In endpoint protection solutions, a false positive is an entity, such as a file or a process, that was detected and identified as malicious, even though the entity isn’t actually a threat. A false negative is an entity that was not detected as a threat, even though it actually is malicious. False positives/negatives can occur with any threat protection solution, including Microsoft Defender for Endpoint.
Fortunately, steps can be taken to address and reduce these kinds of issues. If you’re seeing false positives/negatives in Microsoft 365 Defender (formerly the Microsoft Defender Security Center), your security operations can take steps to address them by using the following process:
- Review and classify alerts
- Review remediation actions that were taken
- Review and define exclusions
- Submit an entity for analysis
- Review and adjust your threat protection settings
You can get help if you still have issues with false positives/negatives after performing the tasks described in this article. See Still need help?
Note
This article is intended as guidance for security operators and security administrators who are using Microsoft Defender for Endpoint.
Part 1: Review and classify alerts
If you see an alert that was triggered because something was detected as malicious or suspicious that should not have been, you can suppress the alert for that entity. You can also suppress alerts that are not necessarily false positives, but are unimportant. We recommend that you classify alerts as well.
Managing your alerts and classifying true/false positives helps to train your threat protection solution and can reduce the number of false positives or false negatives over time. Taking these steps also helps reduce noise in your security operations dashboard so that your security team can focus on higher priority work items.
Determine whether an alert is accurate
Before you classify or suppress an alert, determine whether the alert is accurate, a false positive, or benign.
- Go to the Microsoft 365 Defender portal (https://security.microsoft.com) and sign in.
- In the navigation pane, choose Alerts queue.
- Select an alert to more details about the alert. (See Review alerts in Microsoft Defender for Endpoint.)
- Depending on the alert status, take the steps described in the following table:
Alert status | What to do |
---|---|
The alert is accurate | Assign the alert, and then investigate it further. |
The alert is a false positive | 1. Classify the alert as a false positive.
3. Create an indicator for Microsoft Defender for Endpoint. |
The alert is accurate, but benign (unimportant) | Classify the alert as a true positive, and then suppress the alert. |
Classify an alert
Alerts can be classified as false positives or true positives in Microsoft 365 Defender. Classifying alerts helps train Microsoft Defender for Endpoint so that, over time, you’ll see more true alerts and fewer false alerts.
- Go to the Microsoft 365 Defender portal (https://security.microsoft.com) and sign in.
- Select Alerts queue, and then select an alert.
- For the selected alert, select Actions > Manage alert. A flyout pane opens.
- In the Manage alert section, select either True alert or False alert. (Use False alert to classify a false positive.)
Tip
For more information about suppressing alerts, see Manage Microsoft Defender for Endpoint alerts. And, if your organization is using a security information and event management (SIEM) server, make sure to define a suppression rule there, too.
Suppress an alert
If you have alerts that are either false positives or that are true positives but for unimportant events, you can suppress those alerts in Microsoft 365 Defender. Suppressing alerts helps reduce noise in your security operations dashboard.
- Go to the Microsoft 365 Defender portal (https://security.microsoft.com) and sign in.
- In the navigation pane, select Alerts queue.
- Select an alert that you want to suppress to open its Details pane.
- In the Details pane, choose the ellipsis (…), and then Create a suppression rule.
- Specify all the settings for your suppression rule, and then choose Save.
Tip
Need help with suppression rules? See Suppress an alert and create a new suppression rule.
Part 2: Review remediation actions
Remediation actions, such as sending a file to quarantine or stopping a process, are taken on entities (such as files) that are detected as threats. Several types of remediation actions occur automatically through automated investigation and Microsoft Defender Antivirus:
- Quarantine a file
- Remove a registry key
- Kill a process
- Stop a service
- Disable a driver
- Remove a scheduled task
Other actions, such as starting an antivirus scan or collecting an investigation package, occur manually or through Live Response. Actions taken through Live Response cannot be undone.
After you have reviewed your alerts, your next step is to review remediation actions. If any actions were taken as a result of false positives, you can undo most kinds of remediation actions. Specifically, you can:
- Restore a quarantined file from the Action Center
- Undo multiple actions at one time
- Remove a file from quarantine across multiple devices. and
- Restore file from quarantine
When you’re done reviewing and undoing actions that were taken as a result of false positives, proceed to review or define exclusions.
Review completed actions
- In the left navigation pane of the Microsoft 365 Defender portal, click Action center.
- Select the History tab to view a list of actions that were taken.
- Select an item to view more details about the remediation action that was taken.
Restore a quarantined file from the Action Center
- In the left navigation pane of the Microsoft 365 Defender portal, click Action center.
- On the History tab, select an action that you want to undo.
- In the flyout pane, select Undo. If the action cannot be undone with this method, you will not see an Undo button. (To learn more, see Undo completed actions.)
Undo multiple actions at one time
- In the left navigation pane of the Microsoft 365 Defender portal, click Action center.
- On the History tab, select the actions that you want to undo.
- In the pane on the right side of the screen, select Undo.
Remove a file from quarantine across multiple devices
- In the left navigation pane of the Microsoft 365 Defender portal, click Action center.
- On the History tab, select a file that has the Action type Quarantine file.
- In the pane on the right side of the screen, select Apply to X more instances of this file, and then select Undo.
Restore file from quarantine
You can roll back and remove a file from quarantine if you’ve determined that it’s clean after an investigation. Run the following command on each device where the file was quarantined.
- Open an elevated command-line prompt on the device:
- Go to Start and type cmd.
- Right-click Command prompt and select Run as administrator.
- Enter the following command, and press Enter:
Console
"ProgramFiles%\Windows Defender\MpCmdRun.exe" -Restore -Name EUS:Win32/CustomEnterpriseBlock -All
Important
In some scenarios, the ThreatName may appear as
EUS:Win32/CustomEnterpriseBlock!cl
. Defender for Endpoint will restore all custom blocked files that were quarantined on this device in the last 30 days.A file that was quarantined as a potential network threat might not be recoverable. If a user attempts to restore the file after quarantine, that file might not be accessible. This can be due to the system no longer having network credentials to access the file. Typically, this is a result of a temporary log on to a system or shared folder and the access tokens expired.
- In the pane on the right side of the screen, select Apply to X more instances of this file, and then select Undo.
Part 3: Review or define exclusions
An exclusion is an entity, such as a file or URL, that you specify as an exception to remediation actions. The excluded entity can still get detected, but no remediation actions are taken on that entity. That is, the detected file or process won’t be stopped, sent to quarantine, removed, or otherwise changed by Microsoft Defender for Endpoint.
To define exclusions across Microsoft Defender for Endpoint, perform the following tasks:
- Define exclusions for Microsoft Defender Antivirus
- Create “allow” indicators for Microsoft Defender for Endpoint
Note
Microsoft Defender Antivirus exclusions apply only to antivirus protection, not across other Microsoft Defender for Endpoint capabilities. To exclude files broadly, use exclusions for Microsoft Defender Antivirus and custom indicators for Microsoft Defender for Endpoint.
The procedures in this section describe how to define exclusions and indicators.
Exclusions for Microsoft Defender Antivirus
In general, you should not need to define exclusions for Microsoft Defender Antivirus. Make sure that you define exclusions sparingly, and that you only include the files, folders, processes, and process-opened files that are resulting in false positives. In addition, make sure to review your defined exclusions regularly. We recommend using Microsoft Endpoint Manager to define or edit your antivirus exclusions; however, you can use other methods, such as Group Policy (see Manage Microsoft Defender for Endpoint.
Tip
Need help with antivirus exclusions? See Configure and validate exclusions for Microsoft Defender Antivirus scans.
Use Microsoft Endpoint Manager to manage antivirus exclusions (for existing policies)
- Go to the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com) and sign in.
- Choose Endpoint security > Antivirus, and then select an existing policy. (If you don’t have an existing policy, or you want to create a new policy, skip to the next procedure).
- Choose Properties, and next to Configuration settings, choose Edit.
- Expand Microsoft Defender Antivirus Exclusions and then specify your exclusions.
- Choose Review + save, and then choose Save.
Use Microsoft Endpoint Manager to create a new antivirus policy with exclusions
- Go to the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com) and sign in.
- Choose Endpoint security > Antivirus > + Create Policy.
- Select a platform (such as Windows 10 and later, macOS, or Windows 10 and Windows Server).
- For Profile, select Microsoft Defender Antivirus exclusions, and then choose Create.
- Specify a name and description for the profile, and then choose Next.
- On the Configuration settings tab, specify your antivirus exclusions, and then choose Next.
- On the Scope tags tab, if you are using scope tags in your organization, specify scope tags for the policy you are creating. (See Scope tags.)
- On the Assignments tab, specify the users and groups to whom your policy should be applied, and then choose Next. (If you need help with assignments, see Assign user and device profiles in Microsoft Intune.)
- On the Review + create tab, review the settings, and then choose Create.
Indicators for Microsoft Defender for Endpoint
Indicators (specifically, indicators of compromise, or IoCs) enable your security operations team to define the detection, prevention, and exclusion of entities. For example, you can specify certain files to be omitted from scans and remediation actions in Microsoft Defender for Endpoint. Or, indicators can be used to generate alerts for certain files, IP addresses, or URLs.
To specify entities as exclusions for Microsoft Defender for Endpoint, create “allow” indicators for those entities. Such “allow” indicators in Microsoft Defender for Endpoint apply to next-generation protection, endpoint detection and response, and automated investigation & remediation.
“Allow” indicators can be created for:
Indicators for files
When you create an “allow” indicator for a file, such as an executable, it helps prevent files that your organization is using from being blocked. Files can include portable executable (PE) files, such as .exe
and .dll
files.
Before you create indicators for files, make sure the following requirements are met:
- Microsoft Defender Antivirus is configured with cloud-based protection enabled (see Manage cloud-based protection)
- Antimalware client version is 4.18.1901.x or later
- Devices are running Windows 10, version 1703 or later, or Windows 11; Windows Server 2016, or Windows Server 2019, or Windows Server 2022
- The Block or allow feature is turned on
Indicators for IP addresses, URLs, or domains
When you create an “allow” indicator for an IP address, URL, or domain, it helps prevent the sites or IP addresses your organization uses from being blocked.
Before you create indicators for IP addresses, URLs, or domains, make sure the following requirements are met:
- Network protection in Defender for Endpoint is enabled in block mode (see Enable network protection)
- Antimalware client version is 4.18.1906.x or later
- Devices are running Windows 10, version 1709, or later, or Windows 11
Custom network indicators are turned on in the Microsoft 365 Defender. To learn more, see Advanced features.
Indicators for application certificates
When you create an “allow” indicator for an application certificate, it helps prevent applications, such as internally developed applications, that your organization uses from being blocked. .CER
or .PEM
file extensions are supported.
Before you create indicators for application certificates, make sure the following requirements are met:
- Microsoft Defender Antivirus is configured with cloud-based protection enabled (see Manage cloud-based protection
- Antimalware client version is 4.18.1901.x or later
- Devices are running Windows 10, version 1703 or later, or Windows 11; Windows Server 2016, or Windows Server 2019, or Windows Server 2022
- Virus and threat protection definitions are up to date
Tip
When you create indicators, you can define them one by one, or import multiple items at once. Keep in mind there’s a limit of 15,000 indicators for a single tenant. And, you might need to gather certain details first, such as file hash information. Make sure to review the prerequisites before you create indicators.
Part 4: Submit a file for analysis
You can submit entities, such as files and fileless detections, to Microsoft for analysis. Microsoft security researchers analyze all submissions, and their results help inform Microsoft Defender for Endpoint threat protection capabilities. When you sign in at the submission site, you can track your submissions.
Submit a file for analysis
If you have a file that was either wrongly detected as malicious or was missed, follow these steps to submit the file for analysis.
- Review the guidelines here: Submit files for analysis.
- Visit the Microsoft Security Intelligence submission site (https://www.microsoft.com/wdsi/filesubmission), and submit your file(s).
Submit a fileless detection for analysis
If something was detected as malware based on behavior, and you don’t have a file, you can submit your Mpsupport.cab
file for analysis. You can get the .cab file by using the Microsoft Malware Protection Command-Line Utility (MPCmdRun.exe) tool on Windows 10 or Windows 11.
- Go to
C:\ProgramData\Microsoft\Windows Defender\Platform\<version>
, and then runMpCmdRun.exe
as an administrator. - Type
mpcmdrun.exe -GetFiles
, and then press Enter.A .cab file is generated that contains various diagnostic logs. The location of the file is specified in the output of the command prompt. By default, the location is
C:\ProgramData\Microsoft\Microsoft Defender\Support\MpSupportFiles.cab
. - Review the guidelines here: Submit files for analysis.
- Visit the Microsoft Security Intelligence submission site (https://www.microsoft.com/wdsi/filesubmission), and submit your .cab files.
What happens after a file is submitted?
Your submission is immediately scanned by our systems to give you the latest determination even before an analyst starts handling your case. It’s possible that a file might have already been submitted and processed by an analyst. In those cases, a determination is made quickly.
For submissions that were not already processed, they are prioritized for analysis as follows:
- Prevalent files with the potential to impact large numbers of computers are given a higher priority.
- Authenticated customers, especially enterprise customers with valid Software Assurance IDs (SAIDs), are given a higher priority.
- Submissions flagged as high priority by SAID holders are given immediate attention.
To check for updates regarding your submission, sign in at the Microsoft Security Intelligence submission site.
Tip
To learn more, see Submit files for analysis.
Part 5: Review and adjust your threat protection settings
Microsoft Defender for Endpoint offers a wide variety of options, including the ability to fine-tune settings for various features and capabilities. If you’re getting numerous false positives, make sure to review your organization’s threat protection settings. You might need to make some adjustments to:
- Cloud-delivered protection
- Remediation for potentially unwanted applications
- Automated investigation and remediation
Cloud-delivered protection
Check your cloud-delivered protection level for Microsoft Defender Antivirus. By default, cloud-delivered protection is set to Not configured, which corresponds to a normal level of protection for most organizations. If your cloud-delivered protection is set to High, High +, or Zero tolerance, you might experience a higher number of false positives.
Tip
To learn more about configuring your cloud-delivered protection, see Specify the cloud-delivered protection level.
We recommend using Microsoft Endpoint Manager to edit or set your cloud-delivered protection settings; however, you can use other methods, such as Group Policy (see Manage Microsoft Defender for Endpoint.
Use Microsoft Endpoint Manager to review and edit cloud-delivered protection settings (for existing policies)
- Go to the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com) and sign in.
- Choose Endpoint security > Antivirus and then select an existing policy. (If you don’t have an existing policy, or you want to create a new policy, skip to the next procedure).
- Under Manage, select Properties. Then, next to Configuration settings, choose Edit.
- Expand Cloud protection, and review your current setting in the Cloud-delivered protection level row. We recommend setting cloud-delivered protection to Not configured, which provides strong protection while reducing the chances of getting false positives.
- Choose Review + save, and then Save.
Use Microsoft Endpoint Manager to set cloud-delivered protection settings (for a new policy)
- Go to the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com) and sign in.
- Choose Endpoint security > Antivirus > + Create policy.
- For Platform, select an option, and then for Profile, select Antivirus or Microsoft Defender Antivirus (the specific option depends on what you selected for Platform.) Then choose Create.
- On the Basics tab, specify a name and description for the policy. Then choose Next.
- On the Configuration settings tab, expand Cloud protection, and specify the following settings:
- Set Turn on cloud-delivered protection to Yes.
- Set Cloud-delivered protection level to Not configured. (This level provides a strong level of protection by default while reducing the chances of getting false positives.)
- On the Scope tags tab, if you are using scope tags in your organization, specify scope tags for the policy. (See Scope tags.)
- On the Assignments tab, specify the users and groups to whom your policy should be applied, and then choose Next. (If you need help with assignments, see Assign user and device profiles in Microsoft Intune.)
- On the Review + create tab, review the settings, and then choose Create.
Remediation for potentially unwanted applications
Potentially unwanted applications (PUA) are a category of software that can cause devices to run slowly, display unexpected ads, or install other software that might be unexpected or unwanted. Examples of PUA include advertising software, bundling software, and evasion software that behaves differently with security products. Although PUA is not considered malware, some kinds of software are PUA based on their behavior and reputation.
Tip
To learn more about PUA, see Detect and block potentially unwanted applications.
Depending on the apps your organization is using, you might be getting false positives as a result of your PUA protection settings. If necessary, consider running PUA protection in audit mode for a while, or apply PUA protection to a subset of devices in your organization. PUA protection can be configured for the Microsoft Edge browser and for Microsoft Defender Antivirus.
We recommend using Microsoft Endpoint Manager to edit or set PUA protection settings; however, you can use other methods, such as Group Policy (see Manage Microsoft Defender for Endpoint.
Use Microsoft Endpoint Manager to edit PUA protection (for existing configuration profiles)
- Go to the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com) and sign in.
- Choose Devices > Configuration profiles, and then select an existing policy. (If you don’t have an existing policy, or you want to create a new policy, skip to the next procedure.)
- Under Manage, choose Properties, and then, next to Configuration settings, choose Edit.
- On the Configuration settings tab, scroll down and expand Microsoft Defender Antivirus.
- Set Detect potentially unwanted applications to Audit. (You can turn it off, but by using audit mode, you will be able to see detections.)
- Choose Review + save, and then choose Save.
Use Microsoft Endpoint Manager to set PUA protection (for a new configuration profile)
- Go to the Microsoft Endpoint Manager admin center (https://endpoint.microsoft.com) and sign in.
- Choose Devices > Configuration profiles > + Create profile.
- For the Platform, choose Windows 10 and later, and for Profile, select Device restrictions.
- On the Basics tab, specify a name and description for your policy. Then choose Next.
- On the Configuration settings tab, scroll down and expand Microsoft Defender Antivirus.
- Set Detect potentially unwanted applications to Audit, and then choose Next. (You can turn off PUA protection, but by using audit mode, you will be able to see detections.)
- On the Assignments tab, specify the users and groups to whom your policy should be applied, and then choose Next. (If you need help with assignments, see Assign user and device profiles in Microsoft Intune.)
- On the Applicability Rules tab, specify the OS editions or versions to include or exclude from the policy. For example, you can set the policy to be applied to all devices certain editions of Windows 10. Then choose Next.
- On the Review + create tab, review your settings, and, and then choose Create.
Automated investigation and remediation
Automated investigation and remediation (AIR) capabilities are designed to examine alerts and take immediate action to resolve breaches. As alerts are triggered, and an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be Malicious, Suspicious, or No threats found.
Depending on the level of automation set for your organization and other security settings, remediation actions are taken on artifacts that are considered to be Malicious or Suspicious. In some cases, remediation actions occur automatically; in other cases, remediation actions are taken manually or only upon approval by your security operations team.
Important
We recommend using Full automation for automated investigation and remediation. Don’t turn these capabilities off because of a false positive. Instead, use “allow” indicators to define exceptions, and keep automated investigation and remediation set to take appropriate actions automatically. Following this guidance helps reduce the number of alerts your security operations team must handle.
Still need help?
If you have worked through all the steps in this article and still need help, contact technical support.
- Go to Microsoft 365 Defender and sign in.
- In the upper right corner, select the question mark (?), and then select Microsoft support.
- In the Support Assistant window, describe your issue, and then send your message. From there, you can open a service request.