<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Automatic endpoint isolation after an unauthorized attempt to delete an agent. in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/automatic-endpoint-isolation-after-an-unauthorized-attempt-to/m-p/1229747#M8330</link>
    <description>&lt;P&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="11:1"&gt;Hi.&lt;/SPAN&gt;&amp;nbsp;Maybe someone know,&amp;nbsp;&lt;SPAN&gt;if there &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="32:4"&gt;is&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="40:5"&gt;such&lt;/SPAN&gt;&lt;SPAN&gt; an &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="46:11"&gt;opportunity&lt;/SPAN&gt;&lt;SPAN&gt; to &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="58:7"&gt;create&lt;/SPAN&gt;&lt;SPAN&gt; a &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="66:7"&gt;rule&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="74:7"&gt;that&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="82:5"&gt;will&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="88:13"&gt;automatically&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="102:11"&gt;isolate&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="114:5"&gt;hosts&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="120:2"&gt;on&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="123:7"&gt;which&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="136:19"&gt;attempts&lt;/SPAN&gt;&lt;SPAN&gt; have been made to &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="156:8"&gt;remove&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="165:6"&gt;agent&lt;/SPAN&gt;&lt;SPAN&gt; in a &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="172:2"&gt;non&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="175:12"&gt;traditional&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="188:5"&gt;way&lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="193:1"&gt;?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 22 May 2025 07:11:07 GMT</pubDate>
    <dc:creator>Ramiz_Kiyalov</dc:creator>
    <dc:date>2025-05-22T07:11:07Z</dc:date>
    <item>
      <title>Automatic endpoint isolation after an unauthorized attempt to delete an agent.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/automatic-endpoint-isolation-after-an-unauthorized-attempt-to/m-p/1229747#M8330</link>
      <description>&lt;P&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="11:1"&gt;Hi.&lt;/SPAN&gt;&amp;nbsp;Maybe someone know,&amp;nbsp;&lt;SPAN&gt;if there &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="32:4"&gt;is&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="40:5"&gt;such&lt;/SPAN&gt;&lt;SPAN&gt; an &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="46:11"&gt;opportunity&lt;/SPAN&gt;&lt;SPAN&gt; to &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="58:7"&gt;create&lt;/SPAN&gt;&lt;SPAN&gt; a &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="66:7"&gt;rule&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="74:7"&gt;that&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="82:5"&gt;will&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="88:13"&gt;automatically&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="102:11"&gt;isolate&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="114:5"&gt;hosts&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="120:2"&gt;on&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="123:7"&gt;which&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="136:19"&gt;attempts&lt;/SPAN&gt;&lt;SPAN&gt; have been made to &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="156:8"&gt;remove&lt;/SPAN&gt;&lt;SPAN&gt; the &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="165:6"&gt;agent&lt;/SPAN&gt;&lt;SPAN&gt; in a &lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="172:2"&gt;non&lt;/SPAN&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="175:12"&gt;traditional&lt;/SPAN&gt; &lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="188:5"&gt;way&lt;/SPAN&gt;&lt;SPAN class="aNeGP0gI0B9AV8JaHPyH" data-src-align="193:1"&gt;?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2025 07:11:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/automatic-endpoint-isolation-after-an-unauthorized-attempt-to/m-p/1229747#M8330</guid>
      <dc:creator>Ramiz_Kiyalov</dc:creator>
      <dc:date>2025-05-22T07:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Automatic endpoint isolation after an unauthorized attempt to delete an agent.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/automatic-endpoint-isolation-after-an-unauthorized-attempt-to/m-p/1230159#M8346</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/205344471"&gt;@Ramiz_Kiyalov&lt;/a&gt;&amp;nbsp;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Cortex XDR you can create automated response rules that trigger host isolation based on certain suspicious behaviors—like attempts to tamper with or remove the agent using non-standard methods.&lt;/P&gt;
&lt;P&gt;How to do this:&lt;BR /&gt;1. Identify the Detection&lt;/P&gt;
&lt;P&gt;First, ensure that the Cortex XDR agent or analytics detects the suspicious activity related to agent tampering or removal attempts.&lt;/P&gt;
&lt;P&gt;This could be an alert like "Anti Tampering protection" or a custom detection triggered by suspicious process execution, file deletion, or registry changes related to the agent.&lt;/P&gt;
&lt;P&gt;Create an Automation Rule&lt;/P&gt;
&lt;P&gt;Go to Incident Response &amp;gt; Automation in Cortex XDR.&lt;/P&gt;
&lt;P&gt;Create a new Automation Rule triggered by the specific alert or detection that indicates agent removal attempts.&lt;/P&gt;
&lt;P&gt;Set Isolation Action&lt;/P&gt;
&lt;P&gt;In the automation rule, add an action to Isolate Host automatically when the alert fires.&lt;/P&gt;
&lt;P&gt;Test and Fine-tune&lt;/P&gt;
&lt;P&gt;Test the automation carefully to avoid false positives that could unnecessarily isolate healthy endpoints.&lt;/P&gt;
&lt;P&gt;Optionally, set the rule to first notify SOC analysts for verification before isolation (depending on your risk tolerance).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you feel this has answered your query, please let us know by clicking like and&amp;nbsp; on "mark this as a Solution". Thank you.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 09:36:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/automatic-endpoint-isolation-after-an-unauthorized-attempt-to/m-p/1230159#M8346</guid>
      <dc:creator>aspatil</dc:creator>
      <dc:date>2025-05-27T09:36:18Z</dc:date>
    </item>
  </channel>
</rss>

