From 9740a2d7e2d86038f2fd6490a27a904592207ee0 Mon Sep 17 00:00:00 2001
From: "Yong Rhee [MSFT]" <56358587+YongRhee-MSFT@users.noreply.github.com>
Date: Tue, 21 Jan 2025 13:26:41 -0800
Subject: [PATCH 1/2] Update enable-network-protection.md
Updated the Windows Server info, where Windows Server 2019 was missing in the PoSh cmdlet. And added that for the downlevel servers, it requires the unified agent for MDE.
---
defender-endpoint/enable-network-protection.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/defender-endpoint/enable-network-protection.md b/defender-endpoint/enable-network-protection.md
index b339389d42..c1c6b68e16 100644
--- a/defender-endpoint/enable-network-protection.md
+++ b/defender-endpoint/enable-network-protection.md
@@ -84,8 +84,8 @@ To enable network protection, you can use one of the following methods:
| Windows Server version | Commands |
|---|---|
- | Windows Server 2022 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
- | Windows Server 2016
Windows Server 2012 R2 | `set-MpPreference -AllowNetworkProtectionDownLevel $true`
`set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
+ | Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
+ | Windows Server 2016
Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](https://learn.microsoft.com/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true`
`set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet:
From 4df40ba284dd4a0aa4985a8795fc3f998111803c Mon Sep 17 00:00:00 2001
From: Denise Vangel-MSFT
Date: Wed, 22 Jan 2025 14:03:03 -0800
Subject: [PATCH 2/2] Update date and link in documentation
---
defender-endpoint/enable-network-protection.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/defender-endpoint/enable-network-protection.md b/defender-endpoint/enable-network-protection.md
index c1c6b68e16..25330bbaf9 100644
--- a/defender-endpoint/enable-network-protection.md
+++ b/defender-endpoint/enable-network-protection.md
@@ -3,7 +3,7 @@ title: Turn on network protection
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
ms.service: defender-endpoint
ms.localizationpriority: medium
-ms.date: 10/14/2024
+ms.date: 01/22/2025
ms.topic: conceptual
author: denisebmsft
ms.author: deniseb
@@ -85,7 +85,7 @@ To enable network protection, you can use one of the following methods:
| Windows Server version | Commands |
|---|---|
| Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
- | Windows Server 2016
Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](https://learn.microsoft.com/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true`
`set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
+ | Windows Server 2016
Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true`
`set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet: