<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Blocking of Powershell execution in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/blocking-of-powershell-execution/m-p/532897#M3744</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We need to block PowerShell executions on the some endpoints.&amp;nbsp; how can we block Powershell dll files so that PowerShell cannot be loaded.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have created a BIOC rule and it is flagging legitimate Powershell executions also. Can we exclude such legitimate executions by creation exceptions for CGO name?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Shashank&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Mar 2023 07:52:48 GMT</pubDate>
    <dc:creator>Shashanksinha</dc:creator>
    <dc:date>2023-03-02T07:52:48Z</dc:date>
    <item>
      <title>Blocking of Powershell execution</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/blocking-of-powershell-execution/m-p/532897#M3744</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;We need to block PowerShell executions on the some endpoints.&amp;nbsp; how can we block Powershell dll files so that PowerShell cannot be loaded.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have created a BIOC rule and it is flagging legitimate Powershell executions also. Can we exclude such legitimate executions by creation exceptions for CGO name?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Shashank&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 07:52:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/blocking-of-powershell-execution/m-p/532897#M3744</guid>
      <dc:creator>Shashanksinha</dc:creator>
      <dc:date>2023-03-02T07:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking of Powershell execution</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/blocking-of-powershell-execution/m-p/532973#M3751</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/203123"&gt;@Shashanksinha&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Thank you for writing to Live Community!&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;One way to go about it would be creating a BIOC rule (like you already have) and then adding it to a&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/WildFire-Analysis-Concepts" target="_self"&gt;new restrictions profile.&lt;/A&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Assuming the BIOC rule that you have created is blocking both legitimate and illegitimate powershell executions the correct way to go about it would be to indeed create an exceptions profile.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;You can do so either by &lt;/SPAN&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Add-a-New-Exceptions-Security-Profile" target="_blank"&gt;&lt;SPAN&gt;adding a new exceptions security profile&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, or, starting with version 3.5, create a new &lt;/SPAN&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/search/all?query=Add+a+Legacy+Exception+Rule&amp;amp;filters=Product~%2522Cortex+XDR%2522&amp;amp;content-lang=en-US" target="_blank"&gt;&lt;SPAN&gt;legacy exception rule&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;, choose the process you wish to exclude and choose whether you want to apply it globally or to a specific profile (see example in the screenshot below).&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mavraham_0-1677771399541.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48372i949E4CC31B122A67/image-size/medium?v=v2&amp;amp;px=400" role="button" title="mavraham_0-1677771399541.png" alt="mavraham_0-1677771399541.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Lastly, I’d like to refer you to &lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/blog/security-operations/stopping-powershell-without-powershell/" target="_blank"&gt;&lt;SPAN&gt;this article&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; from our research team about the existing BTP rules that already help detect and block powershell related executions.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 15:45:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/blocking-of-powershell-execution/m-p/532973#M3751</guid>
      <dc:creator>mavraham</dc:creator>
      <dc:date>2023-03-02T15:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking of Powershell execution</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/blocking-of-powershell-execution/m-p/539852#M4217</link>
      <description>&lt;P&gt;Hi&amp;nbsp;@&lt;A id="link_15" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167148" target="_self" aria-label="View Profile of mavraham"&gt;&lt;SPAN class=""&gt;Mavraham&lt;/SPAN&gt;&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Usually, PowerShell is used by multiple legitimate applications in the environment. A BIOC rule get disabled automatically after 5000 alerts. I believe continuous whitelisting and provide excpetions is the only way. Please help in case you believe there are better ways to achieve the following usecase:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Reuiqrement:&lt;/P&gt;
&lt;P&gt;Block PowerShell usage in the environment and allow only legitimate ones. We have identified the legitimate CGO's but unable to identify a method to whitelist these processes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Queries:&lt;/P&gt;
&lt;P&gt;1. Restrisction policy - Is it possible to whitelist legitimate parent processes (CGO's) in the restriction profile and block all other PowerShell executions?&lt;/P&gt;
&lt;P&gt;2. BIOC rule - Exceptions can be provided but rule gets disabled once it hits 5k alerts in 24 hours which is by design?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Rahul&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2023 05:23:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/blocking-of-powershell-execution/m-p/539852#M4217</guid>
      <dc:creator>Rahul9</dc:creator>
      <dc:date>2023-04-24T05:23:00Z</dc:date>
    </item>
  </channel>
</rss>

