Turning on network protection
Network protection helps to prevent employees from using any application to access dangerous domains that may host phishing scams, exploits, and other malicious content on the Internet. You can audit network protection in a test environment to see which apps would be blocked before you enable it.
Check if network protection is enabled
You can see if network protection has been enabled on a local device by using Registry editor.
Select the Start button in the task bar and type regedit to open Registry editor
Choose HKEY_LOCAL_MACHINE from the side menu
Navigate through the nested menus to SOFTWARE > Policies > Microsoft Windows Defender > Policy Manager
Select EnableNetworkProtection to see the current state of network protection on the device
- 0, or Off
- 1, or On
- 2, or Audit mode
Enable network protection
You can enable network protection by using any of these methods:
- Microsoft Intune
- Mobile Device Management (MDM)
- Microsoft Endpoint Configuration Manager
- Group Policy
Type powershell in the Start menu, right-click Windows PowerShell and click Run as administrator
Enter the following cmdlet:
Set-MpPreference -EnableNetworkProtection Enabled
You can enable the feature in audit mode using the following cmdlet:
Set-MpPreference -EnableNetworkProtection AuditMode
Disabled instead of
Enabled to turn the feature off.
- Sign in to the Azure portal and open Intune.
- Click Device configuration > Profiles > Create profile.
- Name the profile, choose Windows 10 and later and Endpoint protection.
- Click Configure > Windows Defender Exploit Guard > Network filtering > Enable.
- Click OK to save each open blade and click Create.
- Click the profile Assignments, assign to All Users & All Devices, and click Save.
Use the ./Vendor/MSFT/Policy/Config/Defender/EnableNetworkProtection configuration service provider (CSP) to enable or disable network protection or enable audit mode.
Microsoft Endpoint Configuration Manager
- In Microsoft Endpoint Configuration Manager, click Assets and Compliance > Endpoint Protection > Windows Defender Exploit Guard.
- Click Home > Create Exploit Guard Policy.
- Enter a name and a description, click Network protection, and click Next.
- Choose whether to block or audit access to suspicious domains and click Next.
- Review the settings and click Next to create the policy.
- After the policy is created, click Close.
You can use the following procedure to enable network protection on domain-joined computers or on a standalone computer.
On a standalone computer, click Start, type and then click Edit group policy.
On a domain-joined Group Policy management computer, open the Group Policy Management Console, right-click the Group Policy Object you want to configure and click Edit.
In the Group Policy Management Editor go to Computer configuration and click Administrative templates.
Expand the tree to Windows components > Microsoft Defender Antivirus > Windows Defender Exploit Guard > Network protection.
Double-click the Prevent users and apps from accessing dangerous websites setting and set the option to Enabled. In the options section, you must specify one of the following:
- Block - Users will not be able to access malicious IP addresses and domains
- Disable (Default) - The Network protection feature will not work. Users will not be blocked from accessing malicious domains
- Audit Mode - If a user visits a malicious IP address or domain, an event will be recorded in the Windows event log but the user will not be blocked from visiting the address.
To fully enable network protection, you must set the Group Policy option to Enabled and also select Block in the options drop-down menu.
You can confirm network protection is enabled on a local computer by using Registry editor:
- Click Start and type regedit to open Registry Editor.
- Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Windows Defender Exploit Guard\Network Protection
- Click EnableNetworkProtection and confirm the value: