Microsoft Defender For Endpoint Article Series: Enabling Web Content Filtering with MEM + MDE

Policy blocking store.steampowered.com on Microsoft Edge

Web content filtering is part of the Microsoft Defender for Endpoint with fully integrated to protect attached devices. Users can easily activate web content filtering via the security.microsoft.com.

In this article, we configure web content filtering using via Microsoft Intune (endpoint.microsoft.com) and Microsoft 365 Defender (security.microsoft.com)

Prerequisites

The licenses used to configure web content filtering are:
- Windows 10/11 Enterprise E5
- Microsoft 365 E5
- Microsoft 365 E5 Security
- Microsoft 365 E3
- Microsoft Defender for Endpoint Plan 1 or Plan 2
- Microsoft Defender for Business
- Microsoft 365 Business Premium

Your organization’s devices must be running one of the following operating systems with the latest antivirus/antimalware updates:
- Windows 11
- Windows 10 Anniversary Update (version 1607) or later and SmartScreen / Network Protection enabled

Step to configure:

Setup Microsoft Endpoint Manager (MEM):

  • First, navigate to endpoint.microsoft.com
  • Click on Endpoint Security — > Antivirus
Configure Microsoft Endpoint Manager
  • Click on Create Policy → choice Windows 10/11/Windows Server and Microsoft Defender Antivirus
Configure Microsoft Endpoint Manager
  • In Configuration settings, enabling network protection and choice Audit mode for testing the feature.
Configure Microsoft Endpoint Manager

For the next steps, we will do the configuration powershell for enabling Network Protection in audit or block with command:

Enable block mode

Set-MpPreference -EnableNetworkProtection Enabled

Enable audit mode

Set-MpPreference -EnableNetworkProtection AuditMode

Configuration Powershell
Configuration Powershell

Configure web content filtering

First, make sure the menu Advanced feature is enabled for web content filtering to web protection capabilities:

  1. Navigate to security.microsoft.com
  2. Click on Settings — > Endpoints — > Advanced Features
  3. Switch on to enable Web content filtering
Configure Web Content Filtering on Microsoft 365 Defender

Next steps, we will create web content filtering policy:

  1. Click on Settings — > Endpoints — > Web content filtering
  2. Click on Add item
Configure Web Content Filtering on Microsoft 365 Defender
  • Create name policy with Blocked-suspicious-website
Configure Web Content Filtering on Microsoft 365 Defender
  • On Blocked categories, checklist Adult content, Legal liability and Leisure to blocking content about this
Configure Web Content Filtering on Microsoft 365 Defender
  • On the Scope, choice All device groups and click Save
Configure Web Content Filtering on Microsoft 365 Defender
Configure Web Content Filtering on Microsoft 365 Defender
  • Now, Web content filtering policy has already to use blocking content.
Configure Web Content Filtering on Microsoft 365 Defender

Testing Web Content Filtering policy

For the example, policy can blocking store.steampowered.com and roundcube.net

  • Network protection: Enabled
  • Web content filtering: block for category games and web based mail
Policy blocking store.steampowered.com on Microsoft Edge
Policy blocking roundcube.net on Microsoft Edge

This policy can blocking store.steampowered.com and roundcube.net on the third party browser. For the example, we use Google Chrome. On endpoint devices, Windows Defender can detect the url.

Policy blocking store.steampowered.com on Google Chrome
Policy blocking roundcube.net on Google Chrome

Reporting

We can view report the blocking website with policy on ReportsWeb protection.

Reporting web content filtering policy
Reporting web content filtering policy
Reporting web content filtering policy

On page Reports, we can view machines suspect blocking website policy

Reporting web content filtering policy

Results Advance Hunting: Web Content Filtering

  • SmartScreenURLWarnings

DeviceEvents
| where ActionType == “SmartScreenUrlWarning”
| extend ParsedFields=parse_json(AdditionalFields)
| project DeviceName, ActionType, Timestamp, RemoteUrl, InitiatingProcessFileName, Experience=tostring(ParsedFields.Experience)
| where Experience == “CustomPolicy”

  • Third party browser — Network protection

DeviceEvents
| where ActionType == “ExploitGuardNetworkProtectionBlocked”
| extend ParsedFields=parse_json(AdditionalFields)
| project DeviceName, ActionType, Timestamp, RemoteUrl, InitiatingProcessFileName, ResponseCategory=tostring(ParsedFields.ResponseCategory)
| where ResponseCategory == “CustomPolicy”

Sources:

  1. Web content filtering | Microsoft Learn
  2. Enroll Windows 10/11 devices in Intune | Microsoft Learn
  3. Turn on network protection | Microsoft Learn
  4. Enabling and configuring Web content filtering in Microsoft Defender for Endpoint (MDE) (jeffreyappel.nl)

--

--