mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-25 23:33:35 +00:00
moved network protection topics into mdatp
This commit is contained in:
@ -1,113 +0,0 @@
|
||||
---
|
||||
title: Turn on network protection
|
||||
description: Enable Network protection with Group Policy, PowerShell, or MDM CSPs
|
||||
keywords: ANetwork protection, exploits, malicious website, ip, domain, domains, enable, turn on
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
author: levinec
|
||||
ms.author: ellevin
|
||||
ms.reviewer:
|
||||
audience: ITPro
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# Enable network protection
|
||||
|
||||
**Applies to:**
|
||||
|
||||
* [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
[Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
||||
You can [audit network protection](evaluate-network-protection.md) in a test environment to see which apps would be blocked before you enable it.
|
||||
|
||||
You can enable network protection by using any of these methods:
|
||||
|
||||
* [Microsoft Intune](#intune)
|
||||
* [Mobile Device Management (MDM)](#mdm)
|
||||
* [System Center Configuration Manager (SCCM)](#sccm)
|
||||
* [Group Policy](#group-policy)
|
||||
* [PowerShell](#powershell)
|
||||
|
||||
## Intune
|
||||
|
||||
1. Sign in to the [Azure portal](https://portal.azure.com) and open Intune.
|
||||
1. Click **Device configuration** > **Profiles** > **Create profile**.
|
||||
1. Name the profile, choose **Windows 10 and later** and **Endpoint protection**.
|
||||

|
||||
1. Click **Configure** > **Windows Defender Exploit Guard** > **Network filtering** > **Enable**.
|
||||

|
||||
1. Click **OK** to save each open blade and click **Create**.
|
||||
1. Click the profile **Assignments**, assign to **All Users & All Devices**, and click **Save**.
|
||||
|
||||
## MDM
|
||||
|
||||
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
|
||||
|
||||
## SCCM
|
||||
|
||||
1. In System Center Configuration Manager, click **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
|
||||
1. Click **Home** > **Create Exploit Guard Policy**.
|
||||
1. Enter a name and a description, click **Network protection**, and click **Next**.
|
||||
1. Choose whether to block or audit access to suspicious domains and click **Next**.
|
||||
1. Review the settings and click **Next** to create the policy.
|
||||
1. After the policy is created, click **Close**.
|
||||
|
||||
## Group Policy
|
||||
|
||||
You can use the following procedure to enable network protection on domain-joined computers or on a standalone computer.
|
||||
|
||||
1. On a standalone computer, click **Start**, type and then click **Edit group policy**.
|
||||
|
||||
-Or-
|
||||
|
||||
On a domain-joined Group Policy management computer, open the [Group Policy Management Console](https://technet.microsoft.com/library/cc731212.aspx), right-click the Group Policy Object you want to configure and click **Edit**.
|
||||
|
||||
2. In the **Group Policy Management Editor** go to **Computer configuration** and click **Administrative templates**.
|
||||
|
||||
3. Expand the tree to **Windows components** > **Windows Defender Antivirus** > **Windows Defender Exploit Guard** > **Network protection**.
|
||||
|
||||
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following:
|
||||
* **Block** - Users will not be able to access malicious IP addresses and domains
|
||||
* **Disable (Default)** - The Network protection feature will not work. Users will not be blocked from accessing malicious domains
|
||||
* **Audit Mode** - If a user visits a malicious IP address or domain, an event will be recorded in the Windows event log but the user will not be blocked from visiting the address.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> To fully enable network protection, you must set the Group Policy option to **Enabled** and also select **Block** in the options drop-down menu.
|
||||
|
||||
You can confirm network protection is enabled on a local computer by using Registry editor:
|
||||
|
||||
1. Click **Start** and type **regedit** to open **Registry Editor**.
|
||||
1. Navigate to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection
|
||||
1. Click **EnableNetworkProtection** and confirm the value:
|
||||
* 0=Off
|
||||
* 1=On
|
||||
* 2=Audit
|
||||
|
||||
## PowerShell
|
||||
|
||||
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**
|
||||
2. Enter the following cmdlet:
|
||||
|
||||
```PowerShell
|
||||
Set-MpPreference -EnableNetworkProtection Enabled
|
||||
```
|
||||
|
||||
You can enable the feature in audit mode using the following cmdlet:
|
||||
|
||||
```PowerShell
|
||||
Set-MpPreference -EnableNetworkProtection AuditMode
|
||||
```
|
||||
|
||||
Use `Disabled` instead of `AuditMode` or `Enabled` to turn the feature off.
|
||||
|
||||
## Related topics
|
||||
|
||||
* [Network protection](network-protection.md)
|
||||
* [Evaluate network protection](evaluate-network-protection.md)
|
||||
* [Troubleshoot network protection](troubleshoot-np.md)
|
@ -1,70 +0,0 @@
|
||||
---
|
||||
title: Conduct a demo to see how network protection works
|
||||
description: Quickly see how Network protection works by performing common scenarios that it protects against
|
||||
keywords: Network protection, exploits, malicious website, ip, domain, domains, evaluate, test, demo
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
author: levinec
|
||||
ms.author: ellevin
|
||||
ms.date: 05/10/2019
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# Evaluate network protection
|
||||
|
||||
**Applies to:**
|
||||
|
||||
* [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
[Network protection](network-protection.md) helps prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
||||
|
||||
This topic helps you evaluate Network protection by enabling the feature and guiding you to a testing site. The site in this evaluation topic are not malicious, they are specially created websites that pretend to be malicious. The site will replicate the behavior that would happen if a user visited a malicious site or domain.
|
||||
|
||||
> [!TIP]
|
||||
> You can also visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to see how other protection features work.
|
||||
|
||||
## Enable network protection in audit mode
|
||||
|
||||
You can enable network protection in audit mode to see which IP addresses and domains would have been blocked if it was enabled.
|
||||
|
||||
You might want to do this to make sure it doesn't affect line-of-business apps or to get an idea of how often blocks occur.
|
||||
|
||||
1. Type **powershell** in the Start menu, right-click **Windows PowerShell** and click **Run as administrator**
|
||||
2. Enter the following cmdlet:
|
||||
|
||||
```PowerShell
|
||||
Set-MpPreference -EnableNetworkProtection AuditMode
|
||||
```
|
||||
|
||||
### Visit a (fake) malicious domain
|
||||
|
||||
1. Open Internet Explorer, Google Chrome, or any other browser of your choice.
|
||||
|
||||
1. Go to [https://smartscreentestratings2.net](https://smartscreentestratings2.net).
|
||||
|
||||
The network connection will be allowed and a test message will be displayed.
|
||||
|
||||

|
||||
|
||||
## Review network protection events in Windows Event Viewer
|
||||
|
||||
To review apps that would have been blocked, open Event Viewer and filter for Event ID 1125 in the Microsoft-Windows-Windows-Defender/Operational log. The following table lists all network protection events.
|
||||
|
||||
| Event ID | Provide/Source | Description |
|
||||
|-|-|-|
|
||||
|5007 | Windows Defender (Operational) | Event when settings are changed |
|
||||
|1125 | Windows Defender (Operational) | Event when a network connection is audited |
|
||||
|1126 | Windows Defender (Operational) | Event when a network connection is blocked |
|
||||
|
||||
## Related topics
|
||||
|
||||
* [Network protection](network-protection.md)
|
||||
* [Enable network protection](enable-network-protection.md)
|
||||
* [Troubleshoot network protection](troubleshoot-np.md)
|
@ -1,182 +0,0 @@
|
||||
---
|
||||
ms.reviewer:
|
||||
title: Import custom views to see attack surface reduction events
|
||||
description: Use Windows Event Viewer to import individual views for each of the features.
|
||||
keywords: event view, exploit guard, audit, review, events
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.date: 04/16/2018
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
author: levinec
|
||||
ms.author: ellevin
|
||||
ms.date: 03/26/2019
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# View attack surface reduction events
|
||||
|
||||
**Applies to:**
|
||||
|
||||
- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
You can review attack surface reduction events in Event Viewer. This is useful so you can monitor what rules or settings are working, and determine if any settings are too "noisy" or impacting your day to day workflow.
|
||||
|
||||
Reviewing the events is also handy when you are evaluating the features, as you can enable audit mode for the features or settings, and then review what would have happened if they were fully enabled.
|
||||
|
||||
This topic lists all the events, their associated feature or setting, and describes how to create custom views to filter to specific events.
|
||||
|
||||
You can also get detailed reporting into events and blocks as part of Windows Security, which you access if you have an E5 subscription and use [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md).
|
||||
|
||||
## Use custom views to review attack surface reduction capabilities
|
||||
|
||||
You can create custom views in the Windows Event Viewer to only see events for specific capabilities and settings.
|
||||
|
||||
The easiest way to do this is to import a custom view as an XML file. You can copy the XML directly from this page.
|
||||
|
||||
You can also manually navigate to the event area that corresponds to the feature.
|
||||
|
||||
### Import an existing XML custom view
|
||||
|
||||
1. Create an empty .txt file and copy the XML for the custom view you want to use into the .txt file. Do this for each of the custom views you want to use. Rename the files as follows (ensure you change the type from .txt to .xml):
|
||||
- Controlled folder access events custom view: *cfa-events.xml*
|
||||
- Exploit protection events custom view: *ep-events.xml*
|
||||
- Attack surface reduction events custom view: *asr-events.xml*
|
||||
- Network/ protection events custom view: *np-events.xml*
|
||||
|
||||
1. Type **event viewer** in the Start menu and open **Event Viewer**.
|
||||
|
||||
1. Click **Action** > **Import Custom View...**
|
||||
|
||||

|
||||
|
||||
1. Navigate to where you extracted XML file for the custom view you want and select it.
|
||||
|
||||
1. Click **Open**.
|
||||
|
||||
1. This will create a custom view that filters to only show the events related to that feature.
|
||||
|
||||
### Copy the XML directly
|
||||
|
||||
1. Type **event viewer** in the Start menu and open the Windows **Event Viewer**.
|
||||
|
||||
1. On the left panel, under **Actions**, click **Create Custom View...**
|
||||
|
||||

|
||||
|
||||
1. Go to the XML tab and click **Edit query manually**. You'll see a warning that you won't be able to edit the query using the **Filter** tab if you use the XML option. Click **Yes**.
|
||||
|
||||
1. Paste the XML code for the feature you want to filter events from into the XML section.
|
||||
|
||||
1. Click **OK**. Specify a name for your filter.
|
||||
|
||||
1. This will create a custom view that filters to only show the events related to that feature.
|
||||
|
||||
### XML for attack surface reduction rule events
|
||||
|
||||
```xml
|
||||
<QueryList>
|
||||
<Query Id="0" Path="Microsoft-Windows-Windows Defender/Operational">
|
||||
<Select Path="Microsoft-Windows-Windows Defender/Operational">*[System[(EventID=1121 or EventID=1122 or EventID=5007)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Windows Defender/WHC">*[System[(EventID=1121 or EventID=1122 or EventID=5007)]]</Select>
|
||||
</Query>
|
||||
</QueryList>
|
||||
```
|
||||
|
||||
### XML for controlled folder access events
|
||||
|
||||
```xml
|
||||
<QueryList>
|
||||
<Query Id="0" Path="Microsoft-Windows-Windows Defender/Operational">
|
||||
<Select Path="Microsoft-Windows-Windows Defender/Operational">*[System[(EventID=1123 or EventID=1124 or EventID=5007)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Windows Defender/WHC">*[System[(EventID=1123 or EventID=1124 or EventID=5007)]]</Select>
|
||||
</Query>
|
||||
</QueryList>
|
||||
```
|
||||
|
||||
### XML for exploit protection events
|
||||
|
||||
```xml
|
||||
<QueryList>
|
||||
<Query Id="0" Path="Microsoft-Windows-Security-Mitigations/KernelMode">
|
||||
<Select Path="Microsoft-Windows-Security-Mitigations/KernelMode">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Win32k/Concurrency">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Win32k/Contention">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Win32k/Messages">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Win32k/Operational">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Win32k/Power">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Win32k/Render">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Win32k/Tracing">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Win32k/UIPI">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="System">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Security-Mitigations/UserMode">*[System[Provider[@Name='Microsoft-Windows-Security-Mitigations' or @Name='Microsoft-Windows-WER-Diag' or @Name='Microsoft-Windows-Win32k' or @Name='Win32k'] and ( (EventID >= 1 and EventID <= 24) or EventID=5 or EventID=260)]]</Select>
|
||||
</Query>
|
||||
</QueryList>
|
||||
```
|
||||
|
||||
### XML for network protection events
|
||||
|
||||
```xml
|
||||
<QueryList>
|
||||
<Query Id="0" Path="Microsoft-Windows-Windows Defender/Operational">
|
||||
<Select Path="Microsoft-Windows-Windows Defender/Operational">*[System[(EventID=1125 or EventID=1126 or EventID=5007)]]</Select>
|
||||
<Select Path="Microsoft-Windows-Windows Defender/WHC">*[System[(EventID=1125 or EventID=1126 or EventID=5007)]]</Select>
|
||||
</Query>
|
||||
</QueryList>
|
||||
```
|
||||
|
||||
## List of attack surface reduction events
|
||||
|
||||
All attack surface reductiond events are located under **Applications and Services Logs > Microsoft > Windows** and then the folder or provider as listed in the following table.
|
||||
|
||||
You can access these events in Windows Event viewer:
|
||||
|
||||
1. Open the **Start** menu and type **event viewer**, and then click on the **Event Viewer** result.
|
||||
2. Expand **Applications and Services Logs > Microsoft > Windows** and then go to the folder listed under **Provider/source** in the table below.
|
||||
3. Double-click on the sub item to see events. Scroll through the events to find the one you are looking.
|
||||
|
||||

|
||||
|
||||
Feature | Provider/source | Event ID | Description
|
||||
:-|:-|:-:|:-
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 1 | ACG audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 2 | ACG enforce
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 3 | Do not allow child processes audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 4 | Do not allow child processes block
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 5 | Block low integrity images audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 6 | Block low integrity images block
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 7 | Block remote images audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 8 | Block remote images block
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 9 | Disable win32k system calls audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 10 | Disable win32k system calls block
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 11 | Code integrity guard audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 12 | Code integrity guard block
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 13 | EAF audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 14 | EAF enforce
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 15 | EAF+ audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 16 | EAF+ enforce
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 17 | IAF audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 18 | IAF enforce
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 19 | ROP StackPivot audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 20 | ROP StackPivot enforce
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 21 | ROP CallerCheck audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 22 | ROP CallerCheck enforce
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 23 | ROP SimExec audit
|
||||
Exploit protection | Security-Mitigations (Kernel Mode/User Mode) | 24 | ROP SimExec enforce
|
||||
Exploit protection | WER-Diagnostics | 5 | CFG Block
|
||||
Exploit protection | Win32K (Operational) | 260 | Untrusted Font
|
||||
Network protection | Windows Defender (Operational) | 5007 | Event when settings are changed
|
||||
Network protection | Windows Defender (Operational) | 1125 | Event when Network protection fires in Audit-mode
|
||||
Network protection | Windows Defender (Operational) | 1126 | Event when Network protection fires in Block-mode
|
||||
Controlled folder access | Windows Defender (Operational) | 5007 | Event when settings are changed
|
||||
Controlled folder access | Windows Defender (Operational) | 1124 | Audited Controlled folder access event
|
||||
Controlled folder access | Windows Defender (Operational) | 1123 | Blocked Controlled folder access event
|
||||
Controlled folder access | Windows Defender (Operational) | 1127 | Blocked Controlled folder access sector write block event
|
||||
Controlled folder access | Windows Defender (Operational) | 1128 | Audited Controlled folder access sector write block event
|
||||
Attack surface reduction | Windows Defender (Operational) | 5007 | Event when settings are changed
|
||||
Attack surface reduction | Windows Defender (Operational) | 1122 | Event when rule fires in Audit-mode
|
||||
Attack surface reduction | Windows Defender (Operational) | 1121 | Event when rule fires in Block-mode
|
@ -1,81 +0,0 @@
|
||||
---
|
||||
title: Use network protection to help prevent connections to bad sites
|
||||
description: Protect your network by preventing users from accessing known malicious and suspicious network addresses
|
||||
keywords: Network protection, exploits, malicious website, ip, domain, domains
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
author: levinec
|
||||
ms.author: ellevin
|
||||
ms.date: 04/30/2019
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# Protect your network
|
||||
|
||||
**Applies to:**
|
||||
|
||||
* [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
Network protection helps reduce the attack surface of your devices from Internet-based events. It prevents employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
|
||||
|
||||
It expands the scope of [Windows Defender SmartScreen](../windows-defender-smartscreen/windows-defender-smartscreen-overview.md) to block all outbound HTTP(s) traffic that attempts to connect to low-reputation sources (based on the domain or hostname).
|
||||
|
||||
Network protection is supported beginning with Windows 10, version 1709.
|
||||
|
||||
> [!TIP]
|
||||
> You can visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works.
|
||||
|
||||
Network protection works best with [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md), which gives you detailed reporting into Windows Defender EG events and blocks as part of the usual [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
||||
|
||||
When network protection blocks a connection, a notification will be displayed from the Action Center. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors.
|
||||
|
||||
You can also use [audit mode](audit-windows-defender.md) to evaluate how Network protection would impact your organization if it were enabled.
|
||||
|
||||
## Requirements
|
||||
|
||||
Network protection requires Windows 10 Pro, Enterprise E3, E5 and Windows Defender AV real-time protection.
|
||||
|
||||
Windows 10 version | Windows Defender Antivirus
|
||||
-|-
|
||||
Windows 10 version 1709 or later | [Windows Defender AV real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) and [cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) must be enabled
|
||||
|
||||
## Review network protection events in the Microsoft Defender ATP Security Center
|
||||
|
||||
Microsoft Defender ATP provides detailed reporting into events and blocks as part of its [alert investigation scenarios](../microsoft-defender-atp/investigate-alerts.md).
|
||||
|
||||
You can query Microsoft Defender ATP data by using [Advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-windows-defender-advanced-threat-protection). If you're using [audit mode](audit-windows-defender.md), you can use Advanced hunting to see how network protection settings would affect your environment if they were enabled.
|
||||
|
||||
Here is an example query
|
||||
|
||||
```PowerShell
|
||||
MiscEvents
|
||||
| where ActionType in ('ExploitGuardNetworkProtectionAudited','ExploitGuardNetworkProtectionBlocked')
|
||||
```
|
||||
|
||||
## Review network protection events in Windows Event Viewer
|
||||
|
||||
You can review the Windows event log to see events that are created when network protection blocks (or audits) access to a malicious IP or domain:
|
||||
|
||||
1. [Copy the XML directly](event-views.md).
|
||||
|
||||
2. Click **OK**.
|
||||
|
||||
3. This will create a custom view that filters to only show the following events related to network protection:
|
||||
|
||||
Event ID | Description
|
||||
-|-
|
||||
5007 | Event when settings are changed
|
||||
1125 | Event when network protection fires in audit mode
|
||||
1126 | Event when network protection fires in block mode
|
||||
|
||||
## Related topics
|
||||
|
||||
[Evaluate network protection](evaluate-network-protection.md) | Undertake a quick scenario that demonstrate how the feature works, and what events would typically be created.
|
||||
[Enable network protection](enable-network-protection.md) | Use Group Policy, PowerShell, or MDM CSPs to enable and manage network protection in your network.
|
@ -1,101 +0,0 @@
|
||||
---
|
||||
title: Troubleshoot problems with Network protection
|
||||
description: Check pre-requisites, use audit mode, add exclusions, or collect diagnostic data to help troubleshoot issues
|
||||
keywords: troubleshoot, error, fix, windows defender eg, asr, rules, hips, troubleshoot, audit, exclusion, false positive, broken, blocking
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
ms.pagetype: security
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: manage
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.localizationpriority: medium
|
||||
audience: ITPro
|
||||
author: dansimp
|
||||
ms.author: dansimp
|
||||
ms.date: 03/27/2019
|
||||
ms.reviewer:
|
||||
manager: dansimp
|
||||
---
|
||||
|
||||
# Troubleshoot network protection
|
||||
|
||||
**Applies to:**
|
||||
|
||||
* [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559)
|
||||
|
||||
* IT administrators
|
||||
|
||||
When you use [Network protection](network-protection.md) you may encounter issues, such as:
|
||||
|
||||
* Network protection blocks a website that is safe (false positive)
|
||||
* Network protection fails to block a suspicious or known malicious website (false negative)
|
||||
|
||||
There are four steps to troubleshooting these problems:
|
||||
|
||||
1. Confirm prerequisites
|
||||
2. Use audit mode to test the rule
|
||||
3. Add exclusions for the specified rule (for false positives)
|
||||
4. Submit support logs
|
||||
|
||||
## Confirm prerequisites
|
||||
|
||||
Network protection will only work on devices with the following conditions:
|
||||
|
||||
>[!div class="checklist"]
|
||||
> * Endpoints are running Windows 10 Enterprise edition, version 1709 or higher (also known as the Fall Creators Update).
|
||||
> * Endpoints are using Windows Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../windows-defender-antivirus/windows-defender-antivirus-compatibility.md).
|
||||
> * [Real-time protection](../windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md) is enabled.
|
||||
> * [Cloud-delivered protection](../windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md) is enabled.
|
||||
> * Audit mode is not enabled. Use [Group Policy](enable-network-protection.md#group-policy) to set the rule to **Disabled** (value: **0**).
|
||||
|
||||
## Use audit mode
|
||||
|
||||
You can enable network protection in audit mode and then visit a website that we've created to demo the feature. All website connections will be allowed by network protection but an event will be logged to indicate any connection that would have been blocked if network protection was enabled.
|
||||
|
||||
1. Set network protection to **Audit mode**.
|
||||
|
||||
```PowerShell
|
||||
Set-MpPreference -EnableNetworkProtection AuditMode
|
||||
```
|
||||
|
||||
1. Perform the connection activity that is causing an issue (for example, attempt to visit the site, or connect to the IP address you do or don't want to block).
|
||||
|
||||
1. [Review the network protection event logs](network-protection.md#review-network-protection-events-in-windows-event-viewer) to see if the feature would have blocked the connection if it had been set to **Enabled**.
|
||||
>
|
||||
>If network protection is not blocking a connection that you are expecting it should block, enable the feature.
|
||||
|
||||
```PowerShell
|
||||
Set-MpPreference -EnableNetworkProtection Enabled
|
||||
```
|
||||
|
||||
## Report a false positive or false negative
|
||||
|
||||
If you've tested the feature with the demo site and with audit mode, and network protection is working on pre-configured scenarios, but is not working as expected for a specific connection, use the [Windows Defender Security Intelligence web-based submission form](https://www.microsoft.com/wdsi/filesubmission) to report a false negative or false positive for network protection. With an E5 subscription, you can also [provide a link to any associated alert](../microsoft-defender-atp/alerts-queue.md).
|
||||
|
||||
## Exclude website from network protection scope
|
||||
|
||||
To whitelist the website that is being blocked (false positive), add its URL to the [list of trusted sites](https://blogs.msdn.microsoft.com/asiatech/2014/08/19/how-to-add-web-sites-to-trusted-sites-via-gpo-from-dc-installed-ie10-or-higher-ie-version/). Web resources from this list bypass the network protection check.
|
||||
|
||||
## Collect diagnostic data for file submissions
|
||||
|
||||
When you report a problem with network protection, you are asked to collect and submit diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues.
|
||||
|
||||
1. Open an elevated command prompt and change to the Windows Defender directory:
|
||||
|
||||
```PowerShell
|
||||
cd c:\program files\windows defender
|
||||
```
|
||||
|
||||
1. Run this command to generate the diagnostic logs:
|
||||
|
||||
```PowerShell
|
||||
mpcmdrun -getfiles
|
||||
```
|
||||
|
||||
1. By default, they are saved to C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab. Attach the file to the submission form.
|
||||
|
||||
## Related topics
|
||||
|
||||
* [Network protection](network-protection.md)
|
||||
* [Evaluate network protection](evaluate-network-protection.md)
|
||||
* [Enable network protection](enable-network-protection.md)
|
Reference in New Issue
Block a user