Cortex Policy
Cortex Policy
Review and enhance disk drive policies. Consider implementing granular Inventory > Endpoints > Policy
controls based on user roles and business requirements Management > Extensions > Policy Rules
Implement essential firewall rules: Inventory > Endpoints > Host Firewall
• Allow RDP from Admin IPs Only
Create correlation rules, for example: Threat Management > Detection Rules >
• Foreign Login + PowerShell Execution Correlation Rules
• UltraViewer, RustDesk
• Chrome Remote Desktop
Enable restriction to block execution from optical media. Configure Inventory > Endpoint > Policy
alerts for optical media insertion attempts Management > Prevention Rules >
Windows > Restrictions
Prakash Sir
MEDIUM Prevents data exfiltration and
unauthorized data access
Disk Encryption
Disk Encryption
Software Restriction
Audit
Enforces BitLocker encryption on the operating system volume Enable BitLocker; block non-compliant
for all Windows endpoints. endpoints.
Monitors BitLocker encryption status and reports non-compliant Alert on non-encrypted endpoints; report to
endpoints. Console.
Description Action
Blocks execution of files with known malicious SHA-256 hashes. Block execution; report to Console.
Tracks modifications to critical files and registry keys (e.g., Log changes; alert on unauthorized
system binaries, startup keys). modifications.
Ingests logs from Palo Alto Networks NGFWs to correlate with Log and correlate NGFW events; alert on
endpoint data for enhanced threat detection. threats.
Description Action
Description Action
In Cortex XDR Console, go to Endpoints > Policy Management > Prevention >
Profiles > Malware > Real-Time Scanning. Enable Local Analysis for immediate
verdicts using machine learning models. Enable WildFire Integration to forward
unknown files for cloud analysis (set Timeout: 60 seconds, Action on Timeout:
Block). Include File Types: .exe, .dll, .docm, .xlsm, .pptm. Enable Quarantine to
isolate malicious files in a secure directory. Set Verdict Reporting to log events to
Cortex Data Lake with MITRE ATT&CK mappings. Enable Automatic Content
Updates for latest signatures. Apply to All Endpoints.
In Detection Rules > BIOC > Process, create a rule for parent-child relationships
(e.g., winword.exe -> powershell.exe, excel.exe -> cmd.exe). Set Condition: Process
creation. Set Action: Block. Enable Verbose Logging for detailed process
information. Apply via Endpoints > Prevention > Policy Rules. Log events to Cortex
Data Lake with MITRE ATT&CK mappings (e.g., T1059). Test in Alert mode to
validate impact. Apply to All Endpoints.
In Malware Security Profile > Restrictions > File Execution, add restricted paths: \\*
(network shares), E:\*, F:\* (external drives). Set Action: Block. Enable Report
Matched Events to log attempts to Cortex Data Lake. Exclude trusted network paths
(e.g., \\trusted.server\share) if needed via Exceptions. Apply to All Endpoints.
Monitor restricted paths via Cortex XDR analytics to detect unauthorized attempts.
In Malware Security Profile > Highly Trusted Signers, add certificate authorities:
CN=Microsoft Corporation, CN=Adobe Systems Incorporated, CN=Symantec
Corporation. Set Action: Allow. Block self-signed or untrusted certificates unless
explicitly allowed. Enable Periodic Review (quarterly) to validate trusted signers.
Log allowed executions to Cortex Data Lake for auditing. Apply to All Endpoints.
In Malware Security Profile > Hash Exceptions, add SHA-256 hashes for trusted
files (e.g., company_app.exe) or malicious files. Generate hashes using certutil -
hashfile <file> SHA256. Set Action: Allow for benign files, Block for malicious
files. Review hashes quarterly to ensure validity. Log exceptions to Cortex Data
Lake. Apply to All Endpoints or Specific Endpoints as needed.
In Detection Rules > BIOC > Process, create a rule for installer processes (e.g.,
Installer.exe, ZoomInstallerFull.exe). Set Condition: Process creation from non-
trusted paths (e.g., C:\Users\*\Downloads). Set Action: Block. Enable Alert
Notifications for investigation. Apply via Prevention > Policy Rules. Log to Cortex
Data Lake with MITRE ATT&CK mappings (e.g., T1106). Apply to All Endpoints.
In Detection Rules > BIOC > Command Line, create a rule for commands:
regsvr32.exe *, rundll32.exe *. Set Condition: Execution from non-system paths
(e.g., C:\Users\*\*). Set Action: Alert. Enable Verbose Logging for command-line
details. Test in Alert mode, then switch to Block after validation. Log to Cortex Data
Lake with MITRE ATT&CK mappings (e.g., T1218). Apply to All Endpoints.
In Endpoints > Policy Management > Extensions > Profiles > Disk Encryption,
enable Disk Encryption. Set Encryption Type: AES-256. Require TPM + PIN or
TPM + Password. Store recovery keys in Cortex Data Lake with Security
Administrator access only. Enable Network Access Control to block non-encrypted
endpoints (except Cortex XDR communication, TCP 443 to service IPs). Log status
to Cortex Data Lake. Apply to All Endpoints.
In Endpoints > Policy Management > Extensions > Profiles > Host Firewall, create
rules: 1. Block All: Direction: Both, Protocol: Any, Action: Block (lowest priority).
2. Allow Apps: Example: msedge.exe, Outbound, TCP, Ports 80/443; ccmexec.exe,
Both, TCP, Ports 80/445, SCCM IPs (e.g., 10.0.1.10–10.0.1.20). 3. Block RDP:
Both, TCP, Port 3389; Allow for IT group to specific IPs (e.g., 10.0.2.0/24). Enable
Report Matched Traffic. Integrate with Prisma Access/GlobalProtect for remote
endpoints. Log to Cortex Data Lake. Apply to All Endpoints or specific groups.
In Cortex XDR Console, go to Endpoints > Policy Management > Extensions >
Profiles > Disk Encryption. Enable Disk Encryption for OS volume. Set Encryption
Type: AES-256. Require TPM + PIN or TPM + Password for authentication. Apply
to All Endpoints.
In Disk Encryption Profile, enable Recovery Key Storage. Store keys in Cortex Data
Lake with access restricted to Security Administrators. Ensure keys are not stored
locally on endpoints. Apply to All Endpoints.
In Disk Encryption Profile, enable Network Access Control. Set Action: Block all
network traffic (except Cortex XDR agent communication) for non-encrypted
endpoints. Apply to All Endpoints.
In Disk Encryption Profile > Exceptions, create a rule for specific endpoints (e.g., by
Device Group or AD identity). Set Allow Decryption: Enabled. Require Admin
Approval via Cortex XDR Console. Log decryption events to Cortex Data Lake.
Apply to Specific Endpoints.
In Cortex XDR Console, go to Endpoints > Policy Management > Prevention >
Profiles > Malware > Restrictions. Set Default Action: Block. Include file
types: .exe, .dll, .scr. Apply to All Endpoints.
In Malware Security Profile > Highly Trusted Signers, add trusted certificate
authorities: CN=Microsoft Corporation, CN=Adobe Systems Incorporated. Block
self-signed or untrusted certificates. Apply to All Endpoints.
In Malware Security Profile > Restrictions > File Execution, add paths: C:\Users\*\
AppData\Local\Temp\*, E:\*. Set Action: Block. Apply to All Endpoints.
In Malware Security Profile > Hash Exceptions, add SHA-256 hashes for trusted
apps (e.g., company_app.exe). Generate hashes using certutil -hashfile. Apply to
Specific Endpoints or All Endpoints.
In Malware Security Profile > Hash Exceptions, add hashes of known malicious
files. Set Action: Block. Apply to All Endpoints.
Create a BIOC rule in Detection Rules > BIOC > Process. Example: Block
Installer.exe from non-trusted paths. Set Action: Block. Apply via Prevention >
Policy Rules to All Endpoints.
In Malware Security Profile > Exceptions, add specific apps (e.g., it_tool.exe) or
paths (e.g., C:\Program Files\ITTools\). Require Admin Approval via Cortex XDR
Console. Apply to IT Group Endpoints.
In Cortex XDR Console, go to Detection Rules > BIOC > Windows Event Log.
Create a BIOC rule for Event Codes: 4720 (user created), 4731–4735 (group
changes), 4764 (group deletion). Set Action: Alert. Log to Cortex Data Lake. Apply
to All Endpoints.
In Detection Rules > BIOC > Process, enable Command Line Auditing. Include
processes: powershell.exe, cmd.exe, wscript.exe. Set Action: Alert. Enable Verbose
Logging for detailed command-line capture. Apply to All Endpoints.
In Detection Rules > BIOC > Windows Event Log, create a rule for Event Code:
4625 (failed logon). Set Threshold: 5 failed attempts in 5 minutes. Set Action: Alert.
Log to Cortex Data Lake. Apply to All Endpoints.
In Detection Rules > BIOC > Process, create a rule for processes accessing lsass.exe
or invoking SeDebugPrivilege. Set Action: Alert. Enable MITRE ATT&CK
Mapping (e.g., T1134). Log to Cortex Data Lake. Apply to All Endpoints.
In Detection Rules > BIOC > File, create a rule for changes in paths: C:\Windows\
System32\*, HKLM\Software\Microsoft\Windows\CurrentVersion\Run. Set Action:
Alert. Log to Cortex Data Lake. Apply to All Endpoints.
In Endpoints > Policy Management > Audit Management, enable Agent Audit
Logging. Include events: agent uninstall, policy modification. Set Action: Alert.
Restrict actions to Security Administrators. Log to Cortex Data Lake. Apply to All
Endpoints.
In Detection Rules > BIOC > Exceptions, create a rule for trusted processes (e.g.,
admin_script.exe) or paths (e.g., C:\IT\Scripts\). Set Action: Suppress Alert, Log
Only. Apply to Specific Endpoints (e.g., IT Admin group).
In Cortex XDR Console, go to Detection Rules > BIOC > Windows Event Log.
Create a rule for Event Codes: 4624 (successful logon), 4625 (failed logon). Set
Condition: >5 failed logins in 5 minutes or logins from unusual geolocations (via
Identity Analytics). Enable Identity Analytics add-on for user behavior analytics
(UBA). Set Action: Alert. Integrate with Active Directory or Azure AD via Settings
> Integrations > Servers & Services. Log to Cortex Data Lake with MITRE
ATT&CK mapping (e.g., T1110 - Brute Force). Apply to All Windows/Server
Endpoints.
In Endpoints > Policy Management > Extensions > Profiles > Device Control, create
a rule. Set Condition: Restrict USB access by AD group (e.g., Domain Users allowed
read-only, IT-Admins allowed full access). Specify Device Types: USB storage,
portable devices. Set Permissions: Read-only for non-admins, Full for IT Admins.
Set Action: Block for unauthorized users. Enable User Notifications: “USB Device
Was Blocked.” Log events to Cortex Data Lake. Apply to All Windows/Server
Endpoints.
In Settings > Configurations > Users and Roles, define roles: Security Administrator
(full access), Analyst (read-only, view incidents), IT Admin (manage policies).
Enable IP Whitelisting (e.g., 10.0.0.0/24). Require Multi-Factor Authentication
(MFA) for all roles via Azure AD or Okta integration. Set API Key Permissions:
Advanced key for integrations (e.g., XSOAR), restricted to specific actions. Log
access attempts to Cortex Data Lake. Apply to Console Users.
In Detection Rules > BIOC > Process, create a rule for processes accessing lsass.exe
or invoking SeDebugPrivilege. Set Condition: Non-admin user or unusual AD
account activity. Enable Identity Analytics to correlate user identity with behavior.
Set Action: Alert. Log to Cortex Data Lake with MITRE ATT&CK mapping (e.g.,
T1134 - Access Token Manipulation). Apply to All Windows/Server Endpoints.
In Endpoints > Policy Management > Prevention > Policy Rules, create a rule to
check AD account status via integration with Active Directory or Azure AD. Set
Condition: Expired, disabled, or non-existent AD account. Set Action: Block
network traffic (except Cortex XDR communication, TCP 443 to service IPs).
Enable Endpoint Network Isolation Notification: “Cortex XDR agent halted all
network access on your device.” Log to Cortex Data Lake. Apply to All
Windows/Server Endpoints.
In Detection Rules > BIOC > Windows Event Log, create a rule for Event Codes:
4720 (user created), 4731–4735 (group changes), 4764 (group deletion). Set
Condition: Changes by non-admin accounts or unusual times. Set Action: Alert.
Enable Identity Analytics for user context. Log to Cortex Data Lake with MITRE
ATT&CK mapping (e.g., T1098 - Account Manipulation). Apply to All
Windows/Server Endpoints.
In Cortex XSOAR > Playbooks, use Cloud IAM User Access Investigation
playbook. Configure to detect alerts for Azure or AWS IAM misuse (e.g., API calls
from unusual IPs). Set Action: Alert for investigation, auto-isolate endpoint via
Security Operations > Isolate Endpoint if malicious. Enrich with AutoFocus Threat
Intelligence. Log to Cortex Data Lake with MITRE ATT&CK mapping (e.g., T1078
- Valid Accounts). Apply to Windows Server Endpoints with cloud integration.
In Detection Rules > BIOC > Windows Event Log, create a rule for Event Code:
4672 (privilege assignment). Set Condition: Local admin account usage outside IT
Admins group. Set Action: Alert. Optionally, block actions via Prevention > Policy
Rules by restricting Administrator account execution of sensitive processes (e.g.,
cmd.exe). Log to Cortex Data Lake with MITRE ATT&CK mapping (e.g., T1078).
Apply to All Windows/Server Endpoints.
In Detection Rules > BIOC > Exceptions, create a rule for trusted AD users (e.g., IT-
Admins group) or processes (e.g., it_script.exe). Set Condition: Actions by specified
AD group or process from trusted paths (e.g., C:\IT\Scripts\). Set Action: Suppress
Alert, Log Only. Log to Cortex Data Lake for audit purposes. Apply to Specific
Endpoints (e.g., IT Admin devices).
In Cortex XDR Console, go to Endpoints > Policy Management > Extensions >
Profiles > Host Firewall. Create a rule: Direction: Both, Protocol: Any, Action:
Block. Set as lowest priority to allow specific allow rules to take precedence. Enable
Report Matched Traffic to log blocked attempts. Log to Cortex Data Lake. Apply to
All Windows/Server Endpoints.
In Host Firewall Profile, create rules: 1. Microsoft Edge: Executable: msedge.exe,
Direction: Outbound, Protocol: TCP, Ports: 80, 443, Destination IP: Any (or trusted
domains via NGFW integration). 2. SCCM: Executable: ccmexec.exe, Direction:
Both, Protocol: TCP, Ports: 80, 445, Destination IP: SCCM server range (e.g.,
10.0.1.10–10.0.1.20). Enable Report Matched Traffic. Log to Cortex Data Lake.
Apply to All Windows/Server Endpoints or specific groups.
In Host Firewall Profile, create rules: 1. Block RDP: Direction: Both, Protocol: TCP,
Port: 3389, Action: Block, apply to All Endpoints. 2. Allow IT Admins: Direction:
Both, Protocol: TCP, Port: 3389, Destination IP: IT server range (e.g., 10.0.2.0/24),
Action: Allow, apply to IT Admin Endpoints. Enable Report Matched Traffic. Log to
Cortex Data Lake with MITRE ATT&CK mapping (e.g., T1021 - Remote Services).
Apply to All Windows/Server Endpoints.
In Settings > Integrations > Servers & Services, configure NGFW integration via
Cortex XDR API. Set Data Source: NGFW logs (traffic, threat, URL filtering).
Enable AutoFocus Threat Intelligence for enrichment. Create a BIOC rule in
Detection Rules > BIOC > Network to detect threats (e.g., malware C2 traffic). Set
Action: Alert. Log to Cortex Data Lake with MITRE ATT&CK mapping (e.g.,
T1071 - Application Layer Protocol). Apply to All Windows/Server Endpoints.
In Host Firewall Profile > Exceptions, create a rule for trusted executables (e.g.,
veeamagent.exe). Set Direction: Outbound, Protocol: TCP, Ports: 10001, 10002,
Destination IP: Backup server range (e.g., 10.0.3.0/24). Set Action: Allow. Enable
Report Matched Traffic. Log to Cortex Data Lake. Apply to Specific
Windows/Server Endpoints.
Detailed Settings/Options
In Endpoints > Policy Management > Agent Settings Profile, enable Network
Location Detection. Internal Network: Allow broader traffic (e.g., TCP 445 to
192.168.0.0/16). External Network: Block all inbound traffic except VPN (e.g., TCP
443 to Prisma Access/GlobalProtect IPs, 203.0.113.0/24). Set Action: Block for non-
VPN external traffic. Enable Endpoint Network Isolation Notification: “Cortex XDR
agent halted all network access on your device.” Log to Cortex Data Lake. Apply to
Laptop Endpoints (Windows).
In Host Firewall Profile, create a rule: Direction: Outbound, Protocol: TCP, Port:
443, Destination IP: Prisma Access/GlobalProtect IPs (e.g., 203.0.113.0/24), Action:
Allow. Block all other external traffic. Configure in Agent Settings Profile to detect
external networks. Enable Report Matched Traffic. Log to Cortex Data Lake. Apply
to Remote Windows/Server Endpoints.
In Detection Rules > BIOC > Network, create a rule for connections to non-corporate
SSIDs or IPs. Set Condition: Connection to unknown SSID or non-trusted IP range.
Enable Identity Analytics to correlate with AD user behavior. Set Action: Alert. Log
to Cortex Data Lake with MITRE ATT&CK mapping (e.g., T1071 - Application
Layer Protocol). Apply to All Windows/Server Endpoints.
In Endpoints > Policy Management > Prevention > Policy Rules, create a rule to
check VPN status. Set Condition: Endpoint on external network without Prisma
Access/GlobalProtect connection. Set Action: Block network traffic (except Cortex
XDR communication, TCP 443). Enable Endpoint Network Isolation Notification:
“Cortex XDR agent halted all network access on your device.” Log to Cortex Data
Lake. Apply to All Windows/Server Endpoints.
In Host Firewall Profile > Exceptions, create a rule for trusted SSIDs (e.g., Corp-
WiFi). Set Direction: Both, Protocol: TCP/UDP, Ports: 80, 443, 445, Destination IP:
Internal range (e.g., 192.168.0.0/16). Set Action: Allow. Enable Report Matched
Traffic. Log to Cortex Data Lake. Apply to All Windows/Server Endpoints.
Detailed Settings/Options
In Endpoints > Detection Rules > IOC, add IOC: Type: SHA-256 Hash, Value:
Known malicious hashes (e.g., from WildFire or Unit 42). In Malware Security
Profile, set Action: Block for matching hashes. Create a BIOC rule in Detection
Rules > BIOC > Process: Condition: Execution of files with malicious hashes from
non-system paths (e.g., C:\Users\*\AppData\). Set Action: Alert. Log to Cortex Data
Lake with MITRE ATT&CK mapping (e.g., T1204 - User Execution). Use Cortex
Xpanse inventory for endpoint coverage. Apply to All Windows System Endpoints.
In Detection Rules > BIOC > Network, create a rule: Condition: Connection to non-
corporate SSID (e.g., not Corp-WiFi) or non-trusted IP range (e.g., outside
192.168.0.0/16) from Cortex Xpanse inventory. Enable Identity Analytics to
correlate with Active Directory (AD) user behavior. Set Action: Alert. Log to Cortex
Data Lake with MITRE ATT&CK mapping (e.g., T1071 - Application Layer
Protocol). Optionally, trigger XSOAR playbook to isolate endpoint. Apply to All
Windows System Endpoints.
In Endpoints > Policy Management > Prevention > Policy Rules, create a rule:
Condition: Endpoint on external network (detected via Agent Settings Profile >
Network Location Detection) without Prisma Access/GlobalProtect connection (e.g.,
no TCP 443 to 203.0.113.0/24). Set Action: Block network traffic (except Cortex
XDR communication, TCP 443). Enable Endpoint Network Isolation Notification:
“Cortex XDR agent halted all network access on your device.” Use Cortex Xpanse
inventory for endpoint coverage. Log to Cortex Data Lake. Apply to All Windows
System Endpoints.
In Detection Rules > BIOC > Windows Event Log, create a rule for Event Code:
4657 (registry value modified). Set Condition: Changes to Wi-Fi profiles (e.g.,
HKLM\Software\Microsoft\WlanSvc) or persistence keys (e.g., HKLM\Software\
Microsoft\Windows\CurrentVersion\Run). Set Action: Alert. Use Cortex Xpanse
inventory to correlate with endpoint data. Log to Cortex Data Lake with MITRE
ATT&CK mapping (e.g., T1112 - Modify Registry). Apply to All Windows System
Endpoints.
In Detection Rules > IOC, add IOC: Type: Process, Value: Known malicious process
names (e.g., regsvr32.exe with parameters like /s). Create a BIOC rule in Detection
Rules > BIOC > Process: Condition: Process execution from non-system paths (e.g.,
C:\Users\*\Downloads\). Set Action: Block and Alert. Log to Cortex Data Lake with
MITRE ATT&CK mapping (e.g., T1218 - Signed Binary Proxy Execution). Apply
to All Windows System Endpoints.
In Detection Rules > BIOC > Windows Event Log, create a rule for Event Code:
4625 (failed logon). Set Condition: >5 failed logins in 5 minutes per user. Enable
Identity Analytics to correlate with AD user accounts. Set Action: Alert. Log to
Cortex Data Lake with MITRE ATT&CK mapping (e.g., T1110 - Brute Force).
Apply to All Windows System Endpoints.
In Detection Rules > BIOC > Command Line, create a rule: Condition: Commands
involving powershell.exe, cmd.exe, or wscript.exe with suspicious parameters (e.g., -
enc for encoded PowerShell scripts). Set Action: Alert. Test in Alert mode, then
switch to Block after validation. Log to Cortex Data Lake with MITRE ATT&CK
mapping (e.g., T1059 - Command and Scripting Interpreter). Apply to All Windows
System Endpoints.
In Detection Rules > BIOC > Windows Event Log, create a rule for Event Codes:
4624 (successful logon), 4663 (file access). Set Condition: Logins from non-
corporate IPs or excessive file access outside user’s normal profile (via Identity
Analytics). Set Action: Alert. Log to Cortex Data Lake with MITRE ATT&CK
mapping (e.g., T1078 - Valid Accounts). Apply to All Windows System Endpoints.
In Detection Rules > BIOC > Process, create a rule: Condition: Process execution
from USB paths (e.g., E:\*\*.exe). Set Action: Block and Alert. In Extensions >
Profiles > Device Control, restrict USB access to read-only for non-admins. Enable
User Notifications: “USB Device Was Blocked.” Log to Cortex Data Lake with
MITRE ATT&CK mapping (e.g., T1091 - Replication Through Removable Media).
Apply to All Windows System Endpoints.
In Detection Rules > IOC > Exceptions, create a rule for trusted IOCs (e.g., IP
10.0.3.10 for backup server, SHA-256 hash for it_script.exe). Set Condition: Actions
by trusted AD group (e.g., IT-Admins) or processes in Cortex Xpanse inventory. Set
Action: Suppress Alert, Log Only. Log to Cortex Data Lake for audit purposes.
Apply to All Windows System Endpoints.
SOC 2 Relevance Column1
SOC 2 Relevance
The Known
Prevents unauthorized software execution (Security
DLL files
criterion).
cannot run
External
Drivers are
blcoked,
Reduces risk of malware from untrusted locations
Temp files
(Security criterion).
few process
run from
Temp
SOC 2 Relevance
SOC 2 Relevance