Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Network protection helps to prevent users from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the internet. You can audit network protection in a test environment to view which apps would be blocked before enabling network protection.
Learn more about network filtering configuration options.
Prerequisites
Supported operating systems
- Windows
- Linux (See Network protection for Linux)
- macOS (See Network protection for macOS)
Enable network protection
To enable network protection, you can use any of the methods described in this article.
Microsoft Defender for Endpoint Security Settings Management
Create an endpoint security policy
Tip
The following procedures require the Security Administrator role in Microsoft Entra ID.
In the Microsoft Defender portal at https://security.microsoft.com, go to Endpoints > Configuration management > Endpoint security policies. Or, to go directly to the Endpoint Security Policies page, use https://security.microsoft.com/policy-inventory.
On the Windows policies tab of the Endpoint Security Policies page, select Create new policy.
On the Create a new policy flyout that opens, configure the following settings:
- Select platform: Select Windows.
- Select template: Select Microsoft Defender AntiVirus.
Select Create policy.
The Create a new policy wizard opens. On the Basics tab, configure the following settings:
- Name: Enter a unique, descriptive name for the policy.
- Description: Enter an optional description.
Select Next.
On the Configuration settings tab, expand Defender and then select a value for Enable network protection based on operating system:
Windows clients and Windows servers: Available values are:
- Enabled (block mode): Block mode is needed to block IP address/URL indicators and Web Content Filtering.
- Enabled (audit mode)
- Disabled (Default)
- Not Configured
Windows Server 2016 and Windows Server 2012 R2: You also need to configure the Allow Network Protection Down Level setting in the Threat Severity Default Action section. Available values are:
- Network protection will be enabled downlevel
- Network Protection will be disabled downlevel. (Default)
- Not configured
Optional Network Protection settings for Windows clients and Windows servers:
- Allow Datagram Processing On Win Server: Available values are:
Datagram processing on Windows Server is enabled
Datagram processing on Windows Server is disabled (Default): We strongly recommend this value for any server roles that generate high volumes of UDP traffic. For example:
- Domain Controllers
- Windows DNS servers
- Windows File Servers
- Microsoft SQL servers
- Microsoft Exchange servers
Disabling datagram processing on these servers helps keep the network stable and ensures better use of system resources in high-demand environments. Enabling datagram processing on these servers can reduce network performance and reliability.
Not configured
- Disable DNS over TCP parsing
- DNS over TCP parsing is disabled
- DNS over TCP parsing is enabled (Default)
- Not configured
- Disable HTTP parsing
- HTTP parsing is disabled
- HTTP parsing is enabled (Default)
- Not configured
- Disable SSH parsing
- SSH parsing is disabled
- SSH parsing is enabled (Default)
- Not configured
- Disable TLS parsing
- TLS parsing is disabled
- TLS parsing is enabled (Default)
- Not configured
- [Deprecated] Enable DNS Sinkhole
- DNS Sinkhole is disabled
- DNS Sinkhole is enabled. (Default)
- Not configured
- Allow Datagram Processing On Win Server: Available values are:
When you're finished on the Configuration settings tab, select Next.
On the Assignments tab, click in the search box or start typing a group name, and then select it from the results.
You can select All users or All devices.
When you select a custom group, you can use that group to include or exclude the group members.
When you're finished on the Assignments tab, select Next.
On the Review + create tab, review your settings, and then select Save.
Microsoft Intune
Microsoft Defender for Endpoint Baseline method
In the Microsoft Intune admin center at https://intune.microsoft.com, go to Endpoint security > Overview section > Security baselines. Or, to go directly to the Endpoint security | Security baselines page, use https://intune.microsoft.com/#view/Microsoft_Intune_Workflows/SecurityManagementMenu/~/securityBaselines.
On the Endpoint security | Security baselines page, select Microsoft Defender for Endpoint Baseline.
On the Microsoft Defender for Endpoint Security Baseline | Profiles page, select Create policy.
On the Create profile flyout that opens, select Create.
The Create profile wizard opens. On the Basics tab, configure the following settings:
- Name: Enter a unique, descriptive name for the policy.
- Description: Enter an optional description.
Select Next.
On the Configuration settings tab, expand Defender and then select one of the following values for Enable network protection:
- Disabled
- Enabled (block mode)
- Enable Network Protection
Select Next.
On the Scope tags tab, the scope tag named Default is select by default, but you can remove it and select other existing scope tags. When you're finished, select Next.
On the Assignments tab, configure the following settings:
- Included groups section: Select one of the following options:
- Add groups: Select one or more groups to include.
- Add all users
- Add all devices
- Excluded groups: Select Add groups to specify groups to exclude.
When you're finished on the Assignments tab, select Next.
- Included groups section: Select one of the following options:
On the Review + create tab, review the settings, and then select Create.
Antivirus policy method
In the Microsoft Intune admin center at https://intune.microsoft.com, go to Endpoint security > Manage section > Antivirus. Or, to go directly to the Endpoint security | Antivirus page, use https://intune.microsoft.com/#view/Microsoft_Intune_Workflows/SecurityManagementMenu/~/antivirus.
In the AV policies section of the Summary tab of the Endpoint security | Antivirus page, select Create policy.
On the Create a profile flyout that opens, configure the following settings:
- Platform: Select Windows.
- Profile: Select Microsoft Defender Antivirus.
Select Create.
The Create Policy wizard opens. On the Basics tab, configure the following settings:
- Name: Enter a unique, descriptive name for the policy.
- Description: Enter an optional description.
Select Next.
On the Configuration settings tab, select one of the following values for Enable network protection:
- Disabled
- Enabled (block mode)
- Enable Network Protection
Select Next.
On the Scope tags tab, the scope tag named Default is select by default, but you can remove it and select other existing scope tags. When you're finished, select Next.
On the Assignments tab, click in the search box or start typing a group name, and then select it from the results.
You can select All users or All devices.
When you select a custom group, you can use that group to include or exclude the group members.
When you're finished on the Assignments tab, select Next.
On the Review + create tab, review your settings, and then select Save.
Configuration profile method
In the Microsoft Intune admin center at https://intune.microsoft.com, go to Devices > Manage devices section > Configuration. Or, to go directly to the Devices | Configuration page, use https://intune.microsoft.com/#view/Microsoft_Intune_DeviceSettings/DevicesMenu/~/configuration.
On the Policies tab of the Devices | Configuration page, select Create > New policy.
In the Create a profile flyout that opens, configure the following settings:
- Platform: Select Windows 10 and later.
- Platform: Select Templates.
In the Template name section that appears, select Endpoint protection.
When you're finished on the Create a profile flyout, select Create.
The Endpoint protection wizard opens. On the Basics tab, configure the following settings:
- Name: Enter a unique, descriptive name for the policy.
- Description: Enter an optional description.
Select Next.
On the Configuration settings tab, select Microsoft Defender Exploit Guard > Network filtering.
Change the Network protection value from Not configured to Audit (for testing and observation) or Enable.
Select Next.
On the Assignments tab, configure the following settings:
- Included groups section: Select one of the following options:
- Add groups: Select one or more groups to include.
- Add all users
- Add all devices
- Excluded groups: Select Add groups to specify groups to exclude.
When you're finished on the Assignments tab, select Next.
- Included groups section: Select one of the following options:
On the Applicability rules tab, create rules as required by configuring the following settings:
- Rule: Select Assign profile if or Don't assign profile if.
- Property: Select OS edition or OS version.
- Value:
- OS edition: Select one or more of the available values.
- OS version: Enter a beginning version number and an ending version number.
When you're finished on the Applicability rules tab, select Next.
On the Review + create tab, review the settings, and then select Create.
Mobile device management (MDM)
Use the EnableNetworkProtection configuration service provider (CSP) to turn network protection on or off, or to enable audit mode.
Update Microsoft Defender anti-malware platform to the latest version before you turn network protection on or off.
Group Policy
Use the following procedure to enable network protection on domain-joined computers or on a standalone computer.
On a standalone computer, go to Start and then type and select Edit group policy.
-Or-
On a domain-joined Group Policy management computer, open the Group Policy Management Console. Right-click the Group Policy Object you want to configure and select Edit.
In the Group Policy Management Editor, go to Computer configuration and select Administrative templates.
Expand the tree to Windows components > Microsoft Defender Antivirus > Microsoft Defender Exploit Guard > Network protection.
On older versions of Windows, the Group Policy path might have Windows Defender Antivirus instead of Microsoft Defender Antivirus.
Double-click the Prevent users and apps from accessing dangerous websites setting and set the option to Enabled. In the options section, you must specify one of the following options:
- Block: Users can't access malicious IP addresses and domains.
- Disable (Default): The Network protection feature doesn't work. Users aren't blocked from accessing malicious domains.
- Audit Mode: If a user visits a malicious IP address or domain, an event is recorded in the Windows event log. However, the user isn't blocked from visiting the address.
Important
To fully enable network protection, you must set the Group Policy option to Enabled and also select Block in the options drop-down menu.
(This step is optional.) Follow the steps in Check if network protection is enabled to verify that your Group Policy settings are correct.
Microsoft Configuration Manager
Open the Configuration Manager console.
Go to Assets and Compliance > Endpoint Protection > Windows Defender Exploit Guard.
Select Create Exploit Guard Policy from the ribbon to create a new policy.
To edit an existing policy, select the policy, then select Properties from either the ribbon or the right-click menu. Edit the Configure network protection option from the Network Protection tab.
On the General page, specify a name for the new policy and verify the Network protection option is enabled.
On the Network protection page, select one of the following settings for the Configure network protection option:
- Block
- Audit
- Disabled
Complete the rest of the steps, and save the policy.
From the ribbon, select Deploy to deploy the policy to a collection.
PowerShell
On your Windows device, select Start, type
powershell, right-click Windows PowerShell, and then select Run as administrator.Run the following cmdlet:
Set-MpPreference -EnableNetworkProtection EnabledFor Windows Server, use the extra commands listed in the following table:
Windows Server version Commands Windows Server 2019 and later Set-MpPreference -AllowNetworkProtectionOnWinServer $trueWindows Server 2016
Windows Server 2012 R2 with the unified agent for Microsoft Defender for EndpointSet-MpPreference -AllowNetworkProtectionDownLevel $true
Set-MpPreference -AllowNetworkProtectionOnWinServer $true
Important
Disable the "AllowDatagramProcessingOnWinServer" setting. Disabling this setting is important for any roles that generate high volumes of UDP traffic such as Domain Controllers, Windows DNS servers, Windows File Servers, Microsoft SQL servers, Microsoft Exchange servers, and others. Enabling datagram processing in these cases can reduce network performance and reliability. Disabling it helps keep the network stable and ensures better use of system resources in high-demand environments.
(This step is optional.) To set network protection to audit mode, use the following cmdlet:
Set-MpPreference -EnableNetworkProtection AuditModeTo turn off network protection, use the
Disabledparameter instead ofAuditModeorEnabled.
Check if network protection is enabled
You can use Registry Editor to check the status of network protection.
Open Registry Editor (for example, run
regedit.exe).Navigate to the following path: HKEY_LOCAL_MACHINE > SOFTWARE > Policies > Microsoft > Windows Defender > Policy Manager
If that path doesn't exist, navigate to HKEY_LOCAL_MACHINE > SOFTWARE > Microsoft > Windows Defender > Windows Defender Exploit Guard > Network Protection.
Select EnableNetworkProtection to see the current state of network protection on the device:
- 0 is Off
- 1 is On
- 2 is Audit mode
Important information about removing Exploit Guard settings from a device
When you deploy an Exploit Guard policy using Configuration Manager, the settings remain on the client even if you later remove the deployment. If the deployment is removed, the client logs Delete not supported in the ExploitGuardHandler.log file.
To correctly remove Exploit Guard settings, use the following PowerShell script in the SYSTEM context:
$defenderObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_Defender02" -Filter "InstanceID='Defender' and ParentID='./Vendor/MSFT/Policy/Config'"
$defenderObject.AttackSurfaceReductionRules = $null
$defenderObject.AttackSurfaceReductionOnlyExclusions = $null
$defenderObject.EnableControlledFolderAccess = $null
$defenderObject.ControlledFolderAccessAllowedApplications = $null
$defenderObject.ControlledFolderAccessProtectedFolders = $null
$defenderObject.EnableNetworkProtection = $null
$defenderObject.Put()
$exploitGuardObject = Get-WmiObject -Namespace "root/cimv2/mdm/dmmap" -Class "MDM_Policy_Config01_ExploitGuard02" -Filter "InstanceID='ExploitGuard' and ParentID='./Vendor/MSFT/Policy/Config'"
$exploitGuardObject.ExploitProtectionSettings = $null
$exploitGuardObject.Put()
See also
- Network protection
- Network protection for Linux
- Network protection for macOS
- Network protection and the TCP three-way handshake
- Evaluate network protection
- Troubleshoot network protection
Tip
Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.