Skip to content

Latest commit

 

History

History
93 lines (61 loc) · 4.38 KB

investigate-behind-proxy.md

File metadata and controls

93 lines (61 loc) · 4.38 KB
title description ms.service ms.author author ms.localizationpriority manager audience ms.collection ms.topic ms.subservice search.appverid ms.date
Investigate connection events that occur behind forward proxies
Learn how to use advanced HTTP level monitoring through network protection in Microsoft Defender for Endpoint, which surfaces a real target, instead of a proxy.
defender-endpoint
siosulli
siosulli
medium
deniseb
ITPro
m365-security
tier2
mde-edr
conceptual
edr
met150
12/18/2020

Investigate connection events that occur behind forward proxies

[!INCLUDE Microsoft Defender XDR rebranding]

Applies to:

Want to experience Defender for Endpoint? Sign up for a free trial.

Defender for Endpoint supports network connection monitoring from different levels of the network stack. A challenging case is when the network uses a forward proxy as a gateway to the Internet.

The proxy acts as if it was the target endpoint. In these cases, simple network connection monitors audit the connections with the proxy that is correct but has lower investigation value.

Defender for Endpoint supports advanced HTTP level monitoring through network protection. When turned on, a new type of event is surfaced which exposes the real target domain names.

Use network protection to monitor network connection behind a firewall

Monitoring network connection behind a forward proxy is possible due to other network events that originate from network protection. To see them on a device timeline, turn on network protection (at the minimum in audit mode).

Network protection can be controlled using the following modes:

  • Block: Users or apps are blocked from connecting to dangerous domains. You'll be able to see this activity in Microsoft Defender XDR.
  • Audit: Users or apps won't be blocked from connecting to dangerous domains. However, you'll still see this activity in Microsoft Defender XDR.

If you turn off network protection, users or apps won't be blocked from connecting to dangerous domains. You won't see any network activity in Microsoft Defender XDR.

If you don't configure it, network blocking is turned off by default.

For more information, see Enable network protection.

Investigation impact

When network protection is turned on, you'll see that on a device's timeline the IP address keeps representing the proxy, while the real target address shows up.

:::image type="content" source="media/atp-proxy-investigation.png" alt-text="The network events on device's timeline" lightbox="media/atp-proxy-investigation.png":::

Other events triggered by the network protection layer are now available to surface the real domain names even behind a proxy.

Event's information:

:::image type="content" source="media/atp-proxy-investigation-event.png" alt-text="The URLs of a single network event" lightbox="media/atp-proxy-investigation-event.png":::

Hunt for connection events using advanced hunting

All new connection events are available for you to hunt on through advanced hunting as well. Since these events are connection events, you can find them under the DeviceNetworkEvents table under the ConnecionSuccess action type.

Using this simple query shows you all the relevant events:

DeviceNetworkEvents
| where ActionType == "ConnectionSuccess"
| take 10

:::image type="content" source="media/atp-proxy-investigation-ah.png" alt-text="The advanced hunting query" lightbox="media/atp-proxy-investigation-ah.png":::

You can also filter out events that are related to connection to the proxy itself.

Use the following query to filter out the connections to the proxy:

DeviceNetworkEvents
| where ActionType == "ConnectionSuccess" and RemoteIP != "ProxyIP"
| take 10

Related articles