Manage Defender for Endpoint IOCs

Use this operation to add or remove Indicators of Compromise (IOCs) for Defender for Endpoint.

Role Requirements

Procedure Scope: Administrators

Required Group Membership: Admin.Security

Handbook Reference

Package: Device Security

Domain: Endpoint Indicator Management

Modifies: Allowed File Hashes, Allowed URLs/Domains, Allowed IP Addresses, Allowed Certificates, Blocked File Hashes, Blocked URLs/Domains, Blocked IP                                                Addresses, Blocked Certificates

2024-12-17_9-49-52

When to Perform this Operation

As Needed: Proactive or in Response to User/Security

Technical Description and Importance

Managing IOCs in Defender for Endpoint ensures that security teams can proactively allow or block specific threats based on intelligence. By adding allowed IOCs, organizations can ensure that trusted entities are not falsely flagged as threats, while blocking IOCs prevents known malicious entities from executing or communicating within the environment. Regularly updating IOCs based on threat intelligence supports proactive threat management and minimizes false positives. This operation is essential for aligning security enforcement with evolving organizational needs and emerging threats.

Management Options

2024-12-17_10-15-21

Allow a Certificate:

Purpose
Adds a certificate to the allow list to prevent false positives.
Use Case
A legitimate software vendor's certificate is mistakenly flagged as malicious.

Allow a File:

Purpose
Adds a file hash to the allow list, ensuring it is not blocked.
Use Case
A business-critical application file is misclassified as a threat.

Allow an IP:

Purpose
Adds an IP address to the allow list to permit network communication.
Use Case
A company's remote office IP is mistakenly blocked.

Allow a URL/Domain:

Purpose
Adds a URL or domain to the allow list to enable access.
Use Case
A partner organization's website is erroneously blocked.

Block a Certificate:

Purpose
Blocks a certificate to prevent execution of signed malware.
Use Case
A compromised certificate is being used for code signing attacks.

Block a File:

Purpose
Blocks a file hash to prevent execution of malicious files.
Use Case
A known ransomware file hash must be proactively blocked.

Block an IP:

Purpose
Blocks an IP address to prevent network communication.
Use Case
A known command-and-control server must be blocked.

Block a URL/Domain:

Purpose
Blocks a URL or domain to prevent malicious web activity.
Use Case
A phishing website impersonating a trusted service needs to be blocked.

2024-12-17_10-15-21-1

Operation Action Target
Allow a Certificate Addition Allowed Certificates
Allow a File Hash Addition Allowed File Hashes
Allow an IP Addition Allowed IP Addresses
Allow a URL/Domain Addition Allowed URLs/Domains
Block a Certificate Removal Blocked Certificates
Block a File Hash Removal Blocked File Hashes
Block an IP Removal Blocked IP Addresses
Block a URL/Domain Removal Blocked URLs/Domains

Allow a Certificate

This operation adds a certificate to the allowed list, preventing it from being flagged as a threat.

      1. Defender for Endpoint Certificate IOC Allowance

Allow a File Hash

This operation adds a file hash to the allow list, ensuring it is not blocked.

      1. Defender for Endpoint File Hash IOC Allowance

Allow an IP

This operation adds an IP address to the allow list to enable network access.

      1. Defender for Endpoint IP IOC Allowance

Allow a URL/Domain

This operation adds a URL or domain to the allow list, allowing traffic.

      1. Defender for Endpoint URL/Domain IOC Allowance

Block a Certificate

This operation adds a certificate to the block list to prevent execution.

      1. Defender for Endpoint Certificate IOC Block

Block a File

This operation blocks a specific file hash from execution.

      1. Defender for Endpoint File Hash IOC Block

Block an IP

This operation blocks an IP address from communicating within the network.

      1. Defender for Endpoint IP IOC Block

Block a URL/Domain

This operation blocks a URL or domain from being accessed.

      1. Defender for Endpoint URL/Domain IOC Block

Need Assistance?

Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.