Configuring Command Line Rules Settings in CatchPulse Policy

Command Line Rules extend the allowlisting coverage to file-less attacks that make use of already trusted applications to infect PCs. Such attacks do not exist as a file and can remain undetected by Anti-malware programs and threaten the security of the user's system.

Jump to:

What is a Fileless Attack?

Disabling Default Command Line Rules

Adding multiple rules with varying parameters to the same process

Adding New User-Defined Command Line Rules

What is a Fileless Attack?

In fileless attacks, malicious actors infiltrate, seize control, and conduct malicious activities by taking advantage of vulnerable software that an end user might routinely employ, such as Microsoft Word or the Chrome browser or software already installed on a server.

These actors can also exploit vulnerabilities to access native operating system utilities like PowerShell or any application that grants high-level access and privileges. These utilities allow actors to execute fundamental commands across a network. Fileless attacks frequently arise because conventional antivirus (AV) software is not designed to identify and thwart non-malware assaults. Consequently, malicious actors can exploit a fileless attack as a means of entry that may go entirely unnoticed unless more sophisticated security measures are implemented.

Disabling Default Command Line Rules

If this setting is enabled, SecureAge Central will send the default list to the end user. If the setting is disabled, SecureAge Central will not send the default list.

To disable Default Command Line Rules

  1. From the main navigation bar, go to CatchPulsePolicy.

  2. Do one of the following: 

    • To create a new policy and disable default command line rules, click on the Add Policy button located at the top right corner of the Policy page, or

    • To disable a default command line rules to an existing policy, select a policy and click on the corresponding button.

  3. On the Policy page, under ManageCommand Line Rules.

  4. Turn off Use Default Command Line Rules switch.

Back to top

Adding multiple rules with varying parameters to the same process

If the default command line rules listed are not sufficient, or if additional measures can be implemented to protect against fileless attacks, you may create variations of these rules.

This is a precautionary measure for enhanced security. Consider adding multiple rules with different parameters for the same process. This approach will help ensure that the processes' rules, parameters, and actions are comprehensive and thorough.

  1. From the main navigation bar, go to CatchPulsePolicy.

  2. Do one of the following: 

    • To create a new policy and add multiple rules with varying parameters to the same Command Line Rules process, click on the Add Policy button located in the top right corner of the Policy page, or

    • To add multiple rules with different parameters to the same Command Line Rules in an existing policy, select a policy and click on the corresponding button.

  3. On the Policy page, under ManageCommand Line Rules.

  4. Select a Command Line Rules and click on the corresponding button.

  5. On the Add Command Line Rules display box, add rules with varying parameters to the same process.

    1. Process

      Specify the name of the executable or process for which you want to set rules. This could be any program that can be executed from the command line.

    2. Parameters

      1. Rules - This drop down allows you to select the type of match that should be applied to the command-line parameters, such as an exact match, starts with, or contains.
      2. Case Sensitive - Choose whether the parameter matching should be case sensitive.
      3. Parameter - Enter the specific command-line parameters you want to create a rule for.
    3. Process Action

      From the drop down menu, select the action to take when the specified process and parameters are encountered.

      You have three options: always block, allow a trusted user to decide, or never trust permanently.

  6. (Optional) Select Add another to continue adding Command Line Rule.

  7. Select Add to add a Command Line Rules.

    You will be directed to the User-Defined Command Line Rules tab, and the notification panel at the bottom of the page will indicate that the Command Line Rules have been added.

Back to top

Adding New User-Defined Command Line Rules

To add New User-Defined Command Line Rules

  1. From the main navigation bar, go to CatchPulsePolicy.

  2. Do one of the following: 

    • To create a new policy and add a new User-Defined Command Line Rule, click on the Add Policy button located at the top right corner of the Policy page, or

    • To add a new User-Defined Command Line Rule to an existing policy, select a policy and click on the corresponding button.

  3. On the Policy page, under ManageCommand Line Rules.

  4. Click Add New User-Defined from the top right corner of the Command Line Rules page.

  5. On the Add Command Line Rules display box, create command-line rules that are not part of the default set provided by the system.

    1. Process

      Specify the name of the executable or process for which you want to set rules. This could be any program that can be executed from the command line.

    2. Parameters

      1. Rules - This drop down allows you to select the type of match that should be applied to the command-line parameters, such as an exact match, starts with, or contains.
      2. Case Sensitive - Choose whether the parameter matching should be case sensitive.
      3. Parameter - Enter the specific command-line parameters you want to create a rule for.
    3. Process Action

      From the drop down menu, select the action to take when the specified process and parameters are encountered.

      You have three options: always block, allow a trusted user to decide, or never trust permanently.

      ACTION EXPLANATION PROMPTS

      Always block:

      Never trust the command line that matches the rules. This will simply always block it

       

       
      Let Trusted user decide, where:

      (a) For users who are in the trusted account list and in Interactive Mode, CatchPulse Application Allowlisting will prompt for the possible actions: Unblock & Trust, Continue Blocking, Trust Once.

      i) Unblock and Trust – The command line will be unblocked and executed. CatchPulse will automatically add the command line into the allowlist database (Manage → Application Control → Allowed Commands

      ii) Continue Blocking - The command line will be blocked

      iii) Trust Once - The command line will only be trusted once.

      (b) For non-trusted account users who will be in Lockdown Mode, the default action is to never trust the command line and will always block it.  
      (c) In Trust All mode, the command line will be automatically trusted permanently. CatchPulse will automatically add the command line into the allowlist database (App Setting → Application Allowlisting → Command Line Settings → Allowlisted Command Line).  
      Never trust permanently:

      (a) For the user in Interactive Mode & Trust All Mode, CatchPulse Application Allowlisting will prompt for the possible actions: Continue Blocking & Trust Once.

      i) Continue Blocking - The command line will be blocked

      ii) Trust Once - The command line will only be trusted once.

      (b) For the user in Lockdown Mode, the default action is to never trust the command line and will always block it  
           
  6. (Optional) Select Add another to continue adding Command Line Rule.

  7. Select Add to add a Command Line Rules.

    The notification panel at the bottom of the page indicates the Command Line Rules was added.

Back to top

Deleting a Command Line Rule

To delete a Command Line Rule

  1. From the main navigation bar, go to CatchPulsePolicy.

  2. Select a policy and click on the corresponding button.

  3. On the Policy page, under ManageCommand Line RulesUser-Defined Command Line Rules tab.

  4. Select a User-Defined Command Line Rule and click on the corresponding button.

  5. When prompted to confirm deleting a Command Line Rule, choose Delete.

    The Command Line Rule you selected has been deleted, as indicated in the notification panel at the bottom of the page.

Back to top

More information


Support and feedback

Should you encounter any issues using the SecureAge Central with any of the mentioned or missed requirements above, you can always write to us a docs@secureage.com.


This page was last updated: September 09, 2025