18.9.76.13.3.1 (L1) Ensure 'Prevent users and apps from accessing dangerous websites' is set to 'Enabled: Block'

Information

This policy setting controls Windows Defender Exploit Guard network protection.
The recommended state for this setting is: Enabled: Block.
Rationale:
This setting can help prevent employees from using any application to access dangerous domains that may host phishing scams, exploit-hosting sites, and other malicious content on the Internet.

Solution

To establish the recommended configuration via GP, set the following UI path to Enabled: Block:
Computer Configuration\Policies\Administrative Templates\Windows Components\Windows Defender Antivirus\Windows Defender Exploit Guard\Network Protection\Prevent users and apps from accessing dangerous websites
Note: This Group Policy path may not exist by default. It is provided by the Group Policy template WindowsDefender.admx/adml that is included with the Microsoft Windows 10 Release 1803 Administrative Templates (or newer).
Impact:
Users and applications will not be able to access dangerous domains.
Default Value:
Disabled. (Users and applications will not be blocked from connecting to dangerous domains.)
CIS Controls:
Version 6
7 Email and Web Browser Protections
Email and Web Browser Protections

See Also

https://workbench.cisecurity.org/files/2288