Add a New Restrictions Security Profile

From the Cortex XDR management console, you can add and configure restriction security profiles to limit the surface of an attack on a Windows endpoint.
Restrictions security profiles limit the surface of an attack on a Windows endpoint by defining where and how your users can run files.
By default, the
agent will receive the default profile that contains a pre-defined configuration for each restrictions capability. To customize the configuration for specific
agents, configure a new Restrictions security profile and assign it to one or more policy rules.
To define a Restrictions security profile:
  1. Add a new profile.
    1. From
      , select
      Policy Management
      + Add Profile
      and select whether to
      Create New
      Import from File
      a new profile.
      New imported profiles are added and not replaced.
    2. Select the platform to which the profile applies and
      as the profile type.
    3. Click
  2. Define the basic settings.
    1. Enter a unique
      Profile Name
      to identify the profile. The name can contain only letters, numbers, or spaces, and must be no more than 30 characters. The name you choose will be visible from the list of profiles when you configure a policy rule.
    2. To provide additional context for the purpose or business reason that explains why you are creating the profile, enter a profile
      . For example, you might include an incident identification number or a link to a help desk ticket.
  3. Configure each of the Restrictions Endpoint Protection Capabilities.
    1. Configure the action to take when a file attempts to run from a specified location.
      • Block
        —Block the file execution.
      • Notify
        —Allow the file to execute but notify the user that the file is attempting to run from a suspicious location. The
        agent also reports the event to
      • Report
        —Allow the file to execute but report it to
      • Disabled
        —Disable the module and do not analyze or report execution attempts from restricted locations.
    2. Add files to your allow list or block list, as needed.
      The type of protection capability determines whether the capability supports an allow list, block list, or both. With an allow list, the action mode you configure applies to all the paths except for those that you specify. With a block list, the action applies only to the paths that you specify.
      1. +Add
        a file or folder.
      2. Enter the path and press
        or click the check mark when done. You can also use a wildcard to match a partial name for the folder and environment variables. Use
        to match any single character or
        to match any string of characters. To match a folder, you must terminate the path with * to match all files in the folder (for example,
      3. Repeat to add additional folders.
  4. Save
    the changes to your profile.
  5. You can do this in two ways: You can
    Create a new policy rule using this profile
    from the right-click menu or you can launch the new policy wizard from
    Policy Rules

Recommended For You