<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability Assessment - How does it work? in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-how-does-it-work/m-p/579259#M6247</link>
    <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311763"&gt;@RemiLiquete&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Hope you are doing well, and thank you for reaching out to our Live Community. From the above query I do understand that you have some queries in relation to the Vulnerability Assessment feature available with cortex XDR.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note that for Windows OS,&amp;nbsp;&lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;lists only CVEs relating to the operating system, and not CVEs relating to applications provided by other vendors.&amp;nbsp;&lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;retrieves the latest data for each CVE from the NIST National Vulnerability Database as well as from the Microsoft Security Response Center (MSRC). However,&amp;nbsp;&lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;collects KB and application information from the agents but calculates CVE only for KBs based on the data collected from MSRC and other sources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, please note for endpoints running Windows Insider,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;cannot guarantee an accurate CVE assessment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To add to your point, please note that you are right when it comes to&amp;nbsp;&lt;SPAN&gt;VA looking for application version and not application build numbers. This is one of the limitation of this feature. All this and more information can also be found on the documentation I have provided below, thank you:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Vulnerability-Assessment?tocId=Hp_9TFhScGCnppEnCHawXA" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Vulnerability-Assessment?tocId=Hp_9TFhScGCnppEnCHawXA&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you feel this has answered your query, please let us know by clicking on "mark this as a Solution". Thank you. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Mar 2024 07:18:25 GMT</pubDate>
    <dc:creator>abdrahman</dc:creator>
    <dc:date>2024-03-05T07:18:25Z</dc:date>
    <item>
      <title>Vulnerability Assessment - How does it work?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-how-does-it-work/m-p/578621#M6187</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm trying to figure out how the vulnerability assessment (VA) feature works since I've got so many false positives.&lt;/P&gt;
&lt;P&gt;I've check the documentation but it's not clear enough for me.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Windows, does VA looking for installed KB? If the KB is not found, does it show up CVEs linked to this KB? What if the KB is included in another one?&lt;/P&gt;
&lt;P&gt;Or is it looking for the build number?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Linux, I've undestood VA is only looking for application version and not application build numbers. So, if an application X with a version 4.3.21 is vulnerable and the server has installed 4.3.22 (which is not vulnerable), the server will appears vulnerable because VA will only see 4.3?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Rémi.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 10:29:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-how-does-it-work/m-p/578621#M6187</guid>
      <dc:creator>RemiLiquete</dc:creator>
      <dc:date>2024-02-28T10:29:44Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Assessment - How does it work?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-how-does-it-work/m-p/579259#M6247</link>
      <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/311763"&gt;@RemiLiquete&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Hope you are doing well, and thank you for reaching out to our Live Community. From the above query I do understand that you have some queries in relation to the Vulnerability Assessment feature available with cortex XDR.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note that for Windows OS,&amp;nbsp;&lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;lists only CVEs relating to the operating system, and not CVEs relating to applications provided by other vendors.&amp;nbsp;&lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;retrieves the latest data for each CVE from the NIST National Vulnerability Database as well as from the Microsoft Security Response Center (MSRC). However,&amp;nbsp;&lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;collects KB and application information from the agents but calculates CVE only for KBs based on the data collected from MSRC and other sources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, please note for endpoints running Windows Insider,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;cannot guarantee an accurate CVE assessment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To add to your point, please note that you are right when it comes to&amp;nbsp;&lt;SPAN&gt;VA looking for application version and not application build numbers. This is one of the limitation of this feature. All this and more information can also be found on the documentation I have provided below, thank you:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Vulnerability-Assessment?tocId=Hp_9TFhScGCnppEnCHawXA" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Vulnerability-Assessment?tocId=Hp_9TFhScGCnppEnCHawXA&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you feel this has answered your query, please let us know by clicking on "mark this as a Solution". Thank you. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Mar 2024 07:18:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/vulnerability-assessment-how-does-it-work/m-p/579259#M6247</guid>
      <dc:creator>abdrahman</dc:creator>
      <dc:date>2024-03-05T07:18:25Z</dc:date>
    </item>
  </channel>
</rss>

