diff --git a/windows/client-management/mdm/policy-csp-networklistmanager.md b/windows/client-management/mdm/policy-csp-networklistmanager.md index ced9fe042a..227d198378 100644 --- a/windows/client-management/mdm/policy-csp-networklistmanager.md +++ b/windows/client-management/mdm/policy-csp-networklistmanager.md @@ -7,7 +7,7 @@ ms.prod: w10 ms.technology: windows author: nimishasatapathy ms.localizationpriority: medium -ms.date: 7/10/2021 +ms.date: 12/16/2021 ms.reviewer: manager: dansimp --- @@ -58,7 +58,15 @@ manager: dansimp -This policy setting provides the list of URLs (separated by Unicode character 0xF000) to endpoints accessible only within an enterprise's network. If any of the URLs can be resolved over HTTPS, the network would be considered authenticated. +This policy setting provides the list of URLs (separated by Unicode character 0xF000) to endpoints accessible only within an enterprise's network. If any of the URLs can be resolved over HTTPS, the network would be considered authenticated. + +When entering a list of TLS endpoints in Microsoft Endpoint Manager, you must follow this format, even in the UI: +`````` +- The HTTPS endpoint must not have any additional authentication checks, such as login or multifactor authentication. +- The HTTPS endpoint must be an internal address not accessible from outside the corporate network. +- The client must trust the server certificate, so the CA certificate that the HTTPS server certificate chains to must be present in the client machine's root certificate store. +- A certificate should not be a public certificate. +