<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability/m-p/536471#M3939</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can we know how frequesntly are new vulnerablities added on XDR?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How XDR's vulnerabilty assesment can be used to address vulnerablitlites?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 26 Mar 2023 10:48:25 GMT</pubDate>
    <dc:creator>Aiman_Fathima</dc:creator>
    <dc:date>2023-03-26T10:48:25Z</dc:date>
    <item>
      <title>Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability/m-p/536471#M3939</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can we know how frequesntly are new vulnerablities added on XDR?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How XDR's vulnerabilty assesment can be used to address vulnerablitlites?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 26 Mar 2023 10:48:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability/m-p/536471#M3939</guid>
      <dc:creator>Aiman_Fathima</dc:creator>
      <dc:date>2023-03-26T10:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability/m-p/536561#M3942</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/224150"&gt;@Aiman_Fathima&lt;/a&gt;&amp;nbsp;CVE's are added on a regular basis and is transparent to the user. Whether an endpoint has a vulnerable software affected by a specific CVE or a set of CVE's can be determined using Host Insights (see &lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Vulnerability-Assessment?tocId=xnoo33GXtlAg31KQ~aXgHQ" target="_blank"&gt;link&lt;/A&gt;). The information is automatically calculated every 24hrs, and can be manually initiated for one or more endpoints or the entire tenant. Using the information, organizations can identify vulnerable software, apply patches and determine the risk to the organization.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 06:54:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability/m-p/536561#M3942</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2023-03-27T06:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability/m-p/538753#M4128</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider gz b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Hello Team,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider gz b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;1. How frequently CVE's are added to the XDR Console?&lt;BR /&gt;2. How PaloAlto addresses Patch Tuesday CVEs ?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 08:07:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability/m-p/538753#M4128</guid>
      <dc:creator>RamyashreeMada</dc:creator>
      <dc:date>2023-04-14T08:07:07Z</dc:date>
    </item>
  </channel>
</rss>

