Use this operation to add Indicator of Compromise (IOC) blocks for files, certificates, IPs, and URLs/domains.
Role Requirements
Procedure Scope: Administrators
Required Group Membership: Admin.Security
Handbook Reference
Package: Device Security
Domain: TBD
Modifies: TBD
When to Perform this Operation
As Needed: Proactive or in Response to User/Security
Technical Description and Importance
Managing IOCs in Microsoft Defender for Endpoint enables precise control over potential threats by blocking specific files, certificates, IP addresses, and URLs/domains identified as malicious. This helps mitigate risks associated with known threats while maintaining system integrity and compliance with organizational security policies. By routinely updating and monitoring these blocks, businesses can reduce exposure to malicious activities and ensure that unauthorized access or data exfiltration attempts are minimized. Proactive IOC management empowers security teams to respond swiftly to emerging threats and maintain a robust defense posture.
Management Options
Block a Certificate:
Purpose
Add a certificate to the unsanctioned list to prevent its use.
Use Case
A certificate is identified as being used in phishing campaigns and must be blocked across endpoints.
Block a File:
Purpose
Add a file hash to the unsanctioned list to prevent execution.
Use Case
A malicious executable detected in the environment must be blocked to avoid further spread.
Block an IP:
Purpose
Add an IP address to the unsanctioned list to prevent communication.
Use Case
A command-and-control (C2) server IP is discovered and must be blocked to stop active threat activity.
Block a URL/Domain:
Purpose
Add a URL or domain to the unsanctioned list to prevent access.
Use Case
A malicious domain is identified in phishing attempts and must be blocked to avoid data exfiltration.
Operation | Action | Target |
Block a Certificate | Addition | Unsanctioned Certificates |
Block a File Hash | Addition | Unsanctioned File Hashes |
Block an IP | Addition | Unsanctioned IP Addresses |
Block a URL/Domain | Addition | Unsanctioned URLs/Domains |
Block a Certificate
This operation adds a certificate to the unsanctioned list in Defender for Endpoint.
Defender for Endpoint Certificate IOC Block
Block a File
This operation adds a file hash to the unsanctioned list in Defender for Endpoint.
Defender for Endpoint File Hash IOC Block
Block an IP
This operation adds an IP address to the unsanctioned list in Defender for Endpoint.
Defender for Endpoint IP IOC Block
Block a URL/Domain
This operation adds a URL or domain to the unsanctioned list in Defender for Endpoint.
Defender for Endpoint URL/Domain IOC Block
Need Assistance?
Reach out to your Customer Success Manager to discuss how a Sittadel cybersecurity analyst can assist in managing these tasks for you. New to our services? Inquire about arranging a consultation to explore optimizing your Azure environment for painless management.