mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-27 16:23:36 +00:00
Merged PR 11267: udpate proxy config content
update proxy config content
This commit is contained in:
@ -10,15 +10,13 @@ ms.pagetype: security
|
|||||||
ms.author: macapara
|
ms.author: macapara
|
||||||
author: mjcaparas
|
author: mjcaparas
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 05/29/2018
|
ms.date: 09/12/2018
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
# Configure machine proxy and Internet connectivity settings
|
# Configure machine proxy and Internet connectivity settings
|
||||||
|
|
||||||
**Applies to:**
|
**Applies to:**
|
||||||
|
|
||||||
|
|
||||||
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
- Windows Defender Advanced Threat Protection (Windows Defender ATP)
|
||||||
|
|
||||||
|
|
||||||
@ -46,18 +44,24 @@ The WinHTTP configuration setting is independent of the Windows Internet (WinINe
|
|||||||
## Configure the proxy server manually using a registry-based static proxy
|
## Configure the proxy server manually using a registry-based static proxy
|
||||||
Configure a registry-based static proxy to allow only Windows Defender ATP sensor to report diagnostic data and communicate with Windows Defender ATP services if a computer is not be permitted to connect to the Internet.
|
Configure a registry-based static proxy to allow only Windows Defender ATP sensor to report diagnostic data and communicate with Windows Defender ATP services if a computer is not be permitted to connect to the Internet.
|
||||||
|
|
||||||
The static proxy is configurable through Group Policy (GP). The group policy can be found under: **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry**.
|
The static proxy is configurable through Group Policy (GP). The group policy can be found under:
|
||||||
|
- Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure Authenticated Proxy usage for the Connected User Experience and Telemetry Service
|
||||||
|
- Set it to **Enabled** and select **Disable Authenticated Proxy usage**:
|
||||||
|

|
||||||
|
- **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry**:
|
||||||
|
- Configure the proxy:<br>
|
||||||
|

|
||||||
|
|
||||||
The policy sets two registry values `TelemetryProxyServer` as REG_SZ and `DisableEnterpriseAuthProxy` as REG_DWORD under the registry key `HKLM\Software\Policies\Microsoft\Windows\DataCollection`.
|
The policy sets two registry values `TelemetryProxyServer` as REG_SZ and `DisableEnterpriseAuthProxy` as REG_DWORD under the registry key `HKLM\Software\Policies\Microsoft\Windows\DataCollection`.
|
||||||
|
|
||||||
The registry value `TelemetryProxyServer` takes the following string format:
|
The registry value `TelemetryProxyServer` takes the following string format:
|
||||||
|
|
||||||
```text
|
```text
|
||||||
<server name or ip>:<port>
|
<server name or ip>:<port>
|
||||||
```
|
```
|
||||||
For example: 10.0.0.6:8080
|
For example: 10.0.0.6:8080
|
||||||
|
|
||||||
The registry value `DisableEnterpriseAuthProxy` should be set to 1.
|
The registry value `DisableEnterpriseAuthProxy` should be set to 1.
|
||||||
|
|
||||||
## Configure the proxy server manually using netsh command
|
## Configure the proxy server manually using netsh command
|
||||||
|
|
||||||
@ -82,7 +86,7 @@ For example: netsh winhttp set proxy 10.0.0.6:8080
|
|||||||
## Enable access to Windows Defender ATP service URLs in the proxy server
|
## Enable access to Windows Defender ATP service URLs in the proxy server
|
||||||
If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Windows Defender ATP service in port 80 and 443:
|
If a proxy or firewall is blocking all traffic by default and allowing only specific domains through or HTTPS scanning (SSL inspection) is enabled, make sure that the following URLs are white-listed to permit communication with Windows Defender ATP service in port 80 and 443:
|
||||||
|
|
||||||
>![NOTE]
|
>[!NOTE]
|
||||||
> URLs that include v20 in them are only needed if you have Windows 10, version 1803 or later machines. For example, ```us-v20.events.data.microsoft.com``` is only needed if the machine is on Windows 10, version 1803 or later.
|
> URLs that include v20 in them are only needed if you have Windows 10, version 1803 or later machines. For example, ```us-v20.events.data.microsoft.com``` is only needed if the machine is on Windows 10, version 1803 or later.
|
||||||
|
|
||||||
Service location | Microsoft.com DNS record
|
Service location | Microsoft.com DNS record
|
||||||
|
Binary file not shown.
After Width: | Height: | Size: 31 KiB |
Binary file not shown.
After Width: | Height: | Size: 32 KiB |
Reference in New Issue
Block a user