Skip to content

Commit e541960

Browse files
committed
Learn Editor: Update indicator-ip-domain.md
1 parent 20b66f8 commit e541960

File tree

1 file changed

+23
-16
lines changed

1 file changed

+23
-16
lines changed

defender-endpoint/indicator-ip-domain.md

Lines changed: 23 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -46,38 +46,45 @@ You can block malicious IPs/URLs through the settings page or by machine groups,
4646
> [!NOTE]
4747
> Classless Inter-Domain Routing (CIDR) notation for IP addresses is not supported.
4848
49-
## Before you begin
50-
51-
It's important to understand the following prerequisites prior to creating indicators for IPS, URLs, or domains:
52-
53-
### Network Protection requirements
54-
55-
URL/IP allow and block requires that the Microsoft Defender for Endpoint component _Network Protection_ is enabled in block mode. For more information on Network Protection and configuration instructions, see [Enable network protection](enable-network-protection.md).
56-
5749
### Supported operating systems
5850

59-
- Windows 10, version 1709 or later
6051
- Windows 11
61-
- Windows Server 2016
62-
- Windows Server 2012 R2
63-
- Windows Server 2019
52+
53+
- Windows 10, version 1709 or later
6454
- Windows Server 2022
55+
- Windows Server 2019
56+
- Windows Server 2016 running [Defender for Endpoint modern unified solution](/defender-endpoint/configure-server-endpoints) (requires installation through MSI)
57+
58+
- Windows Server 2012 R2 running [Defender for Endpoint modern unified solution](/defender-endpoint/configure-server-endpoints) (requires installation through MSI)
59+
6560
- macOS
6661
- Linux
6762
- iOS
6863
- Android
6964

70-
### Windows Server 2016 and Windows Server 2012 R2 requirements
65+
## Before you begin
7166

72-
Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the instructions in [Onboard Windows servers](configure-server-endpoints.md#windows-server-2016-and-windows-server-2012-r2).
67+
It's important to understand the following prerequisites prior to creating indicators for IPS, URLs, or domains:
7368

7469
### Microsoft Defender Antivirus version requirements
7570

76-
The _Antimalware client version_ must be 4.18.1906.x or later.
71+
This feature is available if your organization uses [Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-windows) (in active mode)
72+
73+
[Behavior Monitoring](/defender-endpoint/behavior-monitor) is enabled
74+
75+
[Cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus) is turned on.
76+
77+
[Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus) is functional
78+
79+
The *Antimalware client version* must be 4.18.1906.x or later. See [Monthly platform and engine versions](/defender-endpoint/microsoft-defender-antivirus-updates)
80+
81+
### Network Protection requirements
82+
83+
URL/IP allow and block requires that the Microsoft Defender for Endpoint component _Network Protection_ is enabled in **block mode**. For more information on Network Protection and configuration instructions, see [Enable network protection](enable-network-protection.md).
7784

7885
### Custom network indicators requirements
7986

80-
Ensure that **Custom network indicators** is enabled in **Microsoft Defender XDR** \> **Settings** \> **Advanced features**. For more information, see [Advanced features](advanced-features.md).
87+
To start blocking IP addresses and/or URL's, turn on "**Custom network indicators"** feature in **Microsoft Defender XDR** (in the Microsoft Defender portal), go to **Settings** > **Endpoints** > **General** > **Advanced features**. For more information, see [Advanced features](advanced-features.md).
8188

8289
For support of indicators on iOS, see [Microsoft Defender for Endpoint on iOS](ios-configure-features.md#configure-custom-indicators).
8390

0 commit comments

Comments
 (0)