You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/respond-machine-alerts.md
+42-1Lines changed: 42 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ ms.service: defender-endpoint
5
5
ms.author: diannegali
6
6
author: diannegali
7
7
ms.localizationpriority: medium
8
-
ms.date: 12/03/2024
8
+
ms.date: 02/20/2025
9
9
manager: deniseb
10
10
audience: ITPro
11
11
ms.collection:
@@ -321,6 +321,47 @@ You'll be able to stop containing a device at any time.
321
321
322
322
2. Select **Release from containment** from the action menu. This action will restore this device's connection to the network.
323
323
324
+
### Contain IP addresses of undiscovered devices
325
+
326
+
> [!IMPORTANT]
327
+
> Some information in this article relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.
328
+
329
+
Defender for Endpoint can also contain IP addresses associated with devices that are undiscovered or are not onboarded to Defender for Endpoint. The capability to contain an IP address prevents attackers from spreading attacks to other non-compromised devices. Containing an IP address results in Defender for Endpoint-onboarded devices blocking incoming and outgoing communication with devices using the contained IP address
330
+
331
+
> [!NOTE]
332
+
> Blocking incoming and outgoing communication with a 'contained' device is supported on onboarded Defender for Endpoint Windows 10, Windows 2012 R2, Windows 2016, and Windows Server 2019+ devices.
333
+
334
+
Containing an IP address associated with undiscovered devices or devices not onboarded to Defender for Endpoint is done automatically through [automatic attack disruption](/defender-xdr/automatic-attack-disruption). The Contain IP policy automatically blocks a malicious IP address when Defender for Endpoint detects the IP address to be associated with an undiscovered device or a device not onboarded.
335
+
336
+
A message indicating that the action is applied appears on the applicable incident, device, or IP page. Here’s an example.
337
+
338
+
**[INSERT SCREENSHOT]**
339
+
340
+
After an IP address is contained, you can view the action in the History view of the Action Center. You can see when the action occurred and identify the IP addresses that were contained.
341
+
342
+
**[INSERT SCREENSHOT]**
343
+
344
+
If a contained IP address is part of an incident, an indicator is present on the [incident graph](/defender-xdr/investigate-incidents#attack-story) and on the incident’s [evidence and response](/defender-xdr/investigate-incidents#evidence-and-response) tab. Here’s an example.
345
+
346
+
**[INSERT SCREENSHOTS]**
347
+
348
+
You can stop an IP address’ containment at any time. To stop containment, you can perform any of the following:
349
+
350
+
- Select the **Contain IP** action in the **Action Center**. In the flyout, select **Undo**.
351
+
- Select the IP address from either the incident page side pane or alert side pane, then select **Undo**.
352
+
353
+
This action restores the IP address’ connection to the network.
354
+
355
+
### Containing critical assets
356
+
357
+
When a critical asset is compromised and used to spread threats within an organization, stopping the spread can be challenging because these assets must continue to function to avoid productivity loss. Defender for Endpoint addresses this by granularly containing the critical asset, preventing the spread of the attack while ensuring the asset remains operational for business continuity.
358
+
359
+
Through automatic attack disruption, Defender for Endpoint incriminates a malicious device, identifies the role of the device to apply a matching policy to automatically contain a critical asset. The granular containment is done by blocking only specific ports and communication directions.
360
+
361
+
**[INSERT SCREENSHOT]**
362
+
363
+
You can identify critical assets by the **critical asset** tag on the device or IP page. Device containment currently supports critical asset types like domain controllers, DNS servers, and DHCP servers.
364
+
324
365
## Contain user from the network
325
366
326
367
When an identity in your network might be compromised, you must prevent that identity from accessing the network and different endpoints. Defender for Endpoint can contain an identity, blocking it from access, and helping prevent attacks-- specifically, ransomware. When an identity is contained, any supported Microsoft Defender for Endpoint onboarded device will block incoming traffic in specific protocols related to attacks (network logons, RPC, SMB, RDP), terminate ongoing remote sessions and logoff existing RDP connections (terminating the session itself including all its related processes), while enabling legitimate traffic. This action can significantly help to reduce the impact of an attack. When an identity is contained, security operations analysts have extra time to locate, identify and remediate the threat to the compromised identity.
Copy file name to clipboardExpand all lines: defender-xdr/automatic-attack-disruption.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ ms.topic: conceptual
18
18
search.appverid:
19
19
- MOE150
20
20
- MET150
21
-
ms.date: 09/11/2024
21
+
ms.date: 02/20/2025
22
22
---
23
23
24
24
# Automatic attack disruption in Microsoft Defender XDR
@@ -63,13 +63,13 @@ Investigations are integral to monitoring our signals and the attack threat land
63
63
64
64
Automatic attack disruption uses Microsoft-based XDR response actions. Examples of these actions are:
65
65
66
-
-[Device contain](/defender-endpoint/respond-machine-alerts#contain-devices-from-the-network) - based on Microsoft Defender for Endpoint's capability, this action is an automatic containment of a suspicious device to block any incoming/outgoing communication with the said device.
66
+
-[Device contain](/defender-endpoint/respond-machine-alerts#contain-devices-from-the-network) - based on Microsoft Defender for Endpoint's capability, this action is an automatic containment of a suspicious device to block any incoming/outgoing communication with the said device. In addition, Defender for Endpoint automatically contains malicious IP addresses associated with undiscovered/not onboarded devices to block any lateral movement and encryption activity to other Defender for Endpoint-onboarded/discovered devices. It does this through its **[Contain IP](/defender-endpoint/respond-machine-alerts#contain-ip-addresses-of-undiscovered-devices)** policy. Moreover, compromised critical assets' IP addresses are also automatically contained with specific blocking mechanisms to stop the spread of an attack while avoiding productivity loss.
67
67
68
68
-[Disable user](/defender-for-identity/remediation-actions) - based on Microsoft Defender for Identity's capability, this action is an automatic suspension of a compromised account to prevent additional damage like lateral movement, malicious mailbox use, or malware execution. The disable user action behaves differently depending on how the user is hosted in your environment.
69
69
- When the user account is hosted in Active Directory: Defender for Identity triggers the disable user action on domain controllers running the Defender for Identity agent.
70
70
- When the user account is hosted in Active Directory and is synced on Microsoft Entra ID: Defender for Identity triggers the disable user action via onboarded domain controllers. Attack disruption also disables the user account on the Entra ID synced account.
71
71
- When the user account is hosted in Entra ID only (cloud native account): attack disruption disable the user account on the Entra ID synced account.
72
-
72
+
73
73
> [!NOTE]
74
74
> Disabling the user account in Microsoft Entra ID is not dependent on the deployment of Microsoft Defender for Identity.
75
75
@@ -125,5 +125,4 @@ For more information, see [view attack disruption details and results](autoad-re
125
125
-[View details and results](autoad-results.md)
126
126
-[Get email notifications for response actions](m365d-response-actions-notifications.md)
0 commit comments