{"id":4813,"date":"2023-06-22T15:59:42","date_gmt":"2023-06-22T22:59:42","guid":{"rendered":"https:\/\/SUMMALAI.COM\/?p=4813"},"modified":"2023-06-22T15:59:45","modified_gmt":"2023-06-22T22:59:45","slug":"how-to-turn-on-network-protection","status":"publish","type":"post","link":"https:\/\/SUMMALAI.COM\/?p=4813","title":{"rendered":"How to Turn on Network Protection"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\" id=\"check-if-network-protection-is-enabled\">Check if network protection is enabled<\/h3>\n\n\n\n<p>Check if network protection has been enabled on a local device by using Registry editor.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Select the&nbsp;<strong>Start<\/strong>&nbsp;button in the task bar and type&nbsp;<strong>regedit<\/strong>&nbsp;to open Registry editor.<\/li><li>Choose&nbsp;<strong>HKEY_LOCAL_MACHINE<\/strong>&nbsp;from the side menu.<\/li><li>Navigate through the nested menus to&nbsp;<strong>SOFTWARE<\/strong>&nbsp;&gt;&nbsp;<strong>Policies<\/strong>&nbsp;&gt;&nbsp;<strong>Microsoft<\/strong>&nbsp;&gt;&nbsp;<strong>Windows Defender<\/strong>&nbsp;&gt;&nbsp;<strong>Policy Manager<\/strong>.<\/li><\/ol>\n\n\n\n<p>If the Key is missing, Navigate to&nbsp;<strong>SOFTWARE<\/strong>&nbsp;&gt;&nbsp;<strong>Microsoft<\/strong>&nbsp;&gt;&nbsp;<strong>Windows Defender<\/strong>&nbsp;&gt;&nbsp;<strong>Windows Defender Exploit Guard<\/strong>&nbsp;&gt;&nbsp;<strong>Network Protection<\/strong>.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\"><li>Select&nbsp;<strong>EnableNetworkProtection<\/strong>&nbsp;to see the current state of network protection on the device:<ul><li>0, or&nbsp;<strong>Off<\/strong><\/li><li>1, or&nbsp;<strong>On<\/strong><\/li><li>2, or&nbsp;<strong>Audit<\/strong>&nbsp;mode<\/li><\/ul><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/media\/95341270-b738b280-08d3-11eb-84a0-16abb140c9fd.png?view=o365-worldwide#lightbox\"><\/a><\/li><\/ol>\n\n\n\n<p>There are a couple of different ways to enable network protection.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"powershell\">PowerShell<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li>Type&nbsp;<strong>powershell<\/strong>&nbsp;in the Start menu, right-click&nbsp;<strong>Windows PowerShell<\/strong>&nbsp;and select&nbsp;<strong>Run as administrator<\/strong>.<\/li><li>Enter the following cmdlet:PowerShellCopy<code>Set-MpPreference -EnableNetworkProtection Enabled<\/code><\/li><li>Optional: Enable the feature in audit mode using the following cmdlet:PowerShellCopy<code>Set-MpPreference -EnableNetworkProtection AuditMode <\/code>Use&nbsp;<code>Disabled<\/code>&nbsp;instead of&nbsp;<code>AuditMode<\/code>&nbsp;or&nbsp;<code>Enabled<\/code>&nbsp;to turn off the feature.<\/li><\/ol>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-network-protection?view=o365-worldwide#mobile-device-management-mdm\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mobile-device-management-mdm\">Mobile device management (MDM)<\/h3>\n\n\n\n<p>Use the&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/client-management\/mdm\/policy-csp-defender\">.\/Vendor\/MSFT\/Policy\/Config\/Defender\/EnableNetworkProtection<\/a>&nbsp;configuration service provider (CSP) to enable or disable network protection or enable audit mode.<\/p>\n\n\n\n<p><a href=\"https:\/\/support.microsoft.com\/topic\/update-for-microsoft-defender-antimalware-platform-92e21611-8cf1-8e0e-56d6-561a07d144cc\">Update Microsoft Defender antimalware platform to the latest version<\/a>&nbsp;before you enable or disable network protection or enable audit mode.<\/p>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-network-protection?view=o365-worldwide#microsoft-intune\"><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft-intune\">Microsoft Intune<\/h3>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-network-protection?view=o365-worldwide#microsoft-defender-for-endpoint-baseline-method\"><\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"microsoft-defender-for-endpoint-baseline-method\">Microsoft Defender for Endpoint Baseline method<\/h4>\n\n\n\n<ol class=\"wp-block-list\"><li>Sign into the Microsoft Intune admin center (<a href=\"https:\/\/endpoint.microsoft.com\/\">https:\/\/endpoint.microsoft.com<\/a>).<\/li><li>Go to\u00a0<strong>Endpoint security<\/strong>\u00a0>\u00a0<strong>Security baselines<\/strong>\u00a0>\u00a0<strong>Microsoft Defender for Endpoint Baseline<\/strong>.<\/li><li>Select\u00a0<strong>Create a profile<\/strong>, then provide a name for your profile, and then select\u00a0<strong>Next<\/strong>.<\/li><li>In the\u00a0<strong>Configuration settings<\/strong>\u00a0section, go to\u00a0<strong>Attack Surface Reduction Rules<\/strong>\u00a0> set\u00a0<strong>Block<\/strong>,\u00a0<strong>Enable<\/strong>\u00a0or\u00a0<strong>Audit<\/strong>\u00a0for\u00a0<strong>Enable network protection<\/strong>. Select\u00a0<strong>Next<\/strong>.<\/li><li>Select the appropriate\u00a0<strong>Scope tags<\/strong>\u00a0and\u00a0<strong>Assignments<\/strong>\u00a0as required by your organization.<\/li><li>Review all the information, and then select\u00a0<strong>Create<\/strong>.<a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-network-protection?view=o365-worldwide#antivirus-policy-method\"><\/a><\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"antivirus-policy-method\">Antivirus policy method<\/h4>\n\n\n\n<ol class=\"wp-block-list\"><li>Sign into the Microsoft Intune admin center (<a href=\"https:\/\/endpoint.microsoft.com\/\">https:\/\/endpoint.microsoft.com<\/a>).<\/li><li>Go to&nbsp;<strong>Endpoint security<\/strong>&nbsp;&gt;&nbsp;<strong>Antivirus<\/strong><\/li><li>Select&nbsp;<strong>Create a policy<\/strong><\/li><li>In the&nbsp;<strong>Create a policy<\/strong>&nbsp;flyout, choose&nbsp;<strong>Windows 10, Windows 11, and Windows Server<\/strong>&nbsp;from the&nbsp;<strong>Platform<\/strong>&nbsp;list.<\/li><li>Choose&nbsp;<strong>Microsoft Defender Antivirus<\/strong>&nbsp;from the&nbsp;<strong>Profile<\/strong>&nbsp;list then choose&nbsp;<strong>Create<\/strong><\/li><li>Provide a name for your profile, and then select&nbsp;<strong>Next<\/strong>.<\/li><li>In the&nbsp;<strong>Configuration settings<\/strong>&nbsp;section, select&nbsp;<strong>Disabled<\/strong>,&nbsp;<strong>Enabled (block mode)<\/strong>&nbsp;or&nbsp;<strong>Enabled (audit mode)<\/strong>&nbsp;for&nbsp;<strong>Enable Network Protection<\/strong>, then select&nbsp;<strong>Next<\/strong>.<\/li><li>Select the appropriate&nbsp;<strong>Assignments<\/strong>&nbsp;and&nbsp;<strong>Scope tags<\/strong>&nbsp;as required by your organization.<\/li><li>Review all the information, and then select&nbsp;<strong>Create<\/strong>.<\/li><\/ol>\n\n\n\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-network-protection?view=o365-worldwide#configuration-profile-method\"><\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"configuration-profile-method\">Configuration profile method<\/h4>\n\n\n\n<ol class=\"wp-block-list\"><li>Sign into the Microsoft Intune admin center (<a href=\"https:\/\/endpoint.microsoft.com\/\">https:\/\/endpoint.microsoft.com<\/a>).<\/li><li>Go to\u00a0<strong>Devices<\/strong>\u00a0>\u00a0<strong>Configuration profiles<\/strong>\u00a0>\u00a0<strong>Create profile<\/strong>.<\/li><li>In the\u00a0<strong>Create a profile<\/strong>\u00a0flyout, select\u00a0<strong>Platform<\/strong>\u00a0and choose the\u00a0<strong>Profile Type<\/strong>\u00a0as\u00a0<strong>Templates<\/strong>.<\/li><li>In the\u00a0<strong>Template name<\/strong>, Choose\u00a0<strong>Endpoint protection<\/strong>\u00a0from the list of templates, and then select\u00a0<strong>Create<\/strong>.<\/li><li>Go to\u00a0<strong>Endpoint protection<\/strong>\u00a0>\u00a0<strong>Basics<\/strong>, provide a name for your profile, and then select\u00a0<strong>Next<\/strong>.<\/li><li>In the\u00a0<strong>Configuration settings<\/strong>\u00a0section, go to\u00a0<strong>Microsoft Defender Exploit Guard<\/strong>\u00a0>\u00a0<strong>Network filtering<\/strong>\u00a0>\u00a0<strong>Network protection<\/strong>\u00a0>\u00a0<strong>Enable<\/strong>\u00a0or\u00a0<strong>Audit<\/strong>. Select\u00a0<strong>Next<\/strong>.<\/li><li>Select the appropriate\u00a0<strong>Scope tags<\/strong>,\u00a0<strong>Assignments<\/strong>, and\u00a0<strong>Applicability rules<\/strong>\u00a0as required by your organization. Admins can set more requirements.<\/li><li>Review all the information, and then select\u00a0<strong>Create<\/strong>.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"group-policy\">Group Policy<\/h3>\n\n\n\n<p>Use the following procedure to enable network protection on domain-joined computers or on a standalone computer.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>On a standalone computer, go to\u00a0<strong>Start<\/strong>\u00a0and then type and select\u00a0<strong>Edit group policy<\/strong>.<em>-Or-<\/em>On a domain-joined Group Policy management computer, open the\u00a0<a href=\"https:\/\/technet.microsoft.com\/library\/cc731212.aspx\">Group Policy Management Console<\/a>, right-click the Group Policy Object you want to configure and select\u00a0<strong>Edit<\/strong>.<\/li><li>In the\u00a0<strong>Group Policy Management Editor<\/strong>, go to\u00a0<strong>Computer configuration<\/strong>\u00a0and select\u00a0<strong>Administrative templates<\/strong>.<\/li><li>Expand the tree to\u00a0<strong>Windows components<\/strong>\u00a0>\u00a0<strong>Microsoft Defender Antivirus<\/strong>\u00a0>\u00a0<strong>Microsoft Defender Exploit Guard<\/strong>\u00a0>\u00a0<strong>Network protection<\/strong>.\u00a0NoteOn older versions of Windows, the group policy path may say &#8220;Windows Defender Antivirus&#8221; instead of &#8220;Microsoft Defender Antivirus.&#8221;<\/li><li>Double-click the\u00a0<strong>Prevent users and apps from accessing dangerous websites<\/strong>\u00a0setting and set the option to\u00a0<strong>Enabled<\/strong>. In the options section, you must specify one of the following options:<ul><li><strong>Block<\/strong>\u00a0&#8211; Users can&#8217;t access malicious IP addresses and domains.<\/li><li><strong>Disable (Default)<\/strong>\u00a0&#8211; The Network protection feature won&#8217;t work. Users won&#8217;t be blocked from accessing malicious domains.<\/li><li><strong>Audit Mode<\/strong>\u00a0&#8211; If a user visits a malicious IP address or domain, an event will be recorded in the Windows event log. However, the user won&#8217;t be blocked from visiting the address.\u00a0ImportantTo fully enable network protection, you must set the Group Policy option to\u00a0<strong>Enabled<\/strong>\u00a0and also select\u00a0<strong>Block<\/strong>\u00a0in the options drop-down menu.\u00a0NoteOptional: Follow the steps in\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-network-protection?view=o365-worldwide#check-if-network-protection-is-enabled\">Check if network protection is enabled<\/a>\u00a0to verify that your Group Policy settings are correct.<\/li><\/ul><\/li><\/ol>\n\n\n\n<p>Ref: <a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/enable-network-protection?view=o365-worldwide#mdm\">Turn on network protection | Microsoft Learn<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check if network protection is enabled Check if network protection has been enabled on a local device by using Registry editor. Select the&nbsp;Start&nbsp;button in the task bar and type&nbsp;regedit&nbsp;to open Registry editor. Choose&nbsp;HKEY_LOCAL_MACHINE&nbsp;from the side menu. Navigate through the nested menus to&nbsp;SOFTWARE&nbsp;&gt;&nbsp;Policies&nbsp;&gt;&nbsp;Microsoft&nbsp;&gt;&nbsp;Windows Defender&nbsp;&gt;&nbsp;Policy Manager. If the Key is missing, Navigate to&nbsp;SOFTWARE&nbsp;&gt;&nbsp;Microsoft&nbsp;&gt;&nbsp;Windows Defender&nbsp;&gt;&nbsp;Windows Defender Exploit Guard&nbsp;&gt;&nbsp;Network <a class=\"read-more\" href=\"https:\/\/SUMMALAI.COM\/?p=4813\">Read More<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1185,1249,10,1224,14],"tags":[1634],"class_list":["post-4813","post","type-post","status-publish","format-standard","hentry","category-autopilot-intune","category-azure-microsoft","category-microsoft","category-powershell","category-windows-7-8-10","tag-turn-on-network-protection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/posts\/4813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4813"}],"version-history":[{"count":1,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/posts\/4813\/revisions"}],"predecessor-version":[{"id":4814,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=\/wp\/v2\/posts\/4813\/revisions\/4814"}],"wp:attachment":[{"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/SUMMALAI.COM\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}