<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot add BIOC rule to restriction profiles in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cannot-add-bioc-rule-to-restriction-profiles/m-p/1254191#M9339</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1624214315"&gt;@S.Alves&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="281" data-start="0"&gt;The "No matching profiles" error or the inability to add a Behavioral Indicator of Compromise (BIOC) rule to a Restrictions profile typically occurs when the rule's query contains fields that are incompatible with agent-side prevention or when no valid user-defined profiles exist.&lt;/P&gt;
&lt;H4 data-end="323" data-start="283" data-section-id="18r9w92"&gt;1. Why you see "No matching profiles"&lt;/H4&gt;
&lt;P data-end="546" data-start="325"&gt;Custom Prevention Rules (converted BIOCs) are executed locally on the Cortex XDR agent. Because of this, they must be generic and cannot include fields that require server-side context or describe the endpoint's identity.&lt;/P&gt;
&lt;P data-end="621" data-start="548"&gt;The rule will be disqualified from appearing for Restriction profiles if:&lt;/P&gt;
&lt;UL data-end="1263" data-start="623"&gt;
&lt;LI data-end="760" data-start="623" data-section-id="kqbpmr"&gt;&lt;STRONG data-end="656" data-start="625"&gt;Prohibited Fields are used:&lt;/STRONG&gt; You cannot use fields like &lt;CODE data-end="700" data-start="684"&gt;agent_hostname&lt;/CODE&gt;, &lt;CODE data-end="722" data-start="702"&gt;agent_ip_addresses&lt;/CODE&gt;, &lt;CODE data-end="743" data-start="724"&gt;agent_os_sub_type&lt;/CODE&gt;, or &lt;CODE data-end="759" data-start="748"&gt;host_name&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI data-end="1011" data-start="761" data-section-id="4deju4"&gt;&lt;STRONG data-end="800" data-start="763"&gt;Incompatible Investigation Types:&lt;/STRONG&gt; The BIOC must be based on supported types such as &lt;CODE data-end="870" data-start="851"&gt;process_execution&lt;/CODE&gt;, &lt;CODE data-end="884" data-start="872"&gt;file_event&lt;/CODE&gt;, or &lt;CODE data-end="903" data-start="889"&gt;module_event&lt;/CODE&gt;. Rules based only on the generic &lt;CODE data-end="946" data-start="937"&gt;PROCESS&lt;/CODE&gt; event type (without specific subtypes) may also be disqualified.&lt;/LI&gt;
&lt;LI data-end="1165" data-start="1012" data-section-id="6tljo6"&gt;&lt;STRONG data-end="1035" data-start="1014"&gt;Default Profiles:&lt;/STRONG&gt; You can only add BIOCs to existing user-created Restriction profiles; &lt;CODE data-end="1128" data-start="1106"&gt;"Cortex XDR Default"&lt;/CODE&gt; profiles will not appear as options.&lt;/LI&gt;
&lt;LI data-end="1263" data-start="1166" data-section-id="gyfqve"&gt;&lt;STRONG data-end="1184" data-start="1168"&gt;OS Mismatch:&lt;/STRONG&gt; The BIOC rule's OS scope must align with the target Restrictions profile's OS.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1325" data-start="1265" data-section-id="qpt5u4"&gt;2. How to correctly create a Signer-based Prevention Rule:&lt;/H4&gt;
&lt;P data-end="1393" data-start="1327"&gt;To block applications by their digital signer, follow these steps:&lt;/P&gt;
&lt;H5 data-end="1427" data-start="1395" data-section-id="1yxka7f"&gt;Step 1: Create the BIOC Rule:&lt;/H5&gt;
&lt;OL data-end="1901" data-start="1429"&gt;
&lt;LI data-end="1493" data-start="1429" data-section-id="crtnb5"&gt;Navigate to Detection Rules → BIOC and select &lt;STRONG data-end="1492" data-start="1478"&gt;+ Add BIOC&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI data-end="1563" data-start="1494" data-section-id="fcklil"&gt;Choose the &lt;STRONG data-end="1519" data-start="1508"&gt;Process&lt;/STRONG&gt; entity (using the rule builder/Legacy XQL).&lt;/LI&gt;
&lt;LI data-end="1718" data-start="1564" data-section-id="14vb2xe"&gt;Enable the &lt;STRONG data-end="1588" data-start="1578"&gt;Signer&lt;/STRONG&gt; field:
&lt;UL data-end="1718" data-start="1599"&gt;
&lt;LI data-end="1646" data-start="1599" data-section-id="1umkj4t"&gt;By default, the &lt;CODE data-end="1625" data-start="1617"&gt;SIGNER&lt;/CODE&gt; field is grayed out.&lt;/LI&gt;
&lt;LI data-end="1718" data-start="1650" data-section-id="kglsvn"&gt;You must first set the &lt;CODE data-end="1686" data-start="1675"&gt;SIGNATURE&lt;/CODE&gt; field to &lt;CODE data-end="1704" data-start="1696"&gt;signed&lt;/CODE&gt; to enable it.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-end="1811" data-start="1719" data-section-id="4op6nm"&gt;Enter the exact name of the signer in the &lt;CODE data-end="1772" data-start="1764"&gt;SIGNER&lt;/CODE&gt; field (for example, &lt;CODE data-end="1809" data-start="1793"&gt;NETSUPPORT LTD&lt;/CODE&gt;).&lt;/LI&gt;
&lt;LI data-end="1901" data-start="1812" data-section-id="1y9msgu"&gt;Ensure no prohibited fields (such as hostname or IP fields) are included in the query.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5 data-end="1936" data-start="1903" data-section-id="qtz2d2"&gt;Step 2: Convert to Prevention:&lt;/H5&gt;
&lt;OL data-end="2055" data-start="1938"&gt;
&lt;LI data-end="2005" data-start="1938" data-section-id="rxsz1x"&gt;Right-click the rule and select &lt;STRONG data-end="2004" data-start="1973"&gt;Add to restrictions profile&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI data-end="2055" data-start="2006" data-section-id="1kig5vi"&gt;Select your user-created Restrictions profile.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5 data-end="2101" data-start="2057" data-section-id="17rdu4"&gt;Step 3: Configure the Profile and Policy&lt;/H5&gt;
&lt;OL data-end="2321" data-start="2103"&gt;
&lt;LI data-end="2168" data-start="2103" data-section-id="et0jm1"&gt;Go to Endpoints → Policy Management → Profiles → Restrictions.&lt;/LI&gt;
&lt;LI data-end="2245" data-start="2169" data-section-id="ke1fln"&gt;Ensure &lt;STRONG data-end="2205" data-start="2179"&gt;Custom Prevention Rule&lt;/STRONG&gt; is enabled within the profile settings.&lt;/LI&gt;
&lt;LI data-end="2321" data-start="2246" data-section-id="5al3ic"&gt;Assign this profile to a Policy Rule that targets the desired endpoints.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-end="2381" data-start="2323" data-section-id="bvxjbv"&gt;3. Important Implementation Note: Asynchronous Blocking:&lt;/H4&gt;
&lt;P data-end="2575" data-start="2383"&gt;Converted BIOC rules are asynchronous. The agent does not suspend a process while evaluating the rule; it allows the process to start and then issues a termination command if a match is found.&lt;/P&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="2919" data-start="2577"&gt;
&lt;LI data-end="2723" data-start="2577" data-section-id="14ce473"&gt;If the process is extremely short-lived, it may finish before the agent can kill it, resulting in a &lt;CODE data-end="2691" data-start="2679"&gt;"Detected"&lt;/CODE&gt; alert instead of &lt;CODE data-end="2722" data-start="2709"&gt;"Prevented"&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="2919" data-start="2724" data-section-id="1jfxjb5"&gt;For guaranteed synchronous prevention (blocking before launch), consider:
&lt;UL data-is-last-node="" data-end="2919" data-start="2802"&gt;
&lt;LI data-end="2866" data-start="2802" data-section-id="1a38blj"&gt;Adding the file hash to the blocklist in the Action Center, or&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="2919" data-start="2869" data-section-id="3c86e1"&gt;Blocking by Image Path in an Exceptions profile.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&amp;nbsp;&lt;STRONG&gt;like&amp;nbsp;&lt;/STRONG&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution"&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 18 May 2026 13:36:54 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-05-18T13:36:54Z</dc:date>
    <item>
      <title>Cannot add BIOC rule to restriction profiles</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cannot-add-bioc-rule-to-restriction-profiles/m-p/1254105#M9338</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm receiving malware incidents with files signed by the same signer entity. However, Cortex XDR often only detects these files without blocking them. I want to prevent this behavior by creating a BIOC rule that detects processes with that specific signer and converting it into a prevention rule. However, when I try to add the BIOC rule to a Restrictions profile, I get a "No matching profiles" error.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SAlves_0-1778845767968.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71428i2D6EB35DEF83C93A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SAlves_0-1778845767968.png" alt="SAlves_0-1778845767968.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2026 11:51:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cannot-add-bioc-rule-to-restriction-profiles/m-p/1254105#M9338</guid>
      <dc:creator>S.Alves</dc:creator>
      <dc:date>2026-05-15T11:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot add BIOC rule to restriction profiles</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cannot-add-bioc-rule-to-restriction-profiles/m-p/1254191#M9339</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1624214315"&gt;@S.Alves&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="281" data-start="0"&gt;The "No matching profiles" error or the inability to add a Behavioral Indicator of Compromise (BIOC) rule to a Restrictions profile typically occurs when the rule's query contains fields that are incompatible with agent-side prevention or when no valid user-defined profiles exist.&lt;/P&gt;
&lt;H4 data-end="323" data-start="283" data-section-id="18r9w92"&gt;1. Why you see "No matching profiles"&lt;/H4&gt;
&lt;P data-end="546" data-start="325"&gt;Custom Prevention Rules (converted BIOCs) are executed locally on the Cortex XDR agent. Because of this, they must be generic and cannot include fields that require server-side context or describe the endpoint's identity.&lt;/P&gt;
&lt;P data-end="621" data-start="548"&gt;The rule will be disqualified from appearing for Restriction profiles if:&lt;/P&gt;
&lt;UL data-end="1263" data-start="623"&gt;
&lt;LI data-end="760" data-start="623" data-section-id="kqbpmr"&gt;&lt;STRONG data-end="656" data-start="625"&gt;Prohibited Fields are used:&lt;/STRONG&gt; You cannot use fields like &lt;CODE data-end="700" data-start="684"&gt;agent_hostname&lt;/CODE&gt;, &lt;CODE data-end="722" data-start="702"&gt;agent_ip_addresses&lt;/CODE&gt;, &lt;CODE data-end="743" data-start="724"&gt;agent_os_sub_type&lt;/CODE&gt;, or &lt;CODE data-end="759" data-start="748"&gt;host_name&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI data-end="1011" data-start="761" data-section-id="4deju4"&gt;&lt;STRONG data-end="800" data-start="763"&gt;Incompatible Investigation Types:&lt;/STRONG&gt; The BIOC must be based on supported types such as &lt;CODE data-end="870" data-start="851"&gt;process_execution&lt;/CODE&gt;, &lt;CODE data-end="884" data-start="872"&gt;file_event&lt;/CODE&gt;, or &lt;CODE data-end="903" data-start="889"&gt;module_event&lt;/CODE&gt;. Rules based only on the generic &lt;CODE data-end="946" data-start="937"&gt;PROCESS&lt;/CODE&gt; event type (without specific subtypes) may also be disqualified.&lt;/LI&gt;
&lt;LI data-end="1165" data-start="1012" data-section-id="6tljo6"&gt;&lt;STRONG data-end="1035" data-start="1014"&gt;Default Profiles:&lt;/STRONG&gt; You can only add BIOCs to existing user-created Restriction profiles; &lt;CODE data-end="1128" data-start="1106"&gt;"Cortex XDR Default"&lt;/CODE&gt; profiles will not appear as options.&lt;/LI&gt;
&lt;LI data-end="1263" data-start="1166" data-section-id="gyfqve"&gt;&lt;STRONG data-end="1184" data-start="1168"&gt;OS Mismatch:&lt;/STRONG&gt; The BIOC rule's OS scope must align with the target Restrictions profile's OS.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1325" data-start="1265" data-section-id="qpt5u4"&gt;2. How to correctly create a Signer-based Prevention Rule:&lt;/H4&gt;
&lt;P data-end="1393" data-start="1327"&gt;To block applications by their digital signer, follow these steps:&lt;/P&gt;
&lt;H5 data-end="1427" data-start="1395" data-section-id="1yxka7f"&gt;Step 1: Create the BIOC Rule:&lt;/H5&gt;
&lt;OL data-end="1901" data-start="1429"&gt;
&lt;LI data-end="1493" data-start="1429" data-section-id="crtnb5"&gt;Navigate to Detection Rules → BIOC and select &lt;STRONG data-end="1492" data-start="1478"&gt;+ Add BIOC&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI data-end="1563" data-start="1494" data-section-id="fcklil"&gt;Choose the &lt;STRONG data-end="1519" data-start="1508"&gt;Process&lt;/STRONG&gt; entity (using the rule builder/Legacy XQL).&lt;/LI&gt;
&lt;LI data-end="1718" data-start="1564" data-section-id="14vb2xe"&gt;Enable the &lt;STRONG data-end="1588" data-start="1578"&gt;Signer&lt;/STRONG&gt; field:
&lt;UL data-end="1718" data-start="1599"&gt;
&lt;LI data-end="1646" data-start="1599" data-section-id="1umkj4t"&gt;By default, the &lt;CODE data-end="1625" data-start="1617"&gt;SIGNER&lt;/CODE&gt; field is grayed out.&lt;/LI&gt;
&lt;LI data-end="1718" data-start="1650" data-section-id="kglsvn"&gt;You must first set the &lt;CODE data-end="1686" data-start="1675"&gt;SIGNATURE&lt;/CODE&gt; field to &lt;CODE data-end="1704" data-start="1696"&gt;signed&lt;/CODE&gt; to enable it.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-end="1811" data-start="1719" data-section-id="4op6nm"&gt;Enter the exact name of the signer in the &lt;CODE data-end="1772" data-start="1764"&gt;SIGNER&lt;/CODE&gt; field (for example, &lt;CODE data-end="1809" data-start="1793"&gt;NETSUPPORT LTD&lt;/CODE&gt;).&lt;/LI&gt;
&lt;LI data-end="1901" data-start="1812" data-section-id="1y9msgu"&gt;Ensure no prohibited fields (such as hostname or IP fields) are included in the query.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5 data-end="1936" data-start="1903" data-section-id="qtz2d2"&gt;Step 2: Convert to Prevention:&lt;/H5&gt;
&lt;OL data-end="2055" data-start="1938"&gt;
&lt;LI data-end="2005" data-start="1938" data-section-id="rxsz1x"&gt;Right-click the rule and select &lt;STRONG data-end="2004" data-start="1973"&gt;Add to restrictions profile&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI data-end="2055" data-start="2006" data-section-id="1kig5vi"&gt;Select your user-created Restrictions profile.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H5 data-end="2101" data-start="2057" data-section-id="17rdu4"&gt;Step 3: Configure the Profile and Policy&lt;/H5&gt;
&lt;OL data-end="2321" data-start="2103"&gt;
&lt;LI data-end="2168" data-start="2103" data-section-id="et0jm1"&gt;Go to Endpoints → Policy Management → Profiles → Restrictions.&lt;/LI&gt;
&lt;LI data-end="2245" data-start="2169" data-section-id="ke1fln"&gt;Ensure &lt;STRONG data-end="2205" data-start="2179"&gt;Custom Prevention Rule&lt;/STRONG&gt; is enabled within the profile settings.&lt;/LI&gt;
&lt;LI data-end="2321" data-start="2246" data-section-id="5al3ic"&gt;Assign this profile to a Policy Rule that targets the desired endpoints.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-end="2381" data-start="2323" data-section-id="bvxjbv"&gt;3. Important Implementation Note: Asynchronous Blocking:&lt;/H4&gt;
&lt;P data-end="2575" data-start="2383"&gt;Converted BIOC rules are asynchronous. The agent does not suspend a process while evaluating the rule; it allows the process to start and then issues a termination command if a match is found.&lt;/P&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="2919" data-start="2577"&gt;
&lt;LI data-end="2723" data-start="2577" data-section-id="14ce473"&gt;If the process is extremely short-lived, it may finish before the agent can kill it, resulting in a &lt;CODE data-end="2691" data-start="2679"&gt;"Detected"&lt;/CODE&gt; alert instead of &lt;CODE data-end="2722" data-start="2709"&gt;"Prevented"&lt;/CODE&gt;.&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="2919" data-start="2724" data-section-id="1jfxjb5"&gt;For guaranteed synchronous prevention (blocking before launch), consider:
&lt;UL data-is-last-node="" data-end="2919" data-start="2802"&gt;
&lt;LI data-end="2866" data-start="2802" data-section-id="1a38blj"&gt;Adding the file hash to the blocklist in the Action Center, or&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="2919" data-start="2869" data-section-id="3c86e1"&gt;Blocking by Image Path in an Exceptions profile.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&amp;nbsp;&lt;STRONG&gt;like&amp;nbsp;&lt;/STRONG&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution"&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2026 13:36:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cannot-add-bioc-rule-to-restriction-profiles/m-p/1254191#M9339</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-05-18T13:36:54Z</dc:date>
    </item>
  </channel>
</rss>

