<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cortex XDR Pro - Vulnerability Assessment Replaced KBs in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/484592#M1938</link>
    <description>&lt;P&gt;Same issue here.&lt;/P&gt;&lt;P&gt;Grabbing thousands of dollars for Hosts Insights and delivering an "vulnerability assesment" that it completly useless...&lt;/P&gt;</description>
    <pubDate>Tue, 03 May 2022 18:42:24 GMT</pubDate>
    <dc:creator>PMBTTSI</dc:creator>
    <dc:date>2022-05-03T18:42:24Z</dc:date>
    <item>
      <title>Cortex XDR Pro - Vulnerability Assessment Replaced KBs</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/484046#M1932</link>
      <description>&lt;P&gt;Hey dear Cortex XDR Admins and Users,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when a KB was not installed in march and replaced with another KB from april like here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://administrator.de/forum/windows-server-2012-r2-windows-updates-2627286719.html" target="_blank"&gt;https://administrator.de/forum/windows-server-2012-r2-windows-updates-2627286719.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is the best way to exclude the CVE in Cortex XDR?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can Cortex XDR rearrange this by itself?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 01 May 2022 18:19:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/484046#M1932</guid>
      <dc:creator>Cyber1985</dc:creator>
      <dc:date>2022-05-01T18:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Pro - Vulnerability Assessment Replaced KBs</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/484592#M1938</link>
      <description>&lt;P&gt;Same issue here.&lt;/P&gt;&lt;P&gt;Grabbing thousands of dollars for Hosts Insights and delivering an "vulnerability assesment" that it completly useless...&lt;/P&gt;</description>
      <pubDate>Tue, 03 May 2022 18:42:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/484592#M1938</guid>
      <dc:creator>PMBTTSI</dc:creator>
      <dc:date>2022-05-03T18:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Pro - Vulnerability Assessment Replaced KBs</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/484719#M1942</link>
      <description>&lt;P&gt;Hi Cyber1985,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can Exclude specific CVE's by navigating to Assets&amp;gt;Vulnerability Assessment&amp;gt;Vulnerability Assessment and clicking the "CVES" box in the top right. Then right click the CVE you want to exclude and click "Exclude", this will give you a prompt where you can also add a comment and/or report the CVE as incorrect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2022 03:38:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/484719#M1942</guid>
      <dc:creator>bbucao</dc:creator>
      <dc:date>2022-05-04T03:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Pro - Vulnerability Assessment Replaced KBs</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/487951#M2006</link>
      <description>&lt;P&gt;This is completly useless. This is a major bug in the Vulnerabliitiy Assessments.&lt;/P&gt;&lt;P&gt;CVEs missing, where a newer KB was installed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very very bad Palo Alto Networks!&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 20:23:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/487951#M2006</guid>
      <dc:creator>PMBTTSI</dc:creator>
      <dc:date>2022-05-17T20:23:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Pro - Vulnerability Assessment Replaced KBs</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/488299#M2012</link>
      <description>&lt;P&gt;Linux scans are even worse, backporting isnt taken into account.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2022 18:31:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/488299#M2012</guid>
      <dc:creator>NathanBradley</dc:creator>
      <dc:date>2022-05-18T18:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Pro - Vulnerability Assessment Replaced KBs</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/494028#M2046</link>
      <description>&lt;P&gt;Hey Bbucao,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;will there be an improvement in the future? To click 100 times exclude CVE is not the daily business of mine and I would like to know if anybody works with the VA live?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 22:24:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/494028#M2046</guid>
      <dc:creator>Cyber1985</dc:creator>
      <dc:date>2022-05-27T22:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Pro - Vulnerability Assessment Replaced KBs</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/494379#M2048</link>
      <description>&lt;P&gt;Hello! Something happend in the background. Now none of our machines has CVEs. Is this a good sign?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Sun, 29 May 2022 21:43:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-pro-vulnerability-assessment-replaced-kbs/m-p/494379#M2048</guid>
      <dc:creator>Cyber1985</dc:creator>
      <dc:date>2022-05-29T21:43:47Z</dc:date>
    </item>
  </channel>
</rss>

