You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/indicator-ip-domain.md
+20-20Lines changed: 20 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.collection:
15
15
ms.topic: conceptual
16
16
ms.subservice:
17
17
search.appverid: met150
18
-
ms.date: 12/11/2024
18
+
ms.date: 01/03/2025
19
19
---
20
20
21
21
# Create indicators for IPs and URLs/domains
@@ -32,7 +32,7 @@ ms.date: 12/11/2024
32
32
33
33
## Overview
34
34
35
-
By creating indicators for IPs and URLs or domains, you can now allow or block IPs, URLs, or domains based on your own threat intelligence. You can also warn users with a prompt if they open a risky app. The prompt won't stop them from using the app but you can provide a custom message and links to a company page that describes appropriate usage of the app. Users can still bypass the warning and continue to use the app if they need.
35
+
By creating indicators for IPs and URLs or domains, you can now allow or block IPs, URLs, or domains based on your own threat intelligence. You can also warn users if they open a risky app. The prompt doesn't stop them from using the app; users can bypass the warning and continue to use the app if needed.
36
36
37
37
To block malicious IPs/URLs (as determined by Microsoft), Defender for Endpoint can use:
38
38
@@ -61,19 +61,19 @@ You can block malicious IPs/URLs through the settings page or by machine groups,
61
61
62
62
## Before you begin
63
63
64
-
It's important to understand the following prerequisites prior to creating indicators for IPS, URLs, or domains.
64
+
It's important to understand the following prerequisites before creating indicators for IPS, URLs, or domains.
65
65
66
66
### Microsoft Defender Antivirus version requirements
67
67
68
-
- Your organization uses [Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-windows). Microsoft Defender Antivirus must be in active mode for non-Microsoft browsers. With Microsoft browsers, like Edge, Microsoft Defender Antivirus can be in active or passive mode.
68
+
- Your organization uses [Microsoft Defender Antivirus](/defender-endpoint/microsoft-defender-antivirus-windows). Microsoft Defender Antivirus must be in active mode for non-Microsoft browsers. With Microsoft browsers, like Microsoft Edge, Microsoft Defender Antivirus can be in active or passive mode.
69
69
70
70
-[Behavior Monitoring](/defender-endpoint/behavior-monitor) is enabled.
71
71
72
72
-[Cloud-based protection](/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus) is turned on.
73
73
74
74
-[Cloud Protection network connectivity](/defender-endpoint/configure-network-connections-microsoft-defender-antivirus) is turned on.
75
75
76
-
- The antimalware client version must be `4.18.1906.x` or later. See [Monthly platform and engine versions](/defender-endpoint/microsoft-defender-antivirus-updates).
76
+
- The anti-malware client version must be `4.18.1906.x` or later. See [Monthly platform and engine versions](/defender-endpoint/microsoft-defender-antivirus-updates).
77
77
78
78
### Network Protection requirements
79
79
@@ -89,23 +89,23 @@ For support of indicators on Android, see [Microsoft Defender for Endpoint on An
89
89
90
90
### IoC indicator list limitations
91
91
92
-
Only external IPs can be added to the indicator list. Indicators can't be created for internal IPs. For web protection scenarios, we recommend using the built-in capabilities in Microsoft Edge. Microsoft Edge leverages[Network Protection](network-protection.md) to inspect network traffic and allows blocks for TCP, HTTP, and HTTPS (TLS).
92
+
Only external IPs can be added to the indicator list. Indicators can't be created for internal IPs. For web protection scenarios, we recommend using the built-in capabilities in Microsoft Edge. Microsoft Edge uses[Network Protection](network-protection.md) to inspect network traffic and allows blocks for TCP, HTTP, and HTTPS (TLS).
93
93
94
94
### Non Microsoft Edge and Internet Explorer processes
95
95
96
-
For processes other than Microsoft Edge and Internet Explorer, web protection scenarios leverage Network Protection for inspection and enforcement:
96
+
For processes other than Microsoft Edge and Internet Explorer, web protection scenarios use Network Protection for inspection and enforcement:
97
97
98
98
- IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS))
99
99
- Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom indicators
100
-
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer, Edge)
101
-
- Encrypted URLs (FQDN only) can be blocked in third party browsers (that is, other than Internet Explorer, Edge)
102
-
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDN's, can only be blocked on first party browsers (Internet Explorer, Edge), unless the CDN URL itself is added to the indicator list.
100
+
- Encrypted URLs (full path) can only be blocked on first party browsers (Internet Explorer or Microsoft Edge)
101
+
- Encrypted URLs (FQDN only) can be blocked in non-Microsoft browsers (that is, other than Internet Explorer or Microsoft Edge)
102
+
- URLs loaded via HTTP connection coalescing, such as content loaded by modern CDNs, can only be blocked on first party browsers (Internet Explorer, Microsoft Edge), unless the CDN URL itself is added to the indicator list.
103
103
- Full URL path blocks can be applied for unencrypted URLs
104
104
- If there are conflicting URL indicator policies, the longer path is applied. For example, the URL indicator policy `https://support.microsoft.com/office` takes precedence over the URL indicator policy `https://support.microsoft.com`.
105
-
-In the case of URL indicator policy conflicts, the longer path may not be applied due to redirection. In such cases, register a non-redirected URL.
105
+
-If URL indicator policy conflicts occur, the longer path might not be applied due to redirection. In such cases, register a non-redirected URL.
106
106
107
107
> [!NOTE]
108
-
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They cannot enforce any enterprise web protection policies.
108
+
> Custom Indicators of Compromise and Web Content Filtering features are currently not supported in Application Guard sessions of Microsoft Edge. These containerized browser sessions can only enforce web threat blocks via the built-in SmartScreen protection. They can't enforce any enterprise web protection policies.
109
109
110
110
## Network protection and the TCP three-way handshake
111
111
@@ -124,14 +124,14 @@ Here's an example of how that works:
124
124
When using warn mode, you can configure the following controls:
125
125
126
126
-**Bypass ability**
127
-
- Allow button in Edge
127
+
- Allow button in Microsoft Edge
128
128
- Allow button on toast (Non-Microsoft browsers)
129
129
- Bypass duration parameter on the indicator
130
130
- Bypass enforcement across Microsoft and Non-Microsoft browsers
131
131
132
132
-**Redirect URL**
133
133
- Redirect URL parameter on the indicator
134
-
- Redirect URL in Edge
134
+
- Redirect URL in Microsoft Edge
135
135
- Redirect URL on toast (Non-Microsoft browsers)
136
136
137
137
For more information, see [Govern apps discovered by Microsoft Defender for Endpoint](/cloud-app-security/mde-govern).
@@ -152,20 +152,20 @@ In the case where multiple different action types are set on the same indicator
152
152
153
153
### Defender for Cloud Apps Indicators
154
154
155
-
If your organization has enabled integration between Defender for Endpoint and Defender for Cloud Apps, block indicators will be created in Defender for Endpoint for all unsanctioned cloud applications. If an application is put in monitor mode, warn indicators (bypassable block) will be created for the URLs associated with the application. Allow indicators cannot be created for sanctioned applications at this time. Indicators created by Defender for Cloud Apps follow the same policy conflict handling described in the previous section.
155
+
If your organization has enabled integration between Defender for Endpoint and Defender for Cloud Apps, block indicators are created in Defender for Endpoint for all unsanctioned cloud applications. If an application is put in monitor mode, warn indicators (bypassable block) are created for the URLs associated with the application. Allow indicators can't be created for sanctioned applications at this time. Indicators created by Defender for Cloud Apps follow the same policy conflict handling described in the previous section.
156
156
157
157
## Policy precedence
158
158
159
159
Microsoft Defender for Endpoint policy has precedence over Microsoft Defender Antivirus policy. In situations when Defender for Endpoint is set to `Allow`, but Microsoft Defender Antivirus is set to `Block`, the policy defaults to `Allow`.
160
160
161
161
### Precedence for multiple active policies
162
162
163
-
Applying multiple different web content filtering policies to the same device will result in the more restrictive policy applying for each category. Consider the following scenario:
163
+
Applying multiple different web content filtering policies to the same device result in the more restrictive policy applying for each category. Consider the following scenario:
164
164
165
165
-**Policy 1** blocks categories 1 and 2 and audits the rest
166
166
-**Policy 2** blocks categories 3 and 4 and audits the rest
167
167
168
-
The result is that categories 1-4 are all blocked. This is illustrated in the following image.
168
+
The result is that categories 1-4 are all blocked. This scenario is illustrated in the following image.
169
169
170
170
:::image type="content" source="media/web-content-filtering-policies-mode-precedence.png" alt-text="Diagram that shows the precedence of web content filtering policy block mode over audit mode.":::
171
171
@@ -179,9 +179,9 @@ The result is that categories 1-4 are all blocked. This is illustrated in the fo
179
179
180
180
4. Specify the following details:
181
181
182
-
- Indicator - Specify the entity details and define the expiration of the indicator.
183
-
- Action - Specify the action to be taken and provide a description.
184
-
- Scope - Define the scope of the machine group.
182
+
-**Indicator**: Specify the entity details and define the expiration of the indicator.
183
+
-**Action**: Specify the action to be taken and provide a description.
184
+
-**Scope**: Define the scope of the machine group.
185
185
186
186
5. Review the details in the **Summary** tab, then select **Save**.
0 commit comments