<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can Wildfire/Cortex XDR be Tweaked From Backend in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473396#M1688</link>
    <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;We get a lot of false positives from Wildfire where it's reporting custom applications used on a "business as usual" (BAU) basis in our environment.&amp;nbsp; Do you folks know if there are settings from the Wildfire backend that Palo Alto normally adjusts for customers so to decrease the sensitivity of the Wildfire engine where it's not reporting so many false positives?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;p.s. pardon me if this sounds like a rookie question.&lt;/P&gt;</description>
    <pubDate>Tue, 15 Mar 2022 21:37:35 GMT</pubDate>
    <dc:creator>chukaokonkwo</dc:creator>
    <dc:date>2022-03-15T21:37:35Z</dc:date>
    <item>
      <title>Can Wildfire/Cortex XDR be Tweaked From Backend</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473396#M1688</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;We get a lot of false positives from Wildfire where it's reporting custom applications used on a "business as usual" (BAU) basis in our environment.&amp;nbsp; Do you folks know if there are settings from the Wildfire backend that Palo Alto normally adjusts for customers so to decrease the sensitivity of the Wildfire engine where it's not reporting so many false positives?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;p.s. pardon me if this sounds like a rookie question.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 21:37:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473396#M1688</guid>
      <dc:creator>chukaokonkwo</dc:creator>
      <dc:date>2022-03-15T21:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: Can Wildfire/Cortex XDR be Tweaked From Backend</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473414#M1689</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;Chukaokonkwo,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are a variety of tuning options within XDR to help reduce False Positives and any adverse impact to normal operations. You can add the sha256 file hash of the application to the allow list located in the Action Center which will allow the applications to execute and therefore override the Wildfire verdict. Within the Malware profile itself you are able to allow PE's and DLL's to run based off of a list of approved signers, or by adding file/folder paths into the allow list for that module. Reference step 3 sub steps 3 and 4 in the documentation linked below for instructions on how to accomplish this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile" target="_blank"&gt;https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 22:56:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473414#M1689</guid>
      <dc:creator>bbucao</dc:creator>
      <dc:date>2022-03-15T22:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: Can Wildfire/Cortex XDR be Tweaked From Backend</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473446#M1691</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193230"&gt;@chukaokonkwo&lt;/a&gt;&amp;nbsp;to add on to what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/205598"&gt;@bbucao&lt;/a&gt;&amp;nbsp;suggested for tactical fixes, you should also raise a Verdict Change Request within Cortex XDR console or raise a Support ticket with the hash/sample for a systemic fix. The Wildfire verdicts should reflect the nature of the applications being run.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 01:30:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473446#M1691</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2022-03-16T01:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Can Wildfire/Cortex XDR be Tweaked From Backend</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473557#M1700</link>
      <description>&lt;P&gt;Unfortunatly Wildfire produces a lot of false positives, we have to unblock and whitelist Cygwin binaries in regular intervals. Of course,&amp;nbsp; I report the incorrect verdict to PA and it is reversed in a short time. But that doesn't help with binaries blocked initally using an incorrect verdict. Apart from adding known hashes to the whitelist, the only workable solution I found out is to exclude known folders from being scanned. Of course, this is not very secure and has it's own issue but it allows our developers to continue with their business&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 10:40:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473557#M1700</guid>
      <dc:creator>MartinPfeil</dc:creator>
      <dc:date>2022-03-16T10:40:31Z</dc:date>
    </item>
    <item>
      <title>Re: Can Wildfire/Cortex XDR be Tweaked From Backend</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473666#M1706</link>
      <description>&lt;P&gt;Wow, so this high rate of false positives cannot be tweaked from the Palo Alto side of the house huh?? ...you're literally limited to having to create exceptions for the legitimate hashes one-at-a-time?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 15:12:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473666#M1706</guid>
      <dc:creator>chukaokonkwo</dc:creator>
      <dc:date>2022-03-16T15:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: Can Wildfire/Cortex XDR be Tweaked From Backend</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473677#M1708</link>
      <description>&lt;P&gt;Hi Chukaokonkwo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The Wildfire malware team is constantly working to keep up with evolving threats while maintaining a high fidelity rate. The risk of false negatives is generally viewed as more dangerous to an organization than the risk of false positives. Custom applications can at times cause Wildfire (or any sandbox) to flag as malware due to the behavior of the application if it resembles behavior patterns commonly seen in malware. As rare as these false positives may be on a large scale, I understand that it can be frustrating to deal with when they are affecting your organization. For that reason Cortex XDR offers a variety of ways to handle these. If handling these individually by either submitting Verdict Change Requests or adding to a sha256 hash allow list is not feasible or desirable, consider adding the digital signature of your organizations custom applications to the malware profiles allow list, that way any application that is signed by your organization will not be prevented from running by Wildfire. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Best Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ben&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 15:58:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/473677#M1708</guid>
      <dc:creator>bbucao</dc:creator>
      <dc:date>2022-03-16T15:58:19Z</dc:date>
    </item>
    <item>
      <title>Re: Can Wildfire/Cortex XDR be Tweaked From Backend</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/476717#M1786</link>
      <description>&lt;P&gt;Yep we currently have over 2100 "Allowed" hashes (growing 300+ a month) and had to drag our dev team kicking and screaming to sign every tiny little application across the entire environment. And still get about 700 LC alerts a week.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2022 22:49:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-wildfire-cortex-xdr-be-tweaked-from-backend/m-p/476717#M1786</guid>
      <dc:creator>eumbach</dc:creator>
      <dc:date>2022-03-29T22:49:56Z</dc:date>
    </item>
  </channel>
</rss>

