<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Question around unsigned binaries and Cortex XDR agent detections in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/question-around-unsigned-binaries-and-cortex-xdr-agent/m-p/1225245#M8158</link>
    <description>&lt;P&gt;Hi folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've been administering Cortex XDR pro for a few years now and just lately in the last 3-4 months we've noticed that unsigned binaries that just got created(usually some of our internal developers testing builds) aren't automatically blocked by the XDR agent anymore.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It was under my impression that Cortex XDR pro was preventing execution of newly created binaries when they aren't signed. At least we used to have a lot of requests back in the day when people were trying to execute their apps that they had just compiled into an unsigned executable. Those used to be detected and blocked at the agent level. We would usually recommend that the developer to sign it's executable and worst case we would add to the allow list the hash of the executable until the file got signed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to give you folks an idea, we took one of those executables that got blocked back in Jan 2025 at the XDR agent level. We recompiled it to make sure the hash changed so that wildfire verdict doesn't come into play. And today it isn't blocked anymore, same code except one extra space in a comment, still unsigned newly created binary.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can anyone confirm if they've noticed that behavior change lately within the product?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 31 Mar 2025 19:23:24 GMT</pubDate>
    <dc:creator>Luc_Desaulniers</dc:creator>
    <dc:date>2025-03-31T19:23:24Z</dc:date>
    <item>
      <title>Question around unsigned binaries and Cortex XDR agent detections</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/question-around-unsigned-binaries-and-cortex-xdr-agent/m-p/1225245#M8158</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've been administering Cortex XDR pro for a few years now and just lately in the last 3-4 months we've noticed that unsigned binaries that just got created(usually some of our internal developers testing builds) aren't automatically blocked by the XDR agent anymore.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It was under my impression that Cortex XDR pro was preventing execution of newly created binaries when they aren't signed. At least we used to have a lot of requests back in the day when people were trying to execute their apps that they had just compiled into an unsigned executable. Those used to be detected and blocked at the agent level. We would usually recommend that the developer to sign it's executable and worst case we would add to the allow list the hash of the executable until the file got signed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to give you folks an idea, we took one of those executables that got blocked back in Jan 2025 at the XDR agent level. We recompiled it to make sure the hash changed so that wildfire verdict doesn't come into play. And today it isn't blocked anymore, same code except one extra space in a comment, still unsigned newly created binary.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can anyone confirm if they've noticed that behavior change lately within the product?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2025 19:23:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/question-around-unsigned-binaries-and-cortex-xdr-agent/m-p/1225245#M8158</guid>
      <dc:creator>Luc_Desaulniers</dc:creator>
      <dc:date>2025-03-31T19:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: Question around unsigned binaries and Cortex XDR agent detections</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/question-around-unsigned-binaries-and-cortex-xdr-agent/m-p/1225428#M8164</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/177062"&gt;@Luc_Desaulniers&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for bringing this matter to our attention. We understand your concerns regarding the recent behavior of the Cortex XDR agent in handling unsigned binaries, especially in light of your past experiences.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="" data-start="865" data-end="1129"&gt;To ensure optimal protection and functionality, we recommend the following steps:&lt;/P&gt;
&lt;OL data-start="1131" data-end="1625"&gt;
&lt;LI class="" data-start="1131" data-end="1245"&gt;
&lt;P class="" data-start="1134" data-end="1245"&gt;&lt;STRONG data-start="1134" data-end="1159"&gt;Verify Agent Version:&lt;/STRONG&gt; &lt;SPAN class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem]"&gt;Confirm that all endpoints are running the latest version of the Cortex XDR agent. Upgrading to the most recent release ensures that all known vulnerabilities are patched and that you benefit from the latest security enhancements.&lt;/SPAN&gt;​&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="1247" data-end="1367"&gt;
&lt;P class="" data-start="1250" data-end="1367"&gt;&lt;STRONG data-start="1250" data-end="1281"&gt;Review Prevention Policies:&lt;/STRONG&gt; &lt;SPAN class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem]"&gt;Examine your existing Malware and Restrictions profiles within the Cortex XDR console. Ensure that the policies governing the execution of unsigned binaries align with your organization's security requirements. Adjustments might be necessary to balance security with operational needs.&lt;/SPAN&gt;​&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="1369" data-end="1496"&gt;
&lt;P class="" data-start="1372" data-end="1496"&gt;&lt;STRONG data-start="1372" data-end="1410"&gt;Implement Custom Prevention Rules:&lt;/STRONG&gt; &lt;SPAN class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem]"&gt;If specific behaviors are desired, such as blocking all newly created unsigned binaries, consider creating Custom Prevention Rules or Behavioral Indicators of Compromise (BIOCs). These tools allow for tailored security measures that can address unique organizational scenarios.&lt;/SPAN&gt;​&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="" data-start="1498" data-end="1625"&gt;
&lt;P class="" data-start="1501" data-end="1625"&gt;&lt;STRONG data-start="1501" data-end="1539"&gt;Consult Documentation and Support:&lt;/STRONG&gt; &lt;SPAN class="relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem]"&gt;Familiarize yourself with the latest release notes and documentation to understand any changes in default behaviors or new features. If uncertainties persist, reaching out to Palo Alto Networks support can provide clarity and assistance tailored to your environment.&lt;/SPAN&gt;​&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="" data-start="1627" data-end="1977"&gt;We acknowledge that changes in security product behavior can impact operational workflows. Our goal is to ensure that Cortex XDR provides robust protection while accommodating the specific needs of your organization. Please feel free to share any further observations or questions, and we'll be glad to assist you in optimizing your security posture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 06:28:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/question-around-unsigned-binaries-and-cortex-xdr-agent/m-p/1225428#M8164</guid>
      <dc:creator>aspatil</dc:creator>
      <dc:date>2025-04-02T06:28:28Z</dc:date>
    </item>
    <item>
      <title>Re: Question around unsigned binaries and Cortex XDR agent detections</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/question-around-unsigned-binaries-and-cortex-xdr-agent/m-p/1225477#M8172</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/308232"&gt;@aspatil&lt;/a&gt;&amp;nbsp;can you confirm if there was a change at the detection level of the agent which caused this behavior change?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 16:47:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/question-around-unsigned-binaries-and-cortex-xdr-agent/m-p/1225477#M8172</guid>
      <dc:creator>Luc_Desaulniers</dc:creator>
      <dc:date>2025-04-02T16:47:54Z</dc:date>
    </item>
  </channel>
</rss>

