@ -34,8 +34,11 @@
|
||||
|
||||
#### [Web protection]()
|
||||
##### [Web protection overview](microsoft-defender-atp/web-protection-overview.md)
|
||||
##### [Monitor web security](microsoft-defender-atp/web-protection-monitoring.md)
|
||||
##### [Respond to web threats](microsoft-defender-atp/web-protection-response.md)
|
||||
##### [Web threat protection]()
|
||||
###### [Web threat protection overview](microsoft-defender-atp/web-threat-protection.md)
|
||||
###### [Monitor web security](microsoft-defender-atp/web-protection-monitoring.md)
|
||||
###### [Respond to web threats](microsoft-defender-atp/web-protection-response.md)
|
||||
##### [Web content filtering](microsoft-defender-atp/web-content-filtering.md)
|
||||
|
||||
#### [Controlled folder access](microsoft-defender-atp/controlled-folders.md)
|
||||
#### [Attack surface reduction](microsoft-defender-atp/attack-surface-reduction.md)
|
||||
|
After Width: | Height: | Size: 49 KiB |
After Width: | Height: | Size: 40 KiB |
After Width: | Height: | Size: 19 KiB |
After Width: | Height: | Size: 34 KiB |
After Width: | Height: | Size: 72 KiB |
After Width: | Height: | Size: 136 KiB |
After Width: | Height: | Size: 142 KiB |
@ -31,7 +31,8 @@ Reduce your attack surfaces by minimizing the places where your organization is
|
||||
|[Hardware-based isolation](../windows-defender-application-guard/wd-app-guard-overview.md) | Protect and maintain the integrity of a system as it starts and while it's running. Validate system integrity through local and remote attestation. And, use container isolation for Microsoft Edge to help guard against malicious websites. |
|
||||
|[Application control](../windows-defender-application-control/windows-defender-application-control.md) | Use application control so that your applications must earn trust in order to run. |
|
||||
|[Exploit protection](./exploit-protection.md) |Help protect operating systems and apps your organization uses from being exploited. Exploit protection also works with third-party antivirus solutions. |
|
||||
|[Network protection](./network-protection.md) |Extend protection to your network traffic and connectivity on your organization's devices. (Requires Windows Defender Antivirus) |
|
||||
|[Network protection](./network-protection.md) |Extend protection to your network traffic and connectivity on your organization's devices. (Requires Windows Defender Antivirus) |
|
||||
|[Web protection](./web-protection-overview.md) |Secure your machines against web threats and help you regulate unwanted content.
|
||||
|[Controlled folder access](./controlled-folders.md) | Help prevent malicious or suspicious apps (including file-encrypting ransomware malware) from making changes to files in your key system folders (Requires Windows Defender Antivirus) |
|
||||
|[Attack surface reduction](./attack-surface-reduction.md) |Reduce vulnerabilities (attack surfaces) in your applications with intelligent rules that help stop malware. (Requires Windows Defender Antivirus) |
|
||||
|[Network firewall](../windows-firewall/windows-firewall-with-advanced-security.md) |Prevent unauthorized traffic from flowing to or from your organization's devices with two-way network traffic filtering. |
|
||||
|
@ -0,0 +1,171 @@
|
||||
---
|
||||
title: Web content filtering
|
||||
description: Use web content filtering in Microsoft Defender ATP to track and regulate access to websites based on their content categories.
|
||||
keywords: web protection, web threat protection, web browsing, monitoring, reports, cards, domain list, security, phishing, malware, exploit, websites, network protection, Edge, Internet Explorer, Chrome, Firefox, web browser
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: ellevin
|
||||
author: levinec
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Web content filtering
|
||||
|
||||
>[!IMPORTANT]
|
||||
>Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
|
||||
|
||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
||||
|
||||
Web content filtering is part of [Web protection](web-protection-overview.md) in Microsoft Defender ATP. It enables your organization to track and regulate access to websites based on their content categories. Many of these websites, while not malicious, might be problematic due to compliance regulations, bandwidth usage, or other concerns.
|
||||
|
||||
You can configure policies across your machine groups to block certain categories, effectively preventing users within specified machine groups from accessing URLs within that category. If a category is not blocked, all your users will be able to access the URLs without disruption. However, web content filtering will continue to gather access statistics that you can use to understand web usage and inform future policy decisions.
|
||||
|
||||
Web content filtering is available on most major web browsers, with blocks performed by SmartScreen (Edge) and Network Protection (Internet Explorer, Chrome, Firefox, and all other browsers). See the prerequisites section for more information about browser support.
|
||||
|
||||
To summarize the benefits:
|
||||
|
||||
- Users are prevented from accessing websites in blocked categories, whether they are browsing on-premises or away
|
||||
- You can conveniently deploy varied policies to various sets of users using the machine groups defined in the [Microsoft Defender ATP role-based access control settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/rbac)
|
||||
- You can access web reports in the same central location, with visibility over actual blocks and web usage
|
||||
|
||||
## User experience
|
||||
|
||||
The standard blocking experience is provided by Network Protection, which provides a system-level toast notifying the user of a blocked connection.
|
||||
For a more user-friendly experience, consider using SmartScreen on Edge.
|
||||
|
||||
## Prerequisites
|
||||
|
||||
Before trying out this feature, make sure you have the following:
|
||||
|
||||
- Windows 10 Enterprise E5 license
|
||||
- Access to Microsoft Defender Security Center portal
|
||||
- Machines running Windows 10 Anniversary Update (version 1607) or later with the latest MoCAMP update (for Network Protection on Internet Explorer, Edge, Chrome, or Firefox)
|
||||
- Machines running Windows 10 May 2019 Update (version 1903) or later (for a better user experience from SmartScreen on Edge). Note that if SmartScreen is not turned on, Network Protection will take over the blocking
|
||||
- A valid license with a partner data provider
|
||||
|
||||
## Data handling
|
||||
|
||||
For this feature, we will follow whichever region you have elected to use as part of your [Microsoft Defender ATP data handling settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/data-storage-privacy). Your data will not leave the data center in that region. In addition, your data will not be shared with any third-parties, including our data providers. However, we may send them aggregate data (across users and organizations) to help them improve their feeds.
|
||||
|
||||
## Partner licensing
|
||||
|
||||
In order to give customers access to various sources of web content categorization data, we are very excited to partner with data providers for this feature. We’ve chosen [Cyren](https://www.cyren.com/threat-intelligence) as our first partner, who we’ve worked with closely to build an integrated solution.
|
||||
|
||||
### About Cyren and Threat Intelligence Service for Microsoft Defender ATP
|
||||
|
||||
Cyren’s URL filtering includes 70 categories, providing partners with the ability to build powerful and advanced web security applications. Cyren’s comprehensive categories provide the necessary flexibility for any implementation requirement.
|
||||
|
||||
The broad range of categories enables numerous applications:
|
||||
|
||||
- Protecting users browsing the web from threats such as malware and phishing sites
|
||||
- Ensuring employee productivity
|
||||
- Consumer services such as parental control
|
||||
|
||||
Cyren's web content classification technology is integrated by design into Microsoft Defender ATP to enable web filtering and auditing capabilities.
|
||||
|
||||
Learn more at https://www.cyren.com/products/url-filtering.
|
||||
|
||||
### Cyren permissions
|
||||
|
||||
"Sign in and read user profile" allows Cyren to read your tenant info from your Microsoft Defender ATP account, such as your tenant ID, which will be tied to your Cyren license.
|
||||
|
||||
"Read and Write Integration settings" exists under the WindowsDefenderATP scope within permissions. This line allows Cyren to add/modify/revoke Cyren license status on the Microsoft Defender ATP portal.
|
||||
|
||||
### Signing up for a Cyren License
|
||||
|
||||
Cyren is offering a 60-day free trial for all Microsoft Defender ATP customers. To sign up, please follow the steps below from the portal.
|
||||
|
||||
>[!NOTE]
|
||||
>A user with AAD app admin/global admin permissions is required to complete these steps.
|
||||
|
||||
1. Go to **Reports > Web protection** from the side navigation
|
||||
2. Select the **Connect to a partner** button
|
||||
3. Go through the flow from the flyout to register and connect your Cyren account
|
||||
|
||||
## Turn on web content filtering
|
||||
|
||||
From the left-hand navigation menu, select **Settings > General > Advanced Features**. Scroll down until you see the entry for **Web content filtering**. Switch the toggle to **On** and **Save preferences**.
|
||||
|
||||
### Configure web content filtering policies
|
||||
|
||||
Web content filtering policies specify which site categories are blocked on which machine groups. To manage the policies, go to **Settings > Rules > Web content filtering**.
|
||||
|
||||
Use the filter to locate policies that contain certain blocked categories or are applied to specific machine groups.
|
||||
|
||||
### Create a policy
|
||||
|
||||
To add a new policy:
|
||||
|
||||
1. Select **Add policy** on the **Web content filtering** page in **Settings**.
|
||||
2. Specify a name.
|
||||
3. Select the categories to block. Use the expand icon to fully expand each parent category and select specific web content categories.
|
||||
4. Specify the policy scope. Select the machine groups to specify where to apply the policy. Only machines in the selected machine groups will be prevented from accessing websites in the selected categories.
|
||||
5. Review the summary and save the policy. The policy may take up to 15 minutes to apply to your selected machines.
|
||||
|
||||
>[!NOTE]
|
||||
>If you are removing a policy or changing machine groups at the same time, this might cause a delay in policy deployment.
|
||||
|
||||
## Web content filtering cards and details
|
||||
|
||||
Select **Reports > Web protection** to view cards with information about web content filtering and web threat protection. The following cards provide summary information about web content filtering.
|
||||
|
||||
### Web activity by category
|
||||
|
||||
This card lists the parent web content categories with the largest percentage change in the number of access attempts, whether they have increased or decreased. You can use this card to understand drastic changes in web activity patterns in your organization from last 30 days, 3 months, or 6 months. Select a category name to view more information about that particular category.
|
||||
|
||||
In the first 30 days of using this feature, your organization might not have sufficient data to display in this card.
|
||||
|
||||

|
||||
|
||||
### Web content filtering summary card
|
||||
|
||||
This card displays the distribution of blocked access attempts across the different parent web content categories. Select one of the colored bars to view more information about a specific parent web category.
|
||||
|
||||

|
||||
|
||||
### Web activity summary card
|
||||
|
||||
This card displays the total number of requests for web content in all URLs.
|
||||
|
||||

|
||||
|
||||
### View card details
|
||||
|
||||
You can access the **Report details** for each card by selecting a table row or colored bar from the chart in the card. The report details page for each card contains extensive statistical data about web content categories, website domains, and machine groups.
|
||||
|
||||

|
||||
|
||||
- **Web categories**: Lists the web content categories that have had access attempts in your organization. Select a specific category to open a summary flyout.
|
||||
|
||||
- **Domains**: Lists the web domains that have been accessed or blocked in your organization. Select a specific domain to view detailed information about that domain.
|
||||
|
||||
- **Machine groups**: Lists all the machine groups that have generated web activity in your organization
|
||||
|
||||
Use the time range filter at the top left of the page to select a time period. You can also filter the information or customize the columns. Select a row to open a flyout pane with even more information about the selected item.
|
||||
|
||||
## Errors and issues
|
||||
|
||||
### Why am I seeing the error "Need admin approval" when trying to connect to Cyren?
|
||||
|
||||
You need to be logged in to an AAD account with either App administrator or Global Administrator privileges. Your IT admin would most likely either have these permissions and/or be able to grant them to you.
|
||||
|
||||
### Limitations and known issues in this preview
|
||||
|
||||
- Unassigned machines will have incorrect data shown within the report. In the Report details > Machine groups pivot, you may see a row with a blank Machine Group field. This group contains your unassigned machines in the interim before they get put into your specified group. The report for this row may not contain an accurate count of machines or access counts.
|
||||
|
||||
- The data in our reports may not be congruent with other data on the site. We currently do not support real-time data processing for this feature, so you may see inconsistencies between the data in our reports and the URL entity page.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Web protection overview](web-protection-overview.md)
|
||||
- [Web threat protection](web-threat-protection.md)
|
||||
- [Monitor web security](web-protection-monitoring.md)
|
||||
- [Respond to web threats](web-protection-response.md)
|
@ -8,14 +8,13 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: lomayor
|
||||
author: lomayor
|
||||
ms.author: ellevin
|
||||
author: levinec
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.date: 08/30/2019
|
||||
---
|
||||
|
||||
# Monitor web browsing security
|
||||
@ -54,4 +53,6 @@ Select a domain to view the list of machines that have attempted to access URLs
|
||||
|
||||
## Related topics
|
||||
- [Web protection overview](web-protection-overview.md)
|
||||
- [Web content filtering](web-content-filtering.md)
|
||||
- [Web threat protection](web-threat-protection.md)
|
||||
- [Respond to web threats](web-protection-response.md)
|
||||
|
@ -1,5 +1,5 @@
|
||||
---
|
||||
title: Overview of web protection in Microsoft Defender ATP
|
||||
title: Web protection
|
||||
description: Learn about web protection in Microsoft Defender ATP and how it can protect your organization
|
||||
keywords: web protection, web threat protection, web browsing, security, phishing, malware, exploit, websites, network protection, Edge, Internet Explorer, Chrome, Firefox, web browser
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
@ -8,43 +8,44 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: lomayor
|
||||
author: lomayor
|
||||
ms.author: ellevin
|
||||
author: levinec
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.date: 08/30/2019
|
||||
---
|
||||
|
||||
# Protect your organization against web threats
|
||||
# Web protection
|
||||
|
||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
||||
|
||||
Web protection in Microsoft Defender ATP uses [network protection](network-protection.md) to secure your machines against web threats. By integrating with Microsoft Edge and popular third-party browsers like Chrome and Firefox, web protection stops web threats without a web proxy and can protect machines while they are away or on premises. Web protection stops access to phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, as well as sites that you have blocked in your [custom indicator list](manage-indicators.md).
|
||||
Web protection in Microsoft Defender ATP is a capability made up of [Web threat protection](web-threat-protection.md) and [Web content filtering](web-content-filtering.md). Web protection lets you secure your machines against web threats and helps you regulate unwanted content. You can find Web protection reports in the Microsoft Defender Security Center by going to **Reports > Web protection**.
|
||||
|
||||
>[!Note]
|
||||
>It can take up to an hour for machines to receive new customer indicators.
|
||||

|
||||
|
||||
With web protection, you also get:
|
||||
## Web threat protection
|
||||
|
||||
The cards that make up web threat protection are **Web threat detections over time** and **Web threat summary**.
|
||||
|
||||
Web threat protection includes:
|
||||
- Comprehensive visibility into web threats affecting your organization
|
||||
- Investigation capabilities over web-related threat activity through alerts and comprehensive profiles of URLs and the machines that access these URLs
|
||||
- A full set of security features that track general access trends to malicious and unwanted websites
|
||||
|
||||
## Prerequisites
|
||||
Web protection uses network protection to provide web browsing security on Microsoft Edge and third-party web browsers.
|
||||
## Web content filtering
|
||||
|
||||
To turn on network protection on your machines:
|
||||
- Edit the Microsoft Defender ATP security baseline under **Web & Network Protection** to enable network protection before deploying or redeploying it. [Learn about reviewing and assigning the Microsoft Defender ATP security baseline](configure-machines-security-baseline.md#review-and-assign-the-microsoft-defender-atp-security-baseline)
|
||||
- Turn network protection on using Intune device configuration, SCCM, Group Policy, or your MDM solution. [Read more about enabling network protection](enable-network-protection.md)
|
||||
|
||||
>[!Note]
|
||||
>If you set network protection to **Audit only**, blocking will be unavailable. Also, you will be able to detect and log attempts to access malicious and unwanted websites on Microsoft Edge only.
|
||||
The cards that make up web content filtering are **Web activity by category**, **Web content filtering summary**, and **Web activity summary**.
|
||||
|
||||
Web content filtering includes:
|
||||
- Users are prevented from accessing websites in blocked categories, whether they are browsing on-premises or away
|
||||
- You can conveniently deploy varied policies to various sets of users using the machine groups defined in the [Microsoft Defender ATP role-based access control settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/rbac)
|
||||
- You can access web reports in the same central location, with visibility over actual blocks and web usage
|
||||
|
||||
## In this section
|
||||
|
||||
Topic | Description
|
||||
:---|:---
|
||||
[Monitor web security](web-protection-monitoring.md) | Monitor attempts to access malicious and unwanted websites.
|
||||
[Respond to web threats](web-protection-response.md) | Investigate and manage alerts related to malicious and unwanted websites. Understand how end users are notified whenever a web threat is blocked.
|
||||
[Web threat protection](web-threat-protection.md) | Stop access to phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, as well as sites that you have blocked.
|
||||
[Web content filtering](web-content-filtering.md) | Track and regulate access to websites based on their content categories.
|
||||
|
@ -8,14 +8,13 @@ ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: lomayor
|
||||
author: lomayor
|
||||
ms.author: ellevin
|
||||
author: levinec
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
ms.date: 08/30/2019
|
||||
---
|
||||
|
||||
# Respond to web threats
|
||||
@ -67,4 +66,6 @@ With web protection in Microsoft Defender ATP, your end users will be prevented
|
||||
|
||||
## Related topics
|
||||
- [Web protection overview](web-protection-overview.md)
|
||||
- [Monitor web security](web-protection-monitoring.md)
|
||||
- [Web content filtering](web-content-filtering.md)
|
||||
- [Web threat protection](web-threat-protection.md)
|
||||
- [Monitor web security](web-protection-monitoring.md)
|
@ -0,0 +1,45 @@
|
||||
---
|
||||
title: Protect your organization against web threats
|
||||
description: Learn about web protection in Microsoft Defender ATP and how it can protect your organization
|
||||
keywords: web protection, web threat protection, web browsing, security, phishing, malware, exploit, websites, network protection, Edge, Internet Explorer, Chrome, Firefox, web browser
|
||||
search.product: eADQiWindows 10XVcnh
|
||||
search.appverid: met150
|
||||
ms.prod: w10
|
||||
ms.mktglfcycl: deploy
|
||||
ms.sitesec: library
|
||||
ms.pagetype: security
|
||||
ms.author: ellevin
|
||||
author: levinec
|
||||
ms.localizationpriority: medium
|
||||
manager: dansimp
|
||||
audience: ITPro
|
||||
ms.collection: M365-security-compliance
|
||||
ms.topic: article
|
||||
---
|
||||
|
||||
# Protect your organization against web threats
|
||||
|
||||
>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-main-abovefoldlink&rtc=1)
|
||||
|
||||
Web threat protection is part of [Web protection](web-protection-overview.md) in Microsoft Defender ATP. It uses [network protection](network-protection.md) to secure your machines against web threats. By integrating with Microsoft Edge and popular third-party browsers like Chrome and Firefox, web threat protection stops web threats without a web proxy and can protect machines while they are away or on premises. Web threat protection stops access to phishing sites, malware vectors, exploit sites, untrusted or low-reputation sites, as well as sites that you have blocked in your [custom indicator list](manage-indicators.md).
|
||||
|
||||
>[!Note]
|
||||
>It can take up to an hour for machines to receive new customer indicators.
|
||||
|
||||
## Prerequisites
|
||||
Web protection uses network protection to provide web browsing security on Microsoft Edge and third-party web browsers.
|
||||
|
||||
To turn on network protection on your machines:
|
||||
- Edit the Microsoft Defender ATP security baseline under **Web & Network Protection** to enable network protection before deploying or redeploying it. [Learn about reviewing and assigning the Microsoft Defender ATP security baseline](configure-machines-security-baseline.md#review-and-assign-the-microsoft-defender-atp-security-baseline)
|
||||
- Turn network protection on using Intune device configuration, SCCM, Group Policy, or your MDM solution. [Read more about enabling network protection](enable-network-protection.md)
|
||||
|
||||
>[!Note]
|
||||
>If you set network protection to **Audit only**, blocking will be unavailable. Also, you will be able to detect and log attempts to access malicious and unwanted websites on Microsoft Edge only.
|
||||
|
||||
## Related topics
|
||||
|
||||
- [Web protection overview](web-protection-overview.md)
|
||||
- [Web threat protection](web-threat-protection.md)
|
||||
- [Monitor web security](web-protection-monitoring.md)
|
||||
- [Respond to web threats](web-protection-response.md)
|
||||
- [Network protection](network-protection.md)
|