<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Application Fingerprinting in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253464#M9309</link>
    <description>&lt;P&gt;Hello Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to understand if application fingerprinting can be achieved in cortex. If yes, what is the approach of achieving default block for all the unknown application.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and Regards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 05 May 2026 12:30:48 GMT</pubDate>
    <dc:creator>S.Jagushte774563</dc:creator>
    <dc:date>2026-05-05T12:30:48Z</dc:date>
    <item>
      <title>Application Fingerprinting</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253464#M9309</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to understand if application fingerprinting can be achieved in cortex. If yes, what is the approach of achieving default block for all the unknown application.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and Regards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 12:30:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253464#M9309</guid>
      <dc:creator>S.Jagushte774563</dc:creator>
      <dc:date>2026-05-05T12:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: Application Fingerprinting</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253546#M9315</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/417995851"&gt;@S.Jagushte774563&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="165" data-start="0"&gt;Cortex XDR identifies and "fingerprints" applications primarily through unique identifiers such as SHA-256 file hashes, digital signers (signatures), and file paths.&lt;/P&gt;
&lt;P data-end="165" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="406" data-start="167"&gt;While Cortex XDR is primarily a threat prevention platform, you can achieve a "Zero Trust" or "Default Deny" application control posture where all unknown applications are blocked by default and only approved ones are permitted to execute.&lt;/P&gt;
&lt;H4 data-end="463" data-start="408" data-section-id="13kdnck"&gt;(Approaches for Default Block of Unknown Applications)&lt;/H4&gt;
&lt;P data-end="571" data-start="465"&gt;There are two primary methods to implement a default block posture for unknown applications in Cortex XDR:&lt;/P&gt;
&lt;H4 data-end="654" data-start="573" data-section-id="1qlkqtr"&gt;1. The Restriction Profile &amp;amp; Legacy Exceptions Approach (Strict Allowlisting)&lt;/H4&gt;
&lt;P data-end="739" data-start="655"&gt;This is the most common method for implementing a strict application control policy.&lt;/P&gt;
&lt;UL data-end="1267" data-start="741"&gt;
&lt;LI data-end="882" data-start="741" data-section-id="1lo24t0"&gt;&lt;STRONG data-end="781" data-start="743"&gt;Step 1: Create a broad block rule.&lt;/STRONG&gt;&lt;BR data-end="784" data-start="781" /&gt;Create a Restrictions Profile and add a broad wildcard (e.g., &lt;CODE data-end="851" data-start="848"&gt;*&lt;/CODE&gt; or &lt;CODE data-end="862" data-start="855"&gt;*.exe&lt;/CODE&gt;) to the Block List.&lt;/LI&gt;
&lt;LI data-end="1103" data-start="884" data-section-id="9stwsx"&gt;&lt;STRONG data-end="931" data-start="886"&gt;Step 2: Explicitly define approved items.&lt;/STRONG&gt;&lt;BR data-end="934" data-start="931" /&gt;Use the Allow List within the Restrictions Profile or create Legacy Agent Exceptions to permit specific trusted applications based on their file path, hash, or signer.&lt;/LI&gt;
&lt;LI data-end="1267" data-start="1105" data-section-id="ram0w9"&gt;&lt;STRONG data-end="1120" data-start="1107"&gt;Priority:&lt;/STRONG&gt;&lt;BR data-end="1123" data-start="1120" /&gt;The agent prioritizes the Allow List over the Block List, ensuring that approved applications run even if they match the broad wildcard block.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1320" data-start="1269" data-section-id="782pha"&gt;2. The Malware Profile "Block Unknown" Approach&lt;/H4&gt;
&lt;P data-end="1453" data-start="1321"&gt;This method relies on WildFire threat intelligence to determine if an application is known to the environment or Palo Alto Networks.&lt;/P&gt;
&lt;UL data-end="1966" data-start="1455"&gt;
&lt;LI data-end="1598" data-start="1455" data-section-id="1fulu73"&gt;&lt;STRONG data-end="1479" data-start="1457"&gt;Action on Unknown:&lt;/STRONG&gt;&lt;BR data-end="1482" data-start="1479" /&gt;Within the Malware Security Profile, set the configuration &lt;EM data-end="1584" data-start="1543"&gt;Action when file is unknown to WildFire&lt;/EM&gt; to &lt;STRONG data-end="1597" data-start="1588"&gt;Block&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI data-end="1791" data-start="1600" data-section-id="12io3h6"&gt;&lt;STRONG data-end="1612" data-start="1602"&gt;Logic:&lt;/STRONG&gt;&lt;BR data-end="1615" data-start="1612" /&gt;When an application attempts to run, the agent calculates its SHA-256 hash. If WildFire does not have a verdict (Benign or Malware) for that hash, the application is blocked.&lt;/LI&gt;
&lt;LI data-end="1966" data-start="1793" data-section-id="hij54q"&gt;&lt;STRONG data-end="1806" data-start="1795"&gt;Caveat:&lt;/STRONG&gt;&lt;BR data-end="1809" data-start="1806" /&gt;This approach can be high-impact, as new legitimate files or temporary DLLs (e.g., from .NET updates) might be blocked until they are analyzed by WildFire.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2004" data-start="1968" data-section-id="y1e4j"&gt;Best Practices and Considerations:&lt;/H4&gt;
&lt;UL data-end="2548" data-start="2006"&gt;
&lt;LI data-end="2188" data-start="2006" data-section-id="sxpaaw"&gt;&lt;STRONG data-end="2024" data-start="2008"&gt;High Impact:&lt;/STRONG&gt;&lt;BR data-end="2027" data-start="2024" /&gt;Strict allowlisting is a high-impact configuration. It is recommended to test these policies on a small group of non-critical systems before a broader rollout.&lt;/LI&gt;
&lt;LI data-end="2395" data-start="2190" data-section-id="151rig"&gt;&lt;STRONG data-end="2223" data-start="2192"&gt;Fingerprinting via Signers:&lt;/STRONG&gt;&lt;BR data-end="2226" data-start="2223" /&gt;To avoid manually managing hashes for every software update, you can use signer-based allowlisting (e.g., allowing all applications signed by "Microsoft Corporation").&lt;/LI&gt;
&lt;LI data-end="2548" data-start="2397" data-section-id="exoh6z"&gt;&lt;STRONG data-end="2422" data-start="2399"&gt;Identifying Hashes:&lt;/STRONG&gt;&lt;BR data-end="2425" data-start="2422" /&gt;To obtain the SHA-256 "fingerprint" of a specific file locally for a block/allow rule, you can use the following command:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl"&gt;
&lt;DIV class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback"&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="pe-11 pt-3"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼd ͼr" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;PRE class="cm-content q9tKkq_readonly m-0"&gt;&lt;CODE&gt;&lt;SPAN&gt;cytool file query [PATHTOFILE]&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking &lt;STRONG&gt;like&lt;/STRONG&gt; and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 18:52:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253546#M9315</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-05-06T18:52:06Z</dc:date>
    </item>
  </channel>
</rss>

