From 9740a2d7e2d86038f2fd6490a27a904592207ee0 Mon Sep 17 00:00:00 2001
From: "Yong Rhee [MSFT]" <56358587+YongRhee-MSFT@users.noreply.github.com>
Date: Tue, 21 Jan 2025 13:26:41 -0800
Subject: [PATCH] Update enable-network-protection.md
Updated the Windows Server info, where Windows Server 2019 was missing in the PoSh cmdlet. And added that for the downlevel servers, it requires the unified agent for MDE.
---
defender-endpoint/enable-network-protection.md | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/defender-endpoint/enable-network-protection.md b/defender-endpoint/enable-network-protection.md
index b339389d42..c1c6b68e16 100644
--- a/defender-endpoint/enable-network-protection.md
+++ b/defender-endpoint/enable-network-protection.md
@@ -84,8 +84,8 @@ To enable network protection, you can use one of the following methods:
| Windows Server version | Commands |
|---|---|
- | Windows Server 2022 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
- | Windows Server 2016
Windows Server 2012 R2 | `set-MpPreference -AllowNetworkProtectionDownLevel $true`
`set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
+ | Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` |
+ | Windows Server 2016
Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](https://learn.microsoft.com/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true`
`set-MpPreference -AllowNetworkProtectionOnWinServer $true` |
4. (This step is optional.) To set network protection to audit mode, use the following cmdlet: