<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tamper protection question in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/tamper-protection-question/m-p/510367#M2412</link>
    <description>&lt;P&gt;Thank you for your answer!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;</description>
    <pubDate>Sun, 31 Jul 2022 14:56:43 GMT</pubDate>
    <dc:creator>Cyber1985</dc:creator>
    <dc:date>2022-07-31T14:56:43Z</dc:date>
    <item>
      <title>Tamper protection question</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/tamper-protection-question/m-p/509813#M2388</link>
      <description>&lt;P&gt;Hello dear live Community!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found a very interesting link on Twitter and would like to know if there is any detection and/or prevention for this technique?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://synzack.github.io/Blinding-EDR-On-Windows/" target="_blank"&gt;https://synzack.github.io/Blinding-EDR-On-Windows/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2022 16:58:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/tamper-protection-question/m-p/509813#M2388</guid>
      <dc:creator>Cyber1985</dc:creator>
      <dc:date>2022-07-25T16:58:38Z</dc:date>
    </item>
    <item>
      <title>Re: Tamper protection question</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/tamper-protection-question/m-p/510290#M2409</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Rob!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you for submitting this coverage inquiry.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;On Windows operating systems, Cortex XDR operates in the kernel space only. Because the Blinding EDR technique in the blog assumes that the EDR operates in the user space, this technique is not applicable to Windows endpoints running Cortex XDR.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cortex XDR offers many valuable endpoint protection modules that may prove to be useful for this type of attack technique, such as tamper protection, behavioral threat protection, malicious file scanning, vulnerable driver protection, etc. Our engineers would love to investigate any proof-of-concept that you may have regarding the technique and can be reached out via support at support.paloaltonetworks.com.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 13:10:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/tamper-protection-question/m-p/510290#M2409</guid>
      <dc:creator>mfakhouri</dc:creator>
      <dc:date>2022-07-29T13:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Tamper protection question</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/tamper-protection-question/m-p/510367#M2412</link>
      <description>&lt;P&gt;Thank you for your answer!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Sun, 31 Jul 2022 14:56:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/tamper-protection-question/m-p/510367#M2412</guid>
      <dc:creator>Cyber1985</dc:creator>
      <dc:date>2022-07-31T14:56:43Z</dc:date>
    </item>
  </channel>
</rss>

