<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic block vulnerable applications from running in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-vulnerable-applications-from-running/m-p/599443#M7269</link>
    <description>&lt;P&gt;Hi community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am attempting with restricting the execution of vulnerable applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible to block a specific application version using BIOC associated with restriction profile?&lt;BR /&gt;(Or if there's another easy way to do this please let me know)&lt;/P&gt;</description>
    <pubDate>Thu, 03 Oct 2024 16:48:35 GMT</pubDate>
    <dc:creator>Hisashi_Abe</dc:creator>
    <dc:date>2024-10-03T16:48:35Z</dc:date>
    <item>
      <title>block vulnerable applications from running</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-vulnerable-applications-from-running/m-p/599443#M7269</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am attempting with restricting the execution of vulnerable applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible to block a specific application version using BIOC associated with restriction profile?&lt;BR /&gt;(Or if there's another easy way to do this please let me know)&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 16:48:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-vulnerable-applications-from-running/m-p/599443#M7269</guid>
      <dc:creator>Hisashi_Abe</dc:creator>
      <dc:date>2024-10-03T16:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: block vulnerable applications from running</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-vulnerable-applications-from-running/m-p/599458#M7270</link>
      <description>&lt;P data-unlink="true"&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193463"&gt;@Hisashi_Abe&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you for reaching out to the Live community!&lt;/P&gt;
&lt;P data-unlink="true"&gt;&lt;BR /&gt;&lt;SPAN&gt;You can use the restriction profile and call the executable/application there -&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Restrictions-Security-Profile" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Restrictions-Security-Profile&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;In case if you are looking to block the specific version of that application then you may need to check the hash of that version which may be unique with each release so that you can add it to the block list -&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Manage-File-Execution" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Manage-File-Execution&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;For more granular restriction you can check for other parameters/variables of that application and make use of BIOC rules by adding them to the restriction profile.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Please click&amp;nbsp;Accept as Solution&amp;nbsp;to acknowledge&amp;nbsp;If this answer added value to your question.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 17:51:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/block-vulnerable-applications-from-running/m-p/599458#M7270</guid>
      <dc:creator>nar</dc:creator>
      <dc:date>2024-10-03T17:51:05Z</dc:date>
    </item>
  </channel>
</rss>

