@@ -193,12 +193,19 @@ Accept wildcard characters: False
193193
194194### -AllowNetworkProtectionDownLevel
195195
196- Specifies whether to allow network protection to be set to Enabled or Audit Mode on Windows versions
197- before 1709 . Valid values are:
196+ Specifies whether network protection on Windows Server 2012 R2 is controlled by the
197+ **EnableNetworkProtection** parameter . Valid values are:
198198
199- - $true: Allow network protection to be set to Enabled or Audit Mode on Windows v1709 or earlier.
200- - $false: Don't allow network protection to be set to Enabled or Audit Mode on Windows v1709 or
201- earlier.
199+ - $true: Network protection is controlled by the **EnableNetworkProtection**
200+ parameter (Enabled, Disabled, or AuditMode).
201+
202+ **Tip**: For Windows Server 2016 or Windows Server 2012 R2, you also need to set the
203+ **AllowNetworkProtectionOnWinServer** parameter to the value $true.
204+
205+ - $false: Network protection isn't controlled by the **EnableNetworkProtection**
206+ parameter.
207+
208+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
202209
203210` ` ` yaml
204211Type : Boolean
@@ -214,11 +221,19 @@ Accept wildcard characters: False
214221
215222### -AllowNetworkProtectionOnWinServer
216223
217- Specifies whether to allow network protection to be set to Enabled or Audit Mode for Windows Server.
218- Valid values are:
224+ Specifies whether network protection on Windows Server is controlled by the
225+ **EnableNetworkProtection** parameter. Valid values are:
219226
220- - $true: Allow network protection to be set to Enabled or Audit Mode on Windows Server.
221- - $false: Don't allow network protection to be set to Enabled or Audit Mode on Windows Server.
227+ - $true: Network protection is controlled by the **EnableNetworkProtection**
228+ parameter (Enabled, Disabled, or AuditMode).
229+
230+ **Tip**: For Windows Server 2016 or Windows Server 2012 R2, you also need to set the
231+ **AllowNetworkProtectionDownLevel** parameter to the value $true.
232+
233+ - $false: Network protection isn't controlled by the **EnableNetworkProtection**
234+ parameter.
235+
236+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
222237
223238` ` ` yaml
224239Type : Boolean
@@ -509,6 +524,15 @@ To remove values without affecting other existing values, use the **Remove-MPPre
509524
510525` Remove-MpPreference -ControlledFolderAccessAllowedApplications "PathAndFileName1","PathAndFileName2",..."PathAndFileNameN"`
511526
527+ The value parameter is meaningful only if the value of the **EnableControlledFolderAccess**
528+ parameter isn't `Disabled`.
529+
530+ To specify additional folders that are protected by controlled folder access, use the
531+ **ControlledFolderAccessProtectedFolders** parameter.
532+
533+ For more information about controlled folder access, see [Protect important folders with controlled
534+ folder access](/defender-endpoint/controlled-folders).
535+
512536` ` ` yaml
513537Type: String[]
514538Parameter Sets: (All)
@@ -538,6 +562,15 @@ To remove values without affecting other existing values, use the **Remove-MPPre
538562
539563` Remove-MpPreference -ControlledFolderAccessAllowedApplications "Path1","Path2",..."PathN"`
540564
565+ The value parameter is meaningful only if the value of the **EnableControlledFolderAccess**
566+ parameter isn't `Disabled`.
567+
568+ To specify applications that are allowed to access controlled folders, use the
569+ **ControlledFolderAccessAllowedApplications** parameter.
570+
571+ For more information about controlled folder access, see [Protect important folders with controlled
572+ folder access](/defender-endpoint/controlled-folders).
573+
541574` ` ` yaml
542575Type: String[]
543576Parameter Sets: (All)
@@ -769,6 +802,8 @@ Network protection needs to inspect DNS traffic over TCP in the following scenar
769802- To provide metadata for anti-malware behavior monitoring.
770803- To allow for a DNS sinkhole if the **EnableDnsSinkhole** parameter is set to the value $true.
771804
805+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
806+
772807` ` ` yaml
773808Type: Boolean
774809Parameter Sets: (All)
@@ -836,6 +871,8 @@ Specifies whether to disable FTP parsing for network protection. Valid values ar
836871- $true : FTP parsing for network protection is disabled.
837872- $false : FTP parsing for network protection is enabled.
838873
874+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
875+
839876` ` ` yaml
840877Type: Boolean
841878Parameter Sets: (All)
@@ -905,6 +942,8 @@ Specifies whether Network Protection inspects only outbound connections. Valid v
905942- $true : Network Protection inspects only outbound connections.
906943- $false : Network Protection inspects inbound and outbound connections. This is the default value.
907944
945+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
946+
908947` ` ` yaml
909948Type: Boolean
910949Parameter Sets: (All)
@@ -944,6 +983,8 @@ Valid values are:
944983- $true : Network protection telemetry is disabled.
945984- $false : Network protection telemetry is enabled. This is the default value.
946985
986+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
987+
947988` ` ` yaml
948989Type: Boolean
949990Parameter Sets: (All)
@@ -1114,11 +1155,13 @@ Accept wildcard characters: False
11141155
11151156# ## -DisableSmtpParsing
11161157
1117- This setting disables SMTP parsing by Network Protection . Valid values are :
1158+ This setting disables SMTP parsing by network protection . Valid values are :
11181159
11191160- $true : SMTP parsing is disabled.
11201161- $false : SMTP parsing is enabled. This is the default value
11211162
1163+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1164+
11221165` ` ` yaml
11231166Type: Boolean
11241167Parameter Sets: (All)
@@ -1135,8 +1178,10 @@ Accept wildcard characters: False
11351178
11361179Specifies whether to disable the inspection of SSH traffic. Valid values are :
11371180
1138- - $true : Network Protection doesn't inspect SSH traffic.
1139- - $false : Network Protection inspects SSH traffic. This is the default value.
1181+ - $true : Network protection doesn't inspect SSH traffic.
1182+ - $false : Network protection inspects SSH traffic. This is the default value.
1183+
1184+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
11401185
11411186` ` ` yaml
11421187Type: Boolean
@@ -1163,6 +1208,8 @@ being made to a malicious website, and to provide metadata to behavior monitorin
11631208TLS connections to malicious websites can also be blocked if the value of the
11641209**EnableNetworkProtection** parameter is `Enabled`.
11651210
1211+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1212+
11661213` ` ` yaml
11671214Type: Boolean
11681215Parameter Sets: (All)
@@ -1187,6 +1234,15 @@ Specifies the state for the controlled folder access feature. Valid values are:
11871234- BlockDiskModificationOnly
11881235- AuditDiskModificationOnly
11891236
1237+ To specify additional folders that are protected by controlled folder access, use the
1238+ **ControlledFolderAccessProtectedFolders** parameter.
1239+
1240+ To specify applications that are allowed to access controlled folders, use the
1241+ **ControlledFolderAccessAllowedApplications** parameter.
1242+
1243+ For more information about controlled folder access, see [Protect important folders with controlled
1244+ folder access](/defender-endpoint/controlled-folders).
1245+
11901246` ` ` yaml
11911247Type: ControlledFolderAccessType
11921248Parameter Sets: (All)
@@ -1207,6 +1263,8 @@ warning. Valid values are:
12071263- $true : Network Protection blocks network traffic instead of displaying a warning.
12081264- $false : Network Protection displaying a warning.
12091265
1266+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1267+
12101268` ` ` yaml
12111269Type: Boolean
12121270Parameter Sets: (All)
@@ -1231,6 +1289,8 @@ in conjunction with behavior monitoring, detect and sinkhole DNS exfiltration at
12311289DNS based malicious attacks.
12321290- $false : DNS sinkhole is disabled.
12331291
1292+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1293+
12341294` ` ` yaml
12351295Type: Boolean
12361296Parameter Sets: (All)
@@ -1309,6 +1369,12 @@ and malware. Valid values are:
13091369- 1 or Enabled
13101370- 2 or AuditMode
13111371
1372+ **Tip**: Network protection on Windows Server also requires that the
1373+ **AllowNetworkProtectionOnWinServer** and (for Windows Server 2016 or Windows Server 2012 R2)
1374+ **AllowNetworkProtectionDownLevel** parameters are set to the value $true.
1375+
1376+ For more information about network protection, see [Protect your network](/defender-endpoint/network-protection).
1377+
13121378` ` ` yaml
13131379Type: ASRRuleActionType
13141380Parameter Sets: (All)
@@ -1329,8 +1395,8 @@ potentially higher inbound UDP bandwidth. Valid values are:
13291395- $true : UDP receive offload support in Network Protection is enabled.
13301396- $false : UDP receive offload support in Network Protection is disabled.
13311397
1332- Starting with platform version `4.18.24030`, Microsoft will gradually move the default value from
1333- disabled to enabled.
1398+ Starting with platform version `4.18.24030`, we're gradually moving the default value from
1399+ $false ( disabled) to $true ( enabled) .
13341400
13351401` ` ` yaml
13361402Type: Boolean
0 commit comments