Policy overview

Key metadata and intent for this policy.

ClassComputer
CategoryWindows Components > Microsoft Defender Antivirus > Remediation > Behavioral Network Blocks > Remote Encryption Protection
Supported onAt least Windows Server 2016, Windows 10 Version 1607

Supported OS tags: Windows10, Windows10RT, Windows11, WindowsServer2016

Specify IP addresses, subnets, and domain names to exclude from Remote Encryption Protection. Note that attackers can spoof excluded addresses and names to bypass protection. Enter each address or subnet on a new line as a name-value pair: - Name column: Enter an IP address or subnet name. For example, ""1.1.127.0"" will exclude this IP address from getting blocked. - Value column: Enter ""0"" for each item

Internal name
Remediation_BNB_REP_RemoteEncryptionProtectionExclusions
Policy ID
7e87f04d413f
Elements
1

Registry values

How enabled and disabled states update the registry.

No explicit registry values are set for enabled or disabled states.

Policy elements

Inputs and configuration options exposed by this policy.

ElementTypeRegistry mappingConstraints & behavior
Remote Encryption Protection Exclusions
ID Remediation_BNB_REP_RemoteEncryptionProtectionExclusions
list
HKLM\Software\Policies\Microsoft\Windows Defender\Remediation\Behavioral Network Blocks\Remote Encryption Protection\RemoteEncryptionProtectionExclusions\RemoteEncryptionProtection_Exclusions
Type REG_MULTI_SZ
List: additive, explicit value

Other policies in this category

Explore related policies at the same level.