Configure the deception capability in Microsoft Defender XDR

Applies to:

  • Microsoft Defender XDR

Note

The built-in deception capability in Microsoft Defender XDR covers all Windows clients onboarded to Microsoft Defender for Endpoint. Learn how to onboard clients to Defender for Endpoint in Onboard to Microsoft Defender for Endpoint.

Microsoft Defender XDR has deception technology built in to protect your environment from high-impact attacks that use human-operated lateral movement. This article describes how to configure the deception capability in Microsoft Defender XDR.

Turn on the deception capability

The deception capability is turned off by default. To turn it on, perform the following steps:

  1. Select Settings > Endpoints.
  2. Under General, select Advanced features.
  3. Look for Deception capabilities and toggle the switch to On.

Screenshot of Defender XDR Settings to configure the deception feature

A default rule is automatically created and turned on when the deception capability is enabled. The default rule, which you can edit accordingly, automatically generates decoy accounts and hosts that are integrated into lures and plants these to all target devices in the organization. While the deception feature's scope is set to all devices in the organization, lures are planted in Windows client devices only.

Screenshot of the default rule generated by the deception feature

Create and modify deception rules

Note

Microsoft Defender XDR currently supports the creation of up to ten (10) deception rules.

To create a deception rule, perform the following steps:

  1. Navigate to Settings > Endpoints. Under Rules, select Deception rules.
  2. Select Add deception rule. Screenshot of the add rule function in the deception rule setup
  3. In the rule creation pane, add a rule name, description, and select what lure types to create. You can select both Basic and Advanced lure types. Screenshot of the add deception rule page
  4. Identify the devices where you intend to plant the lures in the scope section. You can select to plant lures in all Windows client devices or in clients with specific tags. The deception feature currently covers Windows clients. Screenshot of the deception rule scope page
  5. The deception capability then takes a few minutes to automatically generates decoy accounts and hosts. Note that the deception capability generates decoy accounts that mimic the User Principal Name (UPN) in Active Directory.
  6. You can review, edit, or delete automatically generated decoys. You can also add your own decoy accounts and hosts in this section. To prevent false positive detections, ensure that added hosts/IP addresses aren't used by the organization. Screenshot of the deception rule decoy page
  7. You can edit a decoy account name, host name, and the IP address where the lures are planted in the decoys section. When adding IP addresses, we recommend using a sandbox IP if it exists in the organization. Avoid using commonly used addresses, for example, 127.0.0.1, 10.0.0.1, and the like. Screenshot of editing a decoy host Screenshot of editing a decoy account

Caution

To avoid false positive alerts, we highly recommend creating unique user accounts and host names when creating and editing decoy accounts and hosts. Ensure that created user accounts and hosts are unique for each deception rule and that these accounts and hosts do not exist in the organization's directory.

  1. Identify if you use autogenerated or custom lures in the lures section. Select add new lure under Use custom lures only to upload your own lure. Custom lures can be any file type (except .DLL and .EXE files) and are limited to 10 MB each. When creating and uploading custom lures, we recommend lures to contain or mention the fake hosts or fake user accounts generated in the previous steps to ensure that lures are attractive to attackers. Screenshot of the add new lure option
  2. Provide a lure name and a path where the lure will be planted. You can then select to plant the lure on all devices covered in the scope section and if you want the lure to be planted as a hidden file. If these boxes are left unchecked, the deception feature automatically plants the lures unhidden into random devices within the scope. Screenshot of the add new lure details pane
  3. Review the details of the created rule in the summary section. You can edit the rule details by selecting Edit on the section that you need to modify. Select Save after reviewing. Screenshot of deception rule details pane showing the sections with the edit option
  4. The new rule appears in the Deception rules pane after successful creation. It takes approximately 12-24 hours to complete the rule creation. Check the Status to monitor the rule creation progress.
  5. To check on the details of active rules, including details of devices covered and planted decoys and lures, select Export in the rules pane. Screenshot of the export deception rule details option

To modify a deception rule, perform the following steps:

  1. Select the rule to modify in the Deception rules pane.
  2. Select Edit on the rule details pane.
  3. To turn off the rule, select Turn off in the editing pane.
  4. To delete a deception rule, select Delete in the editing pane.

Tip

Do you want to learn more? Engage with the Microsoft Security community in our Tech Community: Microsoft Defender XDR Tech Community.