Blog Post

Microsoft Defender for Endpoint Blog
1 MIN READ

How behavioral blocking & containment stops post-exploitation tools like BloodHound, Kerberoasting

Eric Avena's avatar
Eric Avena
Icon for Microsoft rankMicrosoft
Aug 28, 2020

Behavioral blocking and containment capabilities in Microsoft Defender Advanced Threat Protection (ATP) use protection engines that specialize in detecting and stopping threats by analyzing behavior. One of these engines leverages insights from Antimalware Scan Interface (AMSI), which has visibility into script content and behavior, and pairs of machine learning models on the client and in the cloud working together to detect and stop malicious scripts post-execution.   

 

 

These pairs of AMSI-powered machine learning classifiers, one pair for each scripting engine, allow Microsoft Defender ATP to detect malicious behavior and stop post-exploitation techniques and other script-based attacks, such as BloodHound and Kerberoasting attacks.

 

To learn more, read our latest blog post: Stopping Active Directory attacks and other post-exploitation behavior with AMSI and machine learning.

Updated Aug 28, 2020
Version 4.0

1 Comment

  • MichaelG666's avatar
    MichaelG666
    Brass Contributor

    The following script https://gist.github.com/Hestat/59b86df6ced15021eb3080338959969d when run as a regular user disables AMSI completely and any malicious PowerShell commands that are subsequently run in the same PowerShell ISE session are no longer blocked by Defender and are allowed to run. Any idea how to fix this, Eric Avena ?

    Thanks a lot.