<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exclude single .exe on single endpoint in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/527351#M3402</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129689"&gt;@cemcga&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Let me jump in and clarify &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/97798"&gt;@P.Jacob&lt;/a&gt;&amp;nbsp; reply:&lt;/P&gt;
&lt;P&gt;- Report incorrect verdict is applicable only if the prevention is triggered by the WildFire. If Wildfire verdict is unknown at the time of the execution (or WF is unreachable) XDR agent will perform static analysis, called Local Analysis. Local Analysis is using machine learning models to search for suspicious behavior in the exe. It is very common for local analysis to trigger false positive for legitimate file.&lt;/P&gt;
&lt;P&gt;- If the execution is blocked by Local Analysis, reporting verdict to WF is not applicable here. As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/97798"&gt;@P.Jacob&lt;/a&gt;&amp;nbsp; mentioned the solution in this case it to add the file hash to the allow list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my humble opinion - if you absolutely trust this file and want execute it on a machine, then it should be safe to allow this file hash&amp;nbsp; globally. So the easiest way would be to add it to the allow list, wait for the xdr agent to check-in (to get the update from the cloud console).&lt;/P&gt;</description>
    <pubDate>Tue, 17 Jan 2023 09:14:58 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2023-01-17T09:14:58Z</dc:date>
    <item>
      <title>Exclude single .exe on single endpoint</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526642#M3373</link>
      <description>&lt;P&gt;Pretty simple need here....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Installing the latest version of WSUS Automated Maintenance from AJ Tek on our WSUS server and Cortex is blocking it with the description "Suspicious executable detected". How do I allow this to install? Is the best way to temporarily pause protection on the endpoint, install the software and then re-enable protection?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 13:53:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526642#M3373</guid>
      <dc:creator>cemcga</dc:creator>
      <dc:date>2023-01-11T13:53:14Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude single .exe on single endpoint</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526644#M3374</link>
      <description>&lt;P&gt;I think can depend how your environment is setup. you potentially could use the "report verdict as incorrect" in the incident... or could whitelist the hash... now if your setup to not allow unsigned app and that is unsigned that would be different. sorry for being slightly vague but some of this depends on your environment.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 14:38:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526644#M3374</guid>
      <dc:creator>P.Jacob</dc:creator>
      <dc:date>2023-01-11T14:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude single .exe on single endpoint</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526688#M3385</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129689"&gt;@cemcga&lt;/a&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;As suggested above, you can add files hashes to your allow list. Adding files to the block list or allow list takes precedence of any other policy rules that may have otherwise been applied to these files.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In order to add file hashes to your allow-lists:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Go to Incident Response → Response → Action Center → + New Action.&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Select Add to Allow List.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Enter the SHA-256 hash of the file.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt; You can read more about managing file execution &lt;/SPAN&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Investigate-Files" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;here&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;If this helped, please click Accept as Solution!&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Jan 2023 19:05:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526688#M3385</guid>
      <dc:creator>mavraham</dc:creator>
      <dc:date>2023-01-11T19:05:53Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude single .exe on single endpoint</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526784#M3390</link>
      <description>&lt;P&gt;Thanks for this. To make sure I understand, this would allow the file to be executed on&amp;nbsp;&lt;EM&gt;any&lt;/EM&gt; endpoint, not just the one server, correct?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 15:27:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526784#M3390</guid>
      <dc:creator>cemcga</dc:creator>
      <dc:date>2023-01-12T15:27:40Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude single .exe on single endpoint</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526788#M3392</link>
      <description>&lt;P&gt;Yes, you are correct.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 15:41:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526788#M3392</guid>
      <dc:creator>mavraham</dc:creator>
      <dc:date>2023-01-12T15:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude single .exe on single endpoint</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526879#M3395</link>
      <description>&lt;P&gt;You can add the exception to an endpoint by creating a new Malware security profile, add the file to the PE and DLL Examination Allow List (&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Malware-Security-Profile" target="_blank"&gt;Step 3c&lt;/A&gt;) and assigning it to the endpoint.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 02:05:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/526879#M3395</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2023-01-13T02:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: Exclude single .exe on single endpoint</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/527351#M3402</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129689"&gt;@cemcga&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Let me jump in and clarify &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/97798"&gt;@P.Jacob&lt;/a&gt;&amp;nbsp; reply:&lt;/P&gt;
&lt;P&gt;- Report incorrect verdict is applicable only if the prevention is triggered by the WildFire. If Wildfire verdict is unknown at the time of the execution (or WF is unreachable) XDR agent will perform static analysis, called Local Analysis. Local Analysis is using machine learning models to search for suspicious behavior in the exe. It is very common for local analysis to trigger false positive for legitimate file.&lt;/P&gt;
&lt;P&gt;- If the execution is blocked by Local Analysis, reporting verdict to WF is not applicable here. As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/97798"&gt;@P.Jacob&lt;/a&gt;&amp;nbsp; mentioned the solution in this case it to add the file hash to the allow list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my humble opinion - if you absolutely trust this file and want execute it on a machine, then it should be safe to allow this file hash&amp;nbsp; globally. So the easiest way would be to add it to the allow list, wait for the xdr agent to check-in (to get the update from the cloud console).&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 09:14:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclude-single-exe-on-single-endpoint/m-p/527351#M3402</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-01-17T09:14:58Z</dc:date>
    </item>
  </channel>
</rss>

