Skip to content

Commit 448cdb3

Browse files
Merge pull request #3417 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/defender-docs (branch public)
2 parents 0a68a67 + 27cb036 commit 448cdb3

File tree

8 files changed

+147
-152
lines changed

8 files changed

+147
-152
lines changed

defender-endpoint/configure-endpoints-gp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Onboard Windows devices to Microsoft Defender for Endpoint via Group Policy
2+
title: Onboard Windows Servers to Microsoft Defender for Endpoint via Group Policy
33
description: Use Group Policy to deploy the configuration package on Windows devices so that they are onboarded to the service.
44
ms.service: defender-endpoint
55
ms.author: deniseb

defender-endpoint/configure-endpoints-script.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Onboard Windows devices using a local script
2+
title: Onboard Windows Servers using a local script
33
description: Use a local script to deploy the configuration package on devices to enable onboarding of the devices to the service.
44
search.appverid: met150
55
ms.service: defender-endpoint

defender-endpoint/indicator-ip-domain.md

Lines changed: 28 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Create indicators for IPs and URLs/domains
3-
ms.reviewer: thdoucet
3+
ms.reviewer: ericlaw
44
description: Create indicators for IPs and URLs/domains that define the detection, prevention, and exclusion of entities.
55
ms.service: defender-endpoint
66
ms.author: deniseb
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice:
1717
search.appverid: met150
18-
ms.date: 03/04/2025
18+
ms.date: 04/08/2025
1919
---
2020

2121
# Create indicators for IPs and URLs/domains
@@ -31,17 +31,14 @@ ms.date: 03/04/2025
3131

3232
By creating indicators for IPs and URLs or domains, you can now allow or block IPs, URLs, or domains based on your own threat intelligence. You can also warn users if they open a risky app. The prompt doesn't stop them from using the app; users can bypass the warning and continue to use the app if needed.
3333

34-
To block malicious IPs/URLs (as determined by Microsoft), Defender for Endpoint can use:
34+
To block malicious IPs/URLs, Defender for Endpoint can use:
3535

3636
- Windows Defender SmartScreen for Microsoft browsers
37-
- Network protection for non-Microsoft browsers, or calls made outside of a browser
37+
- Network protection for non-Microsoft browsers and non-browser processes
3838

39-
The threat-intelligence data set to block malicious IPs/URLs is managed by Microsoft.
39+
The default threat-intelligence data set to block malicious IPs/URLs is managed by Microsoft.
4040

41-
You can block malicious IPs/URLs through the settings page or by machine groups, if you deem certain groups to be more or less at risk than others.
42-
43-
> [!NOTE]
44-
> Classless Inter-Domain Routing (CIDR) notation for IP addresses is not supported.
41+
You can block additional malicious IPs/URLs by configuring "**Custom network indicators**".
4542

4643
### Supported operating systems
4744

@@ -62,14 +59,15 @@ You can block malicious IPs/URLs through the settings page or by machine groups,
6259
It's important to understand the following prerequisites before creating indicators for IPs, URLs, or domains.
6360

6461
### Microsoft Defender Antivirus version requirements
62+
Integration into Microsoft browsers is controlled by the browser's SmartScreen setting. For other browsers and applications, your organization must have:
6563

66-
- Your organization uses [Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-windows). Microsoft Defender Antivirus must be in active mode for non-Microsoft browsers. With Microsoft browsers, like Microsoft Edge, Microsoft Defender Antivirus can be in active or passive mode.
64+
- [Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-windows) configured in active mode.
6765

68-
- [Behavior Monitoring](/defender-endpoint/behavior-monitor) is enabled.
66+
- [Behavior Monitoring](/defender-endpoint/behavior-monitor) enabled.
6967

70-
- [Cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus) is turned on.
68+
- [Cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus) turned on.
7169

72-
- [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus) is turned on.
70+
- [Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus).
7371

7472
- The anti-malware client version must be `4.18.1906.x` or later. See [Monthly platform and engine versions](/defender-endpoint/microsoft-defender-antivirus-updates).
7573

@@ -79,41 +77,39 @@ URL/IP allow and block requires that the Microsoft Defender for Endpoint compone
7977

8078
### Custom network indicators requirements
8179

82-
To start blocking IP addresses and/or URLs, turn on "**Custom network indicators"** feature in the [Microsoft Defender portal](https://security.microsoft.com), go to **Settings** > **Endpoints** > **General** > **Advanced features**. For more information, see [Advanced features](advanced-features.md).
80+
To start blocking IP addresses and/or URLs, turn on the "**Custom network indicators**" feature in the [Microsoft Defender portal](https://security.microsoft.com). The feature is found in **Settings** > **Endpoints** > **General** > **Advanced features**. For more information, see [Advanced features](advanced-features.md).
8381

8482
For support of indicators on iOS, see [Microsoft Defender for Endpoint on iOS](ios-configure-features.md#configure-custom-indicators).
8583

8684
For support of indicators on Android, see [Microsoft Defender for Endpoint on Android](android-configure.md#configure-custom-indicators).
8785

8886
### Indicator list limitations
8987

90-
Only external IPs can be added to the indicator list. Indicators can't be created for internal IPs. For web protection scenarios, we recommend using the built-in capabilities in Microsoft Edge. Microsoft Edge uses [Network Protection](network-protection.md) to inspect network traffic and allows blocks for TCP, HTTP, and HTTPS (TLS).
88+
Only external IPs can be added to the indicator list; indicators cannot be created for internal IPs.
9189

9290
### Non Microsoft Edge and Internet Explorer processes
9391

9492
For processes other than Microsoft Edge and Internet Explorer, web protection scenarios use Network Protection for inspection and enforcement:
9593

96-
- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS))
94+
- IP addresses are supported for all three protocols (TCP, HTTP, and HTTPS (TLS))
9795
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators
98-
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer or Microsoft Edge)
99-
- Encrypted URLs (FQDN only) can be blocked in non-Microsoft browsers (that is, other than Internet Explorer or Microsoft Edge)
100-
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, can only be blocked on first party browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
101-
- Full URL path blocks can be applied for unencrypted URLs
96+
- HTTP URLs (including a full URL path) can be blocked for any browser or process
97+
- HTTPS fully-qualified domain names (FQDN) can be blocked in non-Microsoft browsers (indicators specifying a full URL path can only be blocked in Microsoft Edge)
98+
- Blocking FQDNs in non-Microsoft browsers requires that QUIC and Encrypted Client Hello be disabled in those browsers
99+
- FQDNs loaded via HTTP2 connection coalescing can only be blocked in Microsoft Edge
102100
- If there are conflicting URL indicator policies, the longer path is applied. For example, the URL indicator policy `https://support.microsoft.com/office` takes precedence over the URL indicator policy `https://support.microsoft.com`.
103-
- If URL indicator policy conflicts occur, the longer path might not be applied due to redirection. In such cases, register a non-redirected URL.
104101

105-
> [!NOTE]
106-
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They can't enforce any enterprise web protection policies.
102+
## Network protection implementation
107103

108-
## Network protection and the TCP three-way handshake
104+
In non-Microsoft Edge processes, Network Protection determines the fully qualified domain name for each HTTPS connection by examining the content of the TLS handshake that occurs after a TCP/IP handshake. This requires that the HTTPS connection use TCP/IP (not UDP/QUIC) and that the ClientHello message not be encrypted. To disable QUIC and Encrypted Client Hello in Google Chrome, see [QuicAllowed](https://chromeenterprise.google/policies/#QuicAllowed) and [EncryptedClientHelloEnabled](https://chromeenterprise.google/policies/#EncryptedClientHelloEnabled). For Mozilla Firefox, see [Disable EncryptedClientHello](https://mozilla.github.io/policy-templates/#disableencryptedclienthello) and [network.http.http3.enable](https://support.mozilla.org/ml/questions/1408003#answer-1571474).
109105

110-
With network protection, the determination of whether to allow or block access to a site is made after the completion of the [three-way handshake via TCP/IP](/troubleshoot/windows-server/networking/three-way-handshake-via-tcpip). Thus, when a site is blocked by network protection, you might see an action type of `ConnectionSuccess` under `NetworkConnectionEvents` in the Microsoft Defender portal, even though the site was blocked. `NetworkConnectionEvents` are reported from the TCP layer, and not from network protection. After the three-way handshake has completed, access to the site is allowed or blocked by network protection.
106+
The determination of whether to allow or block access to a site is made after the completion of the [three-way handshake via TCP/IP](/troubleshoot/windows-server/networking/three-way-handshake-via-tcpip) and any TLS handshake. Thus, when a site is blocked by network protection, you might see an action type of `ConnectionSuccess` under `NetworkConnectionEvents` in the Microsoft Defender portal, even though the site was blocked. `NetworkConnectionEvents` are reported from the TCP layer, and not from network protection. After the three-way handshake has completed, access to the site is allowed or blocked by network protection.
111107

112108
Here's an example of how that works:
113109

114110
1. Suppose that a user attempts to access a website on their device. The site happens to be hosted on a dangerous domain, and it should be blocked by network protection.
115111

116-
2. The three-way handshake via TCP/IP commences. Before it completes, a `NetworkConnectionEvents` action is logged, and its `ActionType` is listed as `ConnectionSuccess`. However, as soon as the three-way handshake process completes, network protection blocks access to the site. All of this happens quickly. A similar process occurs with [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview); it's when the three-way handshake completes that a determination is made, and access to a site is either blocked or allowed.
112+
2. The TCP/IP handshake commences. Before it completes, a `NetworkConnectionEvents` action is logged, and its `ActionType` is listed as `ConnectionSuccess`. However, as soon as the TCP/IP handshake process completes, network protection blocks access to the site. All of this happens quickly. A similar process occurs with [Microsoft Defender SmartScreen](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview); it's after the handshake completes that a determination is made, and access to a site is either blocked or allowed.
117113

118114
3. In the Microsoft Defender portal, an alert is listed in the [alerts queue](alerts-queue.md). Details of that alert include both `NetworkConnectionEvents` and `AlertEvents`. You can see that the site was blocked, even though you also have a `NetworkConnectionEvents` item with the ActionType of `ConnectionSuccess`.
119115

@@ -136,9 +132,9 @@ For more information, see [Govern apps discovered by Microsoft Defender for Endp
136132

137133
## Indicator IP URL and domain policy conflict handling order
138134

139-
Policy conflict handling for domains/URLs/IP addresses differ from policy conflict handling for certs.
135+
Policy conflict handling for domains/URLs/IP addresses differ from policy conflict handling for certificates.
140136

141-
In the case where multiple different action types are set on the same indicator (for example, **block**, **warn**, and **allow**, action types set for Microsoft.com), the order those action types would take effect is:
137+
In the case where multiple different action types are set on the same indicator (for example, three indicators for Microsoft.com with the action types **block**, **warn**, and **allow**), the order those action types would take effect is:
142138

143139
1. Allow
144140

@@ -150,11 +146,11 @@ In the case where multiple different action types are set on the same indicator
150146

151147
### Defender for Cloud Apps Indicators
152148

153-
If your organization has enabled integration between Defender for Endpoint and Defender for Cloud Apps, block indicators are created in Defender for Endpoint for all unsanctioned cloud applications. If an application is put in monitor mode, warn indicators (bypassable block) are created for the URLs associated with the application. Allow indicators can't be created for sanctioned applications at this time. Indicators created by Defender for Cloud Apps follow the same policy conflict handling described in the previous section.
149+
If your organization has enabled integration between Defender for Endpoint and Defender for Cloud Apps, block indicators are created in Defender for Endpoint for all unsanctioned cloud applications. If an application is put in monitor mode, warn indicators (bypassable block) are created for the URLs associated with the application. Allow indicators are not automatically created for sanctioned applications. Indicators created by Defender for Cloud Apps follow the same policy conflict handling described in the previous section.
154150

155151
## Policy precedence
156152

157-
Microsoft Defender for Endpoint policy has precedence over Microsoft Defender Antivirus policy. In situations when Defender for Endpoint is set to `Allow`, but Microsoft Defender Antivirus is set to `Block`, the policy defaults to `Allow`.
153+
Microsoft Defender for Endpoint policy has precedence over Microsoft Defender Antivirus policy. In situations when Defender for Endpoint is set to `Allow`, but Microsoft Defender Antivirus is set to `Block`, the result is `Allow`.
158154

159155
### Precedence for multiple active policies
160156

@@ -179,12 +175,12 @@ The result is that categories 1-4 are all blocked. This scenario is illustrated
179175

180176
- **Indicator**: Specify the entity details and define the expiration of the indicator.
181177
- **Action**: Specify the action to be taken and provide a description.
182-
- **Scope**: Define the scope of the machine group.
178+
- **Scope**: Specify the machine group(s) which should enforce the indicator.
183179

184180
5. Review the details in the **Summary** tab, then select **Save**.
185181

186182
> [!IMPORTANT]
187-
> It can take up to 48 hours after a policy is created for a URL or IP address to be blocked on a device.
183+
> It can take up to 48 hours after a policy is created for a URL or IP address to be blocked on a device. In most cases, blocks will take effect in under two hours.
188184
189185
## Related articles
190186

0 commit comments

Comments
 (0)