<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can Cortex XDR fully substitute for Microsoft Defender Attack Surface Reduction (ASR) rules? in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-cortex-xdr-fully-substitute-for-microsoft-defender-attack/m-p/1240844#M8830</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hello Cortex XDR Community,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We are in the process of transitioning our endpoint security stack and are using Cortex XDR as our primary AV/EDR solution, with Microsoft Defender offboarded. Our goal is to have a single, fully functional security control plane within Cortex.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We have a detailed set of Microsoft Defender Attack Surface Reduction (ASR) rules configured via Intune, but they are currently ineffective because Defender has been completely offboarded. We understand that simply moving Defender to passive or active mode would reactivate these rules, but we want to avoid a hybrid configuration if possible.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Based on our internal analysis, we've mapped our 17 ASR rules to Cortex XDR's protection modules as follows:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;14 rules are covered&lt;/STRONG&gt;&amp;nbsp;by equivalent Cortex XDR features:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Child Process Protection:&lt;/STRONG&gt;&amp;nbsp;For rules blocking Office apps, Adobe Reader, script engines, and communication apps from creating child processes.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exploit Prevention (EPM):&lt;/STRONG&gt;&amp;nbsp;For rules blocking Office code injection, Win32 API calls from macros, and kernel-level exploits.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ransomware Protection:&lt;/STRONG&gt;&amp;nbsp;For advanced anti-ransomware behavior monitoring.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Credential Theft Protection:&lt;/STRONG&gt;&amp;nbsp;For blocking LSASS credential dumping.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Behavioral Threat Protection (BTP):&lt;/STRONG&gt;&amp;nbsp;For detecting obfuscated scripts, PSExec/WMI lateral movement, and other malicious causality chains.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Malware Prevention &amp;amp; Device Control:&lt;/STRONG&gt;&amp;nbsp;For blocking untrusted USB executables and email-based threats.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;2 rules are partially covered:&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;"Block abuse of exploited vulnerable signed drivers":&lt;/STRONG&gt;&amp;nbsp;We map this to Kernel Exploit Prevention and BTP, which block the exploitation technique, but we note Cortex lacks a direct, explicit vulnerable driver blocklist like Microsoft's.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;"Block persistence through WMI event subscription":&lt;/STRONG&gt;&amp;nbsp;We map this to BTP for detecting malicious WMI activity, but we don't see a dedicated control for blocking WMI event subscriptions themselves.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;My question to the community and experts is:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Is our mapping and the conclusion that Cortex XDR can serve as a full functional replacement for Defender ASR rules&amp;nbsp;accurate and valid?&lt;/LI&gt;
&lt;LI&gt;For the two partially covered rules, are there more specific configurations, sub-modules, or BTP rules we might have missed that could provide coverage closer to the original ASR intent?&lt;/LI&gt;
&lt;LI&gt;In a best-practice deployment where Cortex XDR is the primary solution, is it recommended to keep Defender in passive mode for the ASR rules, or can we confidently rely on Cortex's native modules?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Oct 2025 11:07:13 GMT</pubDate>
    <dc:creator>atief</dc:creator>
    <dc:date>2025-10-28T11:07:13Z</dc:date>
    <item>
      <title>Can Cortex XDR fully substitute for Microsoft Defender Attack Surface Reduction (ASR) rules?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-cortex-xdr-fully-substitute-for-microsoft-defender-attack/m-p/1240844#M8830</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello Cortex XDR Community,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We are in the process of transitioning our endpoint security stack and are using Cortex XDR as our primary AV/EDR solution, with Microsoft Defender offboarded. Our goal is to have a single, fully functional security control plane within Cortex.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We have a detailed set of Microsoft Defender Attack Surface Reduction (ASR) rules configured via Intune, but they are currently ineffective because Defender has been completely offboarded. We understand that simply moving Defender to passive or active mode would reactivate these rules, but we want to avoid a hybrid configuration if possible.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Based on our internal analysis, we've mapped our 17 ASR rules to Cortex XDR's protection modules as follows:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;14 rules are covered&lt;/STRONG&gt;&amp;nbsp;by equivalent Cortex XDR features:
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Child Process Protection:&lt;/STRONG&gt;&amp;nbsp;For rules blocking Office apps, Adobe Reader, script engines, and communication apps from creating child processes.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Exploit Prevention (EPM):&lt;/STRONG&gt;&amp;nbsp;For rules blocking Office code injection, Win32 API calls from macros, and kernel-level exploits.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Ransomware Protection:&lt;/STRONG&gt;&amp;nbsp;For advanced anti-ransomware behavior monitoring.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Credential Theft Protection:&lt;/STRONG&gt;&amp;nbsp;For blocking LSASS credential dumping.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Behavioral Threat Protection (BTP):&lt;/STRONG&gt;&amp;nbsp;For detecting obfuscated scripts, PSExec/WMI lateral movement, and other malicious causality chains.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Malware Prevention &amp;amp; Device Control:&lt;/STRONG&gt;&amp;nbsp;For blocking untrusted USB executables and email-based threats.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;2 rules are partially covered:&lt;/STRONG&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;"Block abuse of exploited vulnerable signed drivers":&lt;/STRONG&gt;&amp;nbsp;We map this to Kernel Exploit Prevention and BTP, which block the exploitation technique, but we note Cortex lacks a direct, explicit vulnerable driver blocklist like Microsoft's.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;"Block persistence through WMI event subscription":&lt;/STRONG&gt;&amp;nbsp;We map this to BTP for detecting malicious WMI activity, but we don't see a dedicated control for blocking WMI event subscriptions themselves.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;My question to the community and experts is:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Is our mapping and the conclusion that Cortex XDR can serve as a full functional replacement for Defender ASR rules&amp;nbsp;accurate and valid?&lt;/LI&gt;
&lt;LI&gt;For the two partially covered rules, are there more specific configurations, sub-modules, or BTP rules we might have missed that could provide coverage closer to the original ASR intent?&lt;/LI&gt;
&lt;LI&gt;In a best-practice deployment where Cortex XDR is the primary solution, is it recommended to keep Defender in passive mode for the ASR rules, or can we confidently rely on Cortex's native modules?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Oct 2025 11:07:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-cortex-xdr-fully-substitute-for-microsoft-defender-attack/m-p/1240844#M8830</guid>
      <dc:creator>atief</dc:creator>
      <dc:date>2025-10-28T11:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Can Cortex XDR fully substitute for Microsoft Defender Attack Surface Reduction (ASR) rules?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-cortex-xdr-fully-substitute-for-microsoft-defender-attack/m-p/1240912#M8831</link>
      <description>&lt;OL&gt;
&lt;LI&gt;I'm not familiar with Defender ASR, but cortex xdr provides protection for everything in your list.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;- XDR uses Microsoft's vulnerable driver list. You can choose to block the driver from loading, alert on it, or allow it (not recommended).&lt;BR /&gt;- XDR's built in analytics and you can build your own custom BIOCs to detect and block behavior.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Rely on Cortex XDR&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 29 Oct 2025 18:06:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/can-cortex-xdr-fully-substitute-for-microsoft-defender-attack/m-p/1240912#M8831</guid>
      <dc:creator>ChrisDavila</dc:creator>
      <dc:date>2025-10-29T18:06:28Z</dc:date>
    </item>
  </channel>
</rss>

