You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Microsoft Defender for Endpoint Plan 1](microsoft-defender-endpoint.md)
27
25
-[Microsoft Defender for Endpoint Plan 2](microsoft-defender-endpoint.md)
28
26
-[Microsoft Defender XDR](/defender-xdr)
27
+
- Microsoft Defender for Servers
29
28
- Microsoft Defender Antivirus
30
29
31
30
**Platforms**
32
31
33
32
- Windows
34
-
- Linux \(See [Network protection for Linux](network-protection-linux.md)\)
35
-
- macOS \(See [Network protection for macOS](network-protection-macos.md)\)
33
+
- Linux (See [Network protection for Linux](network-protection-linux.md))
34
+
- macOS (See [Network protection for macOS](network-protection-macos.md))
36
35
37
36
> [!TIP]
38
37
> Want to experience Defender for Endpoint? [Sign up for a free trial.](https://signup.microsoft.com/create-account/signup?products=7f379fee-c4f9-4278-b0a1-e4c8c2fcdf7e&ru=https://aka.ms/MDEp2OpenTrial?ocid=docs-wdatp-assignaccess-abovefoldlink)
@@ -43,27 +42,27 @@ search.appverid: met150
43
42
44
43
## Check if network protection is enabled
45
44
46
-
Check to see if network protection is enabled on a local device by using Registry editor.
45
+
You can use Registry Editor to check the status of network protection.
47
46
48
-
1. Select the **Start** button in the task bar and type **regedit** to open Registry editor.
47
+
1. Select the **Start** button in the task bar and type `regedit`. In the list of results, select Registry editor to open it.
49
48
50
49
2. Choose **HKEY_LOCAL_MACHINE** from the side menu.
51
50
52
51
3. Navigate through the nested menus to **SOFTWARE**\>**Policies**\>**Microsoft**\>**Windows Defender**\>**Policy Manager**.
53
52
54
-
If the Key is missing, Navigate to **SOFTWARE**\>**Microsoft**\>**Windows Defender**\>**Windows Defender Exploit Guard**\>**Network Protection**.
53
+
If the key is missing, navigate to **SOFTWARE**\>**Microsoft**\>**Windows Defender**\>**Windows Defender Exploit Guard**\>**Network Protection**.
55
54
56
55
4. Select **EnableNetworkProtection** to see the current state of network protection on the device:
To turn off the feature, use `Disabled` instead of `AuditMode` or `Enabled`.
91
-
92
-
> [!TIP]
93
-
> For Windows Server (Windows Server 2022 and above ) , youan extra setting
83
+
3. For Windows Server, use the additional commands that listed in the following table:
84
+
85
+
| Windows Server version | Commands |
86
+
|---|---|
87
+
| Windows Server 2022 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true`|
88
+
| Windows Server 2016 <br/>Windows Server 2012 R2 |`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true`|
89
+
90
+
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
100
97
101
-
Mobile device management (MDM)
98
+
### Mobile device management (MDM)
102
99
103
-
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
100
+
1.Use the [EnableNetworkProtection](/windows/client-management/mdm/policy-csp-defender#enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
104
101
105
-
[Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
102
+
2.[Update Microsoft Defender antimalware platform to the latest version](https://support.microsoft.com/topic/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc) before you enable or disable network protection or enable audit mode.
106
103
107
104
### Microsoft Intune
108
105
@@ -150,13 +147,13 @@ Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](/windows/
150
147
151
148
4. In the **Template name**, Choose **Endpoint protection** from the list of templates, and then select **Create**.
152
149
153
-
4. Go to **Endpoint protection** > **Basics**, provide a name for your profile, and then select **Next**.
150
+
5. Go to **Endpoint protection** > **Basics**, provide a name for your profile, and then select **Next**.
154
151
155
-
5. In the **Configuration settings** section, go to **Microsoft Defender Exploit Guard** > **Network filtering** > **Network protection** > **Enable** or **Audit**. Select **Next**.
152
+
6. In the **Configuration settings** section, go to **Microsoft Defender Exploit Guard** > **Network filtering** > **Network protection** > **Enable** or **Audit**. Select **Next**.
156
153
157
-
6. Select the appropriate **Scope tags**, **Assignments**, and **Applicability rules** as required by your organization. Admins can set more requirements.
154
+
7. Select the appropriate **Scope tags**, **Assignments**, and **Applicability rules** as required by your organization. Admins can set more requirements.
158
155
159
-
7. Review all the information, and then select **Create**.
156
+
8. Review all the information, and then select **Create**.
160
157
161
158
### Group Policy
162
159
@@ -172,8 +169,7 @@ Use the following procedure to enable network protection on domain-joined comput
172
169
173
170
3. Expand the tree to **Windows components**\>**Microsoft Defender Antivirus**\>**Microsoft Defender Exploit Guard**\>**Network protection**.
174
171
175
-
> [!NOTE]
176
-
> On older versions of Windows, the group policy path may say "Windows Defender Antivirus" instead of "Microsoft Defender Antivirus."
172
+
Note that on older versions of Windows, the Group Policy path might have *Windows Defender Antivirus* instead of *Microsoft Defender Antivirus*.
177
173
178
174
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
179
175
@@ -184,8 +180,7 @@ Use the following procedure to enable network protection on domain-joined comput
184
180
> [!IMPORTANT]
185
181
> To fully enable network protection, you must set the Group Policy option to **Enabled** and also select **Block** in the options drop-down menu.
186
182
187
-
> [!NOTE]
188
-
> Optional: Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
183
+
5. (This step is optional.) Follow the steps in [Check if network protection is enabled](#check-if-network-protection-is-enabled) to verify that your Group Policy settings are correct.
189
184
190
185
### Microsoft Configuration Manager
191
186
@@ -208,37 +203,34 @@ Use the following procedure to enable network protection on domain-joined comput
208
203
209
204
7. From the ribbon, select **Deploy** to deploy the policy to a collection.
210
205
211
-
> [!IMPORTANT]
212
-
> Once you deploy an Exploit Guard policy from Configuration Manager, the Exploit Guard settings will not be removed from the clients if you remove the deployment. `Delete not supported` is recorded in the Configuration Manager client's ExploitGuardHandler.log if you remove the client's Exploit Guard deployment. <!--CMADO8538577-->
213
-
> The following PowerShell script can be run under SYSTEM context to remove these settings:<!--CMADO9907132-->
#### Important information about removing Exploit Guard settings from a device
207
+
208
+
Once an Exploit Guard policy is deployed using Configuration Manager, Exploit Guard settings aren't removed from the clients if you remove the deployment. Furthermore, if you remove the client's Exploit Guard deployment, `Delete not supported` is recorded in the client's `ExploitGuardHandler.log` in Configuration Manager. <!--CMADO8538577-->
209
+
210
+
Use the following PowerShell script in the SYSTEM context to remove Exploit Guard settings correctly:<!--CMADO9907132-->
0 commit comments