This guide will provide background information on modifying an existing web filter set.
Web Content Filtering
Web content filtering enables your security team to track and regulate access to websites based on content categories. When you set up your web content filtering policy, you enable web protection for your organization.
Web content filtering is available on the major web browsers, with blocks performed by Windows Defender SmartScreen (Microsoft Edge) and Network Protection (Chrome, Firefox, Brave, and Opera).
Categories for web content filtering
Not all websites in these categories are malicious, but they could be problematic for your company because of compliance regulations, bandwidth usage, or other concerns. You can create an audit-only policy to get a better understanding of whether your security team should block any website categories.
The following table describes web content categories you can choose for your web content filtering policy:
Category |
Description |
Adult content |
Sites that are related to cults, gambling, nudity, pornography, sexually explicit material, or violence |
High bandwidth |
Download sites, image sharing sites, or peer-to-peer hosts |
Legal liability |
Sites that include child abuse images, promote illegal activities, foster plagiarism or school cheating, or that promote harmful activities |
Leisure |
Sites that provide web-based chat rooms, online gaming, web-based email, or social networking |
Uncategorized |
Sites that have no content or that are newly registered |
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.Security
Handbook Reference
Package: TBD
Domain: TBD
Modifies: TBD
Modifying a Defender Web Filter Policy
- Navigate to the Web Content Filtering – Microsoft Defender portal, locate the policy you wish to alter. When selected configured settings for the policy will be displayed, select Edit to start the modification process.
- Upon opening the policy, all the information of the policy will be displayed. Only one setting will be available to You can modify the section as needed.
- General: Showcases the name of the policy; this setting cannot be changed since one web filter exists for all machines in the environment.
- Blocked Categories: Specifies what categories of web traffic will be blocked or allowed based on configuration; this can be altered to either enforce more restrictions or create allowances on certain web traffic types.
- Scope: Specifies which machines this web filter will apply to; currently this policy can only be enforced to all machines not individual groups.
- Summary: Displays all of the configured settings before saving modifications. Once you have created the necessary modifications to the policy, select Submit to finalize the modification process.
- General: Showcases the name of the policy; this setting cannot be changed since one web filter exists for all machines in the environment.
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.