Forum Discussion

Tali Ash's avatar
Tali Ash
Former Employee
Nov 12, 2018

Default exclusions in Suspicious communication over DNS SA

You asked, we listened!

 

Since releasing the Suspicious communication over DNS alert in preview mode, we’ve heard from many of you and worked to improve accuracy and reliability.

From today’s version (v2.54), 3 common domains customers were excluding are now excluded by default.

 

To change this configuration, go to the Exclusions page and add or remove as needed.

 

As always, we welcome your feedback, suggestions, and ideas about how to improve your Azure ATP experience.

 

Thanks,

Tali

8 Replies

  • What is the basis for adding those particular domains? They aren't "common" for us at all, so I removed them.

     

    Do you intend to add other domains in future? If so will we be notified somehow, e.g. via O365 Message Center?

    • Tali Ash's avatar
      Tali Ash
      Former Employee

      Hi Paul,

       

      These 3 domains are the most popular in organizations with Azure ATP, most of Suspicious communication over DNS alerts were opened on them. In addition we observed that these 3 are also the most popular domains customers excluded from this alert. All 3 domains are known domains which owned by known companies that send to the domains data regarding their applications.

       

      e5.sk - Eset

      sophosxl.net - Sophos

      spotify.com - Spotify

       

      Therefore we decided to exclude these 3 domains by default, which will help for a lot of customers from doing it by their own, and give an option to remove it for others.

       

      If we will see such similar need in the future to exclude more domains by default we will do it, and currently the communication channel is through the communities and it will also be updated in Azure ATP release notes.

       

      Thanks,

      Tali

       

       

       

       

      • Niv Dolgin's avatar
        Niv Dolgin
        Copper Contributor

        Tali Ash Is there complete documentation containing a list of all default domain names in Microsoft's exclusions?

        We're still generating the alert multi-times daily for excessive ('suspicious) sophosxl(.)net and e5(.)sk despite having modified the policy with our own exclusion. Our exclusions appear to be just be ignored by the policy.