<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Block especific Process and Folder/directory in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-especific-process-and-folder-directory/m-p/387496#M569</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167152"&gt;@Marcelo_Campos&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should be able to accomplish both using Cortex XDR using the following instructions. On Windows devices, you can prevent the execution of a process by name or path by creating a rule in a restrictions profile and applying that to a policy.&amp;nbsp;&lt;SPAN&gt;To enable, do the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Endpoints &amp;gt; Policy Management &amp;gt; Profiles.&lt;/LI&gt;&lt;LI&gt;Click "New Profile."&lt;/LI&gt;&lt;LI&gt;Click "Windows" then "Restrictions."&lt;/LI&gt;&lt;LI&gt;Click "Next."&lt;/LI&gt;&lt;LI&gt;Give the profile a name.&lt;/LI&gt;&lt;LI&gt;Go to the "Executable Files" section.&lt;/LI&gt;&lt;LI&gt;Uncheck "Use Default (Disabled)."&lt;/LI&gt;&lt;LI&gt;Set the "Action Mode" to Block.&lt;/LI&gt;&lt;LI&gt;Add the files and folders in the "Block List" section.&lt;/LI&gt;&lt;LI&gt;Click "Create."&lt;/LI&gt;&lt;LI&gt;Finish by adding this Restrictions profile to the policy that applied to your target endpoints.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For endpoints that do not have Windows as an operating system, you can enable detection of a process using BIOC. Create a BIOC to monitor for a process with a specific name:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Rules &amp;gt; BIOC.&lt;/LI&gt;&lt;LI&gt;Click "Add BIOC."&lt;/LI&gt;&lt;LI&gt;Click "Process."&lt;/LI&gt;&lt;LI&gt;Type your process name in the "Name" field.&lt;/LI&gt;&lt;LI&gt;Add any additional identifiers as needed.&lt;/LI&gt;&lt;LI&gt;Click "Save."&lt;/LI&gt;&lt;LI&gt;Monitor for BIOC alerts on the alerts table.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;BR /&gt;As for your second request, you can create a BIOC and convert it into an XDR Agent prevention rule for compatible endpoints by doing the following:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Rules &amp;gt; BIOC.&lt;/LI&gt;&lt;LI&gt;Click "Add BIOC."&lt;/LI&gt;&lt;LI&gt;Click "File"&lt;/LI&gt;&lt;LI&gt;Type your process name in the "Name" field.&lt;/LI&gt;&lt;LI&gt;Type your directory in the "Path" field.&lt;/LI&gt;&lt;LI&gt;Add any additional identifiers as needed.&lt;/LI&gt;&lt;LI&gt;Click "Save."&lt;/LI&gt;&lt;LI&gt;Again, go to Rules &amp;gt; BIOC.&lt;/LI&gt;&lt;LI&gt;Right-click your newly-created BIOC rule.&lt;/LI&gt;&lt;LI&gt;Click "Add to restrictions profile."&lt;/LI&gt;&lt;LI&gt;Select the target compatible restrictions profile.&lt;/LI&gt;&lt;LI&gt;Click "Add"&lt;/LI&gt;&lt;/OL&gt;</description>
    <pubDate>Tue, 23 Feb 2021 23:44:04 GMT</pubDate>
    <dc:creator>gjenkins</dc:creator>
    <dc:date>2021-02-23T23:44:04Z</dc:date>
    <item>
      <title>Block especific Process and Folder/directory</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-especific-process-and-folder-directory/m-p/387259#M566</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;In our company we have implemented Cortex XDR with Pro per endpoint and pro per terabyte licenses.&lt;/P&gt;&lt;P&gt;the incident response area asks me to verify the viability of applying the following preventive measures in cortex xdr&lt;/P&gt;&lt;P&gt;1st. Block the execution of a specific process by its name without having the hash.&lt;/P&gt;&lt;P&gt;2nd block writing and execution in specific directories. As well as blocking the creation of new folders with a specific name.&lt;/P&gt;&lt;P&gt;Is it possible to perform the previously indicated actions?&lt;/P&gt;&lt;P&gt;Stay tuned.&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Feb 2021 02:20:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-especific-process-and-folder-directory/m-p/387259#M566</guid>
      <dc:creator>Marcelo_Campos</dc:creator>
      <dc:date>2021-02-23T02:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Block especific Process and Folder/directory</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-especific-process-and-folder-directory/m-p/387496#M569</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167152"&gt;@Marcelo_Campos&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should be able to accomplish both using Cortex XDR using the following instructions. On Windows devices, you can prevent the execution of a process by name or path by creating a rule in a restrictions profile and applying that to a policy.&amp;nbsp;&lt;SPAN&gt;To enable, do the following:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Endpoints &amp;gt; Policy Management &amp;gt; Profiles.&lt;/LI&gt;&lt;LI&gt;Click "New Profile."&lt;/LI&gt;&lt;LI&gt;Click "Windows" then "Restrictions."&lt;/LI&gt;&lt;LI&gt;Click "Next."&lt;/LI&gt;&lt;LI&gt;Give the profile a name.&lt;/LI&gt;&lt;LI&gt;Go to the "Executable Files" section.&lt;/LI&gt;&lt;LI&gt;Uncheck "Use Default (Disabled)."&lt;/LI&gt;&lt;LI&gt;Set the "Action Mode" to Block.&lt;/LI&gt;&lt;LI&gt;Add the files and folders in the "Block List" section.&lt;/LI&gt;&lt;LI&gt;Click "Create."&lt;/LI&gt;&lt;LI&gt;Finish by adding this Restrictions profile to the policy that applied to your target endpoints.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For endpoints that do not have Windows as an operating system, you can enable detection of a process using BIOC. Create a BIOC to monitor for a process with a specific name:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Rules &amp;gt; BIOC.&lt;/LI&gt;&lt;LI&gt;Click "Add BIOC."&lt;/LI&gt;&lt;LI&gt;Click "Process."&lt;/LI&gt;&lt;LI&gt;Type your process name in the "Name" field.&lt;/LI&gt;&lt;LI&gt;Add any additional identifiers as needed.&lt;/LI&gt;&lt;LI&gt;Click "Save."&lt;/LI&gt;&lt;LI&gt;Monitor for BIOC alerts on the alerts table.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;BR /&gt;As for your second request, you can create a BIOC and convert it into an XDR Agent prevention rule for compatible endpoints by doing the following:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Go to Rules &amp;gt; BIOC.&lt;/LI&gt;&lt;LI&gt;Click "Add BIOC."&lt;/LI&gt;&lt;LI&gt;Click "File"&lt;/LI&gt;&lt;LI&gt;Type your process name in the "Name" field.&lt;/LI&gt;&lt;LI&gt;Type your directory in the "Path" field.&lt;/LI&gt;&lt;LI&gt;Add any additional identifiers as needed.&lt;/LI&gt;&lt;LI&gt;Click "Save."&lt;/LI&gt;&lt;LI&gt;Again, go to Rules &amp;gt; BIOC.&lt;/LI&gt;&lt;LI&gt;Right-click your newly-created BIOC rule.&lt;/LI&gt;&lt;LI&gt;Click "Add to restrictions profile."&lt;/LI&gt;&lt;LI&gt;Select the target compatible restrictions profile.&lt;/LI&gt;&lt;LI&gt;Click "Add"&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Tue, 23 Feb 2021 23:44:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-especific-process-and-folder-directory/m-p/387496#M569</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-02-23T23:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: Block especific Process and Folder/directory</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-especific-process-and-folder-directory/m-p/388986#M574</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167152"&gt;@Marcelo_Campos&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cortex XDR™ Pro Administrator’s Guide - &lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/investigation-and-response/investigate-endpoint-alerts/cortex-xdr-alerts" target="_blank"&gt;https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/investigation-and-response/investigate-endpoint-alerts/cortex-xdr-alerts&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Mar 2021 05:56:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-especific-process-and-folder-directory/m-p/388986#M574</guid>
      <dc:creator>calroy</dc:creator>
      <dc:date>2021-03-04T05:56:25Z</dc:date>
    </item>
  </channel>
</rss>

