Process: Adding an IoC to 365 Defender
Adding an IoC to 365 Defender
If an IoC (Indicator of Compromise) has been found and needs to be either monitored or blocked in our estate you can block it in 365 Defender. IoCs that can be added are the following:
- File Hashes (SHA1, SHA265)
- IP Addresses (IPv4 + IPv6)
- URLs / Domains
- Certificates
IoCs are usually gathered from Incidents, Phishing attempts, Malware Analysis or Threat Intelligence.
Process:
- Go to 365 Defender (security.microsoft.com)
- Settings (In the Left Panel)
- Endpoints
- Rules -> Indicators
- Choose the Appropriate IoC type at the top.
- File Hashes (SHA1, SHA265) - Example: fd9c3bc4d6d47dcf4fa26a38f00b95f88f901cdde0ddec5c0447da82eee5815a
- IP Addresses - Example: 123.123.123.123
- URLs/Domains - Example: maliciousdomain.com
- Certificates - Example: certificate.cer / certificate.pem
- If you need to batch Import, go to Batch Importing, located at the bottom of this solution article.
- Click on Add Item
- Input the Appropriate Fields
- URL/Domain/Hash/IP/Certificate
- Title: (Incident Number) (Malware/Phishing/Malicious Domain etc.)
- Description: Short Description of IoC
- Expires on: “Never”
- Click Next
- Select Action
- Never use Allow as its not needed.
- Audit - to track via reporting if users are connecting to IoC and alert is triggered.
- Warn – the IoC prompts a warning that the user can bypass. Able to create custom warning.
- (Most Commonly Used) Block - the IoC won't be allowed to run.
- (Used for File Hashes or Certificate IoCs) Block and Remediate - the IoC won't be allowed to run and a remediation action will be applied to the IoC.
- Click Next
- If Blocking IOC uncheck the Generate Alert. If Audit or Warn you can customize the properties of the alert:
- Severity – Select Appropriate
- Category – Select Appropriate
- Recommended actions – Recommended actions to perform on this alert.
- Click Next
- Select Appropriate Device Scope
- (Most Commonly Used) All Devices in my Organization.
- Specific machine groups – Used mostly for Auditing IoCs in specific departments.
- Click Next
- Review Summary and Click Submit.
- Confirm in List that the IoCs have been added successfully with the appropriate configuration.
Batch Importing:
- If Batch importing download Appropriate attached template located in this Solution Article. In the template there are existing values for you to use as a Guide. Ensure you delete the existing values.
- Fill in the Appropriate Indicators and Values
- IndicatorType – DomainName/URL/IpAddress
- IndicatorValue – Actual IoC (ex. 123.123.123.123 / maliciousdomain.com)
- Expiration – Leave Blank for no Expiration.
- Action – Allow/Audit/Warn/Block/BlockandRemediate
- Severity – High/Medium/Low/Informational (Leave Blank if no Alerting)
- Title – (Incident Number) (Malware/Phishing/Malicious Domain etc.)
- Description - Short Description of IoC
- RecommendedActions - Recommended actions to perform on this alert (Leave Blank if no Alerting)
- RbacGroup – Leave blank for whole organization.
- Category – Category of Alerting. (Leave Blank if no Alerting)
- MitreTech – Not used.
- Generate Alert
- TRUE if you want alerting.
- FALSE if you want no alerting.
- Ensure you save the file as a CSV.
- Go back to 365 Defender IoC Page and click on Import.
- Choose File and then Click Import
- Confirm in List that the IoCs have been added successfully with the appropriate configuration.
Additional References:
- https://learn.microsoft.com/en-us/microsoft-365/security/defender-endpoint/manage-indicators?view=o365-worldwide