Recently, your organization has been targeted by a custom malware package.
While the files used are constantly changing, the command and control URL is always the same.
How can you ensure this threat is caught in Defender for Endpoint?
Click on the arrows to vote for the correct answer
A. B. C. D. E.Correct Answer: A.
Reference:
The best approach to ensure that the threat is caught in Defender for Endpoint is to add the command and control URL as an IoC (Indicator of Compromise) in Security Center. An IoC is an artifact or anomaly that provides evidence of an intrusion or security compromise. When an IoC is detected, it triggers an alert that can be used to investigate and remediate the threat.
Blocking the command and control URL on all firewalls in the organization is also an effective approach to prevent the malware from communicating with its command and control server. However, it may not be sufficient to catch the threat in Defender for Endpoint as the malware may still be present on the endpoint, and it can cause damage before it's blocked by the firewall.
Blocklisting the URL in Security Center is also an option, but it may not be the best approach as it only blocks the URL without providing any further insights or context about the threat.
Allowlisting the URL in Security Center is not recommended as it allows the URL to bypass any security measures in place, including Defender for Endpoint.
In summary, the best approach to catch the threat in Defender for Endpoint is to add the command and control URL as an IoC in Security Center, which will trigger alerts and allow for further investigation and remediation of the threat.