Skip to content

Commit cdf6d91

Browse files
authored
Merge branch 'public' into patch-2
2 parents 672b7f1 + 0834087 commit cdf6d91

File tree

5 files changed

+93
-106
lines changed

5 files changed

+93
-106
lines changed

defender-endpoint/configure-endpoints-gp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Onboard Windows devices to Microsoft Defender for Endpoint via Group Policy
2+
title: Onboard Windows Servers to Microsoft Defender for Endpoint via Group Policy
33
description: Use Group Policy to deploy the configuration package on Windows devices so that they are onboarded to the service.
44
ms.service: defender-endpoint
55
ms.author: deniseb

defender-endpoint/configure-endpoints-script.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Onboard Windows devices using a local script
2+
title: Onboard Windows Servers using a local script
33
description: Use a local script to deploy the configuration package on devices to enable onboarding of the devices to the service.
44
search.appverid: met150
55
ms.service: defender-endpoint

defender-endpoint/indicators-overview.md

Lines changed: 21 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: diannegali
66
author: diannegali
77
ms.localizationpriority: medium
88
manager: deniseb
9-
ms.reviewer:
9+
ms.reviewer: ericlaw
1010
audience: ITPro
1111
ms.collection:
1212
- m365-security
@@ -15,7 +15,7 @@ ms.collection:
1515
ms.topic: conceptual
1616
ms.subservice: edr
1717
search.appverid: met150
18-
ms.date: 04/03/2025
18+
ms.date: 04/08/2025
1919
---
2020

2121
# Overview of indicators in Microsoft Defender for Endpoint
@@ -30,7 +30,7 @@ ms.date: 04/03/2025
3030

3131
## Indicator of compromise (IoC) overview
3232

33-
An Indicator of compromise (IoC) is a forensic artifact, observed on the network or host. An IoC indicates--with high confidence--that a computer or network intrusion has occurred. IoCs are observable, which links them directly to measurable events. Some IoC examples include:
33+
An Indicator of compromise (IoC) is a forensic artifact observed on the network or host. An IoC indicates--with high confidence--that a computer or network intrusion has occurred. IoCs are observable, which links them directly to measurable events. Some IoC examples include:
3434

3535
- hashes of known malware
3636
- signatures of malicious network traffic
@@ -48,17 +48,19 @@ This video shows a walkthrough of creating and adding indicators:
4848

4949
As a general rule, you should only create indicators for known bad IoCs, or for any files / websites that should be explicitly allowed in your organization. For more information on the types of sites that Defender for Endpoint can block by default, see [Microsoft Defender SmartScreen overview](/windows/security/threat-protection/microsoft-defender-smartscreen/microsoft-defender-smartscreen-overview).
5050

51-
A false positive (FP) refers to a SmartScreen false positive. It's considered to be malware or phish, but actually isn't a threat, so you might want to create an allow policy for it.
51+
A false positive (FP) refers to a false positive in Microsoft's threat intelligence. If a given resource is not actually a threat, you can create an Allow IoC to allow the resource. You can also help drive improvements to Microsoft's security intelligence by submitting false positives, and suspicious or known-bad IoCs for analysis. If a warning or block is incorrectly shown for a file or application, or if you suspect an undetected file is malware, you can submit a file to Microsoft for review. For more information, see [Submit files for analysis](https://www.microsoft.com/en-us/wdsi/filesubmission/).
5252

53-
You can also help drive improvements to Microsoft's security intelligence by submitting false positives, and suspicious or known-bad IoCs for analysis. If a warning or block is incorrectly shown for a file or application, or if you suspect an undetected file is malware, you can submit a file to Microsoft for review. For more information, see [Submit files for analysis](https://www.microsoft.com/en-us/wdsi/filesubmission/).
53+
#### IP/URL/Domain indicators
5454

55-
#### IP/URL indicators
55+
You can use IP and URL/Domain indicators to manage site access.
5656

57-
You can use IP/URL indicators to unblock users from a SmartScreen false positive (FP) or to override a Web Content Filtering (WFC) block.
57+
To block connections to an IP address, type the IPv4 address in dotted-quad form (e.g. `8.8.8.8`). For IPv6 addresses, specify all 8 segments (e.g. `2001:4860:4860:0:0:0:0:8888`). Note that wildcards and ranges are not supported.
5858

59-
You can use URL and IP indicators to manage site access. You can create interim IP and URL indicators to temporarily unblock users from a SmartScreen block. You might also have indicators that you keep for a long period of time to selectively bypass web content filtering blocks.
59+
To block connections to a domain and any of its subdomains, specify the domain (e.g. `example.com`). This indicator will match `example.com` as well as `sub.example.com` and `anything.sub.example.com`.
6060

61-
Consider the case where you have a web content filtering categorization for a particular site that is correct. In this example, you have web content filtering set to block all social media, which is correct for your overall organizational goals. However, the marketing team has a real need to use a specific social media site for advertising and announcements. In that case, you can unblock the specific social media site using IP or URL indicators for the specific group (or groups) to use.
61+
To block a specific URL path, specify the URL path (e.g. `https://example.com/block`). This indicator will match resources under the `/block` path on `example.com`. Note that HTTPS URL paths will only be matched in Microsoft Edge; HTTP URL paths can be matched in any browser.
62+
63+
You can also create IP and URL indicators to unblock users from a SmartScreen block or selectively bypass web content filtering blocks of sites that you'd like to allow to load. For example, consider a case where you have web content filtering set to block all social media websites. However, the marketing team has a requirement to use a specific social media site to monitor their ad placements. In this case, you can unblock the specific social media site by creating a domain Allow indicator and assigning it to the marketing team's device group.
6264

6365
See [Web protection](web-protection-overview.md) and [Web content filtering](web-content-filtering.md)
6466

@@ -84,7 +86,7 @@ Because each version of an application has a different file hash, using indicato
8486

8587
#### Certificate indicators
8688

87-
In some cases, a specific certificate that's used to sign a file or application that your organization is set to allow or block. Certificate indicators are supported in Defender for Endpoint, if they use the .CER or .PEM file format. See [Create indicators based on certificates](indicator-certificates.md) for more details.
89+
You may create an IoC to allow or block files and applications signed by that certificate. Certificate indicators can be supplied in the .CER or .PEM file format. See [Create indicators based on certificates](indicator-certificates.md) for more details.
8890

8991
## IoC detection engines
9092

@@ -100,13 +102,13 @@ The cloud detection engine of Defender for Endpoint regularly scans collected da
100102

101103
## Endpoint prevention engine
102104

103-
The same list of indicators is honored by the prevention agent. Meaning, if Microsoft Defender Antivirus is the primary antivirus configured, the matched indicators are treated according to the settings. For example, if the action is *Alert and Block*, Microsoft Defender Antivirus prevents file executions (block and remediate) and a corresponding alert appears. On the other hand, if the Action is set to *Allow*, Microsoft Defender Antivirus doesn't detect or block the file.
105+
The same list of indicators is honored by the prevention agent. Meaning, if Microsoft Defender Antivirus is the primary antivirus configured, the matched indicators are treated according to the settings. For example, if the action is *block and remediate*, Microsoft Defender Antivirus prevents file executions and a corresponding alert appears. On the other hand, if the Action is set to *Allow*, Microsoft Defender Antivirus doesn't detect or block the file.
104106

105107
## Automated investigation and remediation engine
106108

107109
The automated investigation and remediation behave similarly to the endpoint prevention engine. If an indicator is set to *Allow*, automated investigation and remediation ignores a *bad* verdict for it. If set to *Block*, automated investigation and remediation treats it as *bad*.
108110

109-
The `EnableFileHashComputation` setting computes the file hash for the cert and file IoC during file scans. It supports IoC enforcement of hashes and certs belong to trusted applications. It's concurrently enabled with the allow or block file setting. `EnableFileHashComputation` is enabled manually through Group Policy, and is disabled by default.
111+
The `EnableFileHashComputation` setting computes the file hash during file scans. It supports IoC enforcement against hashes belonging to trusted applications. It's concurrently enabled with the allow or block file setting. `EnableFileHashComputation` is enabled manually through Group Policy, and is disabled by default.
110112

111113
## Enforcement types for Indicators
112114

@@ -128,7 +130,7 @@ You can create an indicator for:
128130
- [URLs/domains](indicator-ip-domain.md)
129131
- [Certificates](indicator-certificates.md)
130132

131-
The table below shows exactly which actions are available per indicator (IoC) type:
133+
The table below shows which actions are available per indicator (IoC) type:
132134

133135
| IoC type | Available actions |
134136
|:---|:---|
@@ -137,12 +139,12 @@ The table below shows exactly which actions are available per indicator (IoC) ty
137139
| [URLs and domains](indicator-ip-domain.md) | Allow <br> Audit <br> Warn <br> Block execution |
138140
| [Certificates](indicator-certificates.md) | Allow <br> Block and remediate |
139141

140-
The functionality of preexisting IoCs doesn't change. However, the indicators are renamed to match the current supported response actions:
142+
The functionality of preexisting IoCs doesn't change. However, the indicators are renamed to match the currently-supported response actions:
141143

142144
- The *alert only* response action was renamed to *audit* with the generated alert setting enabled.
143145
- The *alert and block* response was renamed to *block and remediate* with the optional generate alert setting.
144146

145-
The IoC API schema and the threat IDs in advance hunting are updated to align with the renaming of the IoC response actions. The API scheme changes apply to all IoC Types.
147+
The IoC API schema and the threat IDs in Advanced Hunting are updated to align with the renaming of the IoC response actions. The API scheme changes apply to all IoC Types.
146148

147149
> [!NOTE]
148150
> There is a limit of 15,000 indicators per tenant. Increases to this limit are not supported.
@@ -155,16 +157,16 @@ The IoC API schema and the threat IDs in advance hunting are updated to align wi
155157
156158
## Known issues and limitations
157159

158-
Customers might experience issues with alerts for Indicators of Compromise. The following scenarios are situations where alerts aren't created or are created with inaccurate information. Each issue is investigated by our engineering team.
160+
Microsoft Store apps cannot be blocked by Microsoft Defender because they're signed by Microsoft.
161+
162+
Customers might experience issues with alerts for IoCs. The following scenarios are situations where alerts aren't created or are created with inaccurate information. Each issue is investigated by our engineering team.
159163

160164
- **Block indicators**: Generic alerts with informational severity only are created. Custom alerts (that is, custom title and severity) aren't fired in these cases.
161165
- **Warn indicators**: Generic alerts and custom alerts are possible in this scenario; however, the results aren't deterministic due to an issue with the alert detection logic. In some cases, customers might see a generic alert, whereas a custom alert might show in other cases.
162166
- **Allow**: No alerts are generated (by design).
163-
- **Audit**: Alerts are generated based on the severity provided by the customer.
167+
- **Audit**: Alerts are generated based on the severity provided by the customer (by design).
164168
- In some cases, alerts coming from EDR detections might take precedence over alerts stemming from antivirus blocks, in which case an information alert is generated.
165169

166-
Microsoft Store apps cannot be blocked by Microsoft Defender because they're signed by Microsoft.
167-
168170
## Related articles
169171

170172
- [Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus](defender-endpoint-antivirus-exclusions.md)

0 commit comments

Comments
 (0)