What type of software restricts access to specified websites?
Skip to main content This browser is no longer supported. Show
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Restrict Access to Only Specified Users or Computers
In this articleDomain isolation (as described in the previous goal Restrict Access to Only Trusted Devices) prevents devices that are members of the isolated domain from accepting network traffic from untrusted devices. However, some devices on the network might host sensitive data that must be additionally restricted to only those users and computers that have a business requirement to access the data. Windows Defender Firewall with Advanced Security enables you to restrict access to devices and users that are members of domain groups authorized to access that device. These groups are called network access groups (NAGs). When a device authenticates to a server, the server checks the group membership of the computer account and the user account, and grants access only if membership in the NAG is confirmed. Adding this check creates a virtual "secure zone" within the domain isolation zone. You can have multiple devices in a single secure zone, and it's likely that you'll create a separate zone for each set of servers that have specific security access needs. Devices that are part of this server isolation zone are often also part of the encryption zone (see Require Encryption When Accessing Sensitive Network Resources). Restricting access to only users and devices that have a business requirement can help you comply with regulatory and legislative requirements, such as those found in the Federal Information Security Management Act of 2002 (FISMA), the Sarbanes-Oxley Act of 2002, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other government and industry regulations. You can restrict access by specifying either computer or user credentials. The following illustration shows an isolated server, and examples of devices that can and can't communicate with it. Devices that are outside the Woodgrove corporate network, or computers that are in the isolated domain but aren't members of the required NAG, can't communicate with the isolated server. This goal, which corresponds to Server Isolation Policy Design, provides the following features:
The following components are required for this deployment goal:
Next: Mapping Your Deployment Goals to a Windows Defender Firewall with Advanced Security Design FeedbackSubmit and view feedback for Skip to main content This browser is no longer supported. Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Web content filtering
In this articleApplies to:
What is web content filtering?Web content filtering is part of the Web protection capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Business. Web content filtering enables your organization to track and regulate access to websites based on their content categories. Many of these websites (even if they're not malicious) might be problematic because of compliance regulations, bandwidth usage, or other concerns. Configure policies across your device groups to block certain categories. Blocking a category prevents users within specified device groups from accessing URLs associated with the category. For any category that's not blocked, the URLs are automatically audited. Your users can access the URLs without disruption, and you'll gather access statistics to help create a more custom policy decision. Your users will see a block notification if an element on the page they're viewing is making calls to a blocked resource. Note Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2. Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and Network Protection (Chrome, Firefox, Brave, and Opera). For more information about browser support, see the prerequisites section. Benefits of web content filtering
PrerequisitesBefore trying out this feature, make sure you meet the requirements described in the following table:
Data handlingData is stored in the region that was selected as part of your Microsoft Defender for Endpoint data handling settings. Your data will not leave the data center in that region. In addition, your data will not be shared with any third parties, including our data providers. Precedence for multiple active policiesApplying multiple different web content filtering policies to the same device will result in the more restrictive policy applying for each category. Consider the following scenario:
The result is that categories 1 - 4 are all blocked. This is illustrated in the following image.
Turn on web content filtering
Configure web content filtering policiesWeb content filtering policies specify which site categories are blocked on which device groups. To manage the policies, go to Settings > Endpoints > Web content filtering (under Rules). Policies can be deployed to block any of the following parent or child categories: Adult contentCults: Sites related to groups or movements whose members demonstrate passion for a belief system that is different from those that are socially accepted. Gambling: Online gambling and sites that promote gambling skills and practice. Nudity: Sites that provide full-frontal and semi-nude images or videos, typically in artistic form, and might allow the download or sale of such materials. Pornography / Sexually explicit: Sites containing sexually explicit content in an image-based or textual form. Any form of sexually oriented material is also listed here. Sex education: Sites that discuss sex and sexuality in an informative and non-voyeuristic way, including sites that provide education about human reproduction and contraception, sites that offer advice on preventing infection from sexual diseases, and sites that offer advice on sexual health matters. Tasteless: Sites oriented towards content unsuitable for school children to view or that an employer would be uncomfortable with their staff accessing, but not necessarily violent or pornographic. Violence: Sites that display or promote content related to violence against humans or animals. High bandwidthDownload sites: Sites whose primary function is to allow users to download media content or programs, such as computer programs. Image sharing: Sites that are used primarily for searching or sharing photos, including those that have social aspects. Peer-to-peer: Sites that host peer-to-peer (P2P) software or facilitate the sharing of files using P2P software. Streaming media & downloads: Sites whose primary function is the distribution of streaming media, or sites that allow users to search, watch, or listen to streaming media. Legal liabilityChild abuse images: Sites that include child abuse images or pornography. Criminal activity: Sites that give instruction on, advice about or promotion of illegal activities. Hacking: Sites that provide resources for illegal or questionable use of computer software or hardware, including sites that distribute copyrighted material that has been cracked. Hate & intolerance: Sites promoting aggressive, degrading, or abusive opinions about any section of the population that could be identified by race, religion, gender, age, nationality, physical disability, economic situation, sexual preferences or any other lifestyle choice. Illegal drug: Sites that sell illegal/controlled substances, promote substance abuse, or sell related paraphernalia. Illegal software: Sites that contain or promote the use of malware, spyware, botnets, phishing scams, or piracy & copyright theft. School cheating: Sites related to plagiarism or school cheating. Self-harm: Sites that promote self-harm, including cyberbullying sites that contain abusive and/or threatening messages towards users. Weapons: Any site that sells weapons or advocates the use of weapons, including but not limited to guns, knives, and ammunition. LeisureChat: Sites that are primarily web-based chat rooms. Games: Sites relating to video or computer games, including sites that promote gaming through hosting online services or information related to gaming. Instant messaging: Sites that can be used to download instant messaging software or client based instant messaging. Professional network: Sites that provide professional networking services. Social networking: Sites that provide social networking services. Web-based email: Sites offering web-based mail services. UncategorizedNewly registered domains: Sites that have been newly registered in the past 30 days and have not yet been moved to another category. Parked domains: Sites that have no content or are parked for later use. NOTE: Uncategorized contains only newly registered domains and parked domains, and does not include all other sites outside of these categories. Create a policyTo add a new policy, follow these steps:
Note
End-user experienceThe blocking experience for third-party supported browsers is provided by network protection, which provides a system-level message notifying the user of a blocked connection. For a more user-friendly, in-browser experience, consider using Microsoft Edge. Allow specific websitesIt's possible to override the blocked category in web content filtering to allow a single site by creating a custom indicator policy. The custom indicator policy will supersede the web content filtering policy when it's applied to the device group in question. To define a custom indicator, follow these steps:
Dispute categoriesIf you encounter a domain that has been incorrectly categorized, you can dispute the category directly from the Microsoft 365 Defender portal. To dispute the category of a domain, navigate to Reports > Web protection > Web Content Filtering Details > Domains. On the domains tab of the Web Content Filtering reports, you will see an ellipsis beside each of the domains. Hover over this ellipsis and select Dispute Category. A panel will open where you can select the priority and add more details such as the suggested category for recategorization. Once you complete the form, select Submit. Our team will review the request within one business day. For immediate unblocking, create a custom allow indicator. Web content filtering cards and detailsSelect Reports > Web protection to view cards with information about web content filtering and web threat protection. The following cards provide summary information about web content filtering. Web activity by categoryThis card lists the parent web content categories with the largest increase or decrease in the number of access attempts. Understand drastic changes in web activity patterns in your organization from last 30 days, 3 months, or 6 months. Select a category name to view more information. In the first 30 days of using this feature, your organization might not have enough data to display this information.
Web content filtering summary cardThis card displays the distribution of blocked access attempts across the different parent web content categories. Select one of the colored bars to view more information about a specific parent web category.
Web activity summary cardThis card displays the total number of requests for web content in all URLs.
View card detailsYou can access the Report details for each card by selecting a table row or colored bar from the chart in the card. The report details page for each card contains extensive statistical data about web content categories, website domains, and device groups.
Use the time range filter at the top left of the page to select a time period. You can also filter the information or customize the columns. Select a row to open a flyout pane with even more information about the selected item. Known issues and limitationsOnly Microsoft Edge is supported if your device's OS configuration is Server (cmd > Systeminfo > OS Configuration). Network Protection is only supported in Inspect mode on Server devices, which is responsible for securing traffic across supported third-party browsers. Only Microsoft Edge is supported and network protection is not supported on Windows 10 Azure Virtual Desktop multi-session hosts. Network protection does not currently support SSL inspection, which might result in some sites being allowed by web content filtering that would normally be blocked. Sites would be allowed due to a lack of visibility into encrypted traffic after the TLS handshake has taken place and an inability to parse certain redirects. This includes redirections from some web-based mail login pages to the mailbox page. As an accepted workaround, you can create a custom block indicator for the login page to ensure no users are able to access the site. Keep in mind, this might block their access to other services associated with the same website. If you are using Microsoft 365 Business Premium or Microsoft Defender for Business, you can define one web content filtering policy for your environment. That policy will apply to all users by default. See also
FeedbackSubmit and view feedback for What is a person called when he or she illegally accesses your computer?What is Hacking? Hackers illegally access devices or websites to steal peoples' personal information, which they use to commit the crimes like theft. Many people shop, bank, and pay bills online.
Is Cracker the same as intent?A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often are teenagers that use prewritten hacking and cracking programs to break into computers.
Is someone who accesses a computer or network illegally but has the intent of destroying data stealing information or other malicious action?A cracker also is someone who accesses a computer or networkillegally but has the intent of destroying data, stealing information, or othermalicious action. Both hackers and crackers have advanced computer andnetwork skills.
Is a software programs that destroy or damage processing?Software designed to destroy, damage, disable, or gain unauthorized access to any computer system, software, or electronic data. Malware is an abbreviation of the term malicious software and is also known as malicious code.
|