Enable network protection
Network protection helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet.
You can audit network protection in a test environment to see which apps would be blocked before you enable it.
You can enable network protection by using any of the these methods:
- Group Policy
- PowerShell cmdlets
- Sign in to the Azure portal and open Intune.
- Click Device configuration > Profiles > Create profile.
- Name the profile, choose Windows 10 and later and Endpoint protection.
- Click Configure > Windows Defender Exploit Guard > Network filtering > Enable.
- Click OK to save each open blade and click Create.
- Click the profile Assignments, assign to All Users & All Devices, and click Save.
Use the ./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection configuration service provider (CSP) to enable or disable network protection or enable audit mode.
You can use the following procedure to enable network protection on a standalone computer or for domain-joined computers.
On a standalone computer, click Start, type and then click Edit group policy.
On a domain-joined Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure and click Edit.
In the Group Policy Management Editor go to Computer configuration and click Administrative templates.
Expand the tree to Windows components > Windows Defender Antivirus > Windows Defender Exploit Guard > Network protection.
Double-click the Prevent users and apps from accessing dangerous websites setting and set the option to Enabled. In the options section, you must specify one of the following:
- Block - Users will not be able to access malicious IP addresses and domains
- Disable (Default) - The Network protection feature will not work. Users will not be blocked from accessing malicious domains
- Audit Mode - If a user visits a malicious IP address or domain, an event will be recorded in the Windows event log but the user will not be blocked from visiting the address.
To fully enable network protection, you must set the Group Policy option to Enabled and also select Block in the options drop-down menu.
You can confirm network protection is enabled on a local computer by using Registry editor:
- Click Start and type regedit to open Registry Editor.
- Navigate to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection
- Click EnableNetworkProtection and confirm the value:
- Type powershell in the Start menu, right click Windows PowerShell and click Run as administrator
Enter the following cmdlet:
Set-MpPreference -EnableNetworkProtection Enabled
You can enable the feature in audit mode using the following cmdlet:
Set-MpPreference -EnableNetworkProtection AuditMode
Disabled insead of
Enabled to turn the feature off.
Network protection can't be turned on using the Windows Security app, but you can enable it by
Send feedback about: