<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Piloting XDR 7.3.1, policies seem more stringent- blocking previously allowed scripts and .exes in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/piloting-xdr-7-3-1-policies-seem-more-stringent-blocking/m-p/405535#M721</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/168117"&gt;@WORRELLR&lt;/a&gt;&amp;nbsp; just wondering what Content Version did you see the Child Process being blocked?&amp;nbsp; I know for a fact that I seen&amp;nbsp; a customer that just recently had a lot of processes on some build servers that were blocked as they were spawned from Java and it resulted in needing to put in a temp "fix" in the malware profile (in the malicious child process protection section) until later that day Cortex Operations released a "911" content update.&amp;nbsp; This occurred with Content Update&amp;nbsp;&lt;SPAN&gt;179-57885 and was "fixed" via content update&amp;nbsp;179-57935 the same day.&amp;nbsp; Support stated that a fix in Cortex XDR endpoint itself would occur likely in v7.4 (sometime June)&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I assume 7.3.2 is likely too far down the QA process timeline to put it there and delay that coming out&amp;nbsp; (&amp;lt;&amp;lt; just my guess.&amp;nbsp; I have no prior or inside info)&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 07 May 2021 16:45:05 GMT</pubDate>
    <dc:creator>KRisselada</dc:creator>
    <dc:date>2021-05-07T16:45:05Z</dc:date>
    <item>
      <title>Piloting XDR 7.3.1, policies seem more stringent- blocking previously allowed scripts and .exes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/piloting-xdr-7-3-1-policies-seem-more-stringent-blocking/m-p/405505#M720</link>
      <description>&lt;P&gt;We are in the process of updating our endpoint XDR agents from 7.2 to 7.3.1.&amp;nbsp; We are testing on a small pilot group and finding that scripts and executables that we previously ran are now being blocked.&amp;nbsp; Granted some these scripts are stopping and starting services and removing files.&amp;nbsp; We are concerned if we deploy it site-wide that we'll have many more blocks.&amp;nbsp; Some are being blocked on BTP and some via Child Process.&amp;nbsp; Have the policies changed, are they more stringent.&amp;nbsp; I've read the release notes and didn't get much information from them.&amp;nbsp; Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 14:31:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/piloting-xdr-7-3-1-policies-seem-more-stringent-blocking/m-p/405505#M720</guid>
      <dc:creator>WORRELLR</dc:creator>
      <dc:date>2021-05-07T14:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Piloting XDR 7.3.1, policies seem more stringent- blocking previously allowed scripts and .exes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/piloting-xdr-7-3-1-policies-seem-more-stringent-blocking/m-p/405535#M721</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/168117"&gt;@WORRELLR&lt;/a&gt;&amp;nbsp; just wondering what Content Version did you see the Child Process being blocked?&amp;nbsp; I know for a fact that I seen&amp;nbsp; a customer that just recently had a lot of processes on some build servers that were blocked as they were spawned from Java and it resulted in needing to put in a temp "fix" in the malware profile (in the malicious child process protection section) until later that day Cortex Operations released a "911" content update.&amp;nbsp; This occurred with Content Update&amp;nbsp;&lt;SPAN&gt;179-57885 and was "fixed" via content update&amp;nbsp;179-57935 the same day.&amp;nbsp; Support stated that a fix in Cortex XDR endpoint itself would occur likely in v7.4 (sometime June)&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I assume 7.3.2 is likely too far down the QA process timeline to put it there and delay that coming out&amp;nbsp; (&amp;lt;&amp;lt; just my guess.&amp;nbsp; I have no prior or inside info)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 16:45:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/piloting-xdr-7-3-1-policies-seem-more-stringent-blocking/m-p/405535#M721</guid>
      <dc:creator>KRisselada</dc:creator>
      <dc:date>2021-05-07T16:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Piloting XDR 7.3.1, policies seem more stringent- blocking previously allowed scripts and .exes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/piloting-xdr-7-3-1-policies-seem-more-stringent-blocking/m-p/405542#M722</link>
      <description>Thanks so much for the response, VERY helpful info! Our alerts were occurring 4/4 and the morning of 4/5. We actually had a few servers with the same issue that you had mentioned, had multiple blocks of a child process being spawned from JAVA. I see the latest content update (179-57935) hit the machines on the afternoon of 4/5 and we haven't seen the issue since then. We were just concerned moving forward. I feel more comfortable now, moving forward with 7.3.1 and later in June to 7.4. Thanks again.&lt;BR /&gt;</description>
      <pubDate>Fri, 07 May 2021 17:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/piloting-xdr-7-3-1-policies-seem-more-stringent-blocking/m-p/405542#M722</guid>
      <dc:creator>WORRELLR</dc:creator>
      <dc:date>2021-05-07T17:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: Piloting XDR 7.3.1, policies seem more stringent- blocking previously allowed scripts and .exes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/piloting-xdr-7-3-1-policies-seem-more-stringent-blocking/m-p/405585#M723</link>
      <description>&lt;P&gt;excellent!&amp;nbsp; glad it was helpful&lt;/P&gt;</description>
      <pubDate>Fri, 07 May 2021 21:04:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/piloting-xdr-7-3-1-policies-seem-more-stringent-blocking/m-p/405585#M723</guid>
      <dc:creator>KRisselada</dc:creator>
      <dc:date>2021-05-07T21:04:38Z</dc:date>
    </item>
  </channel>
</rss>

