Skip to content

Commit e258841

Browse files
authored
Update date, formatting, and links in documentation
1 parent 63b6fcc commit e258841

File tree

1 file changed

+25
-28
lines changed

1 file changed

+25
-28
lines changed

defender-endpoint/network-protection.md

Lines changed: 25 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Use network protection to help prevent connections to malicious or suspic
33
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
44
ms.service: defender-endpoint
55
ms.localizationpriority: medium
6-
ms.date: 02/10/2025
6+
ms.date: 04/08/2025
77
audience: ITPro
88
author: denisebmsft
99
ms.author: deniseb
@@ -95,7 +95,7 @@ Network protection is a part of the [attack surface reduction](overview-attack-s
9595
- Block browser access to websites based on category ([Web content filtering](web-content-filtering.md))
9696

9797
> [!TIP]
98-
> For details about network protection for Windows Server, Linux, MacOS and Mobile Threat Defense (MTD), see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
98+
> For details about network protection for Windows Server, Linux, macOS and Mobile Threat Defense (MTD), see [Proactively hunt for threats with advanced hunting](/defender-xdr/advanced-hunting-overview).
9999
100100
### Block Command and Control attacks
101101

@@ -114,7 +114,7 @@ The network protection component of Defender for Endpoint identifies and blocks
114114

115115
In its initial form, ransomware is a commodity threat that's preprogrammed and focused on limited, specific outcomes (like encrypting a computer). However, ransomware has evolved into a sophisticated threat that is human-driven, adaptive, and focused on larger scale and more widespread outcomes, like holding an entire organization's assets or data for ransom.
116116

117-
Support for Command and Control servers (C2) is an important part of this ransomware evolution, and it's what enables these attacks to adapt to the environment they target. Breaking the link to the command-and-control infrastructure stops the progression of an attack to its next stage. For more information about C2 detection and remediation, see [Detecting and remediating command and control attacks at the network layer](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/detecting-and-remediating-command-and-control-attacks-at-the/ba-p/3650607).
117+
Support for Command and Control servers (C2) is an important part of this ransomware evolution, and it's what enables these attacks to adapt to the environment they target. Breaking the link to the command-and-control infrastructure stops the progression of an attack to its next stage. For more information about C2 detection and remediation, see [Tech Community blog: Detecting and remediating command and control attacks at the network layer](https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/detecting-and-remediating-command-and-control-attacks-at-the/ba-p/3650607).
118118

119119
#### Network protection: New toast notifications
120120

@@ -156,23 +156,23 @@ A user visits a website. If the url has an unknown or uncertain reputation, a to
156156
157157
#### Use CSP to enable `Convert warn verdict to block`
158158

159-
[/windows/client-management/mdm/defender-csp](/windows/client-management/mdm/defender-csp#configurationenableconvertwarntoblock)
159+
[Defender CSP: Configuration/EnableConvertWarnToBlock](/windows/client-management/mdm/defender-csp#configurationenableconvertwarntoblock)
160160

161161
#### Use Group Policy to enable Convert warn verdict to block
162162

163163
By enabling this setting, network protection blocks network traffic instead of displaying a warning.
164164

165-
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
165+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
166166

167-
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
167+
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
168168

169-
3. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
169+
3. In the **Group Policy Management Editor** go to **Computer configuration** and then select **Administrative templates**.
170170

171-
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
171+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
172172

173-
5. Double-click **Convert warn verdict to block** and set the option to **Enabled**.
173+
5. Double-click **Convert warn verdict to block** and set the option to **Enabled**.
174174

175-
6. Select **OK**.
175+
6. Select **OK**.
176176

177177
#### Block experience
178178

@@ -293,7 +293,8 @@ After you've enabled network protection, you might need to configure your networ
293293
- `.smartscreen.microsoft.com`
294294
- `.smartscreen-prod.microsoft.com`
295295

296-
## Required Browser Configuration
296+
## Required browser configuration
297+
297298
In non-Microsoft Edge processes, Network Protection determines the fully qualified domain name for each HTTPS connection by examining the content of the TLS handshake that occurs after a TCP/IP handshake. This requires that the HTTPS connection use TCP/IP (not UDP/QUIC) and that the ClientHello message not be encrypted. To disable QUIC and Encrypted Client Hello in Google Chrome, see [QuicAllowed](https://chromeenterprise.google/policies/#QuicAllowed) and [EncryptedClientHelloEnabled](https://chromeenterprise.google/policies/#EncryptedClientHelloEnabled). For Mozilla Firefox, see [Disable EncryptedClientHello](https://mozilla.github.io/policy-templates/#disableencryptedclienthello) and [network.http.http3.enable](https://support.mozilla.org/ml/questions/1408003#answer-1571474).
298299

299300
## Viewing network protection events
@@ -342,15 +343,11 @@ Here's an example of how that works:
342343

343344
Due to the multi-user nature of Windows 10 Enterprise, keep the following points in mind:
344345

345-
1. Network protection is a device-wide feature and can't be targeted to specific user sessions.
346-
347-
2. Web content filtering policies are also device-wide.
348-
349-
3. If you need to differentiate between user groups, consider creating separate Windows Virtual Desktop host pools and assignments.
350-
351-
4. Test network protection in audit mode to assess its behavior before rolling out.
352-
353-
5. Consider resizing your deployment if you have a large number of users or a large number of multi-user sessions.
346+
- Network protection is a device-wide feature and can't be targeted to specific user sessions.
347+
- Web content filtering policies are also device-wide.
348+
- If you need to differentiate between user groups, consider creating separate Windows Virtual Desktop host pools and assignments.
349+
- Test network protection in audit mode to assess its behavior before rolling out.
350+
- Consider resizing your deployment if you have a large number of users or a large number of multi-user sessions.
354351

355352
### Alternative option for network protection
356353

@@ -370,7 +367,7 @@ For Windows Server 2012 R2 and Windows Server 2016 using the [modern unified sol
370367
371368
### Network protection for Windows Servers
372369

373-
Following is information specific to Windows Servers.
370+
The following information is specific to Windows Servers.
374371

375372
#### Verify that network protection is enabled
376373

@@ -462,23 +459,23 @@ Network protection includes performance optimization that allows `block` mode to
462459

463460
#### Use CSP to enable AllowSwitchToAsyncInspection
464461

465-
[/windows/client-management/mdm/defender-csp](/windows/client-management/mdm/defender-csp#configurationallowswitchtoasyncinspection)
462+
[Defender CSP: Configuration/AllowSwitchToAsyncInspection](/windows/client-management/mdm/defender-csp#configurationallowswitchtoasyncinspection)
466463

467464
#### Use Group Policy to enable Turn on asynchronous inspection
468465

469466
This procedure enables network protection to improve performance by switching from real-time inspection to asynchronous inspection.
470467

471-
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
468+
1. On your Group Policy management computer, open the [Group Policy Management Console](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/cc731212(v=ws.11)).
472469

473-
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
470+
2. Right-click the Group Policy Object you want to configure, and then select **Edit**.
474471

475-
3. In the Group Policy Management Editor, go to **Computer configuration**, and then select **Administrative templates**.
472+
3. In the Group Policy Management Editor, go to **Computer configuration**, and then select **Administrative templates**.
476473

477-
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
474+
4. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Network inspection system**.
478475

479-
5. Double-click **Turn on asynchronous inspection**, and then set the option to **Enabled**.
476+
5. Double-click **Turn on asynchronous inspection**, and then set the option to **Enabled**.
480477

481-
6. Select **OK**.
478+
6. Select **OK**.
482479

483480

484481
#### Use Microsoft Defender Antivirus Powershell cmdlet to enable Turn on asynchronous inspection

0 commit comments

Comments
 (0)