Forum Discussion
MDE use of Certificate based IoC not working
I have been trying to use MDE IoC with certificates as per the following link: https://learn.microsoft.com/en-us/defender-endpoint/indicator-certificates#create-an-indicator-for-certificates-from-the-settings-page
This is on a demo tenant with full M365 E5 licenses and vulnerability trial enabled just in case. Test devices are:
- windows 11 with latest updates - domain joined and managed by Intune
- MDE onboarded and active with AV
- Network protection in block mode
- Cloud delivered protection enabled
- File hash enabled
- In defender portal - settings - endpoints advanced settings - all options enabled
I am testing with Firefox - the installer and the application .exe after installation.
I have extracted the leaf certificate from both these .exe's using the helpful information in the following link: https://www.linkedin.com/pulse/microsoft-defender-missing-manual-how-actually-create-adair-collins-paiye/
Then uploaded the certs into defender portal - settings - endpoints - IoC - certificates - set to Block and remediate
Issue:
Its been 24h and nothing happens on the client devices. In the defender portal - assets - devices - device timeline - I can see the firefox processes but at no point is the installer or application blocked.
Have I miss understood how the feature works?
Has anyone else managed to get this to work?
Advice appreciated.
Thanks
Warren
5 Replies
- Ankit365Iron Contributor
The certificate-based Indicator of Compromise (IoC) feature only applies when the Defender cloud protection service performs a reputation check. It is not evaluated by the local real-time scanning engine for every executable on disk. Microsoft’s own documentation states that certificate IoCs are primarily enforced during cloud-based lookups, such as when SmartScreen or the Defender cloud reputation service is triggered during file download or execution from supported Microsoft channels. This means the feature works reliably for files originating from Microsoft Edge, Outlook, or web downloads that go through those reputation checks, but not for files executed directly from disk or installed via third-party browsers like Firefox.
Tests performed in controlled environments confirm this behavior. Even when a certificate is uploaded and set to “Block and remediate,” local execution of a file already present on disk does not trigger a block event because the antivirus engine does not recheck the code signing certificate against the IoC list. Defender’s cloud protection telemetry does not currently cover those local scenarios. Microsoft has an open feature request (tracked internally under MDE feedback threads) to expand this functionality, but as of now, the enforcement scope remains limited to cloud-delivered protection paths rather than local scans. Please hit like if you like the solution.
- Warren212Copper Contributor
As per this link: https://learn.microsoft.com/en-us/defender-endpoint/indicator-certificates states:
- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Microsoft Defender Antivirus prevents file executions (block and remediate), and automated investigation and remediation behaves the same.
This MS statement does not align to what you mentioned above.
- Warren212Copper Contributor
Thanks for the info but unfortunately while testing with multiple applications, cert indicators seem to have no effect, even when downloading the apps via edge browser and relying on SmartScreen. I have run all the SmartScreen tests from the defender test ground to confirm SmartScreen is working. When using file hashe indicators it works.
- Moetaz_RabaiCopper Contributor
Hello, try to export the certificate with another method. Right-click firefox.exe → Properties → Digital Signatures → select Mozilla signature → Details → View Certificate → Copy to File from the wizard, choose Base64 Ensure it’s the leaf certificate (not a CA) before uploading to MDE for blocking.
- Warren212Copper Contributor
Thanks for the suggestion. Unfortunately while testing this with Firefox, Putty and Notepad++ using the cert export process above and adding as indicators - still no blocks happening, either when running the applications or subsequent downloads of the applications using the edge browser (hoping that SmartScreen might do something).
When I add these apps as file hashe indicators, within minutes they are blocked and removed from the machine.