Редагувати

Поділитися через


Evaluate network protection

Applies to:

Network protection helps prevent employees from using any application to access dangerous domains that might host phishing scams, exploits, and other malicious content on the Internet.

This article helps you evaluate network protection by enabling the feature and guiding you to a testing site. The sites in this evaluation article aren't malicious. They're specially created websites that pretend to be malicious. The site replicates the behavior that would happen if a user visited a malicious site or domain.

Enable network protection in audit mode

Enable network protection in audit mode to see which IP addresses and domains might be blocked. You can make sure it doesn't affect line-of-business apps, or get an idea of how often blocks occur.

  1. Type powershell in the Start menu, right-click Windows PowerShell and select Run as administrator.

  2. Run the following cmdlet:

    Set-MpPreference -EnableNetworkProtection AuditMode
    

Visit a (fake) malicious domain

  1. Open Internet Explorer, Google Chrome, or any other browser of your choice.

  2. Go to https://smartscreentestratings2.net.

    The network connection is allowed and a test message displays.

    The connection blockage notification

Note

Network connections can be successful even though a site is blocked by network protection. To learn more, see Network protection and the TCP three-way handshake.

Review network protection events in Windows Event Viewer

To review apps that would have been blocked, open Event Viewer and filter for Event ID 1125 in the Microsoft-Windows-Windows Defender/Operational log. The following table lists all network protection events.

Event ID Provide/Source Description
5007 Windows Defender (Operational) Event when settings are changed
1125 Windows Defender (Operational) Event when a network connection is audited
1126 Windows Defender (Operational) Event when a network connection is blocked

Troubleshooting Network Protection

If network protection fails to detect, make sure that the following prerequisites are enabled:

  1. Microsoft Defender Antivirus is the primary antivirus app (active mode)

  2. Behavior Monitoring is enabled

  3. Cloud Protection is enabled

  4. Cloud Protection network connectivity is functional

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender for Endpoint Tech Community.