You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/network-protection.md
+25-28Lines changed: 25 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
3
3
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
4
4
ms.service: defender-endpoint
5
5
ms.localizationpriority: medium
6
-
ms.date: 02/10/2025
6
+
ms.date: 04/08/2025
7
7
audience: ITPro
8
8
author: denisebmsft
9
9
ms.author: deniseb
@@ -95,7 +95,7 @@ Network protection is a part of the [attack surface reduction](overview-attack-s
95
95
- Block browser access to websites based on category ([Web content filtering](web-content-filtering.md))
96
96
97
97
> [!TIP]
98
-
> For details about network protection for Windows Server, Linux, MacOS and Mobile Threat Defense (MTD), see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
98
+
> For details about network protection for Windows Server, Linux, macOS and Mobile Threat Defense (MTD), see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
99
99
100
100
### Block Command and Control attacks
101
101
@@ -114,7 +114,7 @@ The network protection component of Defender for Endpoint identifies and blocks
114
114
115
115
In its initial form, ransomware is a commodity threat that's preprogrammed and focused on limited, specific outcomes (like encrypting a computer). However, ransomware has evolved into a sophisticated threat that is human-driven, adaptive, and focused on larger scale and more widespread outcomes, like holding an entire organization's assets or data for ransom.
116
116
117
-
Support for Command and Control servers (C2) is an important part of this ransomware evolution, and it's what enables these attacks to adapt to the environment they target. Breaking the link to the command-and-control infrastructure stops the progression of an attack to its next stage. For more information about C2 detection and remediation, see [Detecting and remediating command and control attacks at the network layer](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/detecting-and-remediating-command-and-control-attacks-at-the/ba-p/3650607).
117
+
Support for Command and Control servers (C2) is an important part of this ransomware evolution, and it's what enables these attacks to adapt to the environment they target. Breaking the link to the command-and-control infrastructure stops the progression of an attack to its next stage. For more information about C2 detection and remediation, see [Tech Community blog: Detecting and remediating command and control attacks at the network layer](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/detecting-and-remediating-command-and-control-attacks-at-the/ba-p/3650607).
118
118
119
119
#### Network protection: New toast notifications
120
120
@@ -156,23 +156,23 @@ A user visits a website. If the url has an unknown or uncertain reputation, a to
156
156
157
157
#### Use CSP to enable `Convert warn verdict to block`
#### Use Group Policy to enable Convert warn verdict to block
162
162
163
163
By enabling this setting, network protection blocks network traffic instead of displaying a warning.
164
164
165
-
1. On your Group Policy management computer, open the[Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
165
+
1. On your Group Policy management computer, open the[Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
166
166
167
-
2. Right-click the Group Policy Object you want to configure, and then select**Edit**.
167
+
2. Right-click the Group Policy Object you want to configure, and then select**Edit**.
168
168
169
-
3. In the**Group Policy Management Editor**go to**Computer configuration**and then select**Administrative templates**.
169
+
3. In the**Group Policy Management Editor**go to**Computer configuration**and then select**Administrative templates**.
170
170
171
-
4. Expand the tree to**Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
171
+
4. Expand the tree to**Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
172
172
173
-
5. Double-click**Convert warn verdict to block**and set the option to**Enabled**.
173
+
5. Double-click**Convert warn verdict to block**and set the option to**Enabled**.
174
174
175
-
6. Select**OK**.
175
+
6. Select**OK**.
176
176
177
177
#### Block experience
178
178
@@ -293,7 +293,8 @@ After you've enabled network protection, you might need to configure your networ
293
293
-`.smartscreen.microsoft.com`
294
294
-`.smartscreen-prod.microsoft.com`
295
295
296
-
## Required Browser Configuration
296
+
## Required browser configuration
297
+
297
298
In non-Microsoft Edge processes, Network Protection determines the fully qualified domain name for each HTTPS connection by examining the content of the TLS handshake that occurs after a TCP/IP handshake. This requires that the HTTPS connection use TCP/IP (not UDP/QUIC) and that the ClientHello message not be encrypted. To disable QUIC and Encrypted Client Hello in Google Chrome, see [QuicAllowed](https://chromeenterprise.google/policies/#QuicAllowed) and [EncryptedClientHelloEnabled](https://chromeenterprise.google/policies/#EncryptedClientHelloEnabled). For Mozilla Firefox, see [Disable EncryptedClientHello](https://mozilla.github.io/policy-templates/#disableencryptedclienthello) and [network.http.http3.enable](https://support.mozilla.org/ml/questions/1408003#answer-1571474).
298
299
299
300
## Viewing network protection events
@@ -342,15 +343,11 @@ Here's an example of how that works:
342
343
343
344
Due to the multi-user nature of Windows 10 Enterprise, keep the following points in mind:
344
345
345
-
1. Network protection is a device-wide feature and can't be targeted to specific user sessions.
346
-
347
-
2. Web content filtering policies are also device-wide.
348
-
349
-
3. If you need to differentiate between user groups, consider creating separate Windows Virtual Desktop host pools and assignments.
350
-
351
-
4. Test network protection in audit mode to assess its behavior before rolling out.
352
-
353
-
5. Consider resizing your deployment if you have a large number of users or a large number of multi-user sessions.
346
+
- Network protection is a device-wide feature and can't be targeted to specific user sessions.
347
+
- Web content filtering policies are also device-wide.
348
+
- If you need to differentiate between user groups, consider creating separate Windows Virtual Desktop host pools and assignments.
349
+
- Test network protection in audit mode to assess its behavior before rolling out.
350
+
- Consider resizing your deployment if you have a large number of users or a large number of multi-user sessions.
354
351
355
352
### Alternative option for network protection
356
353
@@ -370,7 +367,7 @@ For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified sol
370
367
371
368
### Network protection for Windows Servers
372
369
373
-
Following is information specific to Windows Servers.
370
+
The following information is specific to Windows Servers.
374
371
375
372
#### Verify that network protection is enabled
376
373
@@ -462,23 +459,23 @@ Network protection includes performance optimization that allows `block` mode to
462
459
463
460
#### Use CSP to enable AllowSwitchToAsyncInspection
#### Use Group Policy to enable Turn on asynchronous inspection
468
465
469
466
This procedure enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
470
467
471
-
1. On your Group Policy management computer, open the[Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
468
+
1. On your Group Policy management computer, open the[Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
472
469
473
-
2. Right-click the Group Policy Object you want to configure, and then select**Edit**.
470
+
2. Right-click the Group Policy Object you want to configure, and then select**Edit**.
474
471
475
-
3. In theGroup Policy Management Editor, go to**Computer configuration**,and then select**Administrative templates**.
472
+
3. In theGroup Policy Management Editor, go to**Computer configuration**,and then select**Administrative templates**.
476
473
477
-
4. Expand the tree to**Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
474
+
4. Expand the tree to**Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
478
475
479
-
5. Double-click**Turn on asynchronous inspection**, and then set the option to**Enabled**.
476
+
5. Double-click**Turn on asynchronous inspection**, and then set the option to**Enabled**.
480
477
481
-
6. Select**OK**.
478
+
6. Select**OK**.
482
479
483
480
484
481
#### Use Microsoft Defender Antivirus Powershell cmdlet to enable Turn on asynchronous inspection
0 commit comments