<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AV Operations through XDR in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/av-operations-through-xdr/m-p/517455#M2999</link>
    <description>&lt;P&gt;Hi Aiman_Fathima,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Full disk scanning is a legacy protection feature of EDR and is done by getting hash verdicts from WildFire for all file hashes observed on the endpoint.&amp;nbsp; You should look to your own internal policies and procedures as well as any applicable regulatory requirements to determine frequency of scanning.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cortex XDR is not a legacy AV product, our protections are built around protecting an endpoint when code runs on an endpoint, including file hash verdicts, exploit protection and Behavioral Threat Protection (BTP).&amp;nbsp; We do provide periodic scanning functionality as it is still a part of some regulatory frameworks, but the bulk of our protections are geared around protecting systems from code that is actually attempting to execute or executing on endpoints.&lt;/P&gt;</description>
    <pubDate>Tue, 11 Oct 2022 13:39:11 GMT</pubDate>
    <dc:creator>afurze</dc:creator>
    <dc:date>2022-10-11T13:39:11Z</dc:date>
    <item>
      <title>AV Operations through XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/av-operations-through-xdr/m-p/517430#M2998</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;1. Please recommend the scanning period and best practices to achieve AV operations through XDR.&lt;/P&gt;
&lt;P&gt;2. On what basis does the malware scanning take place. Is it signature based, Hash based etc.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2022 10:54:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/av-operations-through-xdr/m-p/517430#M2998</guid>
      <dc:creator>Aiman_Fathima</dc:creator>
      <dc:date>2022-10-11T10:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: AV Operations through XDR</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/av-operations-through-xdr/m-p/517455#M2999</link>
      <description>&lt;P&gt;Hi Aiman_Fathima,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Full disk scanning is a legacy protection feature of EDR and is done by getting hash verdicts from WildFire for all file hashes observed on the endpoint.&amp;nbsp; You should look to your own internal policies and procedures as well as any applicable regulatory requirements to determine frequency of scanning.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cortex XDR is not a legacy AV product, our protections are built around protecting an endpoint when code runs on an endpoint, including file hash verdicts, exploit protection and Behavioral Threat Protection (BTP).&amp;nbsp; We do provide periodic scanning functionality as it is still a part of some regulatory frameworks, but the bulk of our protections are geared around protecting systems from code that is actually attempting to execute or executing on endpoints.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2022 13:39:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/av-operations-through-xdr/m-p/517455#M2999</guid>
      <dc:creator>afurze</dc:creator>
      <dc:date>2022-10-11T13:39:11Z</dc:date>
    </item>
  </channel>
</rss>

