Exploit Guard - Network Protection

%3CLINGO-SUB%20id%3D%22lingo-sub-161624%22%20slang%3D%22en-US%22%3EExploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-161624%22%20slang%3D%22en-US%22%3E%3CP%3EWe've%20begun%20pushing%20the%20Windows%2010%26nbsp%3BFall%20Creator's%26nbsp%3BUpdate%20in%20our%20business%20environment.%26nbsp%3B%20We%20have%20configured%20many%20of%20the%20new%26nbsp%3Bsecurity%20features%20through%20GPO%20including%20Exploit%20Guard%20-%20Attack%20Surface%20Reduction%20Rules%20and%20Exploit%20Guard%20-%20Network%20Protection.%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20we%20were%20originally%20testing%20and%20evaluating%201709%20(a%20few%20months%20ago)%20the%20Network%20Protection%20feature%20worked%20as%20expected%2C%20and%20Windows%20would%20notify%20us%20if%20a%20site%20was%20blocked%20due%20to%20the%20setting%20being%20enabled.%26nbsp%3B%20For%20example%2C%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-exploit-guard%2Fevaluate-network-protection%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ENetwork%20Protection%20Evaluation%20%3C%2FA%3Epage%20recommends%20that%20we%20visit%3A%20%3CA%20href%3D%22https%3A%2F%2Fsmartscreentestratings2.net%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fsmartscreentestratings2.net%2F%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThat%20should%20trigger%20the%20Network%20Protection%20notification%20in%20Windows%20and%20prevent%20us%20from%20getting%20to%20the%20page%2C%20however%3B%20that%20does%20not%20seem%20to%20work%20anymore.%26nbsp%3B%20The%20page%20renders%20without%20issue%2C%20and%20I%20never%20receive%20a%20notification%20that%20it%20was%20blocked.%26nbsp%3B%20This%20is%20making%20me%20question%20whether%20or%20not%20the%20feature%20is%20working%20at%20all%20anymore.%26nbsp%3B%20A%20few%20things%20that%20I've%20checked%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EThe%20GPO%20setting%20%22Prevent%20Users%20and%20Apps%20from%20Accessing%20Dangerous%20Websites%22%20is%20set%20to%20enabled%20for%20all%20computers.%3C%2FLI%3E%0A%3CLI%3ERan%20an%20RSOP%20on%20multiple%20computers%20to%20ensure%20that%20settings%20is%20being%20properly%20applied.%26nbsp%3B%20It%20is.%26nbsp%3B%3C%2FLI%3E%0A%3CLI%3EIn%20PowerShell%2C%20ran%20Get-MpPreference%20to%20make%20sure%20that%20EnableNetworkProtection%20has%20a%20value%20%3D%201.%26nbsp%3B%20It%20does.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EAnyone%20else%20having%20the%20same%20experience%20or%20any%20idea%20why%20the%20MS%20test%20site%20doesn't%20evaluate%20correctly%20anymore%3F%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-192453%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-192453%22%20slang%3D%22en-US%22%3E%3CP%3EFails%20on%20PCs%20where%20AVG%20is%20still%20running.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EPCs%20where%20AVG%20is%20gone%20have%20been%20updated%20to%201709%20and%20so%20far%20have%20the%20latest%20Defender.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDH%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-192431%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-192431%22%20slang%3D%22en-US%22%3E%3CP%3EDo%20the%20clients%20without%20the%20latest%20platform%20version%20have%20the%20latest%20engine%20and%20definitions%2C%26nbsp%3BGet-MpComputerStatus%20in%20PowerShell%20will%20show%20you%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-192415%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-192415%22%20slang%3D%22en-US%22%3E%3CP%3EBoth%20clients%20are%20at%20that%20version%20now%2C%20but%20part%20of%20the%20troubleshooting%20for%20both%20was%20to%20update%20them%20to%201709%20so%20not%20sure%20what%20was%20there%20before.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOn%20checking%20now%20on%20other%20PCs%2C%20some%20platform%20folders%20are%20empty%2C%20some%20are%20at%204.12.17007.18022-0%2C%20etc%20etc%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHow%20do%20we%20ensure%20everyone%20has%20current%20Defender%20regardless%20of%20OS%20patch%20level%20-%20is%20there%20a%20KB%20we%20can%20quickly%20push%20on%20everyone%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThanks%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDH%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-192409%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-192409%22%20slang%3D%22en-US%22%3E%3CP%3EWhat%20Windows%20Defender%20platform%20version%20was%20running%20at%20the%20time%20of%20the%20issues%2C%20look%20at%26nbsp%3BC%3A%5CProgramData%5CMicrosoft%5CWindows%20Defender%5CPlatform%5Cx.xx.x.xxx%20for%20example.%20The%20issues%20we've%20seen%20have%20been%20a%20combination%20of%20Defender%20platform%20and%20OS%20version.%3CBR%20%2F%3E%3CBR%20%2F%3EDo%20you%20still%20have%20issues%20now%20with%20platform%204.14.17639.18041-0%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-192404%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-192404%22%20slang%3D%22en-US%22%3E%3CP%3EWin%2010%20Pro.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EOne%20was%201709%20and%20the%20other%20was%201603.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20the%20case%20of%201709%2C%20we%20had%20to%20delete%20wdnsfltr%20while%20unjoined.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20the%20case%20of%201603%2C%20we%20took%20it%20off%20the%20domain%2C%20applied%201709%2C%20rejoined%20and%20network%20came%20back.%20wdnsfltr%20never%20started%20up%20in%20this%20case.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDH%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-192401%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-192401%22%20slang%3D%22en-US%22%3E%3CP%3EWhat%20platform%20versions%20are%20the%20affected%20clients%20running%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-192328%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-192328%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20have%20a%20few%20PCs%2C%20pre%20and%20post%201709%2C%20that%20Defender%20is%20completely%20cutting%20off%20the%20network.%20In%20one%20case%20deleting%20wdnsfltr.exe%20and%20.sys%20solved%20it.%20Nothing%20in%20the%20Defender%20Event%20logs%20about%20blocking%20access%20to%20the%20network%20or%20a%20bad%20site.%20We%20are%20deploying%20via%20Group%20Policy%20from%20Server%202016.%20Win10%20Pro%20clients.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDH%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-188870%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-188870%22%20slang%3D%22en-US%22%3E%3CP%3EI've%20just%20tested%20it%20on%20Pro%201803%20(17134.1)%20and%20it%20works%2C%20notifications%20and%20blocking.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-188866%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-188866%22%20slang%3D%22en-US%22%3E%3CP%3EI've%20just%20found%26nbsp%3Bout%20why%20it%20no%20longer%20works%20on%20my%20Windows%2010%20Pro%20machines%2C%20it's%20now%20a%20Windows%2010%20Enterprise%20only%20feature%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-exploit-guard%2Ftroubleshoot-np%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-exploit-guard%2Ftroubleshoot-np%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-188619%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-188619%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20last%202%20releases%20of%20the%20Defender%20platform%20on%201709%20have%20been%20blocking%20but%20not%20notifying%2C%20you%20can%20test%20it%20in%20PowerShell%20with%20the%20following%3B%3CBR%20%2F%3E%23%23%23Begin%3C%2FP%3E%3CP%3E%5BNet.ServicePointManager%5D%3A%3ASecurityProtocol%20%3D%20%5BNet.SecurityProtocolType%5D%3A%3ATLS12%3CBR%20%2F%3E%24url%20%3D%20'%3CA%20href%3D%22https%3A%2F%2Fsmartscreentestratings2.net%2F%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fsmartscreentestratings2.net%2F%3C%2FA%3E'%3CBR%20%2F%3E%24webClient%20%3D%20New-Object%20System.Net.WebClient%3CBR%20%2F%3E%23%20%24webClient.Proxy%20%3D%20%5BSystem.Net.GlobalProxySelection%5D%3A%3AGetEmptyWebProxy()%20%23Use%20to%20bypass%20the%20proxy%20if%20needed%3CBR%20%2F%3E%24webClient.DownloadString(%24url)%3CBR%20%2F%3E%23%23%23End%3CBR%20%2F%3EYou%20will%20get%20an%20SSL%2FTLS%20negotiation%20error%20when%20blocked%2C%20add%20PowerShell(_ise).exe%20to%20the%20Defender%20exclusion%20and%20restart%20PowerShell%2C%20you'll%20then%20get%20a%20web%20response.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-188610%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-188610%22%20slang%3D%22en-US%22%3E%3CP%3EWe've%20had%20another%20platform%20version%20released%20(4.14.17639.18041-0)%20but%20the%20results%20are%20the%20same%20in%201709%20as%20the%20last%20release%20so%20blocks%20but%20no%20notifications%20still.%20On%20the%20upside%201803%20Enterprise%20appears%20to%20be%20a%20well%20polished%20version%20of%201709%2C%20my%20only%20problem%20so%20far%20is%20event%20logs%20that%20are%20set%20to%20archive%20when%20full%20actually%20stop%20logging%20which%20is%20a%20problem%20that%20was%20fixed%20in%201709%20a%20few%20months%20back%20other%20than%20that%20all%20is%20well%20so%20you%20may%20be%20able%20to%20move%20to%201803%20sooner%20than%20you'd%20planned.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-185760%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-185760%22%20slang%3D%22en-US%22%3E%3CP%3EI'm%20also%20seeing%20this%20issue%3B%20the%20test%20pages%20are%20being%20blocked%20only%20by%20smartscreen%20but%20exploit%20guard%20network%20protection%20doesn't%20function%20at%20all%2C%20ie%20there%20is%20no%20blocking%20and%20no%20auditing%20despite%20the%20policy%20being%20successfully%20deployed.%20I've%20upvoted%20the%20issue%20in%20the%20feedback%20hub%20and%20encourage%20others%20to%20do%20the%20same.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-183754%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-183754%22%20slang%3D%22en-US%22%3E%3CP%3EThat%20is%20interesting.%26nbsp%3B%20I'm%20running%201709%20on%20all%20of%20my%20computers%2C%20and%20I'm%20now%20seeing%20the%20same%20thing.%26nbsp%3B%20The%20test%20site%20is%20properly%20blocked%2C%20but%20I%20don't%20receive%20a%20notification.%26nbsp%3B%20I%20also%20do%20not%20see%20a%20corresponding%20log%20entry%20for%20the%20event.%26nbsp%3B%20According%20to%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-exploit-guard%2Fevent-views-exploit-guard%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3Ethis%20documentation%3C%2FA%3E%26nbsp%3BI%20should%20see%20log%20entries%20for%20the%20Network%20Protection%20events%20in%20the%20Windows%20Defender%20-%26gt%3B%20Operational%20log%2C%20however%20nothing%20is%20being%20logged%20their%20after%20the%20test%20site%20is%20blocked.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EI%20guess%20I%20will%20just%20wait%20until%201803%20is%20ready%20for%20broad%20distribution.%26nbsp%3B%20%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-183613%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-183613%22%20slang%3D%22en-US%22%3E%3CP%3EOkay%20so%20we%20have%20a%20new%20platform%20update%20version%26nbsp%3B4.14.17613.18039-0.%20I've%20had%20connections%20blocked%20with%20this%20platform%20on%201709%20but%20no%20notification%2C%20on%201803%20I've%20had%20both%20blocked%20connections%20and%20notification.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-172747%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-172747%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Steve%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks%20for%20submitting%20this%20to%20microsoft%20directly.%26nbsp%3B%20It's%20a%20bit%20difficult%20to%20traverse%20the%20feedback%20hub%20for%20this%20type%20of%20problem.%26nbsp%3B%20Hopefully%20you%20can%20update%20this%20thread%20if%2Fwhen%20you%20hear%20something%20back%20from%20MS.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThanks.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-172666%22%20slang%3D%22en-US%22%3ERe%3A%20Exploit%20Guard%20-%20Network%20Protection%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-172666%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%3C%2FP%3E%0A%3CP%3EPrior%20to%20the%20'Defender%20Antimalware%20Platform%20Update'%20in%20January%20%22C%3A%5CProgram%20Files%5CWindows%20Defender%5Cwdnsfltr.exe%22%20would%20be%20called%20and%20make%20a%20connection%20to%20urs.smartscreen.microsoft.com%20either%20directly%20or%20via%20a%20proxy%20server%20(even%20if%20a%20proxy%20is%20hardcoded%20and%20WPAD%2FPAC%20files%20direct%20connections%20to%20.microsoft.com%20via%20the%20proxy).%3CBR%20%2F%3EThis%20would%20then%20invoke%20'Network%20Protection'%20on%20a%20matching%20FQDN%2C%20the%20connection%20would%20be%20blocked%2C%20an%20event%20(ID%3A%201126)%20recorded%20in%20the%20'Windows%20Defender'%20event%20log%20and%20a%20notification%20would%20alert%20the%20user.%3CBR%20%2F%3EUpdating%20Windows%2010%20with%20the%20latest%20cumulative%20OS%20update%20will%20still%20work%20but%20as%20soon%20as%20Defender%20is%20updated%20the%20'Network%20Protection'%20service%20is%20no%20longer%20called%20and%20the%20connection%20to%20the%20blacklisted%20site%20is%20successful.%3C%2FP%3E%0A%3CP%3EI've%20emailed%20wdcustomer%40microsoft.com%20directly%20and%20the%20feedback%20link%20is%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FVxogvt%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2FVxogvt%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3ERegards%2C%3C%2FP%3E%0A%3CP%3ESteve%3C%2FP%3E%3C%2FLINGO-BODY%3E
Contributor

We've begun pushing the Windows 10 Fall Creator's Update in our business environment.  We have configured many of the new security features through GPO including Exploit Guard - Attack Surface Reduction Rules and Exploit Guard - Network Protection.  

 

When we were originally testing and evaluating 1709 (a few months ago) the Network Protection feature worked as expected, and Windows would notify us if a site was blocked due to the setting being enabled.  For example, the Network Protection Evaluation page recommends that we visit: https://smartscreentestratings2.net/

 

That should trigger the Network Protection notification in Windows and prevent us from getting to the page, however; that does not seem to work anymore.  The page renders without issue, and I never receive a notification that it was blocked.  This is making me question whether or not the feature is working at all anymore.  A few things that I've checked:

 

  1. The GPO setting "Prevent Users and Apps from Accessing Dangerous Websites" is set to enabled for all computers.
  2. Ran an RSOP on multiple computers to ensure that settings is being properly applied.  It is. 
  3. In PowerShell, ran Get-MpPreference to make sure that EnableNetworkProtection has a value = 1.  It does.

Anyone else having the same experience or any idea why the MS test site doesn't evaluate correctly anymore?  

 

 

 

16 Replies

Hi,

Prior to the 'Defender Antimalware Platform Update' in January "C:\Program Files\Windows Defender\wdnsfltr.exe" would be called and make a connection to urs.smartscreen.microsoft.com either directly or via a proxy server (even if a proxy is hardcoded and WPAD/PAC files direct connections to .microsoft.com via the proxy).
This would then invoke 'Network Protection' on a matching FQDN, the connection would be blocked, an event (ID: 1126) recorded in the 'Windows Defender' event log and a notification would alert the user.
Updating Windows 10 with the latest cumulative OS update will still work but as soon as Defender is updated the 'Network Protection' service is no longer called and the connection to the blacklisted site is successful.

I've emailed wdcustomer@microsoft.com directly and the feedback link is https://aka.ms/Vxogvt.

Regards,

Steve

Hi Steve,

 

Thanks for submitting this to microsoft directly.  It's a bit difficult to traverse the feedback hub for this type of problem.  Hopefully you can update this thread if/when you hear something back from MS. 

 

Thanks. 

Okay so we have a new platform update version 4.14.17613.18039-0. I've had connections blocked with this platform on 1709 but no notification, on 1803 I've had both blocked connections and notification.

 

That is interesting.  I'm running 1709 on all of my computers, and I'm now seeing the same thing.  The test site is properly blocked, but I don't receive a notification.  I also do not see a corresponding log entry for the event.  According to this documentation I should see log entries for the Network Protection events in the Windows Defender -> Operational log, however nothing is being logged their after the test site is blocked. 

 

I guess I will just wait until 1803 is ready for broad distribution.   

I'm also seeing this issue; the test pages are being blocked only by smartscreen but exploit guard network protection doesn't function at all, ie there is no blocking and no auditing despite the policy being successfully deployed. I've upvoted the issue in the feedback hub and encourage others to do the same.

We've had another platform version released (4.14.17639.18041-0) but the results are the same in 1709 as the last release so blocks but no notifications still. On the upside 1803 Enterprise appears to be a well polished version of 1709, my only problem so far is event logs that are set to archive when full actually stop logging which is a problem that was fixed in 1709 a few months back other than that all is well so you may be able to move to 1803 sooner than you'd planned.

The last 2 releases of the Defender platform on 1709 have been blocking but not notifying, you can test it in PowerShell with the following;
###Begin

[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12
$url = 'https://smartscreentestratings2.net/'
$webClient = New-Object System.Net.WebClient
# $webClient.Proxy = [System.Net.GlobalProxySelection]::GetEmptyWebProxy() #Use to bypass the proxy if needed
$webClient.DownloadString($url)
###End
You will get an SSL/TLS negotiation error when blocked, add PowerShell(_ise).exe to the Defender exclusion and restart PowerShell, you'll then get a web response.

I've just found out why it no longer works on my Windows 10 Pro machines, it's now a Windows 10 Enterprise only feature: https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/t...

I've just tested it on Pro 1803 (17134.1) and it works, notifications and blocking. 

We have a few PCs, pre and post 1709, that Defender is completely cutting off the network. In one case deleting wdnsfltr.exe and .sys solved it. Nothing in the Defender Event logs about blocking access to the network or a bad site. We are deploying via Group Policy from Server 2016. Win10 Pro clients.

 

DH

What platform versions are the affected clients running?

Win 10 Pro.

 

One was 1709 and the other was 1603.

 

In the case of 1709, we had to delete wdnsfltr while unjoined.

 

In the case of 1603, we took it off the domain, applied 1709, rejoined and network came back. wdnsfltr never started up in this case.

 

DH

What Windows Defender platform version was running at the time of the issues, look at C:\ProgramData\Microsoft\Windows Defender\Platform\x.xx.x.xxx for example. The issues we've seen have been a combination of Defender platform and OS version.

Do you still have issues now with platform 4.14.17639.18041-0?

Both clients are at that version now, but part of the troubleshooting for both was to update them to 1709 so not sure what was there before.

 

On checking now on other PCs, some platform folders are empty, some are at 4.12.17007.18022-0, etc etc

 

How do we ensure everyone has current Defender regardless of OS patch level - is there a KB we can quickly push on everyone?

 

Thanks

 

DH

Do the clients without the latest platform version have the latest engine and definitions, Get-MpComputerStatus in PowerShell will show you?

Fails on PCs where AVG is still running.

 

PCs where AVG is gone have been updated to 1709 and so far have the latest Defender.

 

DH