<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Honeyuser with machine account name in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/honeyuser-with-machine-account-name/m-p/1247017#M9071</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1602113155"&gt;@T.Nurmi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To create a Behavioral Indicator of Compromise (BIOC) rule in Cortex XDR that alerts when an Active Directory (AD) machine account executes the &lt;CODE&gt;net use&lt;/CODE&gt; command, you can use either the BIOC Rule Builder UI or a custom XQL query.&lt;/P&gt;
&lt;H5&gt;Option 1: Using the BIOC Rule Builder UI&lt;/H5&gt;
&lt;H5&gt;Navigate to BIOC Configuration&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;Log in to the Cortex XDR console.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Go to &lt;STRONG&gt;Detection &amp;gt; Behavioral Indicators&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Click &lt;STRONG&gt;+ Add BIOC&lt;/STRONG&gt; and select the &lt;STRONG&gt;Process&lt;/STRONG&gt; entity.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;Define Rule Criteria&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Process Name&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Image Name equals &lt;CODE&gt;net.exe&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Command Line Argument&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Command Line contains &lt;CODE&gt;net use&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Target Machine Account&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Filter the actor username to match Active Directory machine accounts, which typically end with a dollar sign (&lt;CODE&gt;$&lt;/CODE&gt;).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Regex: &lt;CODE&gt;.*\$&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Wildcard: &lt;CODE&gt;*$&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Set Alert and Severity&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Choose an appropriate severity level (for example, Medium or High).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Set the action to &lt;STRONG&gt;Alert&lt;/STRONG&gt; (or &lt;STRONG&gt;Block&lt;/STRONG&gt; if you intend to enforce prevention via a Restriction Profile).&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Save and Deploy&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;Save the rule.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;If using this as a prevention rule, add it to a &lt;STRONG&gt;Restriction Profile&lt;/STRONG&gt; and apply that profile to the relevant endpoints.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;Option 2: Using XQL (Advanced)&lt;/H4&gt;
&lt;P&gt;You can also create a custom BIOC using an XQL query to detect this behavior:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-xql"&gt;dataset = xdr_data
| filter event_type = ENUM.PROCESS
| filter action_process_image_name = "net.exe"
| filter action_process_command_line contains "net use"
| filter actor_effective_username ~= ".*\\$"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H4&gt;Important Considerations&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Asynchronous Execution&lt;/STRONG&gt;&lt;BR /&gt;Custom BIOC rules are typically asynchronous, meaning the process may execute before the rule completes evaluation of the causality chain.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;AD Context&lt;/STRONG&gt;&lt;BR /&gt;Analytics-based BIOCs may leverage contextual baselining. For custom rules, filtering for machine accounts must be explicitly defined.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Testing&lt;/STRONG&gt;&lt;BR /&gt;Always use the &lt;STRONG&gt;Test&lt;/STRONG&gt; feature in the BIOC rule builder to validate the rule against historical data before enabling it in production.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy New year!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
    <pubDate>Thu, 29 Jan 2026 15:00:36 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-01-29T15:00:36Z</dc:date>
    <item>
      <title>Honeyuser with machine account name</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/honeyuser-with-machine-account-name/m-p/1246988#M9068</link>
      <description>&lt;P&gt;How to create BIOC rule for AD machine account. Example if someone use net use command. so how to create alert for this use case ?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 08:28:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/honeyuser-with-machine-account-name/m-p/1246988#M9068</guid>
      <dc:creator>T.Nurmi</dc:creator>
      <dc:date>2026-01-29T08:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Honeyuser with machine account name</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/honeyuser-with-machine-account-name/m-p/1247017#M9071</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1602113155"&gt;@T.Nurmi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To create a Behavioral Indicator of Compromise (BIOC) rule in Cortex XDR that alerts when an Active Directory (AD) machine account executes the &lt;CODE&gt;net use&lt;/CODE&gt; command, you can use either the BIOC Rule Builder UI or a custom XQL query.&lt;/P&gt;
&lt;H5&gt;Option 1: Using the BIOC Rule Builder UI&lt;/H5&gt;
&lt;H5&gt;Navigate to BIOC Configuration&lt;/H5&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;Log in to the Cortex XDR console.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Go to &lt;STRONG&gt;Detection &amp;gt; Behavioral Indicators&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Click &lt;STRONG&gt;+ Add BIOC&lt;/STRONG&gt; and select the &lt;STRONG&gt;Process&lt;/STRONG&gt; entity.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5&gt;Define Rule Criteria&lt;/H5&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Process Name&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Image Name equals &lt;CODE&gt;net.exe&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Command Line Argument&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Command Line contains &lt;CODE&gt;net use&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Target Machine Account&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Filter the actor username to match Active Directory machine accounts, which typically end with a dollar sign (&lt;CODE&gt;$&lt;/CODE&gt;).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Regex: &lt;CODE&gt;.*\$&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Wildcard: &lt;CODE&gt;*$&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Set Alert and Severity&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Choose an appropriate severity level (for example, Medium or High).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Set the action to &lt;STRONG&gt;Alert&lt;/STRONG&gt; (or &lt;STRONG&gt;Block&lt;/STRONG&gt; if you intend to enforce prevention via a Restriction Profile).&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Save and Deploy&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;Save the rule.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;If using this as a prevention rule, add it to a &lt;STRONG&gt;Restriction Profile&lt;/STRONG&gt; and apply that profile to the relevant endpoints.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;Option 2: Using XQL (Advanced)&lt;/H4&gt;
&lt;P&gt;You can also create a custom BIOC using an XQL query to detect this behavior:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-xql"&gt;dataset = xdr_data
| filter event_type = ENUM.PROCESS
| filter action_process_image_name = "net.exe"
| filter action_process_command_line contains "net use"
| filter actor_effective_username ~= ".*\\$"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H4&gt;Important Considerations&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Asynchronous Execution&lt;/STRONG&gt;&lt;BR /&gt;Custom BIOC rules are typically asynchronous, meaning the process may execute before the rule completes evaluation of the causality chain.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;AD Context&lt;/STRONG&gt;&lt;BR /&gt;Analytics-based BIOCs may leverage contextual baselining. For custom rules, filtering for machine accounts must be explicitly defined.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Testing&lt;/STRONG&gt;&lt;BR /&gt;Always use the &lt;STRONG&gt;Test&lt;/STRONG&gt; feature in the BIOC rule builder to validate the rule against historical data before enabling it in production.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy New year!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 15:00:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/honeyuser-with-machine-account-name/m-p/1247017#M9071</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-01-29T15:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: Honeyuser with machine account name</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/honeyuser-with-machine-account-name/m-p/1247086#M9076</link>
      <description>&lt;P&gt;Hi. Thanks for greate answer. What about to use just this&amp;nbsp;preset = network_story &lt;BR /&gt;| filter actor_effective_username ="*$" , if i want to follow all detections aroiund one account?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 09:04:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/honeyuser-with-machine-account-name/m-p/1247086#M9076</guid>
      <dc:creator>T.Nurmi</dc:creator>
      <dc:date>2026-01-30T09:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: Honeyuser with machine account name</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/honeyuser-with-machine-account-name/m-p/1247118#M9078</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1602113155"&gt;@T.Nurmi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding your question about using&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;preset = network_story | filter actor_effective_username ="*$"&lt;/CODE&gt;:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Dataset Suitability:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;network_story&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;preset is specifically designed for analyzing network sessions and DNS resolutions. While this is useful for following the network activity of an account, it will&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;trigger on the execution of the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;net use&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;command itself. Command executions are logged as process events in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;xdr_data&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;xdr_process&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;datasets.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Machine Account Filtering:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Your use of&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;actor_effective_username ="*$"&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(or the regex&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;~= ".*\$"&lt;/CODE&gt;) is a technically correct way to identify Active Directory machine accounts, as they are distinguished by the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;$&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;suffix.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Recommendation for Investigation:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If your goal is to follow&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;all&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;detections and activities around one account, it is more comprehensive to use&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;dataset = xdr_data&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(for raw telemetry) or&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;dataset = alerts&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(for existing detections).&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;network_story&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;will only provide a limited view focused on network connections.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 13:57:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/honeyuser-with-machine-account-name/m-p/1247118#M9078</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-01-30T13:57:15Z</dc:date>
    </item>
  </channel>
</rss>

