<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: False Positive: Suspicious File Modification' generated by XDR Agent - Module Anti-Ransomware Protection in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/528694#M3475</link>
    <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192039"&gt;@eumbach&lt;/a&gt;&amp;nbsp;, you'll need to perform the action under PE and DLL examination (&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Malware-Security-Profile" target="_blank"&gt;step 3c&lt;/A&gt;) and see if that meets your requirements.&lt;/P&gt;</description>
    <pubDate>Thu, 26 Jan 2023 07:37:46 GMT</pubDate>
    <dc:creator>bbarmanroy</dc:creator>
    <dc:date>2023-01-26T07:37:46Z</dc:date>
    <item>
      <title>False Positive: Suspicious File Modification' generated by XDR Agent - Module Anti-Ransomware Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/460157#M1473</link>
      <description>&lt;P&gt;Hi we see a problem with a powershell Script we are using to clean up Profiles on some specific Remote Session Host Servers.&lt;/P&gt;&lt;P&gt;It will be blocked by Cortex XDR Pro and so I want to make an Exception for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately it seems only possible to do an Alert Exception for this and so it will allow the Initiator CGO "Powershell.exe"&lt;/P&gt;&lt;P&gt;for the Ransomware Module in General, which seems to be a bit to dangerous for me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I didn't found anything to allow just the Powershell Script + Path + Systemname (for example) instead of powershell.exe.&lt;/P&gt;&lt;P&gt;You can edit very granular Exclusions but it seems to be not possible to do the same for exceptions, or?&lt;/P&gt;&lt;P&gt;Is there maybe something other, I can do, to allow the Script without giving any powershell script free to run?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Marcus&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 14:13:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/460157#M1473</guid>
      <dc:creator>Rindsland</dc:creator>
      <dc:date>2022-01-21T14:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive: Suspicious File Modification' generated by XDR Agent - Module Anti-Ransomware Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/460457#M1474</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/201986"&gt;@Rindsland&lt;/a&gt;, your question seems to be similar to &lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-file-hash-allow-block-on-specific-endpoint/td-p/460036" target="_self"&gt;this&lt;/A&gt;. You can create a &lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile.html" target="_self"&gt;Malware Profile&lt;/A&gt;&amp;nbsp;(Step 3, sub-step 3) allowing the PS script (full path) to be exempted from analysis and associate it with a policy that is applied to the selected set of servers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this works for your case, please let us know if it worked, and accept the response as a solution for others to refer to and follow.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 02:39:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/460457#M1474</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2022-01-24T02:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive: Suspicious File Modification' generated by XDR Agent - Module Anti-Ransomware Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/460484#M1475</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192661"&gt;@bbarmanroy&lt;/a&gt;&amp;nbsp;, it comes from &lt;STRONG&gt;Module Anti-Ransomware Protection&lt;/STRONG&gt;, so I am not sure, if it really helps here, but I will give it a try.&lt;/P&gt;&lt;P&gt;Looks for me that the Anti-Ransomware Modul doesn't have really a exception, or?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am also aware that I also can stop the Modul completely via Malware Profile on our Remote Session Host Servers, but I think you will also agree, that this not a good idea.&lt;/P&gt;&lt;P&gt;Anyway thank you for your Input and trying to help for finding a Solution for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Marcus&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 07:41:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/460484#M1475</guid>
      <dc:creator>Rindsland</dc:creator>
      <dc:date>2022-01-24T07:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive: Suspicious File Modification' generated by XDR Agent - Module Anti-Ransomware Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/460535#M1478</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/201986"&gt;@Rindsland&lt;/a&gt;&amp;nbsp;the Powershell script that you're trying to execute is vetted and trusted within your organization, if I understand correctly. If Cortex XDR is flagging it as a ransomware and preventing it from executing, that is because the script possibly has some actions that are similar in nature to a ransomware. Which is good - it is a sign that you're running the Ransomware module protection in Block mode!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Coming back to your need, what I am recommending is for you to create an Exception only for that trusted script, and apply it to only those set of servers. No other modules or protections are being disabled, for anything else that is running in your organization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The recommendation is:&lt;/P&gt;&lt;P&gt;1. create a copy of your existing Malware profile that is currently applied to those servers.&lt;/P&gt;&lt;P&gt;2. Edit the new Malware profile to create an exception for the trusted powershell script.&lt;/P&gt;&lt;P&gt;3. Create a new policy that will apply the Malware profile to the specific set of servers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this clarifies my recommendation.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jan 2022 10:00:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/460535#M1478</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2022-01-24T10:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive: Suspicious File Modification' generated by XDR Agent - Module Anti-Ransomware Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/528571#M3466</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192661"&gt;@bbarmanroy&lt;/a&gt;&amp;nbsp;Where? I don't see anything under this module.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="eumbach_0-1674661972975.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47402iF21685733BBC5349/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="eumbach_0-1674661972975.png" alt="eumbach_0-1674661972975.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jan 2023 15:53:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/528571#M3466</guid>
      <dc:creator>eumbach</dc:creator>
      <dc:date>2023-01-25T15:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive: Suspicious File Modification' generated by XDR Agent - Module Anti-Ransomware Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/528694#M3475</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192039"&gt;@eumbach&lt;/a&gt;&amp;nbsp;, you'll need to perform the action under PE and DLL examination (&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Malware-Security-Profile" target="_blank"&gt;step 3c&lt;/A&gt;) and see if that meets your requirements.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 07:37:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/528694#M3475</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2023-01-26T07:37:46Z</dc:date>
    </item>
    <item>
      <title>Re: False Positive: Suspicious File Modification' generated by XDR Agent - Module Anti-Ransomware Protection</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/532020#M3687</link>
      <description>&lt;P&gt;That's a directory not a CGO.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Feb 2023 20:39:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/false-positive-suspicious-file-modification-generated-by-xdr/m-p/532020#M3687</guid>
      <dc:creator>eumbach</dc:creator>
      <dc:date>2023-02-22T20:39:14Z</dc:date>
    </item>
  </channel>
</rss>

