Skip to content

Latest commit

 

History

History
40 lines (28 loc) · 2.14 KB

defender-for-dns-alerts.md

File metadata and controls

40 lines (28 loc) · 2.14 KB
title description ms.date ms.topic ms.author author
Respond to Microsoft Defender for DNS alerts
Learn best practices for responding to alerts that indicate security risks in DNS services.
07/23/2023
how-to
dacurwin
dcurwin

Respond to Microsoft Defender for DNS alerts

[!INCLUDE Defender for DNS note]

When you receive a security alert about suspicious and anomalous activities identified in DNS transactions, we recommend you investigate and respond to the alert as described below. Even if you're familiar with the application or user that triggered the alert, it's important to verify the situation surrounding every alert.

Step 1: Contact

  1. Contact the resource owner to determine whether the behavior was expected or intentional.
  2. If the activity is expected, dismiss the alert.
  3. If the activity is unexpected, treat the resource as potentially compromised and mitigate as described in the next step.

Step 2: Immediate mitigation

  1. Isolate the resource from the network to prevent lateral movement.
  2. Run a full antimalware scan on the resource, following any resulting remediation advice.
  3. Review installed and running software on the resource, removing any unknown or unwanted packages.
  4. Revert the machine to a known good state, reinstalling the operating system if required, and restore software from a verified malware-free source.
  5. Resolve any Microsoft Defender for Cloud recommendations for the machine, remediating highlighted security issues to prevent future breaches.

Next steps

Now that you know how to respond to DNS alerts, find out more about how to manage alerts.

[!div class="nextstepaction"] Manage security alerts

For related material, see the following articles:

  • To export Defender for Cloud alerts to your centralized security information and event management (SIEM) system, such as Microsoft Sentinel, any third-party SIEM, or any other external tool.
  • To send alerts in real-time to Log Analytics or Event Hubs to create automated processes to analyze and respond to security alerts.