What type of software restricts access to specified websites?

Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Restrict Access to Only Specified Users or Computers

  • Article
  • 10/13/2022
  • 2 minutes to read
  • Applies to:✅ Windows 10, ✅ Windows 11, ✅ Windows Server 2016, ✅ Windows Server 2019, ✅ Windows Server 2022

In this article

Domain isolation (as described in the previous goal Restrict Access to Only Trusted Devices) prevents devices that are members of the isolated domain from accepting network traffic from untrusted devices. However, some devices on the network might host sensitive data that must be additionally restricted to only those users and computers that have a business requirement to access the data.

Windows Defender Firewall with Advanced Security enables you to restrict access to devices and users that are members of domain groups authorized to access that device. These groups are called network access groups (NAGs). When a device authenticates to a server, the server checks the group membership of the computer account and the user account, and grants access only if membership in the NAG is confirmed. Adding this check creates a virtual "secure zone" within the domain isolation zone. You can have multiple devices in a single secure zone, and it's likely that you'll create a separate zone for each set of servers that have specific security access needs. Devices that are part of this server isolation zone are often also part of the encryption zone (see Require Encryption When Accessing Sensitive Network Resources).

Restricting access to only users and devices that have a business requirement can help you comply with regulatory and legislative requirements, such as those found in the Federal Information Security Management Act of 2002 (FISMA), the Sarbanes-Oxley Act of 2002, the Health Insurance Portability and Accountability Act of 1996 (HIPAA), and other government and industry regulations.

You can restrict access by specifying either computer or user credentials.

The following illustration shows an isolated server, and examples of devices that can and can't communicate with it. Devices that are outside the Woodgrove corporate network, or computers that are in the isolated domain but aren't members of the required NAG, can't communicate with the isolated server.

What type of software restricts access to specified websites?

This goal, which corresponds to Server Isolation Policy Design, provides the following features:

  • Isolated servers accept unsolicited inbound network traffic only from devices or users that are members of the NAG.

  • Isolated servers can be implemented as part of an isolated domain, and treated as another zone. Members of the zone group receive a GPO with rules that require authentication, and that specify that only network traffic authenticated as coming from a member of the NAG is allowed.

  • Server isolation can also be configured independently of an isolated domain. To do so, configure only the devices that must communicate with the isolated server with connection security rules to implement authentication and check NAG membership.

  • A server isolation zone can be simultaneously configured as an encryption zone. To do so, configure the GPO with rules that force encryption in addition to requiring authentication and restricting access to NAG members. For more information, see Require Encryption When Accessing Sensitive Network Resources.

The following components are required for this deployment goal:

  • Active Directory: Active Directory supports centralized management of connection security rules by configuring the rules in one or more GPOs that can be automatically applied to all relevant devices in the domain.

Next: Mapping Your Deployment Goals to a Windows Defender Firewall with Advanced Security Design

Feedback

Submit and view feedback for

Skip to main content

This browser is no longer supported.

Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.

Web content filtering

  • Article
  • 10/24/2022
  • 10 minutes to read

In this article

Applies to:

  • Microsoft 365 Defender
  • Microsoft Defender for Endpoint Plan 1
  • Microsoft Defender for Endpoint Plan 2
  • Microsoft Defender for Business

What is web content filtering?

Web content filtering is part of the Web protection capabilities in Microsoft Defender for Endpoint and Microsoft Defender for Business. Web content filtering enables your organization to track and regulate access to websites based on their content categories. Many of these websites (even if they're not malicious) might be problematic because of compliance regulations, bandwidth usage, or other concerns.

Configure policies across your device groups to block certain categories. Blocking a category prevents users within specified device groups from accessing URLs associated with the category. For any category that's not blocked, the URLs are automatically audited. Your users can access the URLs without disruption, and you'll gather access statistics to help create a more custom policy decision. Your users will see a block notification if an element on the page they're viewing is making calls to a blocked resource.

Note

Device group creation is supported in Defender for Endpoint Plan 1 and Plan 2.

Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and Network Protection (Chrome, Firefox, Brave, and Opera). For more information about browser support, see the prerequisites section.

Benefits of web content filtering

  • Users are prevented from accessing websites in blocked categories, whether they're browsing on-premises or away.
  • Your security team can access web reports in the same central location, with visibility over actual blocks and web usage.
  • If you are using Defender for Endpoint, your security team can conveniently deploy policies to groups of users using device groups defined in Microsoft Defender for Endpoint role-based access control settings.
  • If you are using Defender for Business, you can define one web content filtering policy that will be applied to all users.

Prerequisites

Before trying out this feature, make sure you meet the requirements described in the following table:

RequirementDescription
Subscription Your subscription must include one of the following:
- Windows 10/11 Enterprise E5
- Microsoft 365 E5
- Microsoft 365 E5 Security
- Microsoft 365 E3
- Microsoft Defender for Endpoint Plan 1 or Plan 2
- Microsoft Defender for Business
- Microsoft 365 Business Premium
Portal access You must have access to the Microsoft 365 Defender portal.
Operating system Your organization's devices must be running one of the following operating systems with the latest antivirus/antimalware updates:
- Windows 11
- Windows 10 Anniversary Update (version 1607) or later
Related protection Windows Defender SmartScreen and network protection must be enabled on your organization's devices.

Data handling

Data is stored in the region that was selected as part of your Microsoft Defender for Endpoint data handling settings. Your data will not leave the data center in that region. In addition, your data will not be shared with any third parties, including our data providers.

Precedence for multiple active policies

Applying multiple different web content filtering policies to the same device will result in the more restrictive policy applying for each category. Consider the following scenario:

  • Policy 1: blocks categories 1 and 2 and audits the rest
  • Policy 2: blocks categories 3 and 4 and audits the rest

The result is that categories 1 - 4 are all blocked. This is illustrated in the following image.

What type of software restricts access to specified websites?

Turn on web content filtering

  1. Go to the Microsoft 365 Defender portal and sign in.

  2. In the navigation pane, select Settings > Endpoints > General > Advanced Features.

  3. Scroll down until you see Web content filtering.

  4. Switch the toggle to On, and then select Save preferences.

Configure web content filtering policies

Web content filtering policies specify which site categories are blocked on which device groups. To manage the policies, go to Settings > Endpoints > Web content filtering (under Rules).

Policies can be deployed to block any of the following parent or child categories:

Adult content

Cults: Sites related to groups or movements whose members demonstrate passion for a belief system that is different from those that are socially accepted.

Gambling: Online gambling and sites that promote gambling skills and practice.

Nudity: Sites that provide full-frontal and semi-nude images or videos, typically in artistic form, and might allow the download or sale of such materials.

Pornography / Sexually explicit: Sites containing sexually explicit content in an image-based or textual form. Any form of sexually oriented material is also listed here.

Sex education: Sites that discuss sex and sexuality in an informative and non-voyeuristic way, including sites that provide education about human reproduction and contraception, sites that offer advice on preventing infection from sexual diseases, and sites that offer advice on sexual health matters.

Tasteless: Sites oriented towards content unsuitable for school children to view or that an employer would be uncomfortable with their staff accessing, but not necessarily violent or pornographic.

Violence: Sites that display or promote content related to violence against humans or animals.

High bandwidth

Download sites: Sites whose primary function is to allow users to download media content or programs, such as computer programs.

Image sharing: Sites that are used primarily for searching or sharing photos, including those that have social aspects.

Peer-to-peer: Sites that host peer-to-peer (P2P) software or facilitate the sharing of files using P2P software.

Streaming media & downloads: Sites whose primary function is the distribution of streaming media, or sites that allow users to search, watch, or listen to streaming media.

Legal liability

Child abuse images: Sites that include child abuse images or pornography.

Criminal activity: Sites that give instruction on, advice about or promotion of illegal activities.

Hacking: Sites that provide resources for illegal or questionable use of computer software or hardware, including sites that distribute copyrighted material that has been cracked.

Hate & intolerance: Sites promoting aggressive, degrading, or abusive opinions about any section of the population that could be identified by race, religion, gender, age, nationality, physical disability, economic situation, sexual preferences or any other lifestyle choice.

Illegal drug: Sites that sell illegal/controlled substances, promote substance abuse, or sell related paraphernalia.

Illegal software: Sites that contain or promote the use of malware, spyware, botnets, phishing scams, or piracy & copyright theft.

School cheating: Sites related to plagiarism or school cheating.

Self-harm: Sites that promote self-harm, including cyberbullying sites that contain abusive and/or threatening messages towards users.

Weapons: Any site that sells weapons or advocates the use of weapons, including but not limited to guns, knives, and ammunition.

Leisure

Chat: Sites that are primarily web-based chat rooms.

Games: Sites relating to video or computer games, including sites that promote gaming through hosting online services or information related to gaming.

Instant messaging: Sites that can be used to download instant messaging software or client based instant messaging.

Professional network: Sites that provide professional networking services.

Social networking: Sites that provide social networking services.

Web-based email: Sites offering web-based mail services.

Uncategorized

Newly registered domains: Sites that have been newly registered in the past 30 days and have not yet been moved to another category.

Parked domains: Sites that have no content or are parked for later use.

NOTE: Uncategorized contains only newly registered domains and parked domains, and does not include all other sites outside of these categories.

Create a policy

To add a new policy, follow these steps:

  1. In the Microsoft 365 Defender portal, choose Settings > Endpoints > Web content filtering > + Add policy.

  2. Specify a name.

  3. Select the categories to block. Use the expand icon to fully expand each parent category and select specific web content categories.

  4. Specify the policy scope. Select the device groups to specify where to apply the policy. Only devices in the selected device groups will be prevented from accessing websites in the selected categories.

    Important

    If you're using either Microsoft 365 Business Premium or Defender for Business, your web content filtering policy is applied to all users by default. Scoping does not apply.

  5. Review the summary and save the policy. The policy refresh might take up to 2 hours to apply to your selected devices.

Note

  • You can deploy a policy without selecting any category on a device group. This action will create an audit only policy to help you understand user behavior before creating a block policy.
  • If you are removing a policy or changing device groups at the same time, this might cause a delay in policy deployment.
  • Blocking the "Uncategorized" category could lead to unexpected and undesired results.

End-user experience

The blocking experience for third-party supported browsers is provided by network protection, which provides a system-level message notifying the user of a blocked connection. For a more user-friendly, in-browser experience, consider using Microsoft Edge.

Allow specific websites

It's possible to override the blocked category in web content filtering to allow a single site by creating a custom indicator policy. The custom indicator policy will supersede the web content filtering policy when it's applied to the device group in question.

To define a custom indicator, follow these steps:

  1. In the Microsoft 365 Defender portal, go to Settings > Endpoints > Indicators > URL/Domain > Add Item.

  2. Enter the domain of the site.

  3. Set the policy action to Allow.

Dispute categories

If you encounter a domain that has been incorrectly categorized, you can dispute the category directly from the Microsoft 365 Defender portal.

To dispute the category of a domain, navigate to Reports > Web protection > Web Content Filtering Details > Domains. On the domains tab of the Web Content Filtering reports, you will see an ellipsis beside each of the domains. Hover over this ellipsis and select Dispute Category.

A panel will open where you can select the priority and add more details such as the suggested category for recategorization. Once you complete the form, select Submit. Our team will review the request within one business day. For immediate unblocking, create a custom allow indicator.

Web content filtering cards and details

Select Reports > Web protection to view cards with information about web content filtering and web threat protection. The following cards provide summary information about web content filtering.

Web activity by category

This card lists the parent web content categories with the largest increase or decrease in the number of access attempts. Understand drastic changes in web activity patterns in your organization from last 30 days, 3 months, or 6 months. Select a category name to view more information.

In the first 30 days of using this feature, your organization might not have enough data to display this information.

What type of software restricts access to specified websites?

Web content filtering summary card

This card displays the distribution of blocked access attempts across the different parent web content categories. Select one of the colored bars to view more information about a specific parent web category.

What type of software restricts access to specified websites?

Web activity summary card

This card displays the total number of requests for web content in all URLs.

What type of software restricts access to specified websites?

View card details

You can access the Report details for each card by selecting a table row or colored bar from the chart in the card. The report details page for each card contains extensive statistical data about web content categories, website domains, and device groups.

What type of software restricts access to specified websites?

  • Web categories: Lists the web content categories that have had access attempts in your organization. Select a specific category to open a summary flyout.

  • Domains: Lists the web domains that have been accessed or blocked in your organization. Select a specific domain to view detailed information about that domain.

  • Device groups: Lists all the device groups that have generated web activity in your organization

Use the time range filter at the top left of the page to select a time period. You can also filter the information or customize the columns. Select a row to open a flyout pane with even more information about the selected item.

Known issues and limitations

Only Microsoft Edge is supported if your device's OS configuration is Server (cmd > Systeminfo > OS Configuration). Network Protection is only supported in Inspect mode on Server devices, which is responsible for securing traffic across supported third-party browsers.

Only Microsoft Edge is supported and network protection is not supported on Windows 10 Azure Virtual Desktop multi-session hosts.

Network protection does not currently support SSL inspection, which might result in some sites being allowed by web content filtering that would normally be blocked. Sites would be allowed due to a lack of visibility into encrypted traffic after the TLS handshake has taken place and an inability to parse certain redirects. This includes redirections from some web-based mail login pages to the mailbox page. As an accepted workaround, you can create a custom block indicator for the login page to ensure no users are able to access the site. Keep in mind, this might block their access to other services associated with the same website.

If you are using Microsoft 365 Business Premium or Microsoft Defender for Business, you can define one web content filtering policy for your environment. That policy will apply to all users by default.

See also

  • Web protection overview
  • Web threat protection
  • Monitor web security
  • Respond to web threats
  • Requirements for Network Protection

Feedback

Submit and view feedback for

What is a person called when he or she illegally accesses your computer?

What is Hacking? Hackers illegally access devices or websites to steal peoples' personal information, which they use to commit the crimes like theft. Many people shop, bank, and pay bills online.

Is Cracker the same as intent?

A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often are teenagers that use prewritten hacking and cracking programs to break into computers.

Is someone who accesses a computer or network illegally but has the intent of destroying data stealing information or other malicious action?

A cracker also is someone who accesses a computer or networkillegally but has the intent of destroying data, stealing information, or othermalicious action. Both hackers and crackers have advanced computer andnetwork skills.

Is a software programs that destroy or damage processing?

Software designed to destroy, damage, disable, or gain unauthorized access to any computer system, software, or electronic data. Malware is an abbreviation of the term malicious software and is also known as malicious code.