Conundrum around Network Protection Toast Notifications

 

Network protection utilizes functions in SmartScreen to block phishing activities from malicious command and control sites. When an end user attempts to visit a website in an environment in which network protection is enabled, a toast notification may be presented based on the reputation of the URL.

What if you don't want to give the user the ability to circumvent the blocked action at all? This is where the challenge lies, but luckily there is a way. First, let's look at the scenarios under which NP operates.

1. The URL has a known good reputation - In this case the user is permitted access without obstruction, and there's no toast notification presented on the endpoint. In effect, the domain or URL is set to Allowed.

2. The URL has an unknown or uncertain reputation - The user's access is blocked, but with the ability to circumvent (unblock) the block. In effect, the domain or url is set to Audit. The user will have access to the site for 24 hours; at which point the block is reenabled for another 24 hours. The user can continue to use Unblock to access the site until such time that the administrator prohibits (blocks) the site, thus removing the option to Unblock.

3. The URL has a known bad (malicious) reputation - The user is prevented from access. In effect, the domain or URL is set to Block and a toast notification will be presented to the user just for information.

One way to bypass the warning is by configuring the Unblock functionality in Defender for Endpoint Portal by the means of Allow or Block action. However, this can only work with Indicators of Compromise (IoC) rules and not practical as it will involve working against a defined list of URLs.


Therefore, the only other viable option is to configure the Windows Defender Toast notifications to disable additional notifications from being presented to the end user. If you are managing Windows devices using Intune, then this can be easily configured using the steps below -

2. Under Devices -> Endpoint security -> Antivirus -> Create profile.
3. Under Platform, select Windows 10, Windows 11, and Windows Server.
4. Select Profile as Windows Defender Security Experience -> Create
5. Give a name.
6. Configure as shown below.


Note: Disabling additional notifications will not disable critical notifications, such as threat detection and remediation alerts.

You also have the option of disabling it using Settings Catalog.



7. Once selected, assign to a group of devices or users as normal.

End Result

After the policy applies, non-critical toast notifications will be suppressed. A a new registry entry will be created for this configured policy.


Windows Defender Security Center notifications will show as managed.


Compliance shall update against the setting in Intune.


Until next time..

Comments

Popular posts from this blog

How to force escrowing of BitLocker recovery keys using Intune

Prevent users from running certain programs or applications on Windows endpoints using Intune

Intune: Configure Printers for Non-Administrative Users