<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Periodic Scan on endpoints in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/periodic-scan-on-endpoints/m-p/527354#M3403</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206335"&gt;@RamyashreeMada&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I would agree with &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167148"&gt;@mavraham&lt;/a&gt;, that this really depends on your organization and security standards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One think that I want to point out, which is often missed when discussing malware scan - Cortex XDR Malware scan follow the exact same steps of pre-execution protection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you recall Pre-Execution protection perform the following checks, when attempting to execute process/file :&lt;/P&gt;
&lt;P&gt;- Check if file hash is in allow/block list&lt;/P&gt;
&lt;P&gt;- Check if file is signed by trusted/untrusted signer&lt;/P&gt;
&lt;P&gt;- Query wildfire for verdict&lt;/P&gt;
&lt;P&gt;- If WF verdict is uknown (wf is unreachable) local analysis check is performed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Malware scan perform exact same checks, &lt;U&gt;except for the local analysis&lt;/U&gt;, but without the file being executed.&lt;/P&gt;
&lt;P&gt;In addition when malware scan is executed and it send the file hash to WildFire for verdict it will keep this verdict in local cache, which means is this file is later executed agent will use the verdict for the cache instead of querying WF again&lt;/P&gt;</description>
    <pubDate>Tue, 17 Jan 2023 09:43:32 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2023-01-17T09:43:32Z</dc:date>
    <item>
      <title>Periodic Scan on endpoints</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/periodic-scan-on-endpoints/m-p/525987#M3344</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We intend to initiate malware scans on all endpoints. Which is the best approach to perform a periodic scan, is that on a weekly or monthly basis?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 06:32:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/periodic-scan-on-endpoints/m-p/525987#M3344</guid>
      <dc:creator>RamyashreeMada</dc:creator>
      <dc:date>2023-01-05T06:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: Periodic Scan on endpoints</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/periodic-scan-on-endpoints/m-p/526002#M3346</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206335"&gt;@RamyashreeMada&lt;/a&gt;,&amp;nbsp;thank you for writing to Live Community.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Unfortunately we can not determine for you what is the best approach here. You should look into your organization's internal procedures, as well as regulatory requirements to determine the frequency of scanning.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2023 11:49:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/periodic-scan-on-endpoints/m-p/526002#M3346</guid>
      <dc:creator>mavraham</dc:creator>
      <dc:date>2023-01-05T11:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: Periodic Scan on endpoints</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/periodic-scan-on-endpoints/m-p/527354#M3403</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206335"&gt;@RamyashreeMada&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I would agree with &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167148"&gt;@mavraham&lt;/a&gt;, that this really depends on your organization and security standards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One think that I want to point out, which is often missed when discussing malware scan - Cortex XDR Malware scan follow the exact same steps of pre-execution protection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you recall Pre-Execution protection perform the following checks, when attempting to execute process/file :&lt;/P&gt;
&lt;P&gt;- Check if file hash is in allow/block list&lt;/P&gt;
&lt;P&gt;- Check if file is signed by trusted/untrusted signer&lt;/P&gt;
&lt;P&gt;- Query wildfire for verdict&lt;/P&gt;
&lt;P&gt;- If WF verdict is uknown (wf is unreachable) local analysis check is performed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Malware scan perform exact same checks, &lt;U&gt;except for the local analysis&lt;/U&gt;, but without the file being executed.&lt;/P&gt;
&lt;P&gt;In addition when malware scan is executed and it send the file hash to WildFire for verdict it will keep this verdict in local cache, which means is this file is later executed agent will use the verdict for the cache instead of querying WF again&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 09:43:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/periodic-scan-on-endpoints/m-p/527354#M3403</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-01-17T09:43:32Z</dc:date>
    </item>
  </channel>
</rss>

