Create Indicators For IPs and URLs - Domains - Microsoft Defender For Endpoint Microsoft Learn
Create Indicators For IPs and URLs - Domains - Microsoft Defender For Endpoint Microsoft Learn
Applies to:
Tip
Overview
By creating indicators for IPs and URLs or domains, you can now allow or block IPs,
URLs, or domains based on your own threat intelligence. You can also warn users with
a prompt if they open a risky app. The prompt won't stop them from using the app but
you can provide a custom message and links to a company page that describes
appropriate usage of the app. Users can still bypass the warning and continue to use
the app if they need.
To block malicious IPs/URLs (as determined by Microsoft), Defender for Endpoint can
use:
You can block malicious IPs/URLs through the settings page or by machine groups, if
you deem certain groups to be more or less at risk than others.
7 Note
1 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...
2 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...
For support of indicators on iOS, see Microsoft Defender for Endpoint on iOS.
For support of indicators on Android, see Microsoft Defender for Endpoint on Android.
• IP is supported for all three protocols (TCP, HTTP, and HTTPS (TLS))
• Only single IP addresses are supported (no CIDR blocks or IP ranges) in custom
indicators
• Encrypted URLs (full path) can only be blocked on first party browsers (Internet
Explorer, Edge)
• Encrypted URLs (FQDN only) can be blocked in third party browsers (that is, other
than Internet Explorer, Edge)
• Full URL path blocks can be applied for unencrypted URLs
• If there are conflicting URL indicator policies, the longer path is applied. For
example, the URL indicator policy https://support.microsoft.com/office takes
precedence over the URL indicator policy https://support.microsoft.com .
3 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...
is made after the completion of the three-way handshake via TCP/IP. Thus, when a site
is blocked by network protection, you might see an action type of ConnectionSuccess
under NetworkConnectionEvents in the Microsoft Defender portal, even though the site
was blocked. NetworkConnectionEvents are reported from the TCP layer, and not from
network protection. After the three-way handshake has completed, access to the site is
allowed or blocked by network protection.
1. Suppose that a user attempts to access a website on their device. The site
happens to be hosted on a dangerous domain, and it should be blocked by
network protection.
3. In the Microsoft Defender portal, an alert is listed in the alerts queue. Details of
that alert include both NetworkConnectionEvents and AlertEvents . You can see that
the site was blocked, even though you also have a NetworkConnectionEvents item
with the ActionType of ConnectionSuccess .
• Bypass ability
◦ Allow button in Edge
◦ Allow button on toast (Non-Microsoft browsers)
◦ Bypass duration parameter on the indicator
◦ Bypass enforcement across Microsoft and Non-Microsoft browsers
• Redirect URL
◦ Redirect URL parameter on the indicator
◦ Redirect URL in Edge
4 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...
For more information, see Govern apps discovered by Microsoft Defender for Endpoint.
In the case where multiple different action types are set on the same indicator (for
example, block, warn, and allow, action types set for Microsoft.com), the order those
action types would take effect is:
1. Allow
2. Warn
3. Block
Allow overrides warn which overrides block: Allow > Warn > Block. Therefore, in the
above example, Microsoft.com would be allowed.
Policy precedence
Microsoft Defender for Endpoint policy has precedence over Microsoft Defender
Antivirus policy. In situations when Defender for Endpoint is set to Allow, but Microsoft
Defender Antivirus is set to Block, the policy will default to Allow.
5 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...
The result is that categories 1-4 are all blocked. This is illustrated in the following image.
6 of 7 5/27/2024, 11:59 PM
Create indicators for IPs and URLs/domains - Microsoft Defender for ... https://learn.microsoft.com/en-us/defender-endpoint/indicator-ip-domai...
• Indicator - Specify the entity details and define the expiration of the indicator.
• Action - Specify the action to be taken and provide a description.
• Scope - Define the scope of the machine group.
7 Note
There may be up to 2 hours of latency between the time a policy is created and the
URL or IP being blocked on the device.
Related articles
• Create indicators
• Create indicators for files
• Create indicators based on certificates
• Manage indicators
• Exclusions for Microsoft Defender for Endpoint and Microsoft Defender Antivirus
Tip
Do you want to learn more? Engage with the Microsoft Security community in our
Tech Community: Microsoft Defender for Endpoint Tech Community .
Feedback
Was this page helpful? Yes No
7 of 7 5/27/2024, 11:59 PM