Home
%3CLINGO-SUB%20id%3D%22lingo-sub-847007%22%20slang%3D%22en-US%22%3EMicrosoft%20Defender%20ATP%20supports%20custom%20IOCs%20for%20URLs%2C%20IP%20addresses%2C%20and%20domains%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-847007%22%20slang%3D%22en-US%22%3E%3CP%3EMicrosoft%20Defender%20Advanced%20Threat%20Protection%20(ATP)%20provides%20a%20variety%20of%20tools%20to%20protect%20you%20from%20phishing%20or%20malicious%20sites.%20There%E2%80%99s%20Microsoft%20Defender%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-smartscreen%2Fwindows-defender-smartscreen-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESmartScreen%3C%2FA%3Efor%20Microsoft%20Edge%2C%20and%20Microsoft%20Defender%20ATP%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fsecurity%2Fthreat-protection%2Fwindows-defender-exploit-guard%2Fnetwork-protection-exploit-guard%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Enetwork%20protection%26nbsp%3B%3C%2FA%3E%3C%2FSPAN%3Efor%20other%20browsers%20and%20HTTP%20or%20HTTPS%20calls%20outside%20of%20the%20browser.%26nbsp%3BEven%20with%20this%20high-quality%20protection%2C%20Microsoft%20recognizes%20that%20security%20operations%20teams%20need%20to%20tailor%20web%20and%20internet%20protection%20based%20on%20the%20needs%20of%20the%20organization.%20You%20can%20now%20do%20so%20straight%20from%20the%20Microsoft%20Defender%20Security%20Center%20console.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20new%20feature%2C%20now%20in%20public%20preview%2C%20leverages%20network%20protection%20in%20block%20mode%20and%20the%20latest%20version%20of%20the%20antimalware%20platform.%20We%20recommend%20that%20organizations%20enable%20network%20protectionin%20audit%20mode%20first%2C%20and%20then%20move%20to%20block%20mode.%20Your%20organization%20may%20be%20using%20different%20methods%20to%20update%20the%20antimalware%20platform%2C%20which%20may%20cause%20some%20of%20your%20client%20machines%20to%20be%20on%20different%20versions%20of%20the%20platform.%20We%20recommend%20that%20you%20update%20all%20your%20machinesto%20use%20this%20functionality.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ENow%20that%20we%20have%20the%20prerequisites%20out%20of%20the%20way%2C%20let%E2%80%99s%20talk%20about%20why%20an%20organization%20may%20need%20to%20do%20this.%20First%2C%20malicious%20actors%20use%20highly%20tuned%20social%20engineering%20techniques%2C%20where%20a%20phishing%20URL%20or%20IP%20address%20may%20only%20be%20served%20to%20a%20very%20small%20set%20of%20enterprise%20users.%20As%20a%20result%2C%20hunters%20in%20a%20security%20operations%20groups%20may%20find%20malicious%20URLs%20before%20Microsoft%20and%20thus%20need%20fast%20tools%20for%20shutting%20them%20down%20in%20their%20organization.%20Second%2C%20organizations%20would%20often%20buy%20threat%20intelligence%20feeds%20with%20malicious%20URLs%20and%20want%20to%20use%20them%20to%20augment%20Microsoft%E2%80%99s%20threat%20intelligence.%20Last%2C%20there%20are%20times%20when%20Microsoft%E2%80%99s%20intelligence%20and%20machine%20learning%20may%20make%20a%20malicious%20verdict%20for%20an%20internet%20indicator%20that%20can%20impact%20the%20productivity%20of%20a%20small%20set%20within%20the%20organization%2C%20such%20as%20a%20security%20research%20team.%20Security%20operations%20groups%20will%20then%20want%20to%20allow%20these%20indicators%2C%20so%20their%20users%20can%20access%20them.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%226%22%3EGetting%20Started%26nbsp%3B%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3ELet%E2%80%99s%20get%20started.%20To%20review%20the%20URLs%2C%20IP%20addresses%2C%20and%20domains%20in%20the%20allow%20or%20block%20list%2C%20follow%20these%20steps%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E1.%20Sign%20into%20Microsoft%20Defender%20Security%20Center%20and%20go%20to%20%3CSTRONG%3ESettings%20%3C%2FSTRONG%3E%26gt%3B%20%3CSTRONG%3ERules%20%3C%2FSTRONG%3E%26gt%3B%20%3CSTRONG%3EIndicators%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20708px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F130967i8A50158DB3403225%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22screen1_menu.png%22%20title%3D%22screen1_menu.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E2.%20Select%20the%20%3CSTRONG%3EIP%20addresses%3C%2FSTRONG%3Etab%20to%20view%20a%20list%20of%20IPs%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20709px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F130968i95D711248F4B7564%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22screen2_ipaddresses.png%22%20title%3D%22screen2_ipaddresses.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E3.%20Select%20%3CSTRONG%3EURLs%2FDomains%3C%2FSTRONG%3Eto%20view%20the%20list%20of%20URLs%20and%20domains%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20709px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F130969i3B10C0D446EAC767%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22screen3_urls.png%22%20title%3D%22screen3_urls.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20add%20a%20URL%2C%20IP%20address%2C%20or%20domain%20to%20the%20block%20or%20allow%20list%2C%20follow%20these%20steps%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E1.%20From%20the%20%3CSTRONG%3EIndicators%20%3C%2FSTRONG%3Esetting%2C%20navigate%20to%20either%20the%20%3CSTRONG%3EIP%20Addresses%20%3C%2FSTRONG%3Eor%3CSTRONG%3EURLs%2FDomains%20%3C%2FSTRONG%3Etab%3C%2FP%3E%0A%3CP%3E2.%20Select%20%3CSTRONG%3EAdd%20Indicator%3C%2FSTRONG%3Efrom%20the%20action%20bar%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20708px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F130972i9378467C5DE13343%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22screen4_flyout.png%22%20title%3D%22screen4_flyout.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E3.%20Enter%20the%20URL%20or%20IP%20address%2C%20and%20select%3CSTRONG%3ENext%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20674px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F130974i22E766B56844B17A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22screen5_policy.png%22%20title%3D%22screen5_policy.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E4.%20Choose%20from%20the%20following%20actions%2C%20enter%20a%20title%20and%20description%20for%20the%20indicator%2C%20and%20select%20%3CSTRONG%3ENext%3C%2FSTRONG%3E%3A%3C%2FP%3E%0A%3COL%20style%3D%22list-style-type%3A%20lower-alpha%3B%22%3E%0A%3CLI%3E%3CSTRONG%3EAllow%20%3C%2FSTRONG%3E%E2%80%93Allow%20the%20URL%20or%20IP%20in%20the%20organization%2C%20regardless%20of%20Microsoft%20determination%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EAlert%20only%3C%2FSTRONG%3E%E2%80%93%20Allow%20users%20to%20access%20the%20indicator%2C%20but%20raise%20an%20alert%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EAlert%20and%20block%3C%2FSTRONG%3E%E2%80%93%20Block%20users%20or%20processes%20from%20accessing%20the%20URL%20or%20IP%20address%2C%20and%20raise%20an%20alert%3B%20show%20block%20notification%20to%20user%20with%20message%20to%20contact%20IT%20department%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EWarn%20%3C%2FSTRONG%3E%E2%80%93%20Notify%20users%20when%20they%E2%80%99re%20accessing%20an%20untrusted%20URL%20or%20UP%20address%2C%20but%20allow%20users%20to%20dismiss%20the%20warning%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20674px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F130976iC281F7D3091830E3%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22screen5_policy.png%22%20title%3D%22screen5_policy.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E5.%20Select%20either%20%3CSTRONG%3EAll%20machines%20in%20scope%3C%2FSTRONG%3Eor%20%3CSTRONG%3ESelect%20from%20list%3C%2FSTRONG%3E%2C%20which%20allows%20you%20to%20target%20a%20specific%20machine%20group%2C%20and%20select%20%3CSTRONG%3ENext%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20702px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F130977i09173043365612EF%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22screen6_scope.png%22%20title%3D%22screen6_scope.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E6.%20Select%20%3CSTRONG%3ESave%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETo%20remove%20a%20URL%20or%20IP%20from%20the%20block%20or%20allow%20list%3C%2FP%3E%0A%3CP%3E1.%20From%20either%20the%20%3CSTRONG%3EIP%20Addresses%20%3C%2FSTRONG%3Eor%3CSTRONG%3EURLs%2FDomains%20%3C%2FSTRONG%3Etab%2C%20select%20the%20indicator%20you%20want%20to%20delete%3C%2FP%3E%0A%3CP%3E2.%20Select%20%3CSTRONG%3EDelete%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20style%3D%22width%3A%20703px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F130978i00A8B88A48F5272E%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20alt%3D%22scrren7_remove.png%22%20title%3D%22scrren7_remove.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20views%20this%20capability%20as%20a%20good%20way%20to%20tune%20your%20current%20web%20protection%20capabilities.%20It%E2%80%99s%20also%20worth%20emphasizing%20that%20these%20settings%20are%20communicated%20between%20the%20client%20and%20Microsoft%E2%80%99s%20cloud%2C%20so%20it%20will%20be%20in%20place%20wherever%20the%20device%20travels%20%E2%80%93%20in%20distributed%20offices%2C%20at%20airports%2C%20or%20at%20the%20local%20coffee%20shop.%26nbsp%3BWe%20will%20continue%20to%20iterate%20here%20to%20bring%20Security%20Operations%20more%20customization%20of%20indicators%20to%20protect%20their%20organizations.%20We%20welcome%20and%20appreciate%20your%20feedback.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-847007%22%20slang%3D%22en-US%22%3E%3CP%3ENow%20in%20public%20preview%3C%2FP%3E%3C%2FLINGO-TEASER%3E
Microsoft

Microsoft Defender Advanced Threat Protection (ATP) provides a variety of tools to protect you from phishing or malicious sites. There’s Microsoft Defender SmartScreen for Microsoft Edge, and Microsoft Defender ATP network protection for other browsers and HTTP or HTTPS calls outside of the browser. Even with this high-quality protection, Microsoft recognizes that security operations teams need to tailor web and internet protection based on the needs of the organization. You can now do so straight from the Microsoft Defender Security Center console.

 

This new feature, now in public preview, leverages network protection in block mode and the latest version of the antimalware platform. We recommend that organizations enable network protection in audit mode first, and then move to block mode. Your organization may be using different methods to update the antimalware platform, which may cause some of your client machines to be on different versions of the platform. We recommend that you update all your machines to use this functionality.

 

Now that we have the prerequisites out of the way, let’s talk about why an organization may need to do this. First, malicious actors use highly tuned social engineering techniques, where a phishing URL or IP address may only be served to a very small set of enterprise users. As a result, hunters in a security operations groups may find malicious URLs before Microsoft and thus need fast tools for shutting them down in their organization. Second, organizations would often buy threat intelligence feeds with malicious URLs and want to use them to augment Microsoft’s threat intelligence. Last, there are times when Microsoft’s intelligence and machine learning may make a malicious verdict for an internet indicator that can impact the productivity of a small set within the organization, such as a security research team. Security operations groups will then want to allow these indicators, so their users can access them.

 

Getting Started 

Let’s get started. To review the URLs, IP addresses, and domains in the allow or block list, follow these steps:

 

1. Sign into Microsoft Defender Security Center and go to Settings > Rules > Indicators

 

screen1_menu.png

 

2. Select the IP addresses tab to view a list of IPs

 

screen2_ipaddresses.png

 

3. Select URLs/Domains to view the list of URLs and domains

 

screen3_urls.png

 

To add a URL, IP address, or domain to the block or allow list, follow these steps:

 

1. From the Indicators setting, navigate to either the IP Addresses or URLs/Domains tab

2. Select Add Indicator from the action bar

screen4_flyout.png

 

3. Enter the URL or IP address, and select Next

screen5_policy.png

4. Choose from the following actions, enter a title and description for the indicator, and select Next:

  1. Allow –Allow the URL or IP in the organization, regardless of Microsoft determination
  2. Alert only – Allow users to access the indicator, but raise an alert
  3. Alert and block – Block users or processes from accessing the URL or IP address, and raise an alert; show block notification to user with message to contact IT department
  4. Warn – Notify users when they’re accessing an untrusted URL or UP address, but allow users to dismiss the warning

screen5_policy.png

5. Select either All machines in scope or Select from list, which allows you to target a specific machine group, and select Next

 

screen6_scope.png

 

6. Select Save

 

To remove a URL or IP from the block or allow list

1. From either the IP Addresses or URLs/Domains tab, select the indicator you want to delete

2. Select Delete

 

scrren7_remove.png

 

Microsoft views this capability as a good way to tune your current web protection capabilities. It’s also worth emphasizing that these settings are communicated between the client and Microsoft’s cloud, so it will be in place wherever the device travels – in distributed offices, at airports, or at the local coffee shop. We will continue to iterate here to bring Security Operations more customization of indicators to protect their organizations. We welcome and appreciate your feedback.