<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Rule for Detection Powershell Execution in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/rule-for-detection-powershell-execution/m-p/1243841#M8917</link>
    <description>&lt;P&gt;I created a BIOC to detect running processes in PowerShell and I intend to exclude some processes to avoid showing too many false positives, such as: SenseIR.exe and CompatTelRunner.exe.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JLopes279044_0-1765704165983.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70114i49AF9FA3B0CB9797/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JLopes279044_0-1765704165983.png" alt="JLopes279044_0-1765704165983.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JLopes279044_1-1765704190548.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70115i11E7855F5FA778E5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JLopes279044_1-1765704190548.png" alt="JLopes279044_1-1765704190548.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Cortex XDR" id="Cortex_XDR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 14 Dec 2025 09:23:37 GMT</pubDate>
    <dc:creator>J.Lopes279044</dc:creator>
    <dc:date>2025-12-14T09:23:37Z</dc:date>
    <item>
      <title>Rule for Detection Powershell Execution</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/rule-for-detection-powershell-execution/m-p/1243841#M8917</link>
      <description>&lt;P&gt;I created a BIOC to detect running processes in PowerShell and I intend to exclude some processes to avoid showing too many false positives, such as: SenseIR.exe and CompatTelRunner.exe.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JLopes279044_0-1765704165983.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70114i49AF9FA3B0CB9797/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JLopes279044_0-1765704165983.png" alt="JLopes279044_0-1765704165983.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JLopes279044_1-1765704190548.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70115i11E7855F5FA778E5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JLopes279044_1-1765704190548.png" alt="JLopes279044_1-1765704190548.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Cortex XDR" id="Cortex_XDR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Dec 2025 09:23:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/rule-for-detection-powershell-execution/m-p/1243841#M8917</guid>
      <dc:creator>J.Lopes279044</dc:creator>
      <dc:date>2025-12-14T09:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: Rule for Detection Powershell Execution</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/rule-for-detection-powershell-execution/m-p/1249056#M9171</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/451077209"&gt;@J.Lopes279044&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="275" data-start="83"&gt;To exclude legitimate processes like &lt;STRONG data-end="135" data-start="120"&gt;SenseIR.exe&lt;/STRONG&gt; and &lt;STRONG data-end="163" data-start="140"&gt;CompatTelRunner.exe&lt;/STRONG&gt; from your custom PowerShell BIOC rule and reduce false positives, you can use one of the following two methods:&lt;/P&gt;
&lt;H4 data-end="339" data-start="282"&gt;Option 1: Create a BIOC Suppression Rule (Recommended):&lt;/H4&gt;
&lt;P data-end="539" data-start="341"&gt;This is the preferred method because it prevents the detection engine from matching the activity against specific legitimate processes without requiring you to modify the underlying BIOC rule logic.&lt;/P&gt;
&lt;H4 data-end="551" data-start="541"&gt;Steps:&lt;/H4&gt;
&lt;OL data-end="1060" data-start="553"&gt;
&lt;LI data-end="642" data-start="553"&gt;
&lt;P data-end="642" data-start="556"&gt;Navigate to:&lt;BR data-end="571" data-start="568" /&gt;&lt;STRONG data-end="642" data-start="574"&gt;Settings &amp;gt; Exceptions Configuration &amp;gt; IOC/BIOC Suppression Rules&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="693" data-start="644"&gt;
&lt;P data-end="693" data-start="647"&gt;Click &lt;STRONG data-end="666" data-start="653"&gt;+Add Rule&lt;/STRONG&gt; and select &lt;STRONG data-end="692" data-start="678"&gt;Create New&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="855" data-start="695"&gt;
&lt;P data-end="855" data-start="698"&gt;In the &lt;STRONG data-end="714" data-start="705"&gt;Scope&lt;/STRONG&gt; section, define the criteria for the processes you wish to exclude&lt;BR data-end="784" data-start="781" /&gt;(for example: &lt;EM data-end="853" data-start="801"&gt;Process Name is SenseIR.exe or CompatTelRunner.exe&lt;/EM&gt;).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="911" data-start="857"&gt;
&lt;P data-end="911" data-start="860"&gt;Under &lt;STRONG data-end="884" data-start="866"&gt;BIOC selection&lt;/STRONG&gt;, choose &lt;STRONG data-end="910" data-start="893"&gt;Specific BIOC&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="986" data-start="913"&gt;
&lt;P data-end="986" data-start="916"&gt;Search for and select the custom BIOC rule you created for PowerShell.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1060" data-start="988"&gt;
&lt;P data-end="1060" data-start="991"&gt;Save the rule to suppress future alerts for these specific processes.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;-------------------------------------------&lt;/P&gt;
&lt;H4 data-end="1113" data-start="1067"&gt;Option 2: Modify the Custom BIOC Rule Logic:&lt;/H4&gt;
&lt;P data-end="1218" data-start="1115"&gt;If you prefer to tune the rule itself, you can add exclusion filters directly into the rule definition.&lt;/P&gt;
&lt;H5 data-end="1253" data-start="1220"&gt;Using the BIOC Builder (GUI):&lt;/H5&gt;
&lt;OL data-end="1467" data-start="1255"&gt;
&lt;LI data-end="1302" data-start="1255"&gt;
&lt;P data-end="1302" data-start="1258"&gt;Navigate to:&lt;BR data-end="1273" data-start="1270" /&gt;&lt;STRONG data-end="1302" data-start="1276"&gt;Detection Rules &amp;gt; BIOC&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1340" data-start="1304"&gt;
&lt;P data-end="1340" data-start="1307"&gt;Locate and edit your custom BIOC.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1467" data-start="1342"&gt;
&lt;P data-end="1467" data-start="1345"&gt;In the &lt;STRONG data-end="1363" data-start="1352"&gt;Filters&lt;/STRONG&gt; section, add a condition to exclude the processes using the &lt;STRONG data-end="1442" data-start="1424"&gt;Does Not Equal&lt;/STRONG&gt; or &lt;STRONG data-end="1456" data-start="1446"&gt;Not In&lt;/STRONG&gt; operators.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P data-end="1494" data-start="1469"&gt;&lt;STRONG data-end="1494" data-start="1469"&gt;Example filter logic:&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="relative w-full my-4"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border corner-superellipse/1.1 border-token-border-light bg-token-bg-elevated-secondary rounded-3xl"&gt;
&lt;DIV class="pointer-events-none absolute inset-x-px top-6 bottom-6"&gt;
&lt;DIV class="sticky z-1!"&gt;
&lt;DIV class="bg-token-bg-elevated-secondary sticky"&gt;&lt;SPAN&gt;Process Name != SenseIR.exe&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="corner-superellipse/1.1 rounded-3xl bg-token-bg-elevated-secondary"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&lt;SPAN&gt;AND Process Name != CompatTelRunner.exe&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;H5&gt;&lt;SPAN&gt;Using XQL (Query-Based BIOC):&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-end="1717" data-start="1613"&gt;If your BIOC is based on an XQL query, you can add a filter to exclude the specific process image names:&lt;/P&gt;
&lt;DIV class="relative w-full my-4"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border corner-superellipse/1.1 border-token-border-light bg-token-bg-elevated-secondary rounded-3xl"&gt;
&lt;DIV class="corner-superellipse/1.1 rounded-3xl bg-token-bg-elevated-secondary"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&lt;SPAN&gt;| filter actor_process_image_name not in ("SenseIR.exe", "CompatTelRunner.exe")&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-end="1860" data-start="1808"&gt;Alternatively, using individual “not equal” filters:&lt;/P&gt;
&lt;DIV class="relative w-full my-4"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border corner-superellipse/1.1 border-token-border-light bg-token-bg-elevated-secondary rounded-3xl"&gt;
&lt;DIV class="corner-superellipse/1.1 rounded-3xl bg-token-bg-elevated-secondary"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&lt;SPAN&gt;| filter actor_process_image_name != "SenseIR.exe" &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt; and actor_process_image_name != "CompatTelRunner.exe"&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H5&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;SPAN&gt;Additional Best Practices:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H5&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="2398" data-start="2016"&gt;
&lt;LI data-end="2213" data-start="2016"&gt;
&lt;P data-end="2213" data-start="2018"&gt;&lt;STRONG data-end="2044" data-start="2018"&gt;Hash-Based Exclusions:&lt;/STRONG&gt;&lt;BR data-end="2047" data-start="2044" /&gt;If the process names are too common and you are concerned about potential security gaps, consider excluding them by their file hashes (MD5/SHA256) instead of names.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="2398" data-start="2215"&gt;
&lt;P data-is-last-node="" data-end="2398" data-start="2217"&gt;&lt;STRONG data-end="2242" data-start="2217"&gt;Restriction Profiles:&lt;/STRONG&gt;&lt;BR data-end="2245" data-start="2242" /&gt;If you intend to use this BIOC for prevention (blocking), ensure it is added to a Restriction Profile and enabled for the appropriate target endpoints.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 13:25:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/rule-for-detection-powershell-execution/m-p/1249056#M9171</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-02-26T13:25:13Z</dc:date>
    </item>
  </channel>
</rss>

