<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cortex XDR - False positive - Cloud2Model Manager 1.005 in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391565#M615</link>
    <description>&lt;P&gt;That's a great question, &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/175281"&gt;@eproca&lt;/a&gt;&amp;nbsp;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adding your signers to your allow list will exclude signed "executable files, macros, or DLL files on Windows endpoints, Mach-O files or DMG files on Mac endpoints, ELF files on Linux endpoints, or APK files on Android endpoints" from the malware examination. It will still be subject to scrutiny by other protective modules such as Behavior Threat Protection, Child Process Protection, and any other applicable module given the activities observed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are here to support if a false-positive is found. If it does happen, please feel free to have the XDR administrators &lt;A href="https://docs.paloaltonetworks.com/traps/4-2/traps-endpoint-security-manager-admin/malware-protection/manage-hashes-for-executable-files/report-an-incorrect-verdict.html" target="_self"&gt;submit a verdict change request&lt;/A&gt; or &lt;A href="https://support.paloaltonetworks.com/" target="_self"&gt;open a case with Support&lt;/A&gt; to investigate further.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Mar 2021 18:43:11 GMT</pubDate>
    <dc:creator>gjenkins</dc:creator>
    <dc:date>2021-03-16T18:43:11Z</dc:date>
    <item>
      <title>Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391391#M606</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;Some of the users of Cloud2Model are resporting that Cortex XDR is blocking the installer "Cloud2Model Manager 1.005 x64 setup.exe" with this Cortex XDR code: c0400055. This is a legitimate application and the installer is signed with a EV code certificate. You can check the instaler here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://download.cloud2model.com/manager" target="_blank"&gt;https://download.cloud2model.com/manager&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Please check this issue ASAP. I am very interested in knowing the reasons that trigger to block the file.&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 09:23:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391391#M606</guid>
      <dc:creator>eproca</dc:creator>
      <dc:date>2021-03-16T09:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391504#M609</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/175281"&gt;@eproca&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;From what I can tell, you may be encountering an issue where Local Analysis has determined that your sanctioned software is malware and is blocking it due to policy configuration. To override the local analysis verdict and permit this software to run immediately, you can &lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-prevent-admin/investigation-and-response/investigate-files/manage-file-execution.html" target="_self"&gt;apply the hash for the file in the Allow List&lt;/A&gt; for Cortex XDR using the following instructions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To understand why your file was blocked, I would recommend opening the Hash View to see the information collected by Cortex XDR in terms of the threat intelligence and the incidents related to the hash. You can access the Hash View by clicking the circle icon (&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gjenkins_0-1615907288514.png" style="width: 35px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30378iF996A9566D063939/image-dimensions/35x33/is-moderation-mode/true?v=v2" width="35" height="33" role="button" title="gjenkins_0-1615907288514.png" alt="gjenkins_0-1615907288514.png" /&gt;&lt;/span&gt;) on the top-right of your screen, pasting the hash into the search bar, and clicking, "Open Hash View of..." There you will find more information regarding the hash and the verdict provided.&lt;BR /&gt;&lt;BR /&gt;Please let me know how this goes when you have the opportunity.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 15:10:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391504#M609</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-03-16T15:10:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391509#M610</link>
      <description>&lt;P&gt;hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112774"&gt;@gjenkins&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;Thanks for your feedback. I am the application developer but not the Cortex XDR user. I dont have any direct access to the Action Center of Cortex XDR or possibility to check the Hash View. Anyway I will pass the information to the actual Cortex XDR users.&lt;/P&gt;&lt;P&gt;Is there any way to "white list" a file globally for Cortex XDR? I mean without having to be an actual user of Cortex XDR. Some antivirus have proccedures and protocols for this kind of situations.&lt;/P&gt;&lt;P&gt;Many thanks in advance for your support&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 15:25:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391509#M610</guid>
      <dc:creator>eproca</dc:creator>
      <dc:date>2021-03-16T15:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391521#M611</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/175281"&gt;@eproca&lt;/a&gt;,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;As you mention, I would get in touch with your XDR admin and refer him to the following links.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile.html" target="_blank"&gt;https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile.html&lt;/A&gt;&lt;/FONT&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Here you can add applications path and name to the Allow list directly in the Malware profile. By doing this, you can use the wildcard (*) and future-proof the tuning&lt;/FONT&gt;&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;STRONG&gt;c:\folder_a\folder_b\folder_v1.2.3\application_v1.2.3.exe&lt;/STRONG&gt; could turn to&amp;nbsp;&lt;STRONG&gt;c:\folder_a\folder_b\folder_v*.*.*\application_v*.*.*.exe&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Something like the above will make sure that current and future same application versions are allowed by the XDR agent&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&lt;STRONG&gt;NOTE&lt;/STRONG&gt;, adding anything to the allow list in the Malware profile is like poking a tiny whole in the security of the XDR agent, so please be as precise as possible and do not overuse the wildcard (*)&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;You also mentioned that the application you want to allow is also digitally signed. You can also add the signature to the Allow List Signer in the Malware Profile,&lt;/FONT&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile.html#:~:text=Add%20signers%20to%20your%20allow%20list%20to%20exclude%20them%20from%20examination" target="_blank"&gt;https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile.html#:~:text=Add%20signers%20to%20your%20allow%20list%20to%20exclude%20them%20from%20examination&lt;/A&gt;.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 16 Mar 2021 16:05:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391521#M611</guid>
      <dc:creator>fmoixsante</dc:creator>
      <dc:date>2021-03-16T16:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391522#M612</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Passing the information along to the Cortex XDR administrators for your instance is the best next step in this case. Thank you for forwarding it. Once they have applied the hash to the allow list, it will apply to all endpoints within your environment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can add to the allow list for your environment globally by using the instructions above or watching the following video.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-walkthroughs/xdr-pro-prevent-managed-file-execution/ta-p/380240" target="_self"&gt;XDR Pro + Prevent &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-walkthroughs/xdr-pro-prevent-managed-file-execution/ta-p/380240" target="_self"&gt;Managed File Execution&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for a true global verdict via Wildfire submission, the best way to submit is by executing the file on a device with Cortex XDR. Once executed, Wildfire will receive a copy submitted from that endpoint and provide its verdict within 24 hours. That verdict is distributed globally across all tenants.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 16:12:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391522#M612</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-03-16T16:12:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391529#M614</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/64736"&gt;@fmoixsante&lt;/a&gt;&amp;nbsp; for the possible solutions and thanks again&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112774"&gt;@gjenkins&lt;/a&gt; for the support.&lt;/P&gt;&lt;P&gt;One question: the application is signed with an EV code certificate. &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/64736"&gt;@fmoixsante&lt;/a&gt; explains that it can be added to an &lt;FONT face="arial,helvetica,sans-serif"&gt;Allow List Signer in the Malware Profile. Will this help to avoid false positives in future files signed with the same certificate?&amp;nbsp; Honestly, I am not so amused with the idea that each new future installer will need some kind of special managment by the Cortex XDR administrators.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Thanks in advence for the support.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 16:24:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391529#M614</guid>
      <dc:creator>eproca</dc:creator>
      <dc:date>2021-03-16T16:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391565#M615</link>
      <description>&lt;P&gt;That's a great question, &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/175281"&gt;@eproca&lt;/a&gt;&amp;nbsp;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Adding your signers to your allow list will exclude signed "executable files, macros, or DLL files on Windows endpoints, Mach-O files or DMG files on Mac endpoints, ELF files on Linux endpoints, or APK files on Android endpoints" from the malware examination. It will still be subject to scrutiny by other protective modules such as Behavior Threat Protection, Child Process Protection, and any other applicable module given the activities observed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are here to support if a false-positive is found. If it does happen, please feel free to have the XDR administrators &lt;A href="https://docs.paloaltonetworks.com/traps/4-2/traps-endpoint-security-manager-admin/malware-protection/manage-hashes-for-executable-files/report-an-incorrect-verdict.html" target="_self"&gt;submit a verdict change request&lt;/A&gt; or &lt;A href="https://support.paloaltonetworks.com/" target="_self"&gt;open a case with Support&lt;/A&gt; to investigate further.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 18:43:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391565#M615</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-03-16T18:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391741#M619</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;I have an application that keeps getting blocked because the hash keeps changing each time it is downloaded.&amp;nbsp; It is digitally signed by the publisher and I was wondering if you had instructions on allowing the program based off the signature instead of the installation path.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 15:26:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391741#M619</guid>
      <dc:creator>JHugget</dc:creator>
      <dc:date>2021-03-17T15:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391750#M620</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/175542"&gt;@JHugget&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The instructions you're asking for are &lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile.html#:~:text=Add%20signers%20to%20your%20allow%20list%20to%20exclude%20them%20from%20examination" target="_self"&gt;here&lt;/A&gt;, as referenced by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/64736"&gt;@fmoixsante&lt;/a&gt;&amp;nbsp;earlier in the thread. This will help exempt your file from scanning due to the changing hash.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Mar 2021 15:53:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/391750#M620</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-03-17T15:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/392015#M626</link>
      <description>&lt;P&gt;Thanks again for the support &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112774"&gt;@gjenkins&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;I have been told that after one day the same installer file did not trigger any warning from Cortex XDR any more. And without any action from the administrators of Cortex XDR. Maybe some action in the paloaltoN side?. Anyway thanks again for the support.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 12:29:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/392015#M626</guid>
      <dc:creator>eproca</dc:creator>
      <dc:date>2021-03-18T12:29:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/392078#M627</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/175281"&gt;@eproca&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That makes sense as WildFire likely produced and distributed a verdict for the file within that time. If you have other questions in the future regarding the process, please feel free to reach out.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 15:03:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/392078#M627</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-03-18T15:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - False positive - Cloud2Model Manager 1.005</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/392087#M628</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/175281"&gt;@eproca&lt;/a&gt;,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;The current Wildfire flow for unknown applications, and by unknown I mean not known to WildFire, is as follows&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Executable/DLL is executed,&lt;/FONT&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;XDR agent Local Analysis engine will check its Wildfire-cache file for the hash sha256 value, and block or allow accordingly&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;If hash is not in the file, the XDR agent will communicate with the XDR service for the hash sha256 value. If hash is known by the service, the XDR agent will download the info to the wildfire-cache file and allow/block as per the verdict&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;If the XDR service does not know the hash, it will communicate with the Wildfire cloud and follow point 2 if known&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;If the hash is not known in Wildfire, the XDR agent will upload the unknown executable to the Wildfire cloud for it to be dynamically analyzed in isolation. This process could take 10-20 minutes depending on file size, upload link speed, etc.&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;In your case, the installer that was being blocked uploaded to Wildfire, and it was scored as benign allowing it to execute in your system. To clarify, every executable has a unique hash value. If the application gets an update, this new version of the installer will get another unique hash value.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;You could do 3 things,&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Add the digital signature Common name to the &lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile.html#:~:text=Add%20signers%20to%20your%20allow%20list%20to%20exclude%20them%20from%20examination" target="_self"&gt;Trusted Signer Allow&lt;/A&gt; list in the Malware profile, or&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Add the path and name of the file to the &lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-profiles/add-malware-security-profile.html" target="_self"&gt;Allow list of the Malware profile&lt;/A&gt;, or&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;Wait for the whole wildfire flow to follow its course and after 10-20 minutes, you will get a verdict that could be Benign, Malware or Grayware&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;if Benign leave as is&lt;/FONT&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;If Malware, and if you block Grayware, do points 1 or 2, and as mentioned by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112774"&gt;@gjenkins&lt;/a&gt;, &lt;A href="https://docs.paloaltonetworks.com/traps/4-2/traps-endpoint-security-manager-admin/malware-protection/manage-hashes-for-executable-files/report-an-incorrect-verdict.html" target="_self"&gt;report the verdict as incorrect&lt;/A&gt;. This report will be reviewed by our Anti-malware research team and flip the verdict in WF if they agree with you.&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;I would recommend that if the application is legit and needed for your every day work, to follow step 1 or 2, to avoid this kind of situations in the future.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 15:34:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-false-positive-cloud2model-manager-1-005/m-p/392087#M628</guid>
      <dc:creator>fmoixsante</dc:creator>
      <dc:date>2021-03-18T15:34:15Z</dc:date>
    </item>
  </channel>
</rss>

