Reputation scoring

Important

On June 30, 2024, The Microsoft Defender Threat Intelligence (Defender TI) standalone portal (https://ti.defender.microsoft.com) was retired and is no longer accessible. Customers can continue using Defender TI in the Microsoft Defender portal or with Microsoft Copilot for Security. Learn more

Microsoft Defender Threat Intelligence (Defender TI) provides proprietary reputation scores for any host, domain, or IP address. Whether validating the reputation of a known or unknown entity, this score helps you quickly understand any detected ties to malicious or suspicious infrastructure. Defender TI provides quick information about the activity of these entities (for example, first- and last-seen timestamps, autonomous system numbers, and associated infrastructure) and a list of rules that affect the reputation score when applicable.

Reputation data is important to understanding the trustworthiness of your own attack surface and is also useful when assessing unknown hosts, domains, or IP addresses that appear in investigations. These scores uncover any prior malicious or suspicious activity that affected the entity, or other known indicators of compromise (IOCs) that should be considered.

Reputation scoring screenshot.

Understanding reputation scores

Reputation scores are determined by a series of algorithms designed to quantify the risk associated with an entity quickly. We develop reputation scores based on our proprietary data by using our crawling infrastructure and on IP information collected from external sources.

Reputation summary card.

Detection methods

A series of factors determines reputation scores, including known associations to blocklisted entities and a series of machine learning rules used to assess risk.

Scoring brackets

Reputation scores are displayed as a numerical score with a range from zero to 100. An entity with a score of 0 doesn't have associations to suspicious activity or known IOCs; a score of 100 indicates that the entity is malicious. Hosts, domains, and IP addresses are grouped into the following categories depending on their numerical score:

Score Category Description
75+ Malicious The entity has confirmed associations to known malicious infrastructure that appears on our blocklist and matches machine learning rules that detect suspicious activity.
50 – 74 Suspicious The entity is likely associated to suspicious infrastructure based on matches to three or more machine learning rules.
25 – 49 Neutral The entity matches at least two machine learning rules.
0 – 24 Unknown (Green) The entity returned at least one matched rule.
0 – 24 Unknown (Grey) The entity didn't return any rule matches.

Detection rules

Reputation scores are based on many factors that you might reference to determine the relative quality of a domain or address. These factors are reflected in the machine learning rules that comprise the reputation scores. For example, .xyz or .cc top-level domains (TLDs) are more suspicious than .com or .org TLDs. An autonomous system number (ASN) hosted by a low-cost or free hosting provider is more likely to be associated with malicious activity, as would a self-signed TLS certificate. This reputation model was developed by looking at relative occurrences of these features among both malicious and benign indicators to score the overall reputation of an entity.

Refer to the following table for examples of rules used to determine if a host, domain, or IP address is suspicious.

Important

This list isn't comprehensive and is constantly changing; our detection logic and consequent capabilities are dynamic as they reflect the evolving threat landscape. For this reason, we don't publish a comprehensive list of the machine learning rules used to assess an entity's reputation.

Rule Name Description
TLS certificate self-signed Self-signed certificates might indicate malicious behavior
Tagged as malicious Tagged as malicious by a member within your organization
Web components observed The number of web components observed might indicate maliciousness
Name server Domain is using a name server that is more likely to be used by malicious infrastructure
Registrar Domains registered with this registrar are more likely to be malicious
Registrant email provider Domain is registered with an email provider that is more likely to register malicious domains

It's important to remember that these factors must be assessed holistically to make an accurate assessment on the reputation of an entity. The specific combination of indicators, rather than any individual indicator, can predict whether an entity is likely to be malicious or suspicious.

Severity

Rules created for the machine learning detection system have a severity rating applied. Each rule is assigned High, Medium, or Low severity based on the level of risk associated with the rule.

Use cases

Incident triage, response, and threat hunting

Defender TI's reputation score, classification, rules, and description of rules can be used to quickly assess if an IP address or domain indicator is good, suspicious, or malicious. Other times, we might not observe enough infrastructure associated with an IP address or domain to infer if the indicator is good or bad. If an indicator has an unknown or neutral classification, you're encouraged to perform a deeper investigation by reviewing our data sets to infer if the indicator is good or bad. If an indicator's reputation includes an article association, you're encouraged to review those listed articles to learn more about how the indicator is linked to a potential threat actor's campaign; what industries or nations they might be targeting; and what associated techniques, tactics, and procedures (TTPs) they might have; and identify other related IOCs to broaden the scope of your incident's response and hunting efforts.

Intelligence gathering

You can share any associated articles with your threat intelligence team, so they have a clearer understanding of who might be targeting their organization.

See also