Create a IOC without incident

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Create a IOC without incident

L0 Member

Good morning,

Today I would like to create a block for two malicious files that I found in our environment. I noticed that I can create an IOC to block paths, file names, IPs, etc. I have already created an IOC using a wildcard for the file name: PDFEditor_*.exe, but I would also like to block the process without generating an incident.

Is that possible?

Thank you in advance.

1 REPLY 1

L4 Transporter

Hello @J.MorenoCiudad ,

 

Greetings for the day.

 

Yes, it is possible to block these files without generating an incident, but this requires a combination of a Restriction Profile for the blocking action and an Alert Exclusion rule to suppress incident generation.

 

Native Indicator of Compromise (IOC) rules are designed for detection and alerting only and do not inherently support prevention or blocking actions.


To achieve a “silent block” for your malicious files, follow these steps:

1. Create a Restriction Profile to Block by Filename

While the global Block List in the Action Center only supports SHA256 hashes, you can use a Restriction Profile to block execution based on filename wildcards.

Navigate to:

Endpoints > Policy Management > Prevention > Profiles

  1. Click + Add Profile

  2. Select the relevant OS (e.g., Windows)

  3. Choose Restrictions as the profile type

  4. In the profile settings, locate the Executable files section

  5. Add your wildcard pattern

To ensure the file is blocked regardless of its directory, use a leading wildcard:

 
*PDFEditor_*.exe
  1. Save the profile

  2. Ensure it is assigned to a Policy Rule applied to your target endpoints


2. Suppress Incidents Using Alert Exclusion

By default, a block action will trigger a prevention alert and generate an incident. To prevent this, create an Alert Exclusion rule to suppress the resulting notifications.

Navigate to:

Configuration > Incident & Alerts > Alert Exclusion

  1. Click + Add Exclusion Rule

  2. Define the exclusion criteria to match the block events

You can filter by:

  • Field: Action Process Image Name

  • Operator: wildcard

  • Value: *PDFEditor_*.exe

Alternatively, you can filter by the specific Rule Name defined in the Restriction Profile.

  1. Save the rule

This will globally suppress alerts and incidents matching these criteria while allowing the agent to continue enforcing the block.


Important Considerations:

IOC Limitations:
Standard IOC rules are primarily used for threat hunting and post-execution visibility; they do not function as a pre-execution prevention mechanism.

 

Bypassing Risk:


Blocking by filename or wildcard is less reliable than hash-based blocking, as an attacker can easily rename the executable to bypass the restriction.

 

If the hashes are known, adding them to the global Block List via the Action Center is the recommended security best practice.

 

If you feel this has answered your query, please let us know by clicking like and on "mark this as a Solution".

 

Thanks & Regards,
S. Subashkar Sekar

  • 85 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!