You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
5. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
62
60
63
-
## Enable network protection
61
+
6. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
62
+
63
+
- Network Protection on Windows clients:
64
+
65
+
| Description| Setting|
66
+
| -------- | -------- |
67
+
| Enable Network Protection|Options:<br>- Enabled (block mode) Block mode is needed to block IP address/URL indicators and Web Content Filtering.<br>- Enabled (audit mode) <br>- Disabled (Default) <br>- Not Configured|
68
+
69
+
- Network Protection on Windows Server 2012 R2 and Windows Server 2016
70
+
71
+
| Description|Setting|
72
+
| -------- | -------- |
73
+
|Allow Network Protection Down Level|Options:<br>- Network protection will be enabled downlevel. <br>- Network Protection will be disabled downlevel. (Default) <br>- Not Configured|
74
+
75
+
- Optional Network Protection settings for Windows and Windows Server:
76
+
77
+
> [!WARNING]
78
+
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the **Allow Datagram Processing On WinServer** to **Datagram processing on Windows Server is disabled**. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
79
+
80
+
|Description| Setting|
81
+
| -------- | -------- |
82
+
|Allow Datagram Processing On Win Server|- Datagram processing on Windows Server is enabled. <br>- Datagram processing on Windows Server is disabled (Default). <br>- Not configured|
83
+
|Disable DNS over TCP parsing|- DNS over TCP parsing is disabled. <br>- DNS over TCP parsing is enabled (Default). <br>- Not configured|
84
+
|Disable HTTP parsing|- HTTP parsing is disabled. <br>- HTTP parsing is enabled (Default). <br>- Not configured|
85
+
|Disable SSH parsing|- SSH parsing is disabled. <br>- SSH parsing is enabled (Default). <br>- Not configured|
86
+
|Disable TLS parsing |- TLS parsing is disabled. <br>- TLS parsing is enabled (Default). <br>- Not configured|
87
+
|[Deprecated]Enable DNS Sinkhole|- DNS Sinkhole is disabled. <br>- DNS Sinkhole is enabled. (Default) <br>- Not configured|
88
+
89
+
7. When you're done configuring settings, select **Next**.
90
+
91
+
8. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
64
92
65
-
To enable network protection, you can use one of the following methods:
93
+
9. On the **Review + create** page, review the information, and then select **Save**.
The new profile is displayed in the list when you select the policy type for the profile you created.
72
96
73
97
### Microsoft Intune
74
98
@@ -188,15 +212,16 @@ Use the following procedure to enable network protection on domain-joined comput
188
212
Set-MpPreference -EnableNetworkProtection Enabled
189
213
```
190
214
191
-
3. For Windows Server, use the additional commands listed in the following table:
215
+
1. For Windows Server, use the additional commands listed in the following table:
192
216
193
-
| Windows Server version | Commands |
194
-
|---|---|
195
-
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
196
-
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
217
+
| Windows Server version | Commands |
218
+
|---|---|
219
+
|Windows Server 2019 and later |`set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
220
+
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection)|`set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
197
221
198
222
> [!IMPORTANT]
199
-
> For Domain Controllers and Microsoft Exchange servers, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
223
+
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
224
+
200
225
201
226
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
202
227
@@ -206,6 +231,27 @@ Use the following procedure to enable network protection on domain-joined comput
206
231
207
232
To turn off network protection, use the `Disabled` parameter instead of `AuditMode` or `Enabled`.
208
233
234
+
235
+
## Check if network protection is enabled
236
+
237
+
You can use Registry Editor to check the status of network protection.
238
+
239
+
1. Select the **Start** button in the task bar and type `regedit`. In the list of results, select Registry editor to open it.
240
+
241
+
2. Choose **HKEY_LOCAL_MACHINE** from the side menu.
242
+
243
+
3. Navigate through the nested menus to **SOFTWARE**\>**Policies**\>**Microsoft**\>**Windows Defender**\>**Policy Manager**.
244
+
245
+
If the key is missing, navigate to **SOFTWARE**\>**Microsoft**\>**Windows Defender**\>**Windows Defender Exploit Guard**\>**Network Protection**.
246
+
247
+
4. Select **EnableNetworkProtection** to see the current state of network protection on the device:
#### Important information about removing Exploit Guard settings from a device
210
256
211
257
When you deploy an Exploit Guard policy using Configuration Manager, the settings remain on the client even if you later remove the deployment. If the deployment is removed, the client logs `Delete` not supported in the `ExploitGuardHandler.log` file.
Copy file name to clipboardExpand all lines: defender-office-365/quarantine-faq.yml
+4-2Lines changed: 4 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ metadata:
6
6
ms.author: chrisda
7
7
author: chrisda
8
8
manager: deniseb
9
-
ms.date: 03/02/2025
9
+
ms.date: 05/19/2025
10
10
audience: ITPro
11
11
ms.topic: faq
12
12
ms.localizationpriority: medium
@@ -116,6 +116,8 @@ sections:
116
116
117
117
By default, messages from blocked senders are hidden from view in quarantine (quarantine is filtered by **Don't show blocked senders**). To see messages from all senders, select :::image type="icon" source="media/m365-cc-sc-filter-icon.png" border="false"::: **Filter** and then select **Show all senders**.
118
118
119
+
If the previous suggestion doesn't apply to you, open a support case within 7 days of the affected messages for a better chance of fixing the issue.
120
+
119
121
> [!TIP]
120
122
> If a sender is blocked and **Don't show blocked senders** is selected (default), messages from those senders are shown on the **Quarantine** page and are included in quarantine notifications when the **Sender address override reason** value is **None**. This behavior occurs because the messages were blocked due to reasons other than sender address overrides.
121
123
@@ -133,7 +135,7 @@ sections:
133
135
134
136
If **Release-QuarantineMessage** with the _Force_ switch doesn't work, admins should try releasing the message to an alternate mailbox after filtering by the third party service is turned off. Forced release might cause messages to be released multiple times.
135
137
136
-
You receive an error if you try to bulk release multiple messages to all recipients and a recipient-level message delete was done on any of the messages. The admin needs to release that specific message only to the recipient where delete from quarantine has not occurred.
138
+
You receive an error if you try to bulk release multiple messages to all recipients and a recipient-level message delete was done on any of the messages. The admin needs to release that specific message only to the recipient where delete from quarantine hasn't occurred.
137
139
138
140
- Inbox rules ([created by users in Outlook](https://support.microsoft.com/office/c24f5dea-9465-4df4-ad17-a50704d66c59) or by admins using the **\*-InboxRule** cmdlets in Exchange Online PowerShell) can move or delete messages from the Inbox.
0 commit comments