<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Documentation for Advanced API Monitoring in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542528#M4377</link>
    <description>&lt;P&gt;We're also curious for additional information. There is nothing in the XDR Prevent Administrator's Guide.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our console has an option to Enable or Disable. However, the email regarding CVE-2023-23397, and quoted in mavraham's post, says to set Advanced API Monitoring to "report."&lt;/P&gt;</description>
    <pubDate>Wed, 17 May 2023 18:27:39 GMT</pubDate>
    <dc:creator>Joseph_Hunter</dc:creator>
    <dc:date>2023-05-17T18:27:39Z</dc:date>
    <item>
      <title>Documentation for Advanced API Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/540715#M4263</link>
      <description>&lt;P&gt;Dear LIVE community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone have any details on Advanced API monitoring? (Under Malware profile --&amp;gt;&amp;nbsp;&lt;SPAN&gt;Global Behavioral Threat Protection Rules)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;It is disabled by default and the only information we got so far was that it could help detect&amp;nbsp;CVE-2023-23397.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please share if you got any supporting document from Palo as I couldn't find any so far.&lt;BR /&gt;&lt;LI-PRODUCT title="Cortex XDR" id="Cortex_XDR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 May 2023 03:12:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/540715#M4263</guid>
      <dc:creator>Antony_Chan</dc:creator>
      <dc:date>2023-05-02T03:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: Documentation for Advanced API Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/540751#M4270</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/202190"&gt;@Antony_Chan&lt;/a&gt;, thank you for writing to Live Community.&lt;BR /&gt;&lt;BR /&gt;On March 29th all XDR and XSIAM customers received an email about Advanced API Monitoring providing some additional details. Please find the content of the email below and let me know if you have any further questions.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;DIV&gt;&lt;SPAN&gt;----------&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Dear customer,&lt;/SPAN&gt;&lt;/P&gt;
&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;A recent discovery of CVE-&lt;SPAN class="il"&gt;2023&lt;/SPAN&gt;-&lt;SPAN class="il"&gt;23397&lt;/SPAN&gt;, a critical vulnerability/0-day that impacts Microsoft Outlook has found that threat actors can obtain credentials without any user interaction (zero-touch).&amp;nbsp; The vulnerability, affecting all versions of Windows Outlook, was given a 9.8 CVSS rating.&lt;/SPAN&gt;&lt;/P&gt;
&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;BEST PRACTICE: Palo Alto Networks strongly recommends that you upgrade Outlook as soon as possible and follow Microsoft’s Security &lt;/SPAN&gt;&lt;A href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23397&amp;amp;source=gmail&amp;amp;ust=1683107860974000&amp;amp;usg=AOvVaw1aC4U3p88kzi0KJLav7rPx"&gt;&lt;SPAN&gt;Advisory&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; statement and &lt;/SPAN&gt;&lt;A href="https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/&amp;amp;source=gmail&amp;amp;ust=1683107860974000&amp;amp;usg=AOvVaw2p6V_bdoLT1raSKwXV8Oy3"&gt;&lt;SPAN&gt;MSRC’s blogpost&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; regarding vulnerability CVE-&lt;SPAN class="il"&gt;2023&lt;/SPAN&gt;-&lt;SPAN class="il"&gt;23397&lt;/SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;The Cortex XDR research team has investigated the above vulnerabilities, identified the exploit, and developed visibility into the exploitation attempts on endpoints running Microsoft Outlook.&lt;/SPAN&gt;&lt;/P&gt;
&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Consequently, we are happy to announce that the Cortex XDR agent running on version 8.0.0 and above with content version 910-49200&lt;/SPAN&gt;&lt;SPAN&gt;, &lt;/SPAN&gt;&lt;SPAN&gt;together with Advanced API Monitoring enabled, will report the exploitation attempt.&lt;/SPAN&gt;&lt;/P&gt;
&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;To ensure you receive alerts and monitor exploitation attempts:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI dir="ltr"&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Verify that you are using Cortex XDR agent version 8.0 and above.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="ltr"&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Verify that your agent is updated to content version &lt;/SPAN&gt;&lt;SPAN&gt;910-49200&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="ltr"&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Enable ‘Advanced API Monitoring’ in the Malware Profile. Go to Policy Management &amp;gt; Profiles &amp;gt; Malware Profile &amp;gt; Global Behavioral Threat Protection Rules &amp;gt;Advanced API Monitoring and select - Report.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI dir="ltr"&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Restart your running outlook applications to ensure full coverage.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;New behavioral threat protection rules have been added to notify you about exploitations attempts (&lt;/SPAN&gt;&lt;SPAN&gt;The alert can be displayed in two forms, depending on whether you&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/customizable-agent-settings/global-agent-configurations" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/customizable-agent-settings/global-agent-configurations&amp;amp;source=gmail&amp;amp;ust=1683107860974000&amp;amp;usg=AOvVaw3MGr4CWQ_ef3j4iZi5KuiV"&gt;&lt;SPAN&gt; enabled ‘&lt;/SPAN&gt;&lt;SPAN&gt;Informative BTP Alerts’ in the agent configuration&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;SPAN&gt;:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV dir="ltr" align="left"&gt;
&lt;TABLE&gt;&lt;COLGROUP&gt;&lt;COL width="97" /&gt;&lt;COL width="243" /&gt;&lt;COL width="285" /&gt;&lt;/COLGROUP&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Alert Name&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Alert Description&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Informative BTP Alerts Enabled&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;CVE Exploitation - 3933073311&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Outlook exploit CVE-&lt;SPAN class="il"&gt;2023&lt;/SPAN&gt;-&lt;SPAN class="il"&gt;23397&lt;/SPAN&gt; variant&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Informative BTP Alerts Disabled&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Behavioral Threat&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;Behavioral threat detected (rule_id:bioc.outlook_exploit_&lt;WBR /&gt;cve-&lt;SPAN class="il"&gt;2023&lt;/SPAN&gt;-&lt;SPAN class="il"&gt;23397&lt;/SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;* only supported for Cortex XDR Agent 8.0 and above&lt;/SPAN&gt;&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;We are continuously working on expanding our coverage and will be providing additional information as we learn the changing threat vectors.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;&lt;SPAN&gt;If you have any questions, please contact our &lt;/SPAN&gt;&lt;A href="https://support.paloaltonetworks.com/Support/Index" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://support.paloaltonetworks.com/Support/Index&amp;amp;source=gmail&amp;amp;ust=1683107860974000&amp;amp;usg=AOvVaw0PKz_ZO4uGsmZ7ZUqqRBcl"&gt;&lt;SPAN&gt;customer support team&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 02 May 2023 10:33:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/540751#M4270</guid>
      <dc:creator>mavraham</dc:creator>
      <dc:date>2023-05-02T10:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Documentation for Advanced API Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/540790#M4272</link>
      <description>&lt;P&gt;Hello, I received that email as well and understand it is recommended to turn on, but we have a customer that is asking how the Advanced API Monitoring actually works and if there is an operational impact. I recommended testing in a staging environment but that doesn't answer the first question. If this involves process hooking, will a reboot of the system be required? Any other information on this is appreciated. Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 02 May 2023 16:21:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/540790#M4272</guid>
      <dc:creator>Joe_Botelho</dc:creator>
      <dc:date>2023-05-02T16:21:39Z</dc:date>
    </item>
    <item>
      <title>Re: Documentation for Advanced API Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542528#M4377</link>
      <description>&lt;P&gt;We're also curious for additional information. There is nothing in the XDR Prevent Administrator's Guide.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our console has an option to Enable or Disable. However, the email regarding CVE-2023-23397, and quoted in mavraham's post, says to set Advanced API Monitoring to "report."&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 18:27:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542528#M4377</guid>
      <dc:creator>Joseph_Hunter</dc:creator>
      <dc:date>2023-05-17T18:27:39Z</dc:date>
    </item>
    <item>
      <title>Re: Documentation for Advanced API Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542542#M4379</link>
      <description>&lt;P&gt;We are also curious if anybody has managed to find any documentation on this option.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 20:23:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542542#M4379</guid>
      <dc:creator>Nick_Burns</dc:creator>
      <dc:date>2023-05-17T20:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: Documentation for Advanced API Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542543#M4380</link>
      <description>&lt;P&gt;I'm also here to understand what&amp;nbsp;Advanced API Monitoring does exactly.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 20:37:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542543#M4380</guid>
      <dc:creator>earldieta</dc:creator>
      <dc:date>2023-05-17T20:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Documentation for Advanced API Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542571#M4381</link>
      <description>&lt;P&gt;Me too. Waiting for more info about it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 05:23:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542571#M4381</guid>
      <dc:creator>IChen3</dc:creator>
      <dc:date>2023-05-18T05:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: Documentation for Advanced API Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542603#M4383</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223197"&gt;@Joseph_Hunter&lt;/a&gt;&amp;nbsp;you are correct, the initial email sent to customers mentioned putting in Report Mode.&lt;BR /&gt;&lt;SPAN&gt;The Block/Report option is configured at the protection module level.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Advanced API Monitoring has now been added to the &lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Add-a-New-Malware-Security-Profile" target="_self"&gt;Admin Guide&lt;/A&gt;, properly reflecting the available options (enable/disable).&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 13:38:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/documentation-for-advanced-api-monitoring/m-p/542603#M4383</guid>
      <dc:creator>mavraham</dc:creator>
      <dc:date>2023-05-18T13:38:55Z</dc:date>
    </item>
  </channel>
</rss>

