@@ -193,12 +193,19 @@ Accept wildcard characters: False
193
193
194
194
### -AllowNetworkProtectionDownLevel
195
195
196
- Specifies whether to allow network protection to be set to Enabled or Audit Mode on Windows versions
197
- before 1709 . Valid values are:
196
+ Specifies whether network protection on Windows Server 2012 R2 is controlled by the
197
+ **EnableNetworkProtection** parameter . Valid values are:
198
198
199
- - $true: Allow network protection to be set to Enabled or Audit Mode on Windows v1709 or earlier.
200
- - $false: Don't allow network protection to be set to Enabled or Audit Mode on Windows v1709 or
201
- earlier.
199
+ - $true: Network protection is controlled by the **EnableNetworkProtection**
200
+ parameter (Enabled, Disabled, or AuditMode).
201
+
202
+ **Tip**: For Windows Server 2016 or Windows Server 2012 R2, you also need to set the
203
+ **AllowNetworkProtectionOnWinServer** parameter to the value $true.
204
+
205
+ - $false: Network protection isn't controlled by the **EnableNetworkProtection**
206
+ parameter.
207
+
208
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
202
209
203
210
` ` ` yaml
204
211
Type : Boolean
@@ -214,11 +221,19 @@ Accept wildcard characters: False
214
221
215
222
### -AllowNetworkProtectionOnWinServer
216
223
217
- Specifies whether to allow network protection to be set to Enabled or Audit Mode for Windows Server.
218
- Valid values are:
224
+ Specifies whether network protection on Windows Server is controlled by the
225
+ **EnableNetworkProtection** parameter. Valid values are:
219
226
220
- - $true: Allow network protection to be set to Enabled or Audit Mode on Windows Server.
221
- - $false: Don't allow network protection to be set to Enabled or Audit Mode on Windows Server.
227
+ - $true: Network protection is controlled by the **EnableNetworkProtection**
228
+ parameter (Enabled, Disabled, or AuditMode).
229
+
230
+ **Tip**: For Windows Server 2016 or Windows Server 2012 R2, you also need to set the
231
+ **AllowNetworkProtectionDownLevel** parameter to the value $true.
232
+
233
+ - $false: Network protection isn't controlled by the **EnableNetworkProtection**
234
+ parameter.
235
+
236
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
222
237
223
238
` ` ` yaml
224
239
Type : Boolean
@@ -509,6 +524,15 @@ To remove values without affecting other existing values, use the **Remove-MPPre
509
524
510
525
` Remove-MpPreference -ControlledFolderAccessAllowedApplications "PathAndFileName1","PathAndFileName2",..."PathAndFileNameN"`
511
526
527
+ The value parameter is meaningful only if the value of the **EnableControlledFolderAccess**
528
+ parameter isn't `Disabled`.
529
+
530
+ To specify additional folders that are protected by controlled folder access, use the
531
+ **ControlledFolderAccessProtectedFolders** parameter.
532
+
533
+ For more information about controlled folder access, see [Protect important folders with controlled
534
+ folder access](/defender-endpoint/controlled-folders).
535
+
512
536
` ` ` yaml
513
537
Type: String[]
514
538
Parameter Sets: (All)
@@ -538,6 +562,15 @@ To remove values without affecting other existing values, use the **Remove-MPPre
538
562
539
563
` Remove-MpPreference -ControlledFolderAccessAllowedApplications "Path1","Path2",..."PathN"`
540
564
565
+ The value parameter is meaningful only if the value of the **EnableControlledFolderAccess**
566
+ parameter isn't `Disabled`.
567
+
568
+ To specify applications that are allowed to access controlled folders, use the
569
+ **ControlledFolderAccessAllowedApplications** parameter.
570
+
571
+ For more information about controlled folder access, see [Protect important folders with controlled
572
+ folder access](/defender-endpoint/controlled-folders).
573
+
541
574
` ` ` yaml
542
575
Type: String[]
543
576
Parameter Sets: (All)
@@ -769,6 +802,8 @@ Network protection needs to inspect DNS traffic over TCP in the following scenar
769
802
- To provide metadata for anti-malware behavior monitoring.
770
803
- To allow for a DNS sinkhole if the **EnableDnsSinkhole** parameter is set to the value $true.
771
804
805
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
806
+
772
807
` ` ` yaml
773
808
Type: Boolean
774
809
Parameter Sets: (All)
@@ -836,6 +871,8 @@ Specifies whether to disable FTP parsing for network protection. Valid values ar
836
871
- $true : FTP parsing for network protection is disabled.
837
872
- $false : FTP parsing for network protection is enabled.
838
873
874
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
875
+
839
876
` ` ` yaml
840
877
Type: Boolean
841
878
Parameter Sets: (All)
@@ -905,6 +942,8 @@ Specifies whether Network Protection inspects only outbound connections. Valid v
905
942
- $true : Network Protection inspects only outbound connections.
906
943
- $false : Network Protection inspects inbound and outbound connections. This is the default value.
907
944
945
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
946
+
908
947
` ` ` yaml
909
948
Type: Boolean
910
949
Parameter Sets: (All)
@@ -944,6 +983,8 @@ Valid values are:
944
983
- $true : Network protection telemetry is disabled.
945
984
- $false : Network protection telemetry is enabled. This is the default value.
946
985
986
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
987
+
947
988
` ` ` yaml
948
989
Type: Boolean
949
990
Parameter Sets: (All)
@@ -1114,11 +1155,13 @@ Accept wildcard characters: False
1114
1155
1115
1156
# ## -DisableSmtpParsing
1116
1157
1117
- This setting disables SMTP parsing by Network Protection . Valid values are :
1158
+ This setting disables SMTP parsing by network protection . Valid values are :
1118
1159
1119
1160
- $true : SMTP parsing is disabled.
1120
1161
- $false : SMTP parsing is enabled. This is the default value
1121
1162
1163
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1164
+
1122
1165
` ` ` yaml
1123
1166
Type: Boolean
1124
1167
Parameter Sets: (All)
@@ -1135,8 +1178,10 @@ Accept wildcard characters: False
1135
1178
1136
1179
Specifies whether to disable the inspection of SSH traffic. Valid values are :
1137
1180
1138
- - $true : Network Protection doesn't inspect SSH traffic.
1139
- - $false : Network Protection inspects SSH traffic. This is the default value.
1181
+ - $true : Network protection doesn't inspect SSH traffic.
1182
+ - $false : Network protection inspects SSH traffic. This is the default value.
1183
+
1184
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1140
1185
1141
1186
` ` ` yaml
1142
1187
Type: Boolean
@@ -1163,6 +1208,8 @@ being made to a malicious website, and to provide metadata to behavior monitorin
1163
1208
TLS connections to malicious websites can also be blocked if the value of the
1164
1209
**EnableNetworkProtection** parameter is `Enabled`.
1165
1210
1211
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1212
+
1166
1213
` ` ` yaml
1167
1214
Type: Boolean
1168
1215
Parameter Sets: (All)
@@ -1187,6 +1234,15 @@ Specifies the state for the controlled folder access feature. Valid values are:
1187
1234
- BlockDiskModificationOnly
1188
1235
- AuditDiskModificationOnly
1189
1236
1237
+ To specify additional folders that are protected by controlled folder access, use the
1238
+ **ControlledFolderAccessProtectedFolders** parameter.
1239
+
1240
+ To specify applications that are allowed to access controlled folders, use the
1241
+ **ControlledFolderAccessAllowedApplications** parameter.
1242
+
1243
+ For more information about controlled folder access, see [Protect important folders with controlled
1244
+ folder access](/defender-endpoint/controlled-folders).
1245
+
1190
1246
` ` ` yaml
1191
1247
Type: ControlledFolderAccessType
1192
1248
Parameter Sets: (All)
@@ -1207,6 +1263,8 @@ warning. Valid values are:
1207
1263
- $true : Network Protection blocks network traffic instead of displaying a warning.
1208
1264
- $false : Network Protection displaying a warning.
1209
1265
1266
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1267
+
1210
1268
` ` ` yaml
1211
1269
Type: Boolean
1212
1270
Parameter Sets: (All)
@@ -1231,6 +1289,8 @@ in conjunction with behavior monitoring, detect and sinkhole DNS exfiltration at
1231
1289
DNS based malicious attacks.
1232
1290
- $false : DNS sinkhole is disabled.
1233
1291
1292
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1293
+
1234
1294
` ` ` yaml
1235
1295
Type: Boolean
1236
1296
Parameter Sets: (All)
@@ -1309,6 +1369,12 @@ and malware. Valid values are:
1309
1369
- 1 or Enabled
1310
1370
- 2 or AuditMode
1311
1371
1372
+ **Tip**: Network protection on Windows Server also requires that the
1373
+ **AllowNetworkProtectionOnWinServer** and (for Windows Server 2016 or Windows Server 2012 R2)
1374
+ **AllowNetworkProtectionDownLevel** parameters are set to the value $true.
1375
+
1376
+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1377
+
1312
1378
` ` ` yaml
1313
1379
Type: ASRRuleActionType
1314
1380
Parameter Sets: (All)
@@ -1329,8 +1395,8 @@ potentially higher inbound UDP bandwidth. Valid values are:
1329
1395
- $true : UDP receive offload support in Network Protection is enabled.
1330
1396
- $false : UDP receive offload support in Network Protection is disabled.
1331
1397
1332
- Starting with platform version `4.18.24030`, Microsoft will gradually move the default value from
1333
- disabled to enabled.
1398
+ Starting with platform version `4.18.24030`, we're gradually moving the default value from
1399
+ $false ( disabled) to $true ( enabled) .
1334
1400
1335
1401
` ` ` yaml
1336
1402
Type: Boolean
0 commit comments