<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Application Fingerprinting in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1254006#M9335</link>
    <description>&lt;P&gt;Hello Susekar,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for replying. I want to understand if i can prepare "Allow List" using Cortex platform. If yes what will be the approach?? I have tried obtaining the list using XQL but the telemetry that is ingested in cortex only covers the running applications or files with .exe extension. The query does not returns dormant application or silent .exe files. I want to parse and dedup all the .exe files available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and Regards&lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2026 05:17:19 GMT</pubDate>
    <dc:creator>S.Jagushte774563</dc:creator>
    <dc:date>2026-05-14T05:17:19Z</dc:date>
    <item>
      <title>Application Fingerprinting</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253464#M9309</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to understand if application fingerprinting can be achieved in cortex. If yes, what is the approach of achieving default block for all the unknown application.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and Regards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 12:30:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253464#M9309</guid>
      <dc:creator>S.Jagushte774563</dc:creator>
      <dc:date>2026-05-05T12:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: Application Fingerprinting</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253546#M9315</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/417995851"&gt;@S.Jagushte774563&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="165" data-start="0"&gt;Cortex XDR identifies and "fingerprints" applications primarily through unique identifiers such as SHA-256 file hashes, digital signers (signatures), and file paths.&lt;/P&gt;
&lt;P data-end="165" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="406" data-start="167"&gt;While Cortex XDR is primarily a threat prevention platform, you can achieve a "Zero Trust" or "Default Deny" application control posture where all unknown applications are blocked by default and only approved ones are permitted to execute.&lt;/P&gt;
&lt;H4 data-end="463" data-start="408" data-section-id="13kdnck"&gt;(Approaches for Default Block of Unknown Applications)&lt;/H4&gt;
&lt;P data-end="571" data-start="465"&gt;There are two primary methods to implement a default block posture for unknown applications in Cortex XDR:&lt;/P&gt;
&lt;H4 data-end="654" data-start="573" data-section-id="1qlkqtr"&gt;1. The Restriction Profile &amp;amp; Legacy Exceptions Approach (Strict Allowlisting)&lt;/H4&gt;
&lt;P data-end="739" data-start="655"&gt;This is the most common method for implementing a strict application control policy.&lt;/P&gt;
&lt;UL data-end="1267" data-start="741"&gt;
&lt;LI data-end="882" data-start="741" data-section-id="1lo24t0"&gt;&lt;STRONG data-end="781" data-start="743"&gt;Step 1: Create a broad block rule.&lt;/STRONG&gt;&lt;BR data-end="784" data-start="781" /&gt;Create a Restrictions Profile and add a broad wildcard (e.g., &lt;CODE data-end="851" data-start="848"&gt;*&lt;/CODE&gt; or &lt;CODE data-end="862" data-start="855"&gt;*.exe&lt;/CODE&gt;) to the Block List.&lt;/LI&gt;
&lt;LI data-end="1103" data-start="884" data-section-id="9stwsx"&gt;&lt;STRONG data-end="931" data-start="886"&gt;Step 2: Explicitly define approved items.&lt;/STRONG&gt;&lt;BR data-end="934" data-start="931" /&gt;Use the Allow List within the Restrictions Profile or create Legacy Agent Exceptions to permit specific trusted applications based on their file path, hash, or signer.&lt;/LI&gt;
&lt;LI data-end="1267" data-start="1105" data-section-id="ram0w9"&gt;&lt;STRONG data-end="1120" data-start="1107"&gt;Priority:&lt;/STRONG&gt;&lt;BR data-end="1123" data-start="1120" /&gt;The agent prioritizes the Allow List over the Block List, ensuring that approved applications run even if they match the broad wildcard block.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1320" data-start="1269" data-section-id="782pha"&gt;2. The Malware Profile "Block Unknown" Approach&lt;/H4&gt;
&lt;P data-end="1453" data-start="1321"&gt;This method relies on WildFire threat intelligence to determine if an application is known to the environment or Palo Alto Networks.&lt;/P&gt;
&lt;UL data-end="1966" data-start="1455"&gt;
&lt;LI data-end="1598" data-start="1455" data-section-id="1fulu73"&gt;&lt;STRONG data-end="1479" data-start="1457"&gt;Action on Unknown:&lt;/STRONG&gt;&lt;BR data-end="1482" data-start="1479" /&gt;Within the Malware Security Profile, set the configuration &lt;EM data-end="1584" data-start="1543"&gt;Action when file is unknown to WildFire&lt;/EM&gt; to &lt;STRONG data-end="1597" data-start="1588"&gt;Block&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI data-end="1791" data-start="1600" data-section-id="12io3h6"&gt;&lt;STRONG data-end="1612" data-start="1602"&gt;Logic:&lt;/STRONG&gt;&lt;BR data-end="1615" data-start="1612" /&gt;When an application attempts to run, the agent calculates its SHA-256 hash. If WildFire does not have a verdict (Benign or Malware) for that hash, the application is blocked.&lt;/LI&gt;
&lt;LI data-end="1966" data-start="1793" data-section-id="hij54q"&gt;&lt;STRONG data-end="1806" data-start="1795"&gt;Caveat:&lt;/STRONG&gt;&lt;BR data-end="1809" data-start="1806" /&gt;This approach can be high-impact, as new legitimate files or temporary DLLs (e.g., from .NET updates) might be blocked until they are analyzed by WildFire.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2004" data-start="1968" data-section-id="y1e4j"&gt;Best Practices and Considerations:&lt;/H4&gt;
&lt;UL data-end="2548" data-start="2006"&gt;
&lt;LI data-end="2188" data-start="2006" data-section-id="sxpaaw"&gt;&lt;STRONG data-end="2024" data-start="2008"&gt;High Impact:&lt;/STRONG&gt;&lt;BR data-end="2027" data-start="2024" /&gt;Strict allowlisting is a high-impact configuration. It is recommended to test these policies on a small group of non-critical systems before a broader rollout.&lt;/LI&gt;
&lt;LI data-end="2395" data-start="2190" data-section-id="151rig"&gt;&lt;STRONG data-end="2223" data-start="2192"&gt;Fingerprinting via Signers:&lt;/STRONG&gt;&lt;BR data-end="2226" data-start="2223" /&gt;To avoid manually managing hashes for every software update, you can use signer-based allowlisting (e.g., allowing all applications signed by "Microsoft Corporation").&lt;/LI&gt;
&lt;LI data-end="2548" data-start="2397" data-section-id="exoh6z"&gt;&lt;STRONG data-end="2422" data-start="2399"&gt;Identifying Hashes:&lt;/STRONG&gt;&lt;BR data-end="2425" data-start="2422" /&gt;To obtain the SHA-256 "fingerprint" of a specific file locally for a block/allow rule, you can use the following command:&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl"&gt;
&lt;DIV class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback"&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="pe-11 pt-3"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼd ͼr" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;PRE class="cm-content q9tKkq_readonly m-0"&gt;&lt;CODE&gt;&lt;SPAN&gt;cytool file query [PATHTOFILE]&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking &lt;STRONG&gt;like&lt;/STRONG&gt; and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 18:52:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253546#M9315</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-05-06T18:52:06Z</dc:date>
    </item>
    <item>
      <title>Re: Application Fingerprinting</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253880#M9333</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241098"&gt;@susekar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this a theoretical interpretation, or a confirmed and established approach with known practical use?&lt;/P&gt;
&lt;P&gt;Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2026 05:36:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1253880#M9333</guid>
      <dc:creator>maximk</dc:creator>
      <dc:date>2026-05-13T05:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: Application Fingerprinting</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1254006#M9335</link>
      <description>&lt;P&gt;Hello Susekar,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for replying. I want to understand if i can prepare "Allow List" using Cortex platform. If yes what will be the approach?? I have tried obtaining the list using XQL but the telemetry that is ingested in cortex only covers the running applications or files with .exe extension. The query does not returns dormant application or silent .exe files. I want to parse and dedup all the .exe files available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks and Regards&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2026 05:17:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/application-fingerprinting/m-p/1254006#M9335</guid>
      <dc:creator>S.Jagushte774563</dc:creator>
      <dc:date>2026-05-14T05:17:19Z</dc:date>
    </item>
  </channel>
</rss>

