Skip to content

Commit ec6d65a

Browse files
committed
Merge branch 'docs-editor/mac-install-with-intune-1747504909' of https://github.com/pauloviralhadas/defender-docs-pr into pr/3813
2 parents 9c7da64 + 757a213 commit ec6d65a

File tree

1 file changed

+24
-20
lines changed

1 file changed

+24
-20
lines changed

defender-endpoint/enable-network-protection.md

Lines changed: 24 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ To enable network protection, you can use any of the methods described in this a
5858

5959
5. On the **Basics** page, enter a name and description for the profile, then choose **Next**.
6060

61-
6. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
61+
1. On the **Settings** page, expand each group of settings, and configure the settings you want to manage with this profile.
6262

6363
- Network Protection on Windows clients:
6464

@@ -73,19 +73,19 @@ To enable network protection, you can use any of the methods described in this a
7373
|Allow Network Protection Down Level|Options:<br>- Network protection will be enabled downlevel. <br>- Network Protection will be disabled downlevel. (Default) <br>- Not Configured|
7474

7575
- Optional Network Protection settings for Windows and Windows Server:
76-
77-
> [!WARNING]
78-
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the **Allow Datagram Processing On WinServer** to **Datagram processing on Windows Server is disabled**. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
79-
80-
|Description| Setting|
81-
| -------- | -------- |
82-
|Allow Datagram Processing On Win Server|- Datagram processing on Windows Server is enabled. <br>- Datagram processing on Windows Server is disabled (Default). <br>- Not configured|
83-
|Disable DNS over TCP parsing|- DNS over TCP parsing is disabled. <br>- DNS over TCP parsing is enabled (Default). <br>- Not configured|
84-
|Disable HTTP parsing|- HTTP parsing is disabled. <br>- HTTP parsing is enabled (Default). <br>- Not configured|
85-
|Disable SSH parsing|- SSH parsing is disabled. <br>- SSH parsing is enabled (Default). <br>- Not configured|
86-
|Disable TLS parsing |- TLS parsing is disabled. <br>- TLS parsing is enabled (Default). <br>- Not configured|
87-
|[Deprecated]Enable DNS Sinkhole|- DNS Sinkhole is disabled. <br>- DNS Sinkhole is enabled. (Default) <br>- Not configured|
88-
76+
77+
> [!WARNING]
78+
> For Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others, set the `Allow Datagram Processing On WinServer` to `disabled`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
79+
80+
|Description| Setting|
81+
| -------- | -------- |
82+
|Allow Datagram Processing On Win Server|- Datagram processing on Windows Server is enabled. <br>- Datagram processing on Windows Server is disabled (Default, recommended). <br>- Not configured|
83+
|Disable DNS over TCP parsing|- DNS over TCP parsing is disabled. <br>- DNS over TCP parsing is enabled (Default). <br>- Not configured|
84+
|Disable HTTP parsing|- HTTP parsing is disabled. <br>- HTTP parsing is enabled (Default). <br>- Not configured|
85+
|Disable SSH parsing|- SSH parsing is disabled. <br>- SSH parsing is enabled (Default). <br>- Not configured|
86+
|Disable TLS parsing |- TLS parsing is disabled. <br>- TLS parsing is enabled (Default). <br>- Not configured|
87+
|[Deprecated]Enable DNS Sinkhole|- DNS Sinkhole is disabled. <br>- DNS Sinkhole is enabled. (Default) <br>- Not configured|
88+
8989
7. When you're done configuring settings, select **Next**.
9090

9191
8. On the **Assignments** page, select the groups that will receive this profile. Then select **Next**.
@@ -216,13 +216,12 @@ Use the following procedure to enable network protection on domain-joined comput
216216

217217
| Windows Server version | Commands |
218218
|---|---|
219-
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
220-
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/> `set-MpPreference -AllowDatagramProcessingOnWinServer $true`|
219+
|Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
220+
|Windows Server 2016 <br/>Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true` <br/> `set-MpPreference -AllowNetworkProtectionOnWinServer $true` <br/>|
221+
222+
> [!IMPORTANT]
223+
> For Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
221224
222-
> [!IMPORTANT]
223-
> For Domain Controllers, Windows DNS servers and Microsoft Exchange servers, set the `AllowDatagramProcessingOnWinServer` parameter to `$false`. These roles often generate high volumes of UDP traffic, which can affect network performance and reliability when datagram processing is enabled. Disabling this setting helps maintain network stability and optimize resource usage in demanding environments.
224-
225-
226225
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
227226

228227
```PowerShell
@@ -279,10 +278,15 @@ $exploitGuardObject.Put()
279278
## See also
280279

281280
- [Network protection](network-protection.md)
281+
282282
- [Network protection for Linux](network-protection-linux.md)
283+
283284
- [Network protection for macOS](network-protection-macos.md)
285+
284286
- [Network protection and the TCP three-way handshake](network-protection.md#network-protection-and-the-tcp-three-way-handshake)
287+
285288
- [Evaluate network protection](evaluate-network-protection.md)
289+
286290
- [Troubleshoot network protection](troubleshoot-np.md)
287291

288292
[!INCLUDE [Microsoft Defender for Endpoint Tech Community](../includes/defender-mde-techcommunity.md)]

0 commit comments

Comments
 (0)