0% found this document useful (0 votes)
389 views7 pages

Create Indicators For IPs and URLs - Domains - Microsoft Defender For Endpoint Microsoft Learn

This document discusses how to create indicators for IPs, URLs, and domains in Microsoft Defender for Endpoint to allow or block access based on your own threat intelligence. It covers prerequisites, limitations, and how network protection determines whether to allow or block access after the TCP three-way handshake is complete.

Uploaded by

Ethan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
389 views7 pages

Create Indicators For IPs and URLs - Domains - Microsoft Defender For Endpoint Microsoft Learn

This document discusses how to create indicators for IPs, URLs, and domains in Microsoft Defender for Endpoint to allow or block access based on your own threat intelligence. It covers prerequisites, limitations, and how network protection determines whether to allow or block access after the TCP three-way handshake is complete.

Uploaded by

Ethan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...

Create indicators for IPs and URLs/


domains
Article • 04/24/2024

Applies to:

• Microsoft Defender for Endpoint Plan 1


• Microsoft Defender for Endpoint Plan 2
• Microsoft Defender XDR

 Tip

Want to experience Defender for Endpoint? Sign up for a free trial.

Overview
By creating indicators for IPs and URLs or domains, you can now allow or block IPs,
URLs, or domains based on your own threat intelligence. You can also warn users with
a prompt if they open a risky app. The prompt won't stop them from using the app but
you can provide a custom message and links to a company page that describes
appropriate usage of the app. Users can still bypass the warning and continue to use
the app if they need.

To block malicious IPs/URLs (as determined by Microsoft), Defender for Endpoint can
use:

• Windows Defender SmartScreen for Microsoft browsers


• Network Protection for non-Microsoft browsers, or calls made outside of a browser

The threat-intelligence data set to block malicious IPs/URLs is managed by Microsoft.

You can block malicious IPs/URLs through the settings page or by machine groups, if
you deem certain groups to be more or less at risk than others.

7 Note

1 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...

Classless Inter-Domain Routing (CIDR) notation for IP addresses is not supported.

Before you begin


It's important to understand the following prerequisites prior to creating indicators for
IPS, URLs, or domains:

Network Protection requirements


URL/IP allow and block requires that the Microsoft Defender for Endpoint component
Network Protection is enabled in block mode. For more information on Network
Protection and configuration instructions, see Enable network protection.

Supported operating systems


• Windows 10, version 1709 or later
• Windows 11
• Windows Server 2016
• Windows Server 2012 R2
• Windows Server 2019
• Windows Server 2022
• macOS
• Linux
• iOS
• Android

Windows Server 2016 and Windows Server 2012 R2


requirements
Windows Server 2016 and Windows Server 2012 R2 must be onboarded using the
instructions in Onboard Windows servers.

Microsoft Defender Antivirus version requirements


The Antimalware client version must be 4.18.1906.x or later.

2 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...

Custom network indicators requirements


Ensure that Custom network indicators is enabled in Microsoft Defender XDR >
Settings > Advanced features. For more information, see Advanced features.

For support of indicators on iOS, see Microsoft Defender for Endpoint on iOS.

For support of indicators on Android, see Microsoft Defender for Endpoint on Android.

IoC indicator list limitations


Only external IPs can be added to the indicator list. Indicators can't be created for
internal IPs. For web protection scenarios, we recommend using the built-in capabilities
in Microsoft Edge. Microsoft Edge leverages Network Protection to inspect network
traffic and allows blocks for TCP, HTTP, and HTTPS (TLS).

Non Microsoft Edge and Internet Explorer processes


For processes other than Microsoft Edge and Internet Explorer, web protection
scenarios leverage Network Protection for inspection and enforcement:

• IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS))
• Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom
indicators
• Encrypted URLs (full path) can only be blocked on first party browsers (Internet
Explorer, Edge)
• Encrypted URLs (FQDN only) can be blocked in third party browsers (that is, other
than Internet Explorer, Edge)
• Full URL path blocks can be applied for unencrypted URLs
• If there are conflicting URL indicator policies, the longer path is applied. For
example, the URL indicator policy https://support.microsoft.com/office takes
precedence over the URL indicator policy https://support.microsoft.com .

Network protection and the TCP three-way


handshake
With network protection, the determination of whether to allow or block access to a site

3 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...

is made after the completion of the three-way handshake via TCP/IP. Thus, when a site
is blocked by network protection, you might see an action type of ConnectionSuccess
under NetworkConnectionEvents in the Microsoft Defender portal, even though the site
was blocked. NetworkConnectionEvents are reported from the TCP layer, and not from
network protection. After the three-way handshake has completed, access to the site is
allowed or blocked by network protection.

Here's an example of how that works:

1. Suppose that a user attempts to access a website on their device. The site
happens to be hosted on a dangerous domain, and it should be blocked by
network protection.

2. The three-way handshake via TCP/IP commences. Before it completes, a


NetworkConnectionEvents action is logged, and its ActionType is listed as
ConnectionSuccess . However, as soon as the three-way handshake process
completes, network protection blocks access to the site. All of this happens
quickly. A similar process occurs with Microsoft Defender SmartScreen; it's when
the three-way handshake completes that a determination is made, and access to a
site is either blocked or allowed.

3. In the Microsoft Defender portal, an alert is listed in the alerts queue. Details of
that alert include both NetworkConnectionEvents and AlertEvents . You can see that
the site was blocked, even though you also have a NetworkConnectionEvents item
with the ActionType of ConnectionSuccess .

Warn mode controls


When using warn mode, you can configure the following controls:

• Bypass ability
◦ Allow button in Edge
◦ Allow button on toast (Non-Microsoft browsers)
◦ Bypass duration parameter on the indicator
◦ Bypass enforcement across Microsoft and Non-Microsoft browsers

• Redirect URL
◦ Redirect URL parameter on the indicator
◦ Redirect URL in Edge

4 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...

◦ Redirect URL on toast (Non-Microsoft browsers)

For more information, see Govern apps discovered by Microsoft Defender for Endpoint.

IoC IP URL and domain policy conflict


handling order
Policy conflict handling for domains/URLs/IP addresses differ from policy conflict
handling for certs.

In the case where multiple different action types are set on the same indicator (for
example, block, warn, and allow, action types set for Microsoft.com), the order those
action types would take effect is:

1. Allow
2. Warn
3. Block

Allow overrides warn which overrides block: Allow > Warn > Block. Therefore, in the
above example, Microsoft.com would be allowed.

Defender for Cloud Apps Indicators


If your organization has enabled integration between Defender for Endpoint and
Defender for Cloud Apps, block indicators will be created in Defender for Endpoint for all
unsanctioned cloud applications. If an application is put in monitor mode, warn
indicators (bypassable block) will be created for the URLs associated with the
application. Allow indicators cannot be created for sanctioned applications at this time.
Indicators created by Defender for Cloud Apps follow the same policy conflict handling
described in the previous section.

Policy precedence
Microsoft Defender for Endpoint policy has precedence over Microsoft Defender
Antivirus policy. In situations when Defender for Endpoint is set to Allow, but Microsoft
Defender Antivirus is set to Block, the policy will default to Allow.

5 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...

Precedence for multiple active policies


Applying multiple different web content filtering policies to the same device will result in
the more restrictive policy applying for each category. Consider the following scenario:

• Policy 1 blocks categories 1 and 2 and audits the rest


• Policy 2 blocks categories 3 and 4 and audits the rest

The result is that categories 1-4 are all blocked. This is illustrated in the following image.

Create an indicator for IPs, URLs, or domains


from the settings page
1. In the navigation pane, select Settings > Endpoints > Indicators (under Rules).

2. Select the IP addresses or URLs/Domains tab.

6 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...

3. Select Add item.

4. Specify the following details:

• Indicator - Specify the entity details and define the expiration of the indicator.
• Action - Specify the action to be taken and provide a description.
• Scope - Define the scope of the machine group.

5. Review the details in the Summary tab, then select Save.

7 Note

There may be up to 2 hours of latency between the time a policy is created and the
URL or IP being blocked on the device.

Related articles
• Create indicators
• Create indicators for files
• Create indicators based on certificates
• Manage indicators
• Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus

 Tip

Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender for Endpoint Tech Community .

Feedback
Was this page helpful?  Yes  No

Provide product feedback

7 of 7 5/27/2024, 11:59 PM

You might also like