<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Excluding Pentera Box in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/excluding-pentera-box/m-p/1232912#M8503</link>
    <description>&lt;P&gt;I am looking to make an exclusion or suppression of some sort for alerts generated by our Pentera Security Validation Tool. I have a SSL certificate loaded into Pentera so I can filter by that certificate if I can. However for the Vulnerability Scans with Pentera I cant use the SSL cert or any other identifier. Just trying to keep down the noise in Cortex.&lt;/P&gt;</description>
    <pubDate>Mon, 30 Jun 2025 19:23:42 GMT</pubDate>
    <dc:creator>I.Schisel</dc:creator>
    <dc:date>2025-06-30T19:23:42Z</dc:date>
    <item>
      <title>Excluding Pentera Box</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/excluding-pentera-box/m-p/1232912#M8503</link>
      <description>&lt;P&gt;I am looking to make an exclusion or suppression of some sort for alerts generated by our Pentera Security Validation Tool. I have a SSL certificate loaded into Pentera so I can filter by that certificate if I can. However for the Vulnerability Scans with Pentera I cant use the SSL cert or any other identifier. Just trying to keep down the noise in Cortex.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 19:23:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/excluding-pentera-box/m-p/1232912#M8503</guid>
      <dc:creator>I.Schisel</dc:creator>
      <dc:date>2025-06-30T19:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: Excluding Pentera Box</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/excluding-pentera-box/m-p/1232964#M8505</link>
      <description>&lt;P&gt;With Cortex XDR &lt;STRONG&gt;Pro&lt;/STRONG&gt; you can automate the Alerts via Rules (AutomationRules). I do this with an automation that auto-closes (with subject "pentest") all the alert when I detect the CGO is from the Pentera MainNode IP (or the RANs, if any). IMHO this is much easier than the possibilities you have with signing the payload and or using pre/post-fixes within pentera.&lt;BR /&gt;With this the alerts/incidents from the pentest are staying visible in the Cortex backend (they are not excluded, just closed...) but do not fill your active incidents/alerts table.&lt;BR /&gt;BTW: this perfectly works also well for Detects out from a Vulnerability Assessment only - port scans for instance...&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 10:05:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/excluding-pentera-box/m-p/1232964#M8505</guid>
      <dc:creator>OMI_RLI</dc:creator>
      <dc:date>2025-07-01T10:05:06Z</dc:date>
    </item>
  </channel>
</rss>

