mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-21 21:33:38 +00:00
Merge pull request #3750 from MicrosoftDocs/security-acrolinx-updates
Github issue fixes
This commit is contained in:
@ -97,7 +97,7 @@
|
|||||||
#### [Network protection]()
|
#### [Network protection]()
|
||||||
##### [Protect your network](microsoft-defender-atp/network-protection.md)
|
##### [Protect your network](microsoft-defender-atp/network-protection.md)
|
||||||
##### [Evaluate network protection](microsoft-defender-atp/evaluate-network-protection.md)
|
##### [Evaluate network protection](microsoft-defender-atp/evaluate-network-protection.md)
|
||||||
##### [Turning on network protection](microsoft-defender-atp/enable-network-protection.md)
|
##### [Turn on network protection](microsoft-defender-atp/enable-network-protection.md)
|
||||||
|
|
||||||
#### [Web protection]()
|
#### [Web protection]()
|
||||||
##### [Web protection overview](microsoft-defender-atp/web-protection-overview.md)
|
##### [Web protection overview](microsoft-defender-atp/web-protection-overview.md)
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
title: Turning on network protection
|
title: Turn on network protection
|
||||||
description: Enable Network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
|
description: Enable network protection with Group Policy, PowerShell, or Mobile Device Management and Configuration Manager.
|
||||||
keywords: ANetwork protection, exploits, malicious website, ip, domain, domains, enable, turn on
|
keywords: ANetwork protection, exploits, malicious website, ip, domain, domains, enable, turn on
|
||||||
search.product: eADQiWindows 10XVcnh
|
search.product: eADQiWindows 10XVcnh
|
||||||
ms.prod: w10
|
ms.prod: w10
|
||||||
@ -14,7 +14,7 @@ ms.reviewer:
|
|||||||
manager: dansimp
|
manager: dansimp
|
||||||
---
|
---
|
||||||
|
|
||||||
# Turning on network protection
|
# Turn on network protection
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
@ -22,6 +22,8 @@ manager: dansimp
|
|||||||
|
|
||||||
[Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to view which apps would be blocked before you enable it.
|
[Network protection](network-protection.md) helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the internet. You can [audit network protection](evaluate-network-protection.md) in a test environment to view which apps would be blocked before you enable it.
|
||||||
|
|
||||||
|
[Learn more about network filtering configuration options](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-windows-10#network-filtering)
|
||||||
|
|
||||||
## Check if network protection is enabled
|
## Check if network protection is enabled
|
||||||
|
|
||||||
Check if network protection has been enabled on a local device by using Registry editor.
|
Check if network protection has been enabled on a local device by using Registry editor.
|
||||||
@ -40,9 +42,8 @@ Check if network protection has been enabled on a local device by using Registry
|
|||||||
Enable network protection by using any of these methods:
|
Enable network protection by using any of these methods:
|
||||||
|
|
||||||
* [PowerShell](#powershell)
|
* [PowerShell](#powershell)
|
||||||
* [Microsoft Intune](#intune)
|
|
||||||
* [Mobile Device Management (MDM)](#mobile-device-management-mdm)
|
* [Mobile Device Management (MDM)](#mobile-device-management-mdm)
|
||||||
* [Microsoft Endpoint Configuration Manager](#microsoft-endpoint-configuration-manager)
|
* [Microsoft Endpoint Manager / Intune](#microsoft-endpoint-manager-formerly-intune)
|
||||||
* [Group Policy](#group-policy)
|
* [Group Policy](#group-policy)
|
||||||
|
|
||||||
### PowerShell
|
### PowerShell
|
||||||
@ -62,41 +63,17 @@ Enable network protection by using any of these methods:
|
|||||||
|
|
||||||
Use `Disabled` instead of `AuditMode` or `Enabled` to turn off the feature.
|
Use `Disabled` instead of `AuditMode` or `Enabled` to turn off the feature.
|
||||||
|
|
||||||
### Intune
|
### Mobile device management (MDM)
|
||||||
|
|
||||||
1. Sign in to the [Azure portal](https://portal.azure.com) and open Intune.
|
|
||||||
|
|
||||||
2. Go to **Device configuration** > **Profiles** > **Create profile**.
|
|
||||||
|
|
||||||
3. Name the profile, choose **Windows 10 and later** and **Endpoint protection**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
4. Select **Configure** > **Windows Defender Exploit Guard** > **Network filtering** > **Enable**.
|
|
||||||
|
|
||||||

|
|
||||||
|
|
||||||
5. Select **OK** to save each open section and **Create**.
|
|
||||||
|
|
||||||
6. Select the profile called **Assignments**, assign to **All Users & All Devices**, and **Save**.
|
|
||||||
|
|
||||||
### Mobile Device Management (MDM)
|
|
||||||
|
|
||||||
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
|
Use the [./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-defender#defender-enablenetworkprotection) configuration service provider (CSP) to enable or disable network protection or enable audit mode.
|
||||||
|
|
||||||
## Microsoft Endpoint Configuration Manager
|
### Microsoft Endpoint Manager (formerly Intune)
|
||||||
|
|
||||||
1. In Microsoft Endpoint Configuration Manager, go to **Assets and Compliance** > **Endpoint Protection** > **Windows Defender Exploit Guard**.
|
1. Sign into the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com)
|
||||||
|
|
||||||
2. Then go to **Home** > **Create Exploit Guard Policy**.
|
2. Create or edit an [endpoint protection configuration profile](https://docs.microsoft.com/mem/intune/protect/endpoint-protection-configure)
|
||||||
|
|
||||||
3. Enter a name and a description, select **Network protection**, and then **Next**.
|
3. Under "Configuration Settings" in the profile flow, go to **Microsoft Defender Exploit Guard** > **Network filtering** > **Network protection** > **Enable** or **Audit only**
|
||||||
|
|
||||||
4. Choose whether to block or audit access to suspicious domains and select **Next**.
|
|
||||||
|
|
||||||
5. Review the settings and select **Next** to create the policy.
|
|
||||||
|
|
||||||
6. After the policy is created, **Close**.
|
|
||||||
|
|
||||||
### Group Policy
|
### Group Policy
|
||||||
|
|
||||||
@ -112,6 +89,9 @@ Use the following procedure to enable network protection on domain-joined comput
|
|||||||
|
|
||||||
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Windows Defender Exploit Guard** > **Network protection**.
|
3. Expand the tree to **Windows components** > **Microsoft Defender Antivirus** > **Windows Defender Exploit Guard** > **Network protection**.
|
||||||
|
|
||||||
|
> [!NOTE]
|
||||||
|
> On older versions of Windows, the group policy path may say "Windows Defender Antivirus" instead of "Microsoft Defender Antivirus."
|
||||||
|
|
||||||
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
|
4. Double-click the **Prevent users and apps from accessing dangerous websites** setting and set the option to **Enabled**. In the options section, you must specify one of the following options:
|
||||||
* **Block** - Users can't access malicious IP addresses and domains
|
* **Block** - Users can't access malicious IP addresses and domains
|
||||||
* **Disable (Default)** - The Network protection feature won't work. Users won't be blocked from accessing malicious domains
|
* **Disable (Default)** - The Network protection feature won't work. Users won't be blocked from accessing malicious domains
|
||||||
|
Reference in New Issue
Block a user