From 9740a2d7e2d86038f2fd6490a27a904592207ee0 Mon Sep 17 00:00:00 2001 From: "Yong Rhee [MSFT]" <56358587+YongRhee-MSFT@users.noreply.github.com> Date: Tue, 21 Jan 2025 13:26:41 -0800 Subject: [PATCH] Update enable-network-protection.md Updated the Windows Server info, where Windows Server 2019 was missing in the PoSh cmdlet. And added that for the downlevel servers, it requires the unified agent for MDE. --- defender-endpoint/enable-network-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/defender-endpoint/enable-network-protection.md b/defender-endpoint/enable-network-protection.md index b339389d42..c1c6b68e16 100644 --- a/defender-endpoint/enable-network-protection.md +++ b/defender-endpoint/enable-network-protection.md @@ -84,8 +84,8 @@ To enable network protection, you can use one of the following methods: | Windows Server version | Commands | |---|---| - | Windows Server 2022 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` | - | Windows Server 2016
Windows Server 2012 R2 | `set-MpPreference -AllowNetworkProtectionDownLevel $true`
`set-MpPreference -AllowNetworkProtectionOnWinServer $true` | + | Windows Server 2019 and later | `set-mpPreference -AllowNetworkProtectionOnWinServer $true` | + | Windows Server 2016
Windows Server 2012 R2 with the [unified agent for Microsoft Defender for Endpoint](https://learn.microsoft.com/defender-endpoint/enable-network-protection) | `set-MpPreference -AllowNetworkProtectionDownLevel $true`
`set-MpPreference -AllowNetworkProtectionOnWinServer $true` | 4. (This step is optional.) To set network protection to audit mode, use the following cmdlet: