Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update evaluate-mdav-using-gp.md #178

Open
wants to merge 1 commit into
base: public
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 7 additions & 7 deletions defender-endpoint/evaluate-mdav-using-gp.md
Original file line number Diff line number Diff line change
Expand Up @@ -180,13 +180,13 @@ Disable local administrator AV settings such as exclusions, and enforce the poli
| --- | --- |
| Prevent users and apps from accessing dangerous websites | Enabled, Block |
| This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server | Enabled |
| Allow Network Protection Down Level | Network protection is enabled downlevel |
| Allow Datagram Processing On Win Server | Datagram processing on Windows Server is enabled |
| Disable DNS over TCP parsing | DNS over TCP parsing is enabled |
| Disable HTTP parsing | HTTP parsing is enabled |
| Disable SSH parsing | SSH parsing is enabled |
| Disable TLS parsing | TLS parsing is enabled |
| Enable DNS Sinkhole | DNS Sinkhole is enabled |

To enable Network Protection for Windows Servers, for now, please use Powershell:

| OS | Powershell cmdlet |
| --- | --- |
| Windows Server 2012 R2Windows Server 2022 and later | set-mpPreference -AllowNetworkProtectionOnWinServer $true |
| Windows Server 2016 and Windows Server 2012 R2 [unified MDE client](https://learn.microsoft.com/defender-endpoint/update-agent-mma-windows#upgrade-to-the-new-unified-agent-for-defender-for-endpoint) | set-MpPreference -AllowNetworkProtectionOnWinServer $true and set-MpPreference -AllowNetworkProtectionDownLevel $true

## Attack Surface Reduction Rules

Expand Down
Loading