
220+
$defenderObject.Put()
221+
222+
$exploitGuardObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_ExploitGuard02" -Filter "InstanceID='ExploitGuard' and ParentID='./Vendor/MSFT/Policy/Config'"
223+
$exploitGuardObject.ExploitProtectionSettings = $null
224+
$exploitGuardObject.Put()
225+
```
229226

230227
## See also
231228

232229
- [Network protection](network-protection.md)
233-
234230
- [Network protection for Linux](network-protection-linux.md)
235-
236231
- [Network protection for macOS](network-protection-macos.md)
237-
238232
- [Network protection and the TCP three-way handshake](network-protection.md#network-protection-and-the-tcp-three-way-handshake)
239-
240233
- [Evaluate network protection](evaluate-network-protection.md)
241-
242234
- [Troubleshoot network protection](troubleshoot-np.md)
243235

244236
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)