4.6 KiB
title, description, keywords, search.product, ms.pagetype, ms.prod, ms.mktglfcycl, ms.sitesec, ms.pagetype, localizationpriority, author, ms.author, ms.date
title | description | keywords | search.product | ms.pagetype | ms.prod | ms.mktglfcycl | ms.sitesec | ms.pagetype | localizationpriority | author | ms.author | ms.date |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Conduct a demo to see how Network protection works | Quickly see how Network protection works by performing common scenarios that it protects against | Network protection, exploits, malicious website, ip, domain, domains, evaluate, test, demo | eADQiWindows 10XVcnh | security | w10 | manage | library | security | medium | iaanw | iawilt | 11/20/2017 |
Evaluate Network protection
Applies to:
- Windows 10, version 1709
Audience
- Enterprise security administrators
Manageability available with
- Group Policy
- PowerShell
Network protection is a feature that is part of Windows Defender Exploit Guard.
It helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
This topic helps you evaluate Network protection by enabling the feature and guiding you to a testing site.
Note
The site will replicate the behavior that would happen if a user visted a malicious site or domain. The sites in this evaluation topic are not malicious, they are specially created websites that pretend to be malicious.
Tip
You can also visit the Windows Defender Testground website at demo.wd.microsoft.com to confirm the feature is working and see how it works.
Enable Network protection
-
Type powershell in the Start menu, right click Windows PowerShell and click Run as administrator
-
Enter the following cmdlet:
Set-MpPreference -EnableNetworkProtection Enabled
You can also carry out the processes described in this topic in audit or disabled mode to see how the feature will work. Use the same PowerShell cmdlet as above, but replace Enabled
with either AuditMode
or Disabled
.
Visit a (fake) malicious domain
-
Open Internet Explorer, Google Chrome, or any other browser of your choice.
You will get a 403 Forbidden response in the browser, and you will see a notification that the network connnection was blocked.
Review Network protection events in Windows Event Viewer
You can also review the Windows event log to see the events there were created when performing the demo. You can use the custom view below or locate them manually.
-
Type Event viewer in the Start menu to open the Windows Event Viewer.
-
On the left panel, under Actions, click Import custom view...
-
Navigate to the Exploit Guard Evaluation Package, and select the file np-events.xml. Alternatively, copy the XML directly.
-
Click OK.
-
This will create a custom view that filters to only show the following events related to Network protection:
Event ID | Description |
---|---|
5007 | Event when settings are changed |
1125 | Event when rule fires in Audit-mode |
1126 | Event when rule fires in Block-mode |
Use audit mode to measure impact
You can also enable the Network protection feature in audit mode. This lets you see a record of what IPs and domains would have been blocked if the feature were enabled.
You might want to do this when testing how the feature will work in your organization, to ensure it doesn't affect your line-of-business apps, and to get an idea of how often the feature will block connections during normal use.
To enable audit mode, use the following PowerShell cmdlet:
Set-MpPreference -EnableNetworkProtection AuditMode
Tip
If you want to fully audit how Network protection will work in your organization, you'll need to use a management tool to deploy this setting to machines in your network(s). You can also use Group Policy, Intune, or MDM CSPs to configure and deploy the setting, as described in the main Network protection topic.