<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cortex XDR: Allow list behaviour in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/419267#M860</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One week ago I added an artifact (hash) to the allow list. This hash was deteced (reported) by the XDR Agent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Today, I have a new incident,&amp;nbsp;only related with the same artifact(hash) (different host).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was expecting of not seing any incident related with this artifact if it is the ONLY related to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which is the behaviour then of the Allow List functionality?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;David.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jul 2021 10:22:40 GMT</pubDate>
    <dc:creator>david.hernandez</dc:creator>
    <dc:date>2021-07-14T10:22:40Z</dc:date>
    <item>
      <title>Cortex XDR: Allow list behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/419267#M860</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One week ago I added an artifact (hash) to the allow list. This hash was deteced (reported) by the XDR Agent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Today, I have a new incident,&amp;nbsp;only related with the same artifact(hash) (different host).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was expecting of not seing any incident related with this artifact if it is the ONLY related to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which is the behaviour then of the Allow List functionality?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;David.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 10:22:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/419267#M860</guid>
      <dc:creator>david.hernandez</dc:creator>
      <dc:date>2021-07-14T10:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR: Allow list behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/419293#M861</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/187524"&gt;@david.hernandez&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When adding Hash256 values to the Hash Allow List, either via Action Center's "Add to allow list ", or directly from the Incident's Key Artifact, or from the Casualty View, it will be added to the Hash Allow List. This list is then shared among all the XDR agents during the checkin process. If you have added a hash to the Hash Allow list, no further alerting should be generated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you sure that you added the hash to the correct option? Which of the above-mentioned options did you use to add the hash to the allow list?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 12:12:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/419293#M861</guid>
      <dc:creator>fmoixsante</dc:creator>
      <dc:date>2021-07-14T12:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR: Allow list behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/419561#M865</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/64736"&gt;@fmoixsante&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I added it directly from the Incident's Key Artifact, which now has a grey tick button next to it.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 05:18:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/419561#M865</guid>
      <dc:creator>david.hernandez</dc:creator>
      <dc:date>2021-07-15T05:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR: Allow list behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/419685#M867</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/187524"&gt;@david.hernandez&lt;/a&gt;&amp;nbsp; The Allow List feature is to allow execution on the endpoint. In this scenario that you described, you should review the alert source (&lt;EM&gt;E.g. XDR BIOC, XDR agent...etc&lt;/EM&gt;) to determine your next steps in the investigation. If XDR BIOC rule is the alert source, and your analysis indicates the process behavior is not a threat in your environment, then you may want to consider adding the process SHA256 to a Rule Exception (&lt;EM&gt;XDR App &amp;gt; Rules &amp;gt; Exceptions&lt;/EM&gt;). Please note, there are two types of &lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/exceptions-security-profiles" target="_self"&gt;exceptions&lt;/A&gt; (Global / Profile) that you may leverage to manage the scope.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 15:31:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/419685#M867</guid>
      <dc:creator>WSeldenIII</dc:creator>
      <dc:date>2021-07-15T15:31:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR: Allow list behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/420717#M876</link>
      <description>&lt;P&gt;The scenario is as follows: I get an incident from a key artifact from the alert Source XDR Agent. A few days later, I get another incident with the same key artifcat, which I added to the allow list. Maybe this is not the expected behaviour? Maybe I should use what you suggest, to use the Rule Exception?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 14:33:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/420717#M876</guid>
      <dc:creator>david.hernandez</dc:creator>
      <dc:date>2021-07-20T14:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR: Allow list behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/420784#M877</link>
      <description>&lt;P&gt;There are two parts to consider in your scenario. The first is file execution (&lt;EM&gt;is the file being block / allow on the endpoint&lt;/EM&gt;) and the second is the cause for alert. The allow/ block list is manage file execution. XDR has multiple layers of protection. I suggest to triage the full context of the alert to understand the cause for the alert. The XDR agent has additional &lt;U&gt;Alert Names&lt;/U&gt; associated with the XDR agent alert source. For example, in a Behavioral Threat alert you may need analyze and confirm the initiating process and observed behaviors before making the determination of which process needs to be add to an allow list. In the case of BTP Allow list. The processes on the BTP allow list will not be terminated by the agent when are part of a malicious causality chain. Alerts will be triggered regardless. Reference the Behavioral Threat Protection module within the Malware endpoint security profile:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-07-20 at 12.57.31 PM.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/35139i18373309A91E22C0/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-07-20 at 12.57.31 PM.png" alt="Screen Shot 2021-07-20 at 12.57.31 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;BR /&gt;If you want to &lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/investigation-and-response/investigate-endpoint-alerts/alert-exclusions" target="_self"&gt;exclude alerts&lt;/A&gt; for the process in question within the context of BTP, then you will need to create a support ticket in order to obtain a support exception. I hope this information provides you with a path forward.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 17:36:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/420784#M877</guid>
      <dc:creator>WSeldenIII</dc:creator>
      <dc:date>2021-07-20T17:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR: Allow list behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/421407#M898</link>
      <description>&lt;P&gt;Thank you for your help. I will try to investigate from there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jul 2021 17:20:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-allow-list-behaviour/m-p/421407#M898</guid>
      <dc:creator>david.hernandez</dc:creator>
      <dc:date>2021-07-22T17:20:15Z</dc:date>
    </item>
  </channel>
</rss>

