Blog Post

Microsoft Defender for Endpoint Blog
3 MIN READ

Public Preview: Custom file IoC enhancements and API schema update

Jody_Cedola's avatar
Jody_Cedola
Icon for Microsoft rankMicrosoft
Aug 23, 2021

Alerts are now optional for the file custom IoC “block and remediate” action. Additionally, the IoC API scheme and portal description was updated to more accurately describe whether the response action taken was a block or “block and remediate”.

 

Up until now, every blocked and remediate file IoC event raised security alerts to the SOC (security operations center) team. However, some organizations were flooded with unwanted security alerts.  Today we’re announcing a public preview that allows customers to determine if such events require security team awareness, and if they do, the ability to set specific parameters to be met in order for an alert to be raised. In addition, we are updating the IoC API schema and description shown in the portal to more accurately describe whether the response action taken was a block or “block and remediate”.

 

Updated list of available IoC actions

When creating a new indicator (IoC), one or more of the following actions are now available:

  • Allow – the IoC will be allowed to run on your devices.
  • Audit – an alert will be triggered when the IoC runs.
  • Block execution - the IoC will not be allowed to run.
  • Block and remediate - the IoC will not be allowed to run and a remediation action will be applied to the IoC.

More specifically, the table below shows exactly which actions are available per indicator (IoC) type:

IoC type

Available actions

File

·       Allow

·       Audit

·       Block and remediate

IP address

·       Allow

·       Audit

·       Block execution

URL\ domain

·       Allow

·       Audit

·       Block execution

Certificate

·       Allow

·       Block and remediate

 

For example, the original three IoC response actions were “allow,” “alert only,” and “alert and block.” As part of the update, the functionality of pre-existing IoCs will not change. However, the indicators were renamed to match the current supported response actions:  

  • The “alert only” response action was renamed to “audit” with the generate alert setting enabled. 
  • The “alert and block” response was renamed to “block and remediate” with the optional generate alert setting

The IoC API schema and the threat ids in advance hunting have been updated to align with the renaming of the IoC response actions. The API scheme changes apply to all IoC Types.

 

Indicators can be imported through Microsoft Defender for Endpoint APIs: List Indicators API | Microsoft Docs. The indicator action types supported by the API are AlertAndBlock, Allow, Audit, Alert, Warn, BlockExecution, BlockRemediation.

 

Note: The prior response actions (AlertAndBlock, and Alert) will be removed once the feature has reached GAed. The estimated GA date with grace period is end of October 2021.  We advise updating any existing templates or scripts as soon as possible.

 

Note: The format for importing new indicators (IoCs) has changed according to the new updated actions and alerts settings. We recommend downloading the new CSV format that is found at the bottom of the import panel. 

 

 

 

Alerting on file blocking actions

 

In Microsoft 365 Defender, go to Settings > Endpoints > Indicators > add new File hash

Choose to Block and remediate the file

Choose if to Generate an alert on the file block event and define the alerts settings:

  • The alert title
  • The alert severity
  • Category
  • Description
  • Recommended actions

Alert settings for file indicators

 

For more information about custom indicators handling in Microsoft Defender for Endpoint, see (Create indicators).

 

Summary

We’re excited to hear your feedback as you explore the new IoC capabilities, and we will continue to update the documentation throughout the preview.

 

If you’ve enabled public preview features, you can check out the new IoC functionality today! If not, we encourage you to turn on preview features for Microsoft Defender for Endpoint to get access to the newest capabilities. These features can be turned on in the Microsoft Defender Security Center or the Microsoft 365 security center.

 

Resources for using IoCs: 

 

Microsoft Defender for Endpoint is an industry leading, cloud powered endpoint security solution offering endpoint protection, endpoint detection and response, vulnerability management, and mobile threat defense. With our solution, threats are no match. If you are not yet taking advantage of Microsoft’s unrivaled threat optics and proven capabilities, sign up for a free Microsoft Defender for Endpoint trial today.   

Updated Aug 24, 2021
Version 3.0
  • Awesome feature team!

    Can we have Block execution option only without having 'Alerts' for URL's/IP's.  The option 'Generate Alert' is greyed out for now and is in enabled state by default.

     

     

  • richardjav1090's avatar
    richardjav1090
    Copper Contributor

    Can you bring this "Block execution - the IoC will not be allowed to run" to "Files" indicator.

     

    Also can you make so ComputeFileHash only occurs on the system/physically connected rives instead of scanning "network or map drive shares"?