Enable network protection

Applies to:

Network protection helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. You can audit network protection in a test environment to see which apps would be blocked before you enable it.
You can enable network protection by using any of the these methods:

  • Intune
  • MDM
  • Group Policy
  • PowerShell cmdlets
  • Registry

Intune

  1. Sign in to the Azure portal and open Intune.
  2. Click Device configuration > Profiles > Create profile.
  3. Name the profile, choose Windows 10 and later and Endpoint protection. Create endpoint protection profile
  4. Click Configure > Windows Defender Exploit Guard > Network filtering > Enable.
    Enable network protection in Intune
  5. Click OK to save each open blade and click Create.
  6. Click the profile Assignments, assign to All Users & All Devices, and click Save.

MDM

Use the ./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection configuration service provider (CSP) to enable or disable network protection or enable audit mode.

Group Policy

You can use the following procedure to enable network protection on a standalone computer or for domain-joined computers.

  1. On a standalone computer, click Start, type and then click Edit group policy.

    -Or-

    On a domain-joined Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure and click Edit.

  2. In the Group Policy Management Editor go to Computer configuration and click Administrative templates.

  3. Expand the tree to Windows components > Windows Defender Antivirus > Windows Defender Exploit Guard > Network protection.

  4. Double-click the Prevent users and apps from accessing dangerous websites setting and set the option to Enabled. In the options section, you must specify one of the following:

    • Block - Users will not be able to access malicious IP addresses and domains
    • Disable (Default) - The Network protection feature will not work. Users will not be blocked from accessing malicious domains
    • Audit Mode - If a user visits a malicious IP address or domain, an event will be recorded in the Windows event log but the user will not be blocked from visiting the address.

Important

To fully enable network protection, you must set the Group Policy option to Enabled and also select Block in the options drop-down menu.

You can confirm network protection is enabled on a local computer by using Registry editor:

  1. Click Start and type regedit to open Registry Editor.
  2. Navigate to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection
  3. Click EnableNetworkProtection and confirm the value:
    • 0=Off
    • 1=On
    • 2=Audit

PowerShell

  1. Type powershell in the Start menu, right click Windows PowerShell and click Run as administrator
  2. Enter the following cmdlet:

    Set-MpPreference -EnableNetworkProtection Enabled
    

You can enable the feature in audit mode using the following cmdlet:

Set-MpPreference -EnableNetworkProtection AuditMode

Use Disabled insead of AuditMode or Enabled to turn the feature off.

Network protection can't be turned on using the Windows Security app, but you can enable it by