Microsoft Defender for Endpoint : Network Protection in MDE | Attack Surface Reduction | ASR Rules

Поделиться
HTML-код
  • Опубликовано: 1 фев 2025

Комментарии • 9

  • @AjeetSingh-hh1bq
    @AjeetSingh-hh1bq 2 месяца назад

    excellent ...Thanks

  • @DaysofIresh
    @DaysofIresh 6 месяцев назад

    clear explanations, thanks for your all efforts.

  • @ganimohammed7863
    @ganimohammed7863 7 месяцев назад

    Mashallah .,..you had done a good work

  • @rishitashukla2309
    @rishitashukla2309 5 месяцев назад

    very nicely explained. It would be very helpful if you will provide the notes also.

  • @AbdullahOllivierreIT
    @AbdullahOllivierreIT 24 дня назад

    ### Summary of the Video: Microsoft Defender for Endpoint - Network Protection
    **Overview of Network Protection:**
    - Network Protection (NP) in Microsoft Defender for Endpoint (MDE) shields devices from internet-based threats as part of the **Attack Surface Reduction (ASR)** features.
    - It leverages **Microsoft Defender SmartScreen** to block harmful domains and URLs, extending its protection beyond web browsers to other applications.
    ---
    ### **Core Features of Network Protection:**
    1. **Web Threat Protection:** Prevents access to malicious websites.
    2. **Custom Indicators:** Allows admins to define specific IPs, URLs, or domains to block or allow.
    3. **Web Content Filtering:** Blocks access to websites based on categories like gambling, peer-to-peer sharing, or adult content.
    **Modes of Operation:**
    - **Audit Mode:** Logs events without blocking access.
    - **Block Mode:** Actively blocks harmful websites and applications.
    ---
    ### **How It Works:**
    1. **URL Reputation Scenarios:**
    - **Good Reputation:** Access is allowed.
    - **Unknown/Uncertain Reputation:** Access is blocked with an option for the user to unblock temporarily.
    - **Malicious Reputation:** Access is fully blocked with no unblock option.
    2. **Command and Control (C2) Protection:**
    - Detects and blocks C2 infrastructure used in ransomware or malware attacks.
    ---
    ### **Configuration Methods:**
    1. **Microsoft Defender Portal:**
    - Add custom indicators (URLs, domains, or IPs) for blocking or auditing.
    - Configure web content filtering and threat indicators.
    2. **Microsoft Intune:**
    - Use **Security Baselines** or **Configuration Profiles** to enable Network Protection for specific user/device groups.
    - Configuration includes options for audit mode, block mode, and custom alerts.
    3. **Group Policy:**
    - Navigate through Windows Components > Microsoft Defender to enable or configure NP.
    4. **PowerShell Commands:**
    - Enable NP: `Set-MPPreference -EnableNetworkProtection Enabled`
    - Set to Audit Mode: Replace "Enabled" with "AuditMode."
    5. **Registry Editor:**
    - Check or set the NP status under relevant Windows Defender registry paths.
    6. **Configuration Manager:**
    - Configure Network Protection through the endpoint protection settings.
    ---
    ### **Testing Network Protection:**
    - Use Microsoft’s test domain ([smart screen test ratings](www.smartscreentest2.net)) to verify functionality. Enabled NP blocks access to the test page.
    ---
    ### **Use Cases and Benefits:**
    - Prevent phishing scams, malware downloads, and data breaches.
    - Control access to unsanctioned apps or websites.
    - Enhance organizational security by detecting and mitigating advanced threats.
    ---
    ### **Steps to Enable Network Protection:**
    1. Access **Intune Admin Center** or the relevant management tool.
    2. Configure policies to include NP in **block mode** for full functionality.
    3. Test using a fake domain to verify the setup.
    4. Monitor and adjust settings based on organizational needs.
    ---
    The video concludes with a request for feedback and suggestions for future topics. Viewers are encouraged to explore the features for better endpoint security and share their learning experience.

    • @AbdullahOllivierreIT
      @AbdullahOllivierreIT 24 дня назад

      Method 2 (using Intune) is an alternative to methods 3 (Group Policy), 4 (PowerShell Commands), 5 (Registry Editor), and 6 (Configuration Manager) because all these methods allow you to enable and configure Network Protection (NP) in different ways.
      However, method 1 (Microsoft Defender Portal) is focused on managing custom indicators (like adding specific IPs, URLs, or domains for blocking/auditing) and configuring web content filtering, which are different functionalities. These cannot be fully replaced by Intune or the other methods mentioned.
      Thus:
      Intune (Method 2): Alternative to methods 3, 4, 5, and 6.
      Microsoft Defender Portal (Method 1): Complementary to other methods, not replaced by Intune.

  • @PoornaTeja-lx7wx
    @PoornaTeja-lx7wx 8 месяцев назад

    Mam will u please provide any notes I will buy it 🙏

  • @srinivasulureddy1508
    @srinivasulureddy1508 8 месяцев назад +1

    Exapin the app combility

  • @seshasai9086
    @seshasai9086 7 месяцев назад

    maam plz provide notes