<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability Assessment Applications / host insights addon in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519618#M3065</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206384"&gt;@Cyber1985&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for writing to live community!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As per the documentation, both the statements are correct.&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;For Windows and MacOS, we do not do vulnerability assessment for applications and it is limited to OS only&lt;/LI&gt;
&lt;LI&gt;For Linux however, we do vulnerability assessment for both.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Hence the above two statements. As you can see in the documentations the Operating System Platforms are bolded against the statements. Hope that answers your question!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
    <pubDate>Sat, 29 Oct 2022 22:58:47 GMT</pubDate>
    <dc:creator>neelrohit</dc:creator>
    <dc:date>2022-10-29T22:58:47Z</dc:date>
    <item>
      <title>Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519617#M3064</link>
      <description>&lt;P&gt;Hello dear community!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From my perspective, this documentation brings more questions, than answers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is written cortex does not collect CVEs for Applications.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"&lt;/P&gt;
&lt;DIV&gt;
&lt;UL&gt;
&lt;LI class=""&gt;
&lt;DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV&gt;
&lt;DIV&gt;Cortex&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;
&lt;DIV&gt;XDR&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp;lists only CVEs relating to the operating system, and not CVEs relating to applications provided by other vendors.&lt;/SPAN&gt;&lt;/SPAN&gt;
&lt;DIV&gt;"
&lt;DIV&gt;Then its written
&lt;DIV&gt;&amp;nbsp;
&lt;DIV&gt;"&amp;nbsp;
&lt;DIV&gt;Cortex
&lt;P&gt;&lt;VAR class=""&gt;&lt;SPAN&gt;&amp;nbsp;&lt;VAR class="" data-product="admin-pro-only"&gt;&lt;/VAR&gt;&lt;/SPAN&gt;&lt;/VAR&gt;&lt;/P&gt;
&lt;DIV&gt;XDR
&lt;P&gt;&lt;VAR class="" data-product="admin-pro-only"&gt;&lt;SPAN&gt;&amp;nbsp;calculates CVEs for applications according to the application version, and not according to application build numbers.&lt;/SPAN&gt;&lt;/VAR&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"A list of all CVEs that exist on applications that are installed on the endpoint&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So what is right now?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;CVEs For Applications or only CVEs for OS?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There are also in the gui some hints for applications but I never found a CVE related to Applications.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/hardened-endpoint-security/vulnerability-management" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/hardened-endpoint-security/vulnerability-management&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please help me to understand what is right or wrong!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;VAR class="" data-product="admin-pro-only"&gt;&lt;/VAR&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Sat, 29 Oct 2022 21:24:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519617#M3064</guid>
      <dc:creator>Cyber1985</dc:creator>
      <dc:date>2022-10-29T21:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519618#M3065</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206384"&gt;@Cyber1985&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for writing to live community!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As per the documentation, both the statements are correct.&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;For Windows and MacOS, we do not do vulnerability assessment for applications and it is limited to OS only&lt;/LI&gt;
&lt;LI&gt;For Linux however, we do vulnerability assessment for both.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Hence the above two statements. As you can see in the documentations the Operating System Platforms are bolded against the statements. Hope that answers your question!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Sat, 29 Oct 2022 22:58:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519618#M3065</guid>
      <dc:creator>neelrohit</dc:creator>
      <dc:date>2022-10-29T22:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519624#M3066</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/142551"&gt;@neelrohit&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for this clarifiction! From the OS point it is clear now.&lt;/P&gt;
&lt;P&gt;Will there be a change in the future to see CVEs for applications on windows?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Sun, 30 Oct 2022 05:31:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519624#M3066</guid>
      <dc:creator>Cyber1985</dc:creator>
      <dc:date>2022-10-30T05:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519626#M3067</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206384"&gt;@Cyber1985&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We assure you, it is in the works. As you know there are gazillions of applications in Windows world to assess and research and hence we have an intensive R&amp;amp;D already going on around it. I do not have a definite date for the same, but it is in future consideration to be derived in.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that answers your question! Please mark "Accept as Solution" if it does.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Oct 2022 08:05:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519626#M3067</guid>
      <dc:creator>neelrohit</dc:creator>
      <dc:date>2022-10-30T08:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519627#M3068</link>
      <description>&lt;P&gt;I am glad to hear this topic is in progress!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for this good news!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Sun, 30 Oct 2022 09:59:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/519627#M3068</guid>
      <dc:creator>Cyber1985</dc:creator>
      <dc:date>2022-10-30T09:59:22Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/520514#M3118</link>
      <description>&lt;P&gt;Linux vulnerability reporting on applications does not take into account backporting. I opened a support ticket and was told it was put in as an "improvment"&lt;/P&gt;
&lt;P&gt;Applications are reporting vulnerable to old cve's. However they have been patched and the changelog on the server shows the cve fixed via the updated minor version&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2022 17:05:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/520514#M3118</guid>
      <dc:creator>NathanBradley</dc:creator>
      <dc:date>2022-11-07T17:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538568#M4107</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Hello,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Please, will you know how to add/remove applications on cortex xdr (eg. wireshark, etc.) ?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Thank you.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2023 06:15:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538568#M4107</guid>
      <dc:creator>Christshimanga</dc:creator>
      <dc:date>2023-04-13T06:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538726#M4125</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/263259"&gt;@Christshimanga&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Regarding your query on&amp;nbsp;&lt;SPAN&gt;how to add/remove applications on cortex xdr (eg. wireshark, etc.). One cannot add/remove applications as this&amp;nbsp;telemetry/data is part of &lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Host-Inventory" target="_self"&gt;Host Inventory&lt;/A&gt; which is a part of the&amp;nbsp;Host Insights&amp;nbsp;Add-On.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;However you have an option to "Recalculate" as shared in below screenshot.&amp;nbsp;Normally Cortex XDR agent scans the endpoint every 24 hours for any updates and displays the data found over the last 30 days. But with "Recalculate", you can force data recalculation to retrieve the most updated data.&lt;BR /&gt;&lt;BR /&gt;Note: To&amp;nbsp;collect initial data from all endpoints in your network could take&amp;nbsp;&lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt;&amp;nbsp;up to 6 hours.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PiyushKohli_0-1681455872740.png" style="width: 707px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49463iC2E7EC38113F3143/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PiyushKohli_0-1681455872740.png" alt="PiyushKohli_0-1681455872740.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that answers your question! Please mark "Accept as Solution" if it does.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank You!&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 07:12:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538726#M4125</guid>
      <dc:creator>PiyushKohli</dc:creator>
      <dc:date>2023-04-14T07:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538935#M4144</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;A id="link_32" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/276269" target="_self" aria-label="View Profile of PiyushKohli"&gt;&lt;SPAN class=""&gt;PiyushKohli&lt;/SPAN&gt;&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;Once again, Thank you for your response. If I understand these applications reside on the "end users Host machines". In that case, would you then advise (1) I recalculate (2) I delete the application (e.g wireshark) from ALL hosts, servers machines on the network. One can do that? so that I can get ride of "wireshark" from the Host Inventory (and won't be listed as part of the telemetry/data)? is that best way to approach it, or not?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you once more....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Chris&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 05:37:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538935#M4144</guid>
      <dc:creator>Christshimanga</dc:creator>
      <dc:date>2023-04-17T05:37:47Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538975#M4153</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/263259"&gt;@Christshimanga&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If your organization Information Security/IT process is not to have that reported application installed on &lt;SPAN&gt;ALL hosts, servers machines on the network&amp;nbsp;&lt;/SPAN&gt;for ex Wireshark in this use case, then yes you will have to delete/remove the application from reported Hosts. And once that application is removed from the reported hosts then either you may recalculate or can wait as&amp;nbsp;&lt;SPAN&gt;Cortex XDR agent scans the endpoint every 24 hours.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Live Community&amp;nbsp;video on this feature for your reference:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-how-to-videos/cortex-xdr-how-to-video-host-insights/ta-p/510599" target="_blank"&gt;https://live.paloaltonetworks.com/t5/cortex-xdr-how-to-videos/cortex-xdr-how-to-video-host-insights/ta-p/510599&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank You&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 10:56:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538975#M4153</guid>
      <dc:creator>PiyushKohli</dc:creator>
      <dc:date>2023-04-17T10:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538996#M4158</link>
      <description>&lt;P&gt;Dear &lt;A id="link_43" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/276269" target="_self" aria-label="View Profile of PiyushKohli"&gt;&lt;SPAN class=""&gt;PiyushKohli&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Great, and many Thanx.&lt;/P&gt;
&lt;P&gt;You seem to know well Cortex XDR, happy you have indeed assisted in this regard. Please tell me, maybe my last question, how do you delete/remove such applications (example "wireshark") from all hosts. Since I do not see any feature on my cortex xdr setting to use and remove/delete files. Do I need to write a script?, do you have any reference documents or link you can refer me to? so I can read through and execute? How do I go about removing from any Host/Servers such application for example "wireshark"? and what do I need to be advisable to be carefull NOT to do?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Again, Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 13:35:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/538996#M4158</guid>
      <dc:creator>Christshimanga</dc:creator>
      <dc:date>2023-04-17T13:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/569554#M5715</link>
      <description>&lt;P&gt;The Top 10 Vulnerable Applications on my dashboard never shows anything. Has anyone been able to confirm that it only supports CVE alerts for OS only and not applications?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 22:20:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/569554#M5715</guid>
      <dc:creator>TDoerr</dc:creator>
      <dc:date>2023-12-12T22:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment Applications / host insights addon</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/569555#M5716</link>
      <description>&lt;P&gt;Has R&amp;amp;D completed this so that we can see application CVE alerts?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2023 22:21:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-applications-host-insights-addon/m-p/569555#M5716</guid>
      <dc:creator>TDoerr</dc:creator>
      <dc:date>2023-12-12T22:21:13Z</dc:date>
    </item>
  </channel>
</rss>

