<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cortex XDR: False Positive detection of VulnDetect scripts in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-detection-of-vulndetect-scripts/m-p/520306#M3096</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A number of our customers has complained about our signed PowerShell scripts being flagged and, in some cases, blocked by Cortex XDR.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The scripts in question can be found here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://stream.vulndetect.com/e/task.ps1" target="_blank"&gt;https://stream.vulndetect.com/e/task.ps1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://stream.vulndetect.com/e/functions.ps1" target="_blank"&gt;https://stream.vulndetect.com/e/functions.ps1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://stream.vulndetect.com/e/VulnDetectMaintenance.ps1" target="_blank"&gt;https://stream.vulndetect.com/e/VulnDetectMaintenance.ps1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other than signing the scripts and asking customers to whitelist our signing certificate (which doesn't seem to suffice), what is the proper cause of actions to help our customers not getting these false positives?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The scripts are used as "wrappers" for running installers to upgrade software installations and doing some maintenance of temporary task folders.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;SecTeer - &lt;A href="https://secteer.com/" target="_blank"&gt;https://secteer.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;VulnDetect - &lt;A href="https://vulndetect.org/" target="_blank"&gt;https://vulndetect.org/&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Nov 2022 10:33:34 GMT</pubDate>
    <dc:creator>VulnDetect</dc:creator>
    <dc:date>2022-11-04T10:33:34Z</dc:date>
    <item>
      <title>Cortex XDR: False Positive detection of VulnDetect scripts</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-detection-of-vulndetect-scripts/m-p/520306#M3096</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A number of our customers has complained about our signed PowerShell scripts being flagged and, in some cases, blocked by Cortex XDR.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The scripts in question can be found here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://stream.vulndetect.com/e/task.ps1" target="_blank"&gt;https://stream.vulndetect.com/e/task.ps1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://stream.vulndetect.com/e/functions.ps1" target="_blank"&gt;https://stream.vulndetect.com/e/functions.ps1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://stream.vulndetect.com/e/VulnDetectMaintenance.ps1" target="_blank"&gt;https://stream.vulndetect.com/e/VulnDetectMaintenance.ps1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Other than signing the scripts and asking customers to whitelist our signing certificate (which doesn't seem to suffice), what is the proper cause of actions to help our customers not getting these false positives?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The scripts are used as "wrappers" for running installers to upgrade software installations and doing some maintenance of temporary task folders.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;SecTeer - &lt;A href="https://secteer.com/" target="_blank"&gt;https://secteer.com/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;VulnDetect - &lt;A href="https://vulndetect.org/" target="_blank"&gt;https://vulndetect.org/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 10:33:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-detection-of-vulndetect-scripts/m-p/520306#M3096</guid>
      <dc:creator>VulnDetect</dc:creator>
      <dc:date>2022-11-04T10:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR: False Positive detection of VulnDetect scripts</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-detection-of-vulndetect-scripts/m-p/520307#M3097</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/255189"&gt;@VulnDetect&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These seems to be some scripts which are doing discovery on process actions and hence this is categorised by cortex XDR as a script based attack.&lt;/P&gt;
&lt;P&gt;This is a post execution module detection and signer whitelists are not going to work for this. Please ask your customers to create alert exceptions for the same and retrieve the alert data and send it to engineering for investigation and fix. If the engineering declares this as a legit action, they will add the fix in the content updates and once your endpoints get the CU, you can ask to remove the alert exceptions for the same and it should not be blocked.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that answers your question!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 04 Nov 2022 10:53:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-detection-of-vulndetect-scripts/m-p/520307#M3097</guid>
      <dc:creator>neelrohit</dc:creator>
      <dc:date>2022-11-04T10:53:26Z</dc:date>
    </item>
  </channel>
</rss>

