Skip to main content

IOC Feeds

Defend ingests indicators of compromise (IOCs) from multiple threat intelligence feeds and matches them against your endpoint telemetry in real time. When an endpoint communicates with a known-bad IP, resolves a malicious domain, or executes a file with a known-bad hash, Defend generates a detection.

Built-In Feeds

FeedSourceIndicator TypesConfidenceUpdate Frequency
MalwareBazaarabuse.chSHA256 file hashes90Every 6 hours
ThreatFoxabuse.chIPs, domains, hashes, URLs70Every 6 hours
URLhausabuse.chMalicious domains and URLs70Every 6 hours
AlienVault OTXAlienVaultHashes, IPs, domains, URLs75Every 6 hours
VirusTotalVirusTotalHash lookups (on-demand)0–100On-demand (rate-limited)
MSP CollectiveCross-MSP intelligenceHashes, IPs, domainsVariesContinuous

How IOC Matching Works

  1. IOC feeds refresh every 6 hours and populate the IOC cache (Cosmos DB with 24-hour TTL) and the ThreatIntel table in ADX
  2. Detection rules query telemetry against the IOC dataset
  3. When a match is found — e.g., a process connects to an IP listed in ThreatFox — a detection is created
  4. The detection includes the IOC source, confidence score, and the telemetry event that matched

IOC-Specific Detection Rules

  • IOC-001 — File hash match (process executed with a hash in the blocklist)
  • IOC-002 — Network IOC match (connection to a known-bad IP or domain)
  • IOC-003 — URL IOC match (HTTP request to a known-malicious URL)

Feed Deduplication

IOCs are deduplicated across feeds using a composite ID: source-ioc_type-ioc_value. If the same IP appears in both ThreatFox and OTX, both entries are stored but only one detection fires per match. The detection references all sources that flagged the indicator.

Adding Custom IOC Feeds

To add your own threat intelligence:

  1. Navigate to Settings → IOC Feeds → Custom Feeds
  2. Provide the feed URL (must return CSV or JSON with hash/IP/domain/URL fields)
  3. Set the confidence score and refresh interval
  4. Defend begins ingesting and matching against your custom indicators

Reporting False Positives

If a legitimate service is flagged by an IOC feed:

  1. Open the detection
  2. Click Report False Positive
  3. Specify whether to suppress this IOC for your organization only or report it to the feed provider
  4. The IOC is excluded from future matching for your organization
ℹ️False positive reports for built-in feeds are aggregated. If multiple Defend customers report the same IOC as a false positive, it is automatically reviewed and may be removed from the feed.

VirusTotal Integration

VirusTotal lookups work differently from bulk feeds:

  • Hashes are submitted on-demand during investigations or when a process hash isn't in any feed
  • Rate-limited to 4 requests per minute (free tier)
  • Results are cached in the IOC cache for 24 hours
  • Confidence score maps directly from VirusTotal's detection ratio

Next Steps