CAT Auto Pulish for Windows Release Messages - 20200122100633 (#1906)

* add note

* updated dell tool info

* removed M365 ransomware section

* CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200122092630 (#1905)

Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>

Co-authored-by: jcaparas <macapara@microsoft.com>
Co-authored-by: Greg Lindsay <greg.lindsay@microsoft.com>
Co-authored-by: Gary Moore <v-gmoor@microsoft.com>
Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>
This commit is contained in:
John Liu
2020-01-22 10:15:41 -08:00
committed by DocsPreview
parent 1f699212b6
commit aa3edf1487
4 changed files with 7 additions and 10 deletions

View File

@ -123,6 +123,11 @@ It's important to understand the following prerequisites prior to creating indic
>[!IMPORTANT]
> Only external IPs can be added to the indicator list. Indicators cannot be created for internal IPs.
> For web protection scenarios, we recommend using the built-in capabilities in Microsoft Edge. Microsoft Edge leverages Network Protection (link) to inspect network traffic and allows blocks for TCP, HTTP, and HTTPS (TLS): <br>
> NOTE:
>- IP is supported for all three protocols
>- Encrypted URLs can only be blocked on first party browsers
>- Full URL path blocks can be applied on the domain level and all unencrypted URLs
>[!NOTE]
>There may be up to 2 hours latency (usually less) between the time the action is taken, and the URL and IP being blocked.