<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cortex Scanning in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-scanning/m-p/526300#M3360</link>
    <description>&lt;P&gt;Cortex XDR can detect bad malware files and then to auto quarantine them if you have enabled this as Cortex XDR is EDR, Antivirus system and much more. Just start full scans to check everything and enable&amp;nbsp; auto quarantine as shown below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Manage-File-Execution" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Manage-File-Execution&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the agent detects malware on a Windows endpoint, you can take additional precautions to quarantine the file. When the agent quarantines malware, it moves the file from the location on a local or removable drive to a local quarantine folder (&lt;CODE class="filename hljs language-shell"&gt;&lt;SPAN class="hljs-meta prompt_"&gt;%&lt;/SPAN&gt;&lt;SPAN class="language-bash"&gt;PROGRAMDATA%\Cyvera\Quarantine&lt;/SPAN&gt;&lt;/CODE&gt;) where it isolates the file. This prevents the file from attempting to run again from the same path or causing any harm to your endpoints.&lt;/P&gt;
&lt;P&gt;To evaluate whether an executable file is considered malicious, the agent calculates a verdict using information from the following sources in order of priority:&lt;/P&gt;
&lt;DIV class="itemizedlist"&gt;
&lt;UL class="itemizedlist" style="list-style-type: disc;"&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;Hash exception policy&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;WildFire threat intelligence&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;Local analysis&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P&gt;Quarantining a file in &lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt; can be done in one of two ways:&lt;/P&gt;
&lt;DIV class="itemizedlist"&gt;
&lt;UL class="itemizedlist" style="list-style-type: disc;"&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;Enable the agent to automatically quarantine malicious executables by configuring quarantine settings in the Malware security profile.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;Right-click a specific file from the causality card and select &lt;SPAN class="guilabel"&gt;Quarantine&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV class="procedure"&gt;
&lt;OL class="procedure" type="1"&gt;
&lt;LI class="step"&gt;
&lt;P class="cmd cmd"&gt;View the quarantined files in your network.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 09 Jan 2023 09:59:57 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2023-01-09T09:59:57Z</dc:date>
    <item>
      <title>Cortex Scanning</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-scanning/m-p/526291#M3359</link>
      <description>&lt;P&gt;Hi, I'm looking at doing a review on our Cortex policies and we currently have weekly scanning enabled. I know scanning for Cortex is not a traditional antivirus scan, but more for creating a benchmark for your endpoints.&lt;/P&gt;
&lt;P&gt;After it does a scan, alerts get created from things that got raised from the scans. Some of our team members are concerned that if now IOCs or scanning criteria gets created, existing applications that have these criteria won't get scanned and picked up.&lt;/P&gt;
&lt;P&gt;Does the baselines get crosschecked with these new criteria, or will they remain undetected until they are detected through actions?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 09:10:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-scanning/m-p/526291#M3359</guid>
      <dc:creator>Conor_Dunne</dc:creator>
      <dc:date>2023-01-09T09:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex Scanning</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-scanning/m-p/526300#M3360</link>
      <description>&lt;P&gt;Cortex XDR can detect bad malware files and then to auto quarantine them if you have enabled this as Cortex XDR is EDR, Antivirus system and much more. Just start full scans to check everything and enable&amp;nbsp; auto quarantine as shown below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Manage-File-Execution" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Manage-File-Execution&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When the agent detects malware on a Windows endpoint, you can take additional precautions to quarantine the file. When the agent quarantines malware, it moves the file from the location on a local or removable drive to a local quarantine folder (&lt;CODE class="filename hljs language-shell"&gt;&lt;SPAN class="hljs-meta prompt_"&gt;%&lt;/SPAN&gt;&lt;SPAN class="language-bash"&gt;PROGRAMDATA%\Cyvera\Quarantine&lt;/SPAN&gt;&lt;/CODE&gt;) where it isolates the file. This prevents the file from attempting to run again from the same path or causing any harm to your endpoints.&lt;/P&gt;
&lt;P&gt;To evaluate whether an executable file is considered malicious, the agent calculates a verdict using information from the following sources in order of priority:&lt;/P&gt;
&lt;DIV class="itemizedlist"&gt;
&lt;UL class="itemizedlist" style="list-style-type: disc;"&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;Hash exception policy&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;WildFire threat intelligence&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;Local analysis&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P&gt;Quarantining a file in &lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt; can be done in one of two ways:&lt;/P&gt;
&lt;DIV class="itemizedlist"&gt;
&lt;UL class="itemizedlist" style="list-style-type: disc;"&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;Enable the agent to automatically quarantine malicious executables by configuring quarantine settings in the Malware security profile.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="listitem"&gt;
&lt;P&gt;Right-click a specific file from the causality card and select &lt;SPAN class="guilabel"&gt;Quarantine&lt;/SPAN&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;DIV class="procedure"&gt;
&lt;OL class="procedure" type="1"&gt;
&lt;LI class="step"&gt;
&lt;P class="cmd cmd"&gt;View the quarantined files in your network.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 09 Jan 2023 09:59:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-scanning/m-p/526300#M3360</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-01-09T09:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex Scanning</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-scanning/m-p/526303#M3361</link>
      <description>&lt;P&gt;Thank you for the quick response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With the malware detection, is this only during execution? If the hash of a malware gets added, but this malware already exists on the machine in a dormant state, are we waiting for execution for Cortex to pick it up, or when the malware hash gets added, will Cortex detect it as being installed?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 10:05:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-scanning/m-p/526303#M3361</guid>
      <dc:creator>Conor_Dunne</dc:creator>
      <dc:date>2023-01-09T10:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex Scanning</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-scanning/m-p/526317#M3362</link>
      <description>&lt;P&gt;To catch bad new malware that is already installed better configure automatic periodic scans (like it is done for the normal antivirus software applications), maybe each week of each month (if the users complain atleast each month is a nice option&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ) with auto quarantine option. Here is a nice discussion about this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/periodic-endpoint-scanning-report/td-p/525677" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/periodic-endpoint-scanning-report/td-p/525677&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;XDR uses also the wildfire cloud sandbox content service to catch malware, so this where the benifits come into play against normal antivirus, when you run scans. You may need to license this as to block even zero day malware:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Architecture" target="_blank" rel="noopener"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Architecture&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also limit what a not detected malware can do configure also exploits and restrictions profiles to protect processes from the non detected malware and restrict the files. This way you can catch and stop zero day attacks (another EDR benefit compared to normal antivirus software):&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Exploit-Security-Profile" target="_blank" rel="noopener"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Exploit-Security-Profile&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Restrictions-Security-Profile" target="_blank" rel="noopener"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Restrictions-Security-Profile&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Jan 2023 11:51:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-scanning/m-p/526317#M3362</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-01-09T11:51:20Z</dc:date>
    </item>
  </channel>
</rss>

