<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Questions about IOC/BIOC Suppression rules in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/questions-about-ioc-bioc-suppression-rules/m-p/1231984#M8446</link>
    <description>&lt;P&gt;We are doing a (somewhat rushed) Cortex XDR implementation, and I am new to EDR things (in general).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created an IOC/BIOC Supp rule today for an issue with running the Guardian Browser (I'll let you know if it works), and while there I see 52 System Generated rules. The description on them is "Same process triggered BIOC nnn on 100 different hosts." I thought I could both learn as well as possibly resolve them. The one I picked happened to be about drvinst.exe. "Well," I said, "that sounds simple."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I searched for the SHA256 hash in the rule, and found thousands of results (that's how I found drvinst.exe). But when I searched Issues for that hash in&amp;nbsp;Target Process SHA256, Initiator SHA256, CGO SHA256, File SHA256 - nada. Zip. There are other SHA256 fields I could check, but never let it be said I can't take a hint.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I got to thinking and I have a few questions, I'd appreciate hearing your thoughts:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Does anyone do this, i.e. trying to resolve the issues causing these System Generated rules? Is it worth the effort?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Does anyone know if a System Generated IOC/BIOC Suppression rule will also resolve the issues generated before the rule? (The rule I picked was generated today, so I'd have thought the related Issues would still be around, but I found none.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Does anyone know if PAN writes these rules thinking about the apps/programs/images that cause them? In other words does the fact that this involves drvinst.exe, a well-known Windows process, allow them to generate the rule knowing "well that exe is fine" and NOT suppress issues for lesser known apps?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reading and hopefully helping me out?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Paul&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Jun 2025 03:36:30 GMT</pubDate>
    <dc:creator>ptrivino1</dc:creator>
    <dc:date>2025-06-18T03:36:30Z</dc:date>
    <item>
      <title>Questions about IOC/BIOC Suppression rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/questions-about-ioc-bioc-suppression-rules/m-p/1231984#M8446</link>
      <description>&lt;P&gt;We are doing a (somewhat rushed) Cortex XDR implementation, and I am new to EDR things (in general).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I created an IOC/BIOC Supp rule today for an issue with running the Guardian Browser (I'll let you know if it works), and while there I see 52 System Generated rules. The description on them is "Same process triggered BIOC nnn on 100 different hosts." I thought I could both learn as well as possibly resolve them. The one I picked happened to be about drvinst.exe. "Well," I said, "that sounds simple."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I searched for the SHA256 hash in the rule, and found thousands of results (that's how I found drvinst.exe). But when I searched Issues for that hash in&amp;nbsp;Target Process SHA256, Initiator SHA256, CGO SHA256, File SHA256 - nada. Zip. There are other SHA256 fields I could check, but never let it be said I can't take a hint.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So I got to thinking and I have a few questions, I'd appreciate hearing your thoughts:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Does anyone do this, i.e. trying to resolve the issues causing these System Generated rules? Is it worth the effort?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Does anyone know if a System Generated IOC/BIOC Suppression rule will also resolve the issues generated before the rule? (The rule I picked was generated today, so I'd have thought the related Issues would still be around, but I found none.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Does anyone know if PAN writes these rules thinking about the apps/programs/images that cause them? In other words does the fact that this involves drvinst.exe, a well-known Windows process, allow them to generate the rule knowing "well that exe is fine" and NOT suppress issues for lesser known apps?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reading and hopefully helping me out?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Paul&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 03:36:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/questions-about-ioc-bioc-suppression-rules/m-p/1231984#M8446</guid>
      <dc:creator>ptrivino1</dc:creator>
      <dc:date>2025-06-18T03:36:30Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about IOC/BIOC Suppression rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/questions-about-ioc-bioc-suppression-rules/m-p/1232020#M8452</link>
      <description>&lt;P&gt;Hi Ptrivino1,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Answering to your questions:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Yes, it is recommended that you fine tune your Cortex XDR instance to your needs. It will clean up your alerts and findings that are kind of false positives.&amp;nbsp;&lt;BR /&gt;You know that some legit windows or other vendor applications can be used by malicious actors to compromise systems, going stealth to antiviruses due to legit applications even signed by the developers. LOLBIN attack techniques.&lt;/LI&gt;
&lt;LI&gt;No&lt;/LI&gt;
&lt;LI&gt;We are creating the rules based on observed behavior, and environmental prevalence.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Feel free to click on like the answer if this helped you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on "mark this as a Solution". Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;KR,&lt;/P&gt;
&lt;P&gt;Luis&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jun 2025 10:00:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/questions-about-ioc-bioc-suppression-rules/m-p/1232020#M8452</guid>
      <dc:creator>eluis</dc:creator>
      <dc:date>2025-06-18T10:00:54Z</dc:date>
    </item>
  </channel>
</rss>

