XDR Allow-Listing signed processes

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

XDR Allow-Listing signed processes

L0 Member

We have internally developed scripts that we would like to create XDR exclusions or alert level reduction for based on if they contain code signing certificates.  I don't know how to go about doing this or if it's even possible.

 

The idea here is to not need to update exclusions based on hashes any time the scripts are changed and to be more secure than filepath based exclusions.

 

Thanks in advance!

 

2 REPLIES 2

L2 Linker

Hello @M.Crow ,

 

Greetings for the day!

 

Yes, it is possible to create exclusions and reduce alert levels in Cortex XDR based on digital code signing certificates. This approach allows you to trust internally developed tools without relying on fluctuating file hashes or broad path-based exclusions.

There are three primary methods to achieve this, depending on which protection module is flagging your scripts:

1. Whitelisting Signers in Malware Security Profiles

This is the most direct way to prevent the Portable Executable (PE) and DLL Examination and Digital Signer Restriction modules from blocking your signed files.
* Module Scope: This primarily applies to compiled executables (.exe) and DLLs.
* Procedure:
1. Identify the exact Trusted Signer Name from the alert details or file properties on the endpoint.
2. In the Cortex XDR console, navigate to Endpoints > Policy Management > Prevention Profiles > Malware.
3. Edit your active Malware profile.
4. Under Portable Executable and DLL Examination, find the ALLOW LIST SIGNERS section and click + ADD.
5. Enter the exact signer name and save the profile.

2. Disabling Prevention Rules (DPR) by Signer

For alerts triggered by Behavioral Threat Protection (BTP) or specific Exploit modules, you can create a "Disable Prevention Rule" to allow the activity based on the signer.
* Granular Control: You can target specific rules (like a specific BTP rule) and exclude them only when the signer matches.
* Procedure:
1. Navigate to Settings > Exception Configuration > Disable Prevention Rule.
2. Click Add Rule.
3. In the Scope, select the module or specific rule ID causing the block.
4. In the Target Properties, select Signer and enter the name of your internal certificate. 

 

3. Alert Level Reduction (Alert Exclusions)

If you want the scripts to run but simply wish to suppress or hide the alerts in the management console (reducing "noise"), you can use Alert Exclusions.
* Procedure:
1. Navigate to Settings > Exception Configuration > Alert Exclusions.
2. Create a rule where the Signer property matches your certificate.
3. This will hide future matching alerts from the Alert Table and prevent them from generating incidents, while still allowing the agent to monitor the activity.

Important Considerations for Scripts

  • PE vs. Raw Scripts: Most "Signer" allow list features in Malware profiles are designed for Portable Executables (PE). There are internal indications that Cortex XDR may not parse digital signatures for raw PowerShell (.ps1) scripts in the same way it does for binaries.
  • BTP Exclusions: For raw scripts, the most effective method is often creating a Behavioral Threat Protection Exclusion using the script's signer information if the script is being flagged for its behavior.
  • Best Practice: Moving scripts to a dedicated "safe" directory and then using a combination of path and signer-based exclusions is recommended to minimize risk.

If you feel this has answered your query, please let us know by clicking like and on "mark this as a Solution".

 

Happy New year!!

 

Thanks & Regards,
S. Subashkar Sekar

This is wonderfully helpful, thank you!

  • 221 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!