<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detect and Restrict Powershell cmdlets in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584810#M6589</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/310428"&gt;@jmazzeo&lt;/a&gt;,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks, I know this detection functionality, together with an automation with "terminate casuality chain" that kills the powershell process can be a "solution".&lt;/P&gt;
&lt;P&gt;This feature requires XTH - Xtended Threat Hunting license (which I don't have).&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The only drawback I see to this solution is that it is an asynchronous solution (it works after executing the command, in this case the cmdlet).&lt;/P&gt;</description>
    <pubDate>Wed, 24 Apr 2024 16:09:02 GMT</pubDate>
    <dc:creator>agirones</dc:creator>
    <dc:date>2024-04-24T16:09:02Z</dc:date>
    <item>
      <title>Detect and Restrict Powershell cmdlets</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584640#M6567</link>
      <description>&lt;P&gt;Hello everyone,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I would like to know if any of you have struggled with support and technical cases with the need I show below.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I would like to know what you can tell me or give me your opinion about taking action against powershell cmdlets.&lt;/P&gt;
&lt;P&gt;After several cases and meetings with support, I can't get a solid answer to my needs about restricting some powershell cmdlets.&lt;BR /&gt;&lt;BR /&gt;I hope to find a solution that fits my needs, thanks anyway.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 14:57:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584640#M6567</guid>
      <dc:creator>agirones</dc:creator>
      <dc:date>2024-04-23T14:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: Detect and Restrict Powershell cmdlets</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584663#M6568</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/270645"&gt;@agirones&lt;/a&gt;, thanks for reaching us using the Live Community.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share more information about what cmdlets you are trying to detect or block? Do you have some example?&lt;/P&gt;
&lt;P&gt;Maybe I can do some test in my lab and try to help you.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 17:37:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584663#M6568</guid>
      <dc:creator>jmazzeo</dc:creator>
      <dc:date>2024-04-23T17:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Detect and Restrict Powershell cmdlets</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584735#M6579</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/310428"&gt;@jmazzeo&lt;/a&gt;, thaks for your interest and trying to help!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Example, I want to restrict cmdlet like:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Set-ItemProperty -Path&lt;BR /&gt;Remove-ItemProperty -Path&lt;BR /&gt;Invoke-AADintReconAsOutsider&lt;BR /&gt;Remove-DomainObjectACL&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 06:25:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584735#M6579</guid>
      <dc:creator>agirones</dc:creator>
      <dc:date>2024-04-24T06:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: Detect and Restrict Powershell cmdlets</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584800#M6587</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/270645"&gt;@agirones&lt;/a&gt;, I believe that this could work for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Create a new custom BIOC rule going to &lt;STRONG&gt;Detection Rules - BIOC&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Select the Event Log type. The powershell cmdlets details are taken from the windows event log.&lt;/LI&gt;
&lt;LI&gt;Set a name, and put all the required commands in the "Message" field in this format:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;*Set-ItemProperty -Path*|*Remove-ItemProperty -Path*|*Invoke-AADintReconAsOutsider*|*Remove-DomainObjectACL*&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Use the "|" character as an OR separator, and the "*" as wildcard.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jmazzeo_0-1713968206618.png" style="width: 673px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59260i46DE7101D83F3CBD/image-dimensions/673x133/is-moderation-mode/true?v=v2" width="673" height="133" role="button" title="jmazzeo_0-1713968206618.png" alt="jmazzeo_0-1713968206618.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Before save it you can test it to check if you have some matching events.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;You will see the&amp;nbsp; command details by opening the "View event log message" from the results.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jmazzeo_1-1713968439612.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59261iBAAC289C89616C64/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="jmazzeo_1-1713968439612.png" alt="jmazzeo_1-1713968439612.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;This is how you will see the details:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jmazzeo_2-1713968503140.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59262i4668426563969757/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="jmazzeo_2-1713968503140.png" alt="jmazzeo_2-1713968503140.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;LI&gt;Alerts generated:&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="jmazzeo_3-1713968799553.png" style="width: 651px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59263i0A237EA76DC3FB70/image-dimensions/651x109/is-moderation-mode/true?v=v2" width="651" height="109" role="button" title="jmazzeo_3-1713968799553.png" alt="jmazzeo_3-1713968799553.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;This works for cmdlets running in a live powershell console in the host, and it will also detect this commands running from scripts.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The "Event log" type BIOC Rules can't be used to block, only for notifications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this post answers your question, please mark it as the solution.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 14:27:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584800#M6587</guid>
      <dc:creator>jmazzeo</dc:creator>
      <dc:date>2024-04-24T14:27:04Z</dc:date>
    </item>
    <item>
      <title>Re: Detect and Restrict Powershell cmdlets</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584810#M6589</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/310428"&gt;@jmazzeo&lt;/a&gt;,&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks, I know this detection functionality, together with an automation with "terminate casuality chain" that kills the powershell process can be a "solution".&lt;/P&gt;
&lt;P&gt;This feature requires XTH - Xtended Threat Hunting license (which I don't have).&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The only drawback I see to this solution is that it is an asynchronous solution (it works after executing the command, in this case the cmdlet).&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 16:09:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/detect-and-restrict-powershell-cmdlets/m-p/584810#M6589</guid>
      <dc:creator>agirones</dc:creator>
      <dc:date>2024-04-24T16:09:02Z</dc:date>
    </item>
  </channel>
</rss>

