<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Signer of a file in file operations in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/signer-of-a-file-in-file-operations/m-p/517899#M3021</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190671"&gt;@RFeyertag&lt;/a&gt;&amp;nbsp;as you might be aware, Cortex XDR detects and prevents malicious events during execution. The information that you're looking for is collected by modules invoked during execution.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is possible to collect the data, but currently it is not part of the functionality.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Would you have any specific use cases where you'd be looking at the metadata of such files (many of which might not be executables) to comprehensively aid in your investigation flows? I assume you're not referring to use cases pertaining to forensic investigations.&lt;/P&gt;</description>
    <pubDate>Fri, 14 Oct 2022 01:40:18 GMT</pubDate>
    <dc:creator>bbarmanroy</dc:creator>
    <dc:date>2022-10-14T01:40:18Z</dc:date>
    <item>
      <title>Signer of a file in file operations</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/signer-of-a-file-in-file-operations/m-p/517667#M3011</link>
      <description>&lt;P&gt;Hello dear community,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;like I saw, there is no possibility to find out the signer, from files which were only downloaded, moved, etc. but not executed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why is this not possible?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2022 18:25:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/signer-of-a-file-in-file-operations/m-p/517667#M3011</guid>
      <dc:creator>RFeyertag</dc:creator>
      <dc:date>2022-10-12T18:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: Signer of a file in file operations</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/signer-of-a-file-in-file-operations/m-p/517899#M3021</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190671"&gt;@RFeyertag&lt;/a&gt;&amp;nbsp;as you might be aware, Cortex XDR detects and prevents malicious events during execution. The information that you're looking for is collected by modules invoked during execution.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is possible to collect the data, but currently it is not part of the functionality.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Would you have any specific use cases where you'd be looking at the metadata of such files (many of which might not be executables) to comprehensively aid in your investigation flows? I assume you're not referring to use cases pertaining to forensic investigations.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Oct 2022 01:40:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/signer-of-a-file-in-file-operations/m-p/517899#M3021</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2022-10-14T01:40:18Z</dc:date>
    </item>
  </channel>
</rss>

