Sélectionner une page

In some cases, Set-MpPreference -AllowDatagramProcessingOnWinServer 1 can affect network performance based on your infrastructure, traffic volume, and other conditions. Make sure that there are no firewalls or network filtering rules that deny access to these URLs. Otherwise, you must create a specific authorization rule for these URLs (except for the URL *.blob.core.windows.net). The URLs in the following table use port 443 for communication. This section lists the information that you need to collect, as well as the account and network entity information that you must have before you begin installing Defender for Identity. URLs that contain v20 are only necessary if you have Windows 10, version 1803, or Windows 11 devices. For example, us-v20.events.data.microsoft.com is only necessary if the device is running Windows 10, version 1803, or Windows 11. This article provides information about how to configure network connections for Microsoft Defender Antivirus only. If you are using Microsoft Defender for endpoint (including Microsoft Defender Antivirus), see Configure device proxy and Internet connection settings for Endpoint Defender. fe3cr.delivery.mp.microsoft.com/ClientWebService/client.asmx For more information about network protection for Windows Server, Linux, macOS, and Mobile Threat Defense (MTD), see Proactive threat detection with advanced hunting. To ensure that the protection provided by Microsoft Defender Antivirus in the cloud is working properly, your security team must configure your network to allow connections between your endpoints and specific Microsoft servers.

This article lists the connections that must be allowed to use firewall rules. It also includes instructions for checking your connection. When you set up your protection correctly, you ensure you get the most out of your protection services deployed in the cloud. Supported vulnerability management systems and platforms may differ from the Minimum System Requirements for Microsoft Defender endpoints list. For the Windows Server 2012R2/2016, Windows Server version 1803 or later, Windows Server 2019 or later, and Windows 10 Enterprise Multi-Session 1909 and later used in Windows Virtual Desktop on Azure, Network Protection for Microsoft Edge can be enabled using the following method: Defender for Endpoint provides detailed reports on events and crashes as part of its alert investigation scenarios. You can view these details in the Microsoft 365 Defender (security.microsoft.com) portal in the alert queue or by using advanced search. If you are using audit mode, you can use advanced search to determine how network protection settings would affect your environment if enabled. Management card – used for communication within your corporate network. The sensor uses this adapter to query the domain controller it protects and run a solution for computer accounts. There are certain minimum requirements for the integration of devices into the service. Learn about licensing, hardware and software requirements, and other configuration settings for integrating devices into the service. This article describes the requirements for a successful deployment of Microsoft Defender for Identity in your environment.

The Defender for Identity sensor monitors local traffic on all network adapters on the domain controller. After deployment, use the Microsoft 365 Defender portal to change the monitored network adapters. Ensure that the servers on which you want to install Defender for Identity sensors can access the Defender for Identity cloud service. You should be able to access your-instance-namesensorapi.atp.azure.com (port 443). For example, contoso-corpsensorapi.atp.azure.com. To retrieve your instance name, see the About page in the Identity Settings section under security.microsoft.com/settings/identities. The Defender for Identity sensor supports the use of a proxy. For more information about configuring the proxy, see Configure a proxy for Defender for identity.

For example, suppose a user tries to access a website on their device. The website happens to be hosted on a dangerous domain and should be blocked by network protection. If Network Protection blocks a connection, an Action Center notification appears. Your security team can customize the notification with your organization`s details and contact information. In addition, individual rules to reduce the attack surface can be activated and adapted to specific monitoring techniques. Some of the following requirements depend on the data center you are connected to. Because of the environment in which Network Protection runs, Microsoft may not be able to detect operating system proxy settings. In some cases, network protection clients cannot reach the cloud service.

To resolve the connectivity issue, configure a static proxy for Microsoft Defender Antivirus. You can use the resulting list of URLs and IP addresses to determine what would have been blocked if the device was in block mode and what feature would have blocked it. Review each item in the list to identify URLs or IP addresses to see if they are required for your environment. If you find monitored entries that are critical to your environment, create a flag to allow them on your network. URL/IP flags take precedence over any block. For the first three methods to work, the appropriate ports must be open at the entrance of the Defender for Identity sensors to network devices. For more information about Defender for Identity and NNR, see NNR Defender for Identity Policy. Network protection uses TCP/IP to decide whether to allow or block access to a site after triangular negotiation is complete. Therefore, if a website is blocked by network protection, NetworkConnectionEvents in the Microsoft 365 Defender portal may display the ConnectionSuccess action type even if the website has been blocked.

NetworkConnectionEvents is reported by the TCP layer, not by network protection. Once the tripartite negotiation is complete, network protection allows or blocks access to the website. When deploying the standalone sensor, Windows events should be routed to Defender for Identity to further improve detections based on Defender for Identity authentication, sensitive group additions, and suspicious service creation detections. The Defender for Identity sensor automatically receives these events. In the Defender for Identity standalone sensor, these events can be received by your SIEM or, by setting Windows event forwarding, by your domain controller. The collected events provide Defender for Identity with additional information that is not available about the domain controller`s network traffic. The Microsoft Defender Antivirus cloud service provides up-to-date protection for your network and endpoints. The cloud service should not only be seen as a protection for your files stored in the cloud. Instead, the cloud service uses distributed resources and machine learning to provide protection to your endpoints faster than traditional security intelligence updates. This data is then aggregated into the Microsoft Defender Security Center portal, which provides enterprise administrators with an overview of malicious activity detected on their network. A new publicly available feature of Network Protection uses SmartScreen features to block phishing activity from malicious command-and-control websites. Learn about licensing and other requirements for deploying and using Microsoft 365 Defender.

Devices on your network must be running one of these editions. When an end user tries to visit a website in an environment where network protection is enabled, there are three possible scenarios: Network protection is enabled on a per-device basis, which is typically done through your management infrastructure. For more information about supported methods, see Enabling Network Protection. You can enable network protection in audit mode or block mode. If you want to assess the impact of enabling network protection before you actually block IP addresses or URLs, you can enable network protection in audit mode to collect data about what to block. Audit mode records logs when end users have logged on to an address or location that would otherwise have been blocked by network protection. Note that network protection must be in « block mode » for compromise indicators (IoC) or Web content filtering (WCF) to work, definitionupdates.microsoft.com/download/DefinitionUpdates/ standalone Defender for Identity sensors can support monitoring of multiple domain controllers, depending on the amount of network traffic to and from domain controllers.