<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cortex XDR Pro / Browser extensions in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-browser-extensions/m-p/1248479#M9142</link>
    <description>&lt;P&gt;Has anyone ever configured their environment to detect on unauthorized or unsupported browser extensions? Or conduct a threat hunt based on known facts?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We've seen some slip through the cracks and I know Cortex doesn't natively detect abused or malicious extensions. Any XQL ideas out there perhaps?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Feb 2026 12:27:42 GMT</pubDate>
    <dc:creator>CraigV123</dc:creator>
    <dc:date>2026-02-18T12:27:42Z</dc:date>
    <item>
      <title>Cortex XDR Pro / Browser extensions</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-browser-extensions/m-p/1248479#M9142</link>
      <description>&lt;P&gt;Has anyone ever configured their environment to detect on unauthorized or unsupported browser extensions? Or conduct a threat hunt based on known facts?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We've seen some slip through the cracks and I know Cortex doesn't natively detect abused or malicious extensions. Any XQL ideas out there perhaps?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 12:27:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-browser-extensions/m-p/1248479#M9142</guid>
      <dc:creator>CraigV123</dc:creator>
      <dc:date>2026-02-18T12:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Pro / Browser extensions</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-browser-extensions/m-p/1248482#M9144</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112301"&gt;@CraigV123&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="0" data-end="213"&gt;I would like to inform you that Cortex XDR does not natively provide a dashboard inventory or direct blocking of browser extensions by ID/name, you can configure detection and conduct threat hunts using XQL and existing behavioral modules.&lt;/P&gt;
&lt;H4 data-start="220" data-end="252"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-start="220" data-end="252"&gt;1. Native Product Limitations:&lt;/H4&gt;
&lt;P data-start="254" data-end="533"&gt;-Cortex XDR operates primarily at the Operating System (OS) level. Because browser extensions run within the browser’s internal sandbox environment and do not typically create independent OS processes, the agent lacks native visibility into the internal list of loaded extensions.&lt;/P&gt;
&lt;P data-start="254" data-end="533"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="535" data-end="725"&gt;-Direct management or blocking of specific extension IDs is a recognized product limitation, and several feature requests (CXDR-I-1134 and CXDR-I-146) exist to address this in future updates.&lt;/P&gt;
&lt;HR data-start="727" data-end="730" /&gt;
&lt;H4 data-start="732" data-end="762"&gt;2. XQL Threat Hunting Ideas:&lt;/H4&gt;
&lt;P data-start="764" data-end="914"&gt;You can hunt for unauthorized extensions by searching for file activity in standard extension directories or extracting extension IDs from file paths.&lt;/P&gt;
&lt;H5 data-start="916" data-end="956"&gt;A. Searching for Known Malicious IDs:&lt;/H5&gt;
&lt;P data-start="958" data-end="1079"&gt;If you have a list of malicious or unauthorized extension IDs, you can search for their presence in the file system logs.&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl corner-superellipse/1.1 relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-sql"&gt;&lt;SPAN&gt;dataset &lt;SPAN class="hljs-operator"&gt;=&lt;/SPAN&gt; xdr_data
&lt;SPAN class="hljs-operator"&gt;|&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;filter&lt;/SPAN&gt; file_path &lt;SPAN class="hljs-keyword"&gt;contains&lt;/SPAN&gt; "Chrome\\User Data" &lt;SPAN class="hljs-keyword"&gt;and&lt;/SPAN&gt; file_path &lt;SPAN class="hljs-keyword"&gt;contains&lt;/SPAN&gt; "[INSERT_EXTENSION_ID_HERE]"
&lt;SPAN class="hljs-operator"&gt;|&lt;/SPAN&gt; dedup agent_hostname&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-sql"&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H5 data-start="1240" data-end="1285"&gt;B. Extracting All Installed Extension IDs:&lt;/H5&gt;
&lt;P data-start="1287" data-end="1435"&gt;You can use regular expressions to extract 32-character extension IDs from file path events to create a list of what is running in your environment.&lt;/P&gt;
&lt;P data-start="1287" data-end="1435"&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl corner-superellipse/1.1 relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-sql"&gt;&lt;SPAN&gt;config case_sensitive &lt;SPAN class="hljs-operator"&gt;=&lt;/SPAN&gt; &lt;SPAN class="hljs-literal"&gt;false&lt;/SPAN&gt;
&lt;SPAN class="hljs-operator"&gt;|&lt;/SPAN&gt; dataset &lt;SPAN class="hljs-operator"&gt;=&lt;/SPAN&gt; xdr_data
&lt;SPAN class="hljs-operator"&gt;|&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;filter&lt;/SPAN&gt; event_type &lt;SPAN class="hljs-operator"&gt;=&lt;/SPAN&gt; FILE &lt;SPAN class="hljs-keyword"&gt;and&lt;/SPAN&gt; event_sub_type &lt;SPAN class="hljs-operator"&gt;!=&lt;/SPAN&gt; FILE_REMOVE
&lt;SPAN class="hljs-operator"&gt;|&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;filter&lt;/SPAN&gt; action_file_path &lt;SPAN class="hljs-keyword"&gt;contains&lt;/SPAN&gt; "Extensions"
&lt;SPAN class="hljs-operator"&gt;|&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;alter&lt;/SPAN&gt; extension_id &lt;SPAN class="hljs-operator"&gt;=&lt;/SPAN&gt; arrayindex(regextract(action_file_path, "(\w{32})"), &lt;SPAN class="hljs-number"&gt;0&lt;/SPAN&gt;)
&lt;SPAN class="hljs-operator"&gt;|&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;filter&lt;/SPAN&gt; extension_id &lt;SPAN class="hljs-operator"&gt;!=&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;null&lt;/SPAN&gt;
&lt;SPAN class="hljs-operator"&gt;|&lt;/SPAN&gt; stats &lt;SPAN class="hljs-built_in"&gt;count&lt;/SPAN&gt;() &lt;SPAN class="hljs-keyword"&gt;by&lt;/SPAN&gt; agent_hostname, extension_id&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre! language-sql"&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H5 data-start="1771" data-end="1801"&gt;C. Locating Manifest Files:&lt;/H5&gt;
&lt;P data-start="1803" data-end="2005"&gt;To identify the name and details of an extension found via hunting, you can use the File Search and Destroy feature or Live Terminal to locate the &lt;CODE data-start="1950" data-end="1965"&gt;manifest.json&lt;/CODE&gt; file associated with the identified ID:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-2xl corner-superellipse/1.1 relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="sticky top-[calc(var(--sticky-padding-top)+9*var(--spacing))]"&gt;
&lt;DIV class="absolute end-0 bottom-0 flex h-9 items-center pe-2"&gt;
&lt;DIV class="bg-token-bg-elevated-secondary text-token-text-secondary flex items-center gap-4 rounded-sm px-2 font-sans text-xs"&gt;&lt;CODE class="whitespace-pre!"&gt;C:\Users\&amp;lt;&lt;SPAN class="hljs-keyword"&gt;user&lt;/SPAN&gt;&amp;gt;\AppData\&lt;SPAN class="hljs-keyword"&gt;Local&lt;/SPAN&gt;\Google\Chrome\&lt;SPAN class="hljs-keyword"&gt;User&lt;/SPAN&gt; Data\&lt;SPAN class="hljs-keyword"&gt;Default&lt;/SPAN&gt;\Extensions\&amp;lt;extension_id&amp;gt;\&amp;lt;&lt;SPAN class="hljs-keyword"&gt;version&lt;/SPAN&gt;&amp;gt;\manifest.json&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;H4 data-start="2133" data-end="2185"&gt;3. Detection via Analytics and Behavioral Modules:&lt;/H4&gt;
&lt;P data-start="2187" data-end="2284"&gt;Cortex XDR includes built-in mechanisms to catch extensions when they exhibit malicious behavior:&lt;/P&gt;
&lt;UL data-start="2286" data-end="2732"&gt;
&lt;LI data-start="2286" data-end="2524"&gt;
&lt;P data-start="2288" data-end="2524"&gt;&lt;STRONG data-start="2288" data-end="2309"&gt;Analytics Alerts:&lt;/STRONG&gt; The platform can trigger the alert &lt;EM data-start="2345" data-end="2411"&gt;"A browser extension was installed or loaded in an uncommon way"&lt;/EM&gt; based on suspicious installation methods (e.g., loading via special command-line arguments or LOLBIN processes).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2525" data-end="2732"&gt;
&lt;P data-start="2527" data-end="2732"&gt;&lt;STRONG data-start="2527" data-end="2566"&gt;Behavioral Threat Protection (BTP):&lt;/STRONG&gt; If an extension attempts to drop a payload, steal credentials, or perform process injection, BTP and Anti-Exploit modules will block the action at the process level.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR data-start="2734" data-end="2737" /&gt;
&lt;H4 data-start="2739" data-end="2776"&gt;4. Recommended Management Strategy:&lt;/H4&gt;
&lt;P data-start="2778" data-end="2913"&gt;For proactive enforcement, it is recommended to supplement Cortex XDR with administrative tools designed for application-layer control:&lt;/P&gt;
&lt;UL data-start="2915" data-end="3298" data-is-last-node="" data-is-only-node=""&gt;
&lt;LI data-start="2915" data-end="3043"&gt;
&lt;P data-start="2917" data-end="3043"&gt;&lt;STRONG data-start="2917" data-end="2929"&gt;Windows:&lt;/STRONG&gt; Use Group Policy Objects (GPO) to configure the &lt;EM data-start="2978" data-end="3007"&gt;Extension Install Blocklist&lt;/EM&gt; or &lt;EM data-start="3011" data-end="3022"&gt;Allowlist&lt;/EM&gt; for Chrome and Edge.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="3044" data-end="3140"&gt;
&lt;P data-start="3046" data-end="3140"&gt;&lt;STRONG data-start="3046" data-end="3056"&gt;macOS:&lt;/STRONG&gt; Use Mobile Device Management (MDM) profiles to push browser configuration payloads.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="3141" data-end="3298" data-is-last-node=""&gt;
&lt;P data-start="3143" data-end="3298" data-is-last-node=""&gt;&lt;STRONG data-start="3143" data-end="3167"&gt;Enterprise Browsers:&lt;/STRONG&gt; Consider solutions such as Prisma Access Browser, which provide granular application-layer visibility into extension environments.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 13:58:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-browser-extensions/m-p/1248482#M9144</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-02-18T13:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Pro / Browser extensions</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-browser-extensions/m-p/1248920#M9166</link>
      <description>&lt;P&gt;To add to the excellent suggestions made by&amp;nbsp;&lt;SPAN class="UserName lia-user-name lia-user-rank-L4-Transporter lia-component-message-view-widget-author-username"&gt;&lt;A id="link_14" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241098" aria-label="View Profile of susekar" target="_blank"&gt;&lt;SPAN class=""&gt;susekar&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would suggest having a look at&amp;nbsp;&lt;A href="https://github.com/toborrm9/malicious_extension_sentry" target="_blank"&gt;https://github.com/toborrm9/malicious_extension_sentry&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Not saying you should run this tool, but have a look at this more specifically for a list of known malicious extensionID.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/toborrm9/malicious_extension_sentry/blob/main/Malicious-Extensions.csv" target="_blank"&gt;https://github.com/toborrm9/malicious_extension_sentry/blob/main/Malicious-Extensions.csv&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 20:13:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-browser-extensions/m-p/1248920#M9166</guid>
      <dc:creator>Alexandre_Jodoin</dc:creator>
      <dc:date>2026-02-24T20:13:42Z</dc:date>
    </item>
  </channel>
</rss>

