Filtering out M365 Defender Standard discovery noise #279
Replies: 4 comments
-
Thanks for getting in touch with us about this issue. Its an interesting problem and one that we haven't yet engineered for. If you have some ideas, and would like to add to the project, I'd be happy to work with you to add this feature. On the commercial side, we have many different filters (called annotations) which recognise particular attributes of an alert. It then allows us to confidently say that this alert is created from MSFT defender or other scanners or AV. |
Beta Was this translation helpful? Give feedback.
-
This seems like a problem we might run into as well soon as we're currently working to deploy that. Just informing I'm open to collaborate. If no solution is at hand, good chance I will create one but have to wait for it to be rolled out before I can replicate the problem. |
Beta Was this translation helpful? Give feedback.
-
Apologies for the delay. I don't really have any ideas, but I did contact the commercial side of the house. Their response was thoughtful and perhaps helpful for this project (see below). The TLDR of their responses is that we should consider excluding the honeypot IPs from M365 Defender and disabling the SNMP filter on the OpenCanary. I haven't had time to tinker with our OpenCanarys (OpenCanaries?) but I will report back on this thread when I do. Summary of exchange with Canary support:Me: I've been playing with your open source OpenCanary project and was curious how the paid version of Canary handles Microsoft Defender Endpoint Standard Discovery?
Me: What about other miscellaneous SNMP false positives?
|
Beta Was this translation helpful? Give feedback.
-
Hey @GrassfedMeatSticks, I was reading over this issue again. I don't think that Opencanary is going to cater for this kind of ignore specificity any time soon. I would recommend adding the MSFT host doing the scans to your ip ignorelist as a fix for now. |
Beta Was this translation helpful? Give feedback.
-
Hi everyone,
Is there a good way to filter out specific, known-false positive detections?
I had posted earlier about some benign SNMP traffic on Issue #227 and am now seeing detections on ports 22, 80, and 161 from Microsoft 365 Defender's recommended Standard Discovery configuration.
I reviewed #169 and wasn't sure if there was something like a REQUESTS.ignorelist like the
"ip.ignorelist": ["192.168.1.1", "192.168.123.45"],
in the referenced issue or if there would be a better way to filter out these M365 standard discovery requests.Here's a sample M365 standard discovery detection
I wonder how the commercial version of the Canary handles these?
Beta Was this translation helpful? Give feedback.
All reactions