cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Who rated this post

Disable Protection Rule for Remote Initiated Behavioral Threat

L2 Linker

We are creating a custom service to handle automatically checking and updating programs (similar to PDQ Deploy, or an RMM tool).

We've signed the the created service and tried several ways to disable it from being blocked. The problem is, we are very limited in what we can target with the disable prevention rules. 

Has anyone run into this and actually allowed it through. We could change the commands to not trigger the alerts as we can see what triggered them by getting the alert data.

The point is that if we signed what is running, we'd like to be able to build it out without worrying about coding around XDR's every changing (and hard to extract behavioral rules).

 

We've already attempted to:

  1. allow our signature in a disable prevention rule
  2. allow the ending powershell process with a wildcard cmd line argument

The problem seems to be that the point where the block is triggered happens before the signer is considered. The artifacts show our service as being signed.

CJNTS_5-1708639694767.png

 

 

Screenshot of causality chain nodes below.

CJNTS_2-1708639146320.png

 

CJNTS_0-1708639964650.png

 

 

CJNTS_3-1708639258518.png

Disable Prevention Rules does not give us any way to address this.

CJNTS_4-1708639365181.png

 

 

Who rated this post