Przeczytaj w języku angielskim Edytuj

Udostępnij za pośrednictwem


Configure Defender for Identity detection exclusions in Microsoft Defender XDR

This article explains how to configure Microsoft Defender for Identity detection exclusions in Microsoft Defender XDR.

Microsoft Defender for Identity enables the exclusion of specific IP addresses, computers, domains, or users from a number of detections.

For example, a DNS Reconnaissance alert could be triggered by a security scanner that uses DNS as a scanning mechanism. Creating an exclusion helps Defender for Identity ignore such scanners and reduce false positives.

Uwaga

We recommend you to Tune an alert instead of using exclusions. Alert tuning rules allow more granular conditions than exclusions, and allow you to review the alerts which were tuned.

Uwaga

Of the most common domains with Suspicious communication over DNS alerts opened on them, we observed the domains that customers most excluded from the alert. These domains are added to the exclusions list by default, but you have the option to easily remove them.

How to add detection exclusions

  1. In Microsoft Defender XDR, go to Settings and then Identities.

    Go to Settings, then Identities.

  2. You'll then see Excluded entities in the left-hand menu.

    Excluded entities.

    You can then set exclusions by two methods: Exclusions by detection rule and Global excluded entities.

Exclusions by detection rule

  1. In the left-hand menu, select Exclusions by detection rule. You'll see a list of detection rules.

    Exclusions by detection rule.

  2. For each detection you want to configure, do the following steps:

    1. Select the rule. You can search for detections using the search bar. Once selected, a pane will open with the detection rule details.

      Detection rule details.

    2. To add an exclusion, select the Excluded entities button, and then choose the exclusion type. Different excluded entities are available for each rule. They include users, devices, domains and IP addresses. In this example, the choices are Exclude devices and Exclude IP addresses.

      Exclude devices or IP addresses.

    3. After choosing the exclusion type, you can add the exclusion. In the pane that opens, select the + button to add the exclusion.

      Add an exclusion.

    4. Then add the entity to be excluded. Select + Add to add the entity to the list.

      Add an entity to be excluded.

    5. Then select Exclude IP addresses (in this example) to complete the exclusion.

      Exclude IP addresses.

    6. Once you've added exclusions, you can export the list or remove the exclusions by returning to the Excluded entities button. In this example, we've returned to Exclude devices. To export the list, select the down arrow button.

      Return to Exclude devices.

    7. To delete an exclusion, select the exclusion and select the trash icon.

      Delete an exclusion.

Global excluded entities

You can now also configure exclusions by Global excluded entities. Global exclusions allow you to define certain entities (IP addresses, subnets, devices, or domains) to be excluded across all of the detections Defender for Identity has. So for example, if you exclude a device, it will only apply to those detections that have device identification as part of the detection.

  1. In the left-hand menu, select Global excluded entities. You'll see the categories of entities that you can exclude.

    Global excluded entities.

  2. Choose an exclusion type. In this example, we selected Exclude domains.

    Exclude domains.

  3. A pane will open where you can add a domain to be excluded. Add the domain you want to exclude.

    Add a domain to be excluded.

  4. The domain will be added to the list. Select Exclude domains to complete the exclusion.

    Select exclude domains.

  5. You'll then see the domain in the list of entities to be excluded from all detection rules. You can export the list, or remove the entities by choosing them and selecting the Remove button.

    List of global excluded entries.

Next steps