<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XDR Allow-Listing signed processes in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-allow-listing-signed-processes/m-p/1244992#M8963</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1494946589"&gt;@M.Crow&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, it is possible to create exclusions and reduce alert levels in Cortex XDR based on digital code signing certificates. This approach allows you to trust internally developed tools without relying on fluctuating file hashes or broad path-based exclusions.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;There are three primary methods to achieve this, depending on which protection module is flagging your scripts:&lt;/P&gt;
&lt;H3&gt;1. Whitelisting Signers in Malware Security Profiles&lt;/H3&gt;
&lt;P&gt;This is the most direct way to prevent the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Portable Executable (PE) and DLL Examination&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Digital Signer Restriction&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;modules from blocking your signed files.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Module Scope:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;This primarily applies to compiled executables (.exe) and DLLs.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Procedure:&lt;/STRONG&gt;&lt;BR /&gt;1. Identify the exact&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Trusted Signer Name&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from the alert details or file properties on the endpoint.&lt;BR /&gt;2. In the Cortex XDR console, navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Endpoints&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Policy Management&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Prevention Profiles&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Malware&lt;/STRONG&gt;.&lt;BR /&gt;3. Edit your active Malware profile.&lt;BR /&gt;4. Under&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Portable Executable and DLL Examination&lt;/STRONG&gt;, find the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;ALLOW LIST SIGNERS&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;+ ADD&lt;/STRONG&gt;.&lt;BR /&gt;5. Enter the exact signer name and save the profile.&lt;/P&gt;
&lt;H3&gt;2. Disabling Prevention Rules (DPR) by Signer&lt;/H3&gt;
&lt;P&gt;For alerts triggered by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Behavioral Threat Protection (BTP)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or specific&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Exploit&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;modules, you can create a "Disable Prevention Rule" to allow the activity based on the signer.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Granular Control:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;You can target specific rules (like a specific BTP rule) and exclude them only when the signer matches.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Procedure:&lt;/STRONG&gt;&lt;BR /&gt;1. Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Settings&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Exception Configuration&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Disable Prevention Rule&lt;/STRONG&gt;.&lt;BR /&gt;2. Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Add Rule&lt;/STRONG&gt;.&lt;BR /&gt;3. In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Scope&lt;/STRONG&gt;, select the module or specific rule ID causing the block.&lt;BR /&gt;4. In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Target Properties&lt;/STRONG&gt;, select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Signer&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and enter the name of your internal certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;3. Alert Level Reduction (Alert Exclusions)&lt;/H3&gt;
&lt;P&gt;If you want the scripts to run but simply wish to suppress or hide the alerts in the management console (reducing "noise"), you can use&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Alert Exclusions&lt;/STRONG&gt;.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Procedure:&lt;/STRONG&gt;&lt;BR /&gt;1. Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Settings&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Exception Configuration&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Alert Exclusions&lt;/STRONG&gt;.&lt;BR /&gt;2. Create a rule where the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Signer&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;property matches your certificate.&lt;BR /&gt;3. This will hide future matching alerts from the Alert Table and prevent them from generating incidents, while still allowing the agent to monitor the activity.&lt;/P&gt;
&lt;H3&gt;Important Considerations for Scripts&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;PE vs. Raw Scripts:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Most "Signer" allow list features in Malware profiles are designed for Portable Executables (PE). There are internal indications that Cortex XDR may not parse digital signatures for raw PowerShell (.ps1) scripts in the same way it does for binaries.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;BTP Exclusions:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;For raw scripts, the most effective method is often creating a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Behavioral Threat Protection Exclusion&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;using the script's signer information if the script is being flagged for its behavior.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Best Practice:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Moving scripts to a dedicated "safe" directory and then using a combination of path and signer-based exclusions is recommended to minimize risk.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy New year!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 06 Jan 2026 20:18:04 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-01-06T20:18:04Z</dc:date>
    <item>
      <title>XDR Allow-Listing signed processes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-allow-listing-signed-processes/m-p/1242227#M8876</link>
      <description>&lt;P&gt;We have internally developed scripts that we would like to create XDR exclusions or alert level reduction for based on if they contain code signing certificates.&amp;nbsp; I don't know how to go about doing this or if it's even possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The idea here is to not need to update exclusions based on hashes any time the scripts are changed and to be more secure than filepath based exclusions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 15:39:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-allow-listing-signed-processes/m-p/1242227#M8876</guid>
      <dc:creator>M.Crow</dc:creator>
      <dc:date>2025-11-19T15:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: XDR Allow-Listing signed processes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-allow-listing-signed-processes/m-p/1244992#M8963</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1494946589"&gt;@M.Crow&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, it is possible to create exclusions and reduce alert levels in Cortex XDR based on digital code signing certificates. This approach allows you to trust internally developed tools without relying on fluctuating file hashes or broad path-based exclusions.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;There are three primary methods to achieve this, depending on which protection module is flagging your scripts:&lt;/P&gt;
&lt;H3&gt;1. Whitelisting Signers in Malware Security Profiles&lt;/H3&gt;
&lt;P&gt;This is the most direct way to prevent the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Portable Executable (PE) and DLL Examination&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Digital Signer Restriction&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;modules from blocking your signed files.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Module Scope:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;This primarily applies to compiled executables (.exe) and DLLs.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Procedure:&lt;/STRONG&gt;&lt;BR /&gt;1. Identify the exact&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Trusted Signer Name&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;from the alert details or file properties on the endpoint.&lt;BR /&gt;2. In the Cortex XDR console, navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Endpoints&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Policy Management&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Prevention Profiles&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Malware&lt;/STRONG&gt;.&lt;BR /&gt;3. Edit your active Malware profile.&lt;BR /&gt;4. Under&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Portable Executable and DLL Examination&lt;/STRONG&gt;, find the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;ALLOW LIST SIGNERS&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;section and click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;+ ADD&lt;/STRONG&gt;.&lt;BR /&gt;5. Enter the exact signer name and save the profile.&lt;/P&gt;
&lt;H3&gt;2. Disabling Prevention Rules (DPR) by Signer&lt;/H3&gt;
&lt;P&gt;For alerts triggered by&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Behavioral Threat Protection (BTP)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;or specific&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Exploit&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;modules, you can create a "Disable Prevention Rule" to allow the activity based on the signer.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Granular Control:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;You can target specific rules (like a specific BTP rule) and exclude them only when the signer matches.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Procedure:&lt;/STRONG&gt;&lt;BR /&gt;1. Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Settings&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Exception Configuration&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Disable Prevention Rule&lt;/STRONG&gt;.&lt;BR /&gt;2. Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Add Rule&lt;/STRONG&gt;.&lt;BR /&gt;3. In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Scope&lt;/STRONG&gt;, select the module or specific rule ID causing the block.&lt;BR /&gt;4. In the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Target Properties&lt;/STRONG&gt;, select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Signer&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and enter the name of your internal certificate.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;3. Alert Level Reduction (Alert Exclusions)&lt;/H3&gt;
&lt;P&gt;If you want the scripts to run but simply wish to suppress or hide the alerts in the management console (reducing "noise"), you can use&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Alert Exclusions&lt;/STRONG&gt;.&lt;BR /&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Procedure:&lt;/STRONG&gt;&lt;BR /&gt;1. Navigate to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Settings&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Exception Configuration&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Alert Exclusions&lt;/STRONG&gt;.&lt;BR /&gt;2. Create a rule where the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Signer&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;property matches your certificate.&lt;BR /&gt;3. This will hide future matching alerts from the Alert Table and prevent them from generating incidents, while still allowing the agent to monitor the activity.&lt;/P&gt;
&lt;H3&gt;Important Considerations for Scripts&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;PE vs. Raw Scripts:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Most "Signer" allow list features in Malware profiles are designed for Portable Executables (PE). There are internal indications that Cortex XDR may not parse digital signatures for raw PowerShell (.ps1) scripts in the same way it does for binaries.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;BTP Exclusions:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;For raw scripts, the most effective method is often creating a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Behavioral Threat Protection Exclusion&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;using the script's signer information if the script is being flagged for its behavior.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Best Practice:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Moving scripts to a dedicated "safe" directory and then using a combination of path and signer-based exclusions is recommended to minimize risk.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy New year!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jan 2026 20:18:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-allow-listing-signed-processes/m-p/1244992#M8963</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-01-06T20:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: XDR Allow-Listing signed processes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-allow-listing-signed-processes/m-p/1245085#M8974</link>
      <description>&lt;P&gt;&lt;SPAN&gt;This is wonderfully helpful, thank you!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2026 16:33:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-allow-listing-signed-processes/m-p/1245085#M8974</guid>
      <dc:creator>M.Crow</dc:creator>
      <dc:date>2026-01-07T16:33:58Z</dc:date>
    </item>
  </channel>
</rss>

