<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Any manual actions needed for new certificate enforcement? in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/580095#M6308</link>
    <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/205743"&gt;@dgagnon&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope you are doing well, and thank you for reaching out to our live Community. Please note&amp;nbsp;&lt;SPAN&gt;To improve security, the Cortex XDR agent 8.3 is now ensuring the use of a provided certificate without using the local fallback store (trusted root CA file). In order to graduate the adoption of this requirement, Disabled (Notify) is default for existing tenants; new tenants will have the Enabled configuration by default.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All new tenants will be coming with this setting as enabled out of the box. However, for the older tenants this needs to be enabled from the policy settings. Please n&lt;SPAN&gt;ote, If the agent is initially unable to communicate without the local store, enforcement is not enabled and the agent will show as partially protected in the server UI. Once the communication is successful and the certificates are downloaded then the enforcement will be set to Enabled.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please note that all this process is going to be automatic and we do not need to manually download the Certificates, you may try to enable this settings to a pilot group of endpoints and test it yourself to make you comfortably to do the changes to the whole tenant. Thank you.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;More information can be found in the documentation provided below, thank you:&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/8.3/Cortex-XDR-Agent-Release-Notes/Changes-to-Default-Behavior-in-Cortex-XDR-Agent-8.3" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/8.3/Cortex-XDR-Agent-Release-Notes/Changes-to-Default-Behavior-in-Cortex-XDR-Agent-8.3&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you feel this has answered your query, please let us know by clicking on "mark this as a Solution". Thank you. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2024 17:45:41 GMT</pubDate>
    <dc:creator>abdrahman</dc:creator>
    <dc:date>2024-03-12T17:45:41Z</dc:date>
    <item>
      <title>Any manual actions needed for new certificate enforcement?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/580090#M6307</link>
      <description>&lt;P&gt;With the announcement of certificate enforcement for Cortex XDR 8.3, I haven't seen any guidance on how to install or where to download the certificates that XDR agents will be using. The lack of information concerns me because I don't want to enable this setting and then have XDR break because the endpoints do not have the required certificate. If the XDR agent is retrieving the required certificate automatically and no additional endpoint configuration is needed, that would be good to know. But if a certificate needs to be manually installed on the endpoints, it would help to be provided with instructions on how to accomplish this.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 16:56:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/580090#M6307</guid>
      <dc:creator>dgagnon</dc:creator>
      <dc:date>2024-03-12T16:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: Any manual actions needed for new certificate enforcement?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/580095#M6308</link>
      <description>&lt;P&gt;Dear&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/205743"&gt;@dgagnon&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope you are doing well, and thank you for reaching out to our live Community. Please note&amp;nbsp;&lt;SPAN&gt;To improve security, the Cortex XDR agent 8.3 is now ensuring the use of a provided certificate without using the local fallback store (trusted root CA file). In order to graduate the adoption of this requirement, Disabled (Notify) is default for existing tenants; new tenants will have the Enabled configuration by default.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All new tenants will be coming with this setting as enabled out of the box. However, for the older tenants this needs to be enabled from the policy settings. Please n&lt;SPAN&gt;ote, If the agent is initially unable to communicate without the local store, enforcement is not enabled and the agent will show as partially protected in the server UI. Once the communication is successful and the certificates are downloaded then the enforcement will be set to Enabled.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please note that all this process is going to be automatic and we do not need to manually download the Certificates, you may try to enable this settings to a pilot group of endpoints and test it yourself to make you comfortably to do the changes to the whole tenant. Thank you.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;More information can be found in the documentation provided below, thank you:&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/8.3/Cortex-XDR-Agent-Release-Notes/Changes-to-Default-Behavior-in-Cortex-XDR-Agent-8.3" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/8.3/Cortex-XDR-Agent-Release-Notes/Changes-to-Default-Behavior-in-Cortex-XDR-Agent-8.3&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you feel this has answered your query, please let us know by clicking on "mark this as a Solution". Thank you. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 17:45:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/580095#M6308</guid>
      <dc:creator>abdrahman</dc:creator>
      <dc:date>2024-03-12T17:45:41Z</dc:date>
    </item>
    <item>
      <title>Re: Any manual actions needed for new certificate enforcement?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/580098#M6309</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/205743"&gt;@dgagnon&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you enable this feature , it&amp;nbsp;, makes the agent not to use the Local Root CA certificate Store anymore and use only the pinned &lt;STRONG&gt;roots.pem&lt;/STRONG&gt; certificate file, this PEM file is downloaded with content updates&amp;nbsp; , which you can see it under the content folder directory -&amp;nbsp;&lt;STRONG&gt;C:\ProgramData\Cyvera\LocalSystem\Download\content&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;As seen below&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zarnous_2-1710265688421.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58252i4E6FCEBB00CB6216/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="zarnous_2-1710265688421.png" alt="zarnous_2-1710265688421.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;When the agent starts, restarts, or installed, the roots.pem file gets copied and loaded into the configuration and you can see it under the config directory -&amp;nbsp;&lt;STRONG&gt;C:\Program Files\Palo Alto Networks\Traps\config\roots.pem&lt;/STRONG&gt;&lt;BR /&gt;As seen below&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zarnous_1-1710265352300.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58251iC34B8489D14B6C28/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="zarnous_1-1710265352300.png" alt="zarnous_1-1710265352300.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This will give you the assurance that the agent will use the&lt;STRONG&gt; roots.pem&lt;/STRONG&gt;.&lt;BR /&gt;&lt;BR /&gt;One more thing i would recommend here, is to also enable the newly introduced field,&amp;nbsp;field “LAST CERTIFICATE ENFORCEMENT FALLBACK” under the Endpoint --&amp;gt; All Endpoints to have this as a check point and see if the&amp;nbsp;agent fallback to use its local store to validate certificates.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="zarnous_3-1710265982467.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58253i366E39CDF51DD843/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="zarnous_3-1710265982467.png" alt="zarnous_3-1710265982467.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Hope that helped!&lt;BR /&gt;&lt;BR /&gt;If that answered the question please feel free to mark this as a solution so other can benefit from!&lt;BR /&gt;&lt;BR /&gt;Best,&lt;BR /&gt;Z&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 17:54:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/580098#M6309</guid>
      <dc:creator>zarnous</dc:creator>
      <dc:date>2024-03-12T17:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: Any manual actions needed for new certificate enforcement?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/587319#M6710</link>
      <description>&lt;P&gt;I was using cytool commands just to know a little more about this new feature and I noticed the output from the cytool cert_enforcement query command showed the next:&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Current config = 'Enable'&lt;BR /&gt;Current state = 'Delayed'&lt;BR /&gt;Policy Override = 'Policy'&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;Do you know what the "current state='delayed' " means?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 20:32:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/587319#M6710</guid>
      <dc:creator>MarcoMJ</dc:creator>
      <dc:date>2024-05-20T20:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Any manual actions needed for new certificate enforcement?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/588104#M6747</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/309887"&gt;@MarcoMJ&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Delayed means that the agent is in the learning mode. After enabling the enforcement, the agent starts the learning mode for 20 minutes and if the connection is maintained with at least 2 successful heartbeats, it moves form the learning mode (shows as "Delayed") to the enforcement mode (shows as "Enabled" )&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 14:02:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/588104#M6747</guid>
      <dc:creator>zarnous</dc:creator>
      <dc:date>2024-05-28T14:02:22Z</dc:date>
    </item>
    <item>
      <title>Re: Any manual actions needed for new certificate enforcement?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/588143#M6748</link>
      <description>&lt;P&gt;Than you! I exactly noticed that behaviour during my tests.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2024 20:09:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/any-manual-actions-needed-for-new-certificate-enforcement/m-p/588143#M6748</guid>
      <dc:creator>MarcoMJ</dc:creator>
      <dc:date>2024-05-28T20:09:52Z</dc:date>
    </item>
  </channel>
</rss>

