<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with IOC not blocking MyPDFSwitch executable in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/issue-with-ioc-not-blocking-mypdfswitch-executable/m-p/1251077#M9222</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1588122947"&gt;@J.MorenoCiudad&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="219" data-start="0"&gt;The Indicator of Compromise (IOC) rule you created is likely not working as intended for two primary reasons: IOC rules are strictly detection-based mechanisms and do not support wildcard patterns for execution control.&lt;/P&gt;
&lt;P data-end="219" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="601" data-start="221"&gt;&lt;STRONG data-end="256" data-start="221"&gt;1. IOC Rules are Detection Only&lt;/STRONG&gt;&lt;BR data-end="259" data-start="256" /&gt;Custom IOC rules in Cortex XDR are designed for visibility and alerting rather than prevention. Even if your security policy is set to "Block," alerts triggered by IOC rules (whether based on file names, hashes, or IPs) will appear as "Detected (Reported)" or "Reported" because the IOC engine does not have an inherent enforcement mechanism.&lt;/P&gt;
&lt;P data-end="601" data-start="221"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="839" data-start="603"&gt;&lt;STRONG data-end="638" data-start="603"&gt;2. Wildcard Limitations in IOCs&lt;/STRONG&gt;&lt;BR data-end="641" data-start="638" /&gt;IOC rules are static and simple. Modifying a filename (for example, by adding random numbers) will break the matching for a static indicator, as IOCs are intended to match the exact string provided.&lt;/P&gt;
&lt;P data-end="839" data-start="603"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1138" data-start="841"&gt;&lt;STRONG data-end="894" data-start="841"&gt;3. Understanding the "New" Alert (Backward Scans)&lt;/STRONG&gt;&lt;BR data-end="897" data-start="894" /&gt;The alert you received today may not indicate a real-time execution. When a new IOC rule is created or edited, Cortex XDR automatically performs a backward scan of historical data in the xdr_data dataset, typically covering the last 30 days.&lt;/P&gt;
&lt;P data-end="1138" data-start="841"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1273" data-start="1140"&gt;To verify if the alert is retroactive, check the JSON output of the alert (Alt + Right-click &amp;gt; Debug Alert) for the following fields:&lt;/P&gt;
&lt;UL data-end="1341" data-start="1274"&gt;
&lt;LI data-end="1316" data-start="1274" data-section-id="rp18kd"&gt;&lt;CODE data-end="1316" data-start="1276"&gt;"matching_status": "BACKWARDS_SCANNED"&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI data-end="1341" data-start="1317" data-section-id="1k1euzd"&gt;&lt;CODE data-end="1341" data-start="1319"&gt;"is_backwards": true&lt;/CODE&gt;&lt;CODE data-end="1341" data-start="1319"&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="1625" data-start="1343"&gt;&lt;STRONG data-end="1389" data-start="1343"&gt;Recommended Solution: Restriction Profiles&lt;/STRONG&gt;&lt;BR data-end="1392" data-start="1389" /&gt;To actively block files based on a naming pattern (wildcards) when the hash is random, you should use Restriction Profiles. Restriction Profiles allow for flexible execution control based on file attributes rather than static hashes.&lt;/P&gt;
&lt;P data-end="1625" data-start="1343"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1651" data-start="1627"&gt;&lt;STRONG data-end="1651" data-start="1627"&gt;Configuration Steps:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL data-end="2114" data-start="1652"&gt;
&lt;LI data-end="1723" data-start="1652" data-section-id="ihfbkb"&gt;Navigate to Endpoints &amp;gt; Policy Management &amp;gt; Prevention &amp;gt; Profiles.&lt;/LI&gt;
&lt;LI data-end="1757" data-start="1724" data-section-id="1eb9mom"&gt;Select the Restrictions tab.&lt;/LI&gt;
&lt;LI data-end="1853" data-start="1758" data-section-id="1vqe3uv"&gt;Create a new Restriction Profile or edit an existing one applied to your target endpoints.&lt;/LI&gt;
&lt;LI data-end="1904" data-start="1854" data-section-id="1uwuxcb"&gt;In the Executable Files section, click + Add.&lt;/LI&gt;
&lt;LI data-end="2042" data-start="1905" data-section-id="vv0t7r"&gt;In the PROCESS field, enter your pattern using the asterisk wildcard (for example, &lt;CODE data-end="2010" data-start="1991"&gt;*MyPDFSwitch*.exe&lt;/CODE&gt;) and set the ACTION to Block.&lt;/LI&gt;
&lt;LI data-end="2114" data-start="2043" data-section-id="1rxn4u8"&gt;Save the profile and ensure it is assigned to an active Policy Rule.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="2607" data-start="2116"&gt;&lt;STRONG data-end="2158" data-start="2116"&gt;Alternative: BIOC Rule with BTP Action&lt;/STRONG&gt;&lt;BR data-end="2161" data-start="2158" /&gt;If the file name is highly unpredictable or naming-based blocks are easily bypassed, create a custom Behavioral IOC (BIOC) rule. You can base this rule on consistent attributes like the digital signer, internal product name, or specific behaviors (for example, unusual command-line arguments). Once created, add the BIOC to a Restriction Profile and set it to a Block or Terminate Process action via the Behavioral Threat Prevention (BTP) module.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
    <pubDate>Fri, 27 Mar 2026 13:18:32 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-03-27T13:18:32Z</dc:date>
    <item>
      <title>Issue with IOC not blocking MyPDFSwitch executable</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/issue-with-ioc-not-blocking-mypdfswitch-executable/m-p/1250897#M9217</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;I have been receiving alerts related to a file named &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;MyPDFSwitch_8173674.exe&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, where the filename ends with random numbers.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;I created an IOC with the following pattern:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;MyPDFSwitch*.exe&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;However, today I received another alert related to this file, so I suspect that the IOC is not working properly.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Could you please advise what might be happening? We need to block this type of file in our environment.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you in advance.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 07:37:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/issue-with-ioc-not-blocking-mypdfswitch-executable/m-p/1250897#M9217</guid>
      <dc:creator>J.MorenoCiudad</dc:creator>
      <dc:date>2026-03-25T07:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with IOC not blocking MyPDFSwitch executable</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/issue-with-ioc-not-blocking-mypdfswitch-executable/m-p/1251077#M9222</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1588122947"&gt;@J.MorenoCiudad&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="219" data-start="0"&gt;The Indicator of Compromise (IOC) rule you created is likely not working as intended for two primary reasons: IOC rules are strictly detection-based mechanisms and do not support wildcard patterns for execution control.&lt;/P&gt;
&lt;P data-end="219" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="601" data-start="221"&gt;&lt;STRONG data-end="256" data-start="221"&gt;1. IOC Rules are Detection Only&lt;/STRONG&gt;&lt;BR data-end="259" data-start="256" /&gt;Custom IOC rules in Cortex XDR are designed for visibility and alerting rather than prevention. Even if your security policy is set to "Block," alerts triggered by IOC rules (whether based on file names, hashes, or IPs) will appear as "Detected (Reported)" or "Reported" because the IOC engine does not have an inherent enforcement mechanism.&lt;/P&gt;
&lt;P data-end="601" data-start="221"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="839" data-start="603"&gt;&lt;STRONG data-end="638" data-start="603"&gt;2. Wildcard Limitations in IOCs&lt;/STRONG&gt;&lt;BR data-end="641" data-start="638" /&gt;IOC rules are static and simple. Modifying a filename (for example, by adding random numbers) will break the matching for a static indicator, as IOCs are intended to match the exact string provided.&lt;/P&gt;
&lt;P data-end="839" data-start="603"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1138" data-start="841"&gt;&lt;STRONG data-end="894" data-start="841"&gt;3. Understanding the "New" Alert (Backward Scans)&lt;/STRONG&gt;&lt;BR data-end="897" data-start="894" /&gt;The alert you received today may not indicate a real-time execution. When a new IOC rule is created or edited, Cortex XDR automatically performs a backward scan of historical data in the xdr_data dataset, typically covering the last 30 days.&lt;/P&gt;
&lt;P data-end="1138" data-start="841"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1273" data-start="1140"&gt;To verify if the alert is retroactive, check the JSON output of the alert (Alt + Right-click &amp;gt; Debug Alert) for the following fields:&lt;/P&gt;
&lt;UL data-end="1341" data-start="1274"&gt;
&lt;LI data-end="1316" data-start="1274" data-section-id="rp18kd"&gt;&lt;CODE data-end="1316" data-start="1276"&gt;"matching_status": "BACKWARDS_SCANNED"&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI data-end="1341" data-start="1317" data-section-id="1k1euzd"&gt;&lt;CODE data-end="1341" data-start="1319"&gt;"is_backwards": true&lt;/CODE&gt;&lt;CODE data-end="1341" data-start="1319"&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="1625" data-start="1343"&gt;&lt;STRONG data-end="1389" data-start="1343"&gt;Recommended Solution: Restriction Profiles&lt;/STRONG&gt;&lt;BR data-end="1392" data-start="1389" /&gt;To actively block files based on a naming pattern (wildcards) when the hash is random, you should use Restriction Profiles. Restriction Profiles allow for flexible execution control based on file attributes rather than static hashes.&lt;/P&gt;
&lt;P data-end="1625" data-start="1343"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1651" data-start="1627"&gt;&lt;STRONG data-end="1651" data-start="1627"&gt;Configuration Steps:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL data-end="2114" data-start="1652"&gt;
&lt;LI data-end="1723" data-start="1652" data-section-id="ihfbkb"&gt;Navigate to Endpoints &amp;gt; Policy Management &amp;gt; Prevention &amp;gt; Profiles.&lt;/LI&gt;
&lt;LI data-end="1757" data-start="1724" data-section-id="1eb9mom"&gt;Select the Restrictions tab.&lt;/LI&gt;
&lt;LI data-end="1853" data-start="1758" data-section-id="1vqe3uv"&gt;Create a new Restriction Profile or edit an existing one applied to your target endpoints.&lt;/LI&gt;
&lt;LI data-end="1904" data-start="1854" data-section-id="1uwuxcb"&gt;In the Executable Files section, click + Add.&lt;/LI&gt;
&lt;LI data-end="2042" data-start="1905" data-section-id="vv0t7r"&gt;In the PROCESS field, enter your pattern using the asterisk wildcard (for example, &lt;CODE data-end="2010" data-start="1991"&gt;*MyPDFSwitch*.exe&lt;/CODE&gt;) and set the ACTION to Block.&lt;/LI&gt;
&lt;LI data-end="2114" data-start="2043" data-section-id="1rxn4u8"&gt;Save the profile and ensure it is assigned to an active Policy Rule.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="2607" data-start="2116"&gt;&lt;STRONG data-end="2158" data-start="2116"&gt;Alternative: BIOC Rule with BTP Action&lt;/STRONG&gt;&lt;BR data-end="2161" data-start="2158" /&gt;If the file name is highly unpredictable or naming-based blocks are easily bypassed, create a custom Behavioral IOC (BIOC) rule. You can base this rule on consistent attributes like the digital signer, internal product name, or specific behaviors (for example, unusual command-line arguments). Once created, add the BIOC to a Restriction Profile and set it to a Block or Terminate Process action via the Behavioral Threat Prevention (BTP) module.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2026 13:18:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/issue-with-ioc-not-blocking-mypdfswitch-executable/m-p/1251077#M9222</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-03-27T13:18:32Z</dc:date>
    </item>
  </channel>
</rss>

