<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XDR Endpoint with Containers in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251675#M9235</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/307134"&gt;@tlmarques&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P data-end="264" data-start="0"&gt;Cortex XDR Endpoint Pro provides comprehensive protection for Linux servers running Docker by operating at the host kernel level. It is not a “black box”; rather, it extends the same security modules used for the host OS to all processes running within containers.&lt;/P&gt;
&lt;P data-end="264" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="264" data-start="0"&gt;&lt;STRONG&gt;Protection and Visibility Scope:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-end="518" data-start="308"&gt;The agent uses deep hooks into the host kernel to monitor system calls (syscalls), providing visibility into activities inside containers without requiring an agent to be installed in each individual container.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL data-end="1240" data-start="520"&gt;
&lt;LI data-end="662" data-start="520" data-section-id="6m6a7z"&gt;&lt;STRONG data-end="545" data-start="522"&gt;Process Protection:&lt;/STRONG&gt; The agent monitors and protects all containerized processes using standard Exploit and Malware protection modules.&lt;/LI&gt;
&lt;LI data-end="861" data-start="663" data-section-id="jxuhlw"&gt;&lt;STRONG data-end="692" data-start="665"&gt;File System Monitoring:&lt;/STRONG&gt; It tracks file access and modifications within containers. Recent versions (Agent 8.5.0+) have enhanced visibility for file system activity in container environments.&lt;/LI&gt;
&lt;LI data-end="1048" data-start="862" data-section-id="zesgwa"&gt;&lt;STRONG data-end="896" data-start="864"&gt;Container-Specific Security:&lt;/STRONG&gt; Includes a dedicated Container Escaping Protection module designed to detect and block attempts by a process to break out of a container to the host.&lt;/LI&gt;
&lt;LI data-end="1240" data-start="1049" data-section-id="18z0jqh"&gt;&lt;STRONG data-end="1078" data-start="1051"&gt;Vulnerability Scanning:&lt;/STRONG&gt; Starting with agent version 8.4, the Advanced Vulnerability Analysis (AVA) feature can scan running Docker containers for vulnerabilities directly on the host.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Network-Level Protection:&lt;/H4&gt;
&lt;P data-end="1436" data-start="1277"&gt;Cortex XDR is not a “black box” regarding network activity. It monitors network traffic originating from containers and can block or report malicious behavior.&lt;/P&gt;
&lt;UL data-end="2108" data-start="1438"&gt;
&lt;LI data-end="1680" data-start="1438" data-section-id="we0hq7"&gt;&lt;STRONG data-end="1479" data-start="1440"&gt;Behavioral Threat Protection (BTP):&lt;/STRONG&gt; BTP and Analytics rules detect malicious network patterns, such as command-and-control (C2) communication or cryptocurrency mining protocols (e.g., Stratum) originating from containerized processes.&lt;/LI&gt;
&lt;LI data-end="1875" data-start="1681" data-section-id="17olso6"&gt;&lt;STRONG data-end="1712" data-start="1683"&gt;Reverse Shell Protection:&lt;/STRONG&gt; This module blocks attempts to redirect standard input/output streams to network sockets, preventing attackers from gaining remote shell access via a container.&lt;/LI&gt;
&lt;LI data-end="2108" data-start="1876" data-section-id="13yjx8l"&gt;&lt;STRONG data-end="1896" data-start="1878"&gt;Host Firewall:&lt;/STRONG&gt; You can configure Host Firewall policies to enforce network rules directly on the endpoint, allowing you to block outbound traffic from the server (including its containers) to specific malicious IP addresses.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2130" data-start="2115" data-section-id="chrobh"&gt;Limitations:&lt;/H4&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="2320" data-start="2132"&gt;
&lt;LI data-end="2208" data-start="2132" data-section-id="agrwmq"&gt;Does not provide full network segmentation (this requires Prisma Cloud).&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="2320" data-start="2209" data-section-id="17g410w"&gt;Does not perform direct URL filtering at the network layer (typically handled by a Next-Generation Firewall).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking &lt;STRONG&gt;like&lt;/STRONG&gt; and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
    <pubDate>Mon, 06 Apr 2026 17:25:26 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-04-06T17:25:26Z</dc:date>
    <item>
      <title>XDR Endpoint with Containers</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251674#M9234</link>
      <description>&lt;P data-end="170" data-start="0"&gt;Hello, I would like your help to understand what protections I have with &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Cortex XDR&lt;/SPAN&gt;&lt;/SPAN&gt; Endpoint Pro on a Linux server running containers/Docker.&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="297" data-start="172"&gt;Will XDR also protect against malicious activity originating from the container to the network, or is it more of a black box?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2026 17:18:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251674#M9234</guid>
      <dc:creator>tlmarques</dc:creator>
      <dc:date>2026-04-06T17:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: XDR Endpoint with Containers</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251675#M9235</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/307134"&gt;@tlmarques&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P data-end="264" data-start="0"&gt;Cortex XDR Endpoint Pro provides comprehensive protection for Linux servers running Docker by operating at the host kernel level. It is not a “black box”; rather, it extends the same security modules used for the host OS to all processes running within containers.&lt;/P&gt;
&lt;P data-end="264" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="264" data-start="0"&gt;&lt;STRONG&gt;Protection and Visibility Scope:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-end="518" data-start="308"&gt;The agent uses deep hooks into the host kernel to monitor system calls (syscalls), providing visibility into activities inside containers without requiring an agent to be installed in each individual container.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL data-end="1240" data-start="520"&gt;
&lt;LI data-end="662" data-start="520" data-section-id="6m6a7z"&gt;&lt;STRONG data-end="545" data-start="522"&gt;Process Protection:&lt;/STRONG&gt; The agent monitors and protects all containerized processes using standard Exploit and Malware protection modules.&lt;/LI&gt;
&lt;LI data-end="861" data-start="663" data-section-id="jxuhlw"&gt;&lt;STRONG data-end="692" data-start="665"&gt;File System Monitoring:&lt;/STRONG&gt; It tracks file access and modifications within containers. Recent versions (Agent 8.5.0+) have enhanced visibility for file system activity in container environments.&lt;/LI&gt;
&lt;LI data-end="1048" data-start="862" data-section-id="zesgwa"&gt;&lt;STRONG data-end="896" data-start="864"&gt;Container-Specific Security:&lt;/STRONG&gt; Includes a dedicated Container Escaping Protection module designed to detect and block attempts by a process to break out of a container to the host.&lt;/LI&gt;
&lt;LI data-end="1240" data-start="1049" data-section-id="18z0jqh"&gt;&lt;STRONG data-end="1078" data-start="1051"&gt;Vulnerability Scanning:&lt;/STRONG&gt; Starting with agent version 8.4, the Advanced Vulnerability Analysis (AVA) feature can scan running Docker containers for vulnerabilities directly on the host.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;Network-Level Protection:&lt;/H4&gt;
&lt;P data-end="1436" data-start="1277"&gt;Cortex XDR is not a “black box” regarding network activity. It monitors network traffic originating from containers and can block or report malicious behavior.&lt;/P&gt;
&lt;UL data-end="2108" data-start="1438"&gt;
&lt;LI data-end="1680" data-start="1438" data-section-id="we0hq7"&gt;&lt;STRONG data-end="1479" data-start="1440"&gt;Behavioral Threat Protection (BTP):&lt;/STRONG&gt; BTP and Analytics rules detect malicious network patterns, such as command-and-control (C2) communication or cryptocurrency mining protocols (e.g., Stratum) originating from containerized processes.&lt;/LI&gt;
&lt;LI data-end="1875" data-start="1681" data-section-id="17olso6"&gt;&lt;STRONG data-end="1712" data-start="1683"&gt;Reverse Shell Protection:&lt;/STRONG&gt; This module blocks attempts to redirect standard input/output streams to network sockets, preventing attackers from gaining remote shell access via a container.&lt;/LI&gt;
&lt;LI data-end="2108" data-start="1876" data-section-id="13yjx8l"&gt;&lt;STRONG data-end="1896" data-start="1878"&gt;Host Firewall:&lt;/STRONG&gt; You can configure Host Firewall policies to enforce network rules directly on the endpoint, allowing you to block outbound traffic from the server (including its containers) to specific malicious IP addresses.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2130" data-start="2115" data-section-id="chrobh"&gt;Limitations:&lt;/H4&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="2320" data-start="2132"&gt;
&lt;LI data-end="2208" data-start="2132" data-section-id="agrwmq"&gt;Does not provide full network segmentation (this requires Prisma Cloud).&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="2320" data-start="2209" data-section-id="17g410w"&gt;Does not perform direct URL filtering at the network layer (typically handled by a Next-Generation Firewall).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking &lt;STRONG&gt;like&lt;/STRONG&gt; and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2026 17:25:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251675#M9235</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-04-06T17:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: XDR Endpoint with Containers</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251686#M9236</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241098"&gt;@susekar&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P data-end="194" data-start="16"&gt;I appreciate your response. I understand that &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Cortex XDR&lt;/SPAN&gt;&lt;/SPAN&gt; is not a “black box” — my question is specifically about containers running inside the host.&lt;/P&gt;
&lt;P data-end="314" data-start="196"&gt;I have a Linux server with an XDR Pro license, and inside this host there are multiple containers. My questions are:&lt;/P&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="585" data-start="316"&gt;
&lt;LI data-end="396" data-start="316" data-section-id="xq7ipu"&gt;What level of protection do we have for workloads running inside containers?&lt;/LI&gt;
&lt;LI data-end="494" data-start="397" data-section-id="164cp3"&gt;Do we need an additional license for container protection, or is XDR Endpoint Pro sufficient?&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="585" data-start="495" data-section-id="1pv4x28"&gt;If a malicious script is executed inside a container, will XDR detect and respond to it?&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 06 Apr 2026 18:04:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251686#M9236</guid>
      <dc:creator>tlmarques</dc:creator>
      <dc:date>2026-04-06T18:04:22Z</dc:date>
    </item>
    <item>
      <title>Re: XDR Endpoint with Containers</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251687#M9237</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/307134"&gt;@tlmarques&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="382" data-start="0"&gt;Cortex XDR provides comprehensive visibility and protection for containerized workloads on Linux hosts by operating at the host kernel level. When the agent is installed on the underlying Linux host, it automatically extends its monitoring and prevention capabilities to all containers sharing that kernel, such as Docker or Podman, without requiring an agent inside each container.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. Workload Protection Levels:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P data-end="552" data-start="424"&gt;Workloads running inside containers receive the same level of security as processes running natively on the host. This includes:&lt;/P&gt;
&lt;UL data-end="1197" data-start="554"&gt;
&lt;LI data-end="657" data-start="554" data-section-id="se0scb"&gt;&lt;STRONG data-end="585" data-start="556"&gt;Runtime Protection &amp;amp; EDR:&lt;/STRONG&gt; Real-time monitoring of containerized processes and their activities.&lt;/LI&gt;
&lt;LI data-end="838" data-start="658" data-section-id="1ul74m8"&gt;&lt;STRONG data-end="675" data-start="660"&gt;Visibility:&lt;/STRONG&gt; Telemetry collection for network traffic originating from containers and file system activity within container environments (enhanced in Agent 8.5.0 and later).&lt;/LI&gt;
&lt;LI data-end="1015" data-start="839" data-section-id="1p72k4a"&gt;&lt;STRONG data-end="868" data-start="841"&gt;Vulnerability Scanning:&lt;/STRONG&gt; Starting with agent version 8.4, the Advanced Vulnerability Analysis (AVA) feature can scan running Docker containers for known vulnerabilities.&lt;/LI&gt;
&lt;LI data-end="1197" data-start="1016" data-section-id="wvdytq"&gt;&lt;STRONG data-end="1052" data-start="1018"&gt;Container-Escaping Protection:&lt;/STRONG&gt; Specific Behavioral Threat Protection (BTP) modules are designed to detect and block attempts to escape the container and compromise the host.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1233" data-start="1204" data-section-id="16fageg"&gt;2. Licensing Requirements:&lt;/H4&gt;
&lt;P data-end="1330" data-start="1235"&gt;The license required depends on whether the containers are part of an orchestrated environment:&lt;/P&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="1692" data-start="1332"&gt;
&lt;LI data-end="1529" data-start="1332" data-section-id="19klkhg"&gt;&lt;STRONG data-end="1411" data-start="1334"&gt;Non-orchestrated Containers (e.g., Docker/Podman on a standalone server):&lt;/STRONG&gt;&lt;BR data-end="1414" data-start="1411" /&gt;The Cortex XDR Pro per Endpoint license is sufficient. A single license covers the host and all its containers.&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="1692" data-start="1531" data-section-id="u2mhf3"&gt;&lt;STRONG data-end="1592" data-start="1533"&gt;Orchestrated Environments (e.g., Kubernetes/OpenShift):&lt;/STRONG&gt;&lt;BR data-end="1595" data-start="1592" /&gt;These environments require a Cortex XDR Cloud per Host license for full support and visibility.&lt;BR /&gt;&lt;BR /&gt;
&lt;P&gt;To verify the agent is correctly monitoring the host and its containers, you can use the following command on the Linux server:&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="1692" data-start="1531" data-section-id="u2mhf3"&gt;
&lt;P&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;/opt/traps/bin/cytool runtime query&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;like&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Apr 2026 19:09:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251687#M9237</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-04-06T19:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: XDR Endpoint with Containers</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251730#M9239</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241098"&gt;@susekar&lt;/a&gt;&amp;nbsp;thanks a lot for your help.&lt;/P&gt;
&lt;P data-end="201" data-start="44"&gt;&lt;BR /&gt;I have one final question regarding the differences between non-orchestrated containers and orchestrated environments (e.g., Kubernetes/OpenShift).&lt;/P&gt;
&lt;P data-end="272" data-start="203"&gt;Is the main difference related to visibility inside containers?&lt;/P&gt;
&lt;P data-end="426" data-start="274"&gt;&lt;BR /&gt;For example, if I have a Rocky Linux server with &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Cortex XDR&lt;/SPAN&gt;&lt;/SPAN&gt; Endpoint Pro installed, and I’m running OpenShift on top of it:&lt;/P&gt;
&lt;UL data-end="554" data-start="427"&gt;
&lt;LI data-end="466" data-start="427" data-section-id="vczp89"&gt;What level of protection do I have?&lt;/LI&gt;
&lt;LI data-end="554" data-start="467" data-section-id="1smhiro"&gt;What capabilities am I missing compared to a fully supported/orchestrated scenario?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="621" data-start="556"&gt;On my system, I currently see the following components running:&lt;/P&gt;
&lt;UL data-end="717" data-start="623"&gt;
&lt;LI data-end="630" data-start="623" data-section-id="16jvzqp"&gt;pmd&lt;/LI&gt;
&lt;LI data-end="639" data-start="631" data-section-id="1bi8jqa"&gt;clad&lt;/LI&gt;
&lt;LI data-end="648" data-start="640" data-section-id="1b3r82p"&gt;dypd&lt;/LI&gt;
&lt;LI data-end="661" data-start="649" data-section-id="jlaim9"&gt;sandboxd&lt;/LI&gt;
&lt;LI data-end="670" data-start="662" data-section-id="1618ya9"&gt;lted&lt;/LI&gt;
&lt;LI data-end="679" data-start="671" data-section-id="1i9mipp"&gt;pyxd&lt;/LI&gt;
&lt;LI data-end="698" data-start="680" data-section-id="1xua758"&gt;cned (stopped)&lt;/LI&gt;
&lt;LI data-end="717" data-start="699" data-section-id="1dmlatk"&gt;piud (stopped)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="858" data-start="719"&gt;Based on what I’ve read, my understanding is that my Linux host (and, to some extent, the containers running on it) is protected against:&lt;/P&gt;
&lt;UL data-end="1060" data-start="860"&gt;
&lt;LI data-end="923" data-start="860" data-section-id="19wdwcc"&gt;Known and unknown malware (via WildFire and Local Analysis)&lt;/LI&gt;
&lt;LI data-end="965" data-start="924" data-section-id="yplylx"&gt;Exploits of vulnerabilities (via pmd)&lt;/LI&gt;
&lt;LI data-end="1013" data-start="966" data-section-id="1mpo56n"&gt;Suspicious behavior / ransomware (via dypd)&lt;/LI&gt;
&lt;LI data-end="1060" data-start="1014" data-section-id="14yqvpx"&gt;Remote access for investigation (via lted)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="1092" data-start="1062"&gt;Is this understanding correct?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 08:56:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251730#M9239</guid>
      <dc:creator>tlmarques</dc:creator>
      <dc:date>2026-04-07T08:56:06Z</dc:date>
    </item>
    <item>
      <title>Re: XDR Endpoint with Containers</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251754#M9241</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/307134"&gt;@tlmarques&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the response.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="144" data-start="78" data-section-id="1edje7b"&gt;1. Visibility and Protection: Non-Orchestrated vs. Orchestrated:&lt;/H4&gt;
&lt;P data-end="305" data-start="146"&gt;While visibility is a key differentiator, the differences between these two scenarios also involve licensing, deployment architecture, and metadata enrichment.&lt;/P&gt;
&lt;P data-end="305" data-start="146"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="517" data-start="307"&gt;&lt;STRONG data-end="322" data-start="307"&gt;Visibility:&lt;/STRONG&gt;&lt;BR data-end="325" data-start="322" /&gt;Both deployment types (standard Linux agent and Kubernetes DaemonSet) operate at the host kernel level, allowing them to see containerized processes, network traffic, and file system activity.&lt;/P&gt;
&lt;P data-end="517" data-start="307"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="833" data-start="519"&gt;&lt;STRONG data-end="559" data-start="519"&gt;The Main Difference (Orchestration):&lt;/STRONG&gt;&lt;BR data-end="562" data-start="559" /&gt;In an orchestrated environment (Kubernetes/OpenShift), the agent is deployed as a DaemonSet. This provides orchestration metadata (cluster name, pod name, Kubernetes namespace) in the Cortex XDR console and alerts, which is not available when using a standard host agent.&lt;/P&gt;
&lt;P data-end="833" data-start="519"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1157" data-start="835"&gt;&lt;STRONG data-end="849" data-start="835"&gt;Licensing:&lt;/STRONG&gt;&lt;BR data-end="852" data-start="849" /&gt;Orchestrated environments require a Cortex XDR Cloud per Host license. If a standard "Pro per Endpoint" license is used on a node running an orchestrator, the agent may identify the host as a Kubernetes node and display a "Partially Protected" or "Unprotected" status because it expects the cloud license.&lt;/P&gt;
&lt;P data-end="1157" data-start="835"&gt;---------------------------------&lt;/P&gt;
&lt;H4 data-end="1214" data-start="1164" data-section-id="zuoxa4"&gt;2. Level of Protection and Missing Capabilities:&lt;/H4&gt;
&lt;P data-end="1366" data-start="1216"&gt;Running OpenShift on top of a standard Rocky Linux agent installation provides host-level security, but the following capabilities are likely missing:&lt;/P&gt;
&lt;P data-end="1366" data-start="1216"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1537" data-start="1368"&gt;&lt;STRONG data-end="1392" data-start="1368"&gt;Kubernetes Metadata:&lt;/STRONG&gt;&lt;BR data-end="1395" data-start="1392" /&gt;Container processes appear in the Causality Card, but they are associated with the host endpoint name rather than specific pods or namespaces.&lt;/P&gt;
&lt;P data-end="1537" data-start="1368"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1779" data-start="1539"&gt;&lt;STRONG data-end="1569" data-start="1539"&gt;Posture Management (KSPM):&lt;/STRONG&gt;&lt;BR data-end="1572" data-start="1569" /&gt;Full orchestration support typically includes the Kubernetes Connector, which provides cloud security posture management (identifying misconfigurations). The XDR agent alone provides only runtime protection.&lt;/P&gt;
&lt;P data-end="1779" data-start="1539"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1992" data-start="1781"&gt;&lt;STRONG data-end="1806" data-start="1781"&gt;Lifecycle Management:&lt;/STRONG&gt;&lt;BR data-end="1809" data-start="1806" /&gt;Orchestrated agents follow an accelerated lifecycle cleanup policy, automatically deleting inactive agents from the inventory after 6 hours to prevent clutter in dynamic environments.&lt;/P&gt;
&lt;P data-end="1992" data-start="1781"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="1992" data-start="1781"&gt;-----------------------------------------&lt;/P&gt;
&lt;H4 data-end="2033" data-start="1999" data-section-id="1s5xofx"&gt;3. Running Components (Daemons):&lt;/H4&gt;
&lt;P data-end="2122" data-start="2035"&gt;Your understanding of the running components is largely correct. Here is the breakdown:&lt;/P&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH width="118.375px" height="19px"&gt;Daemon&lt;/TH&gt;
&lt;TH width="837.484px" height="19px"&gt;Function&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="118.375px" height="30px"&gt;pmd&lt;/TD&gt;
&lt;TD width="837.484px" height="30px"&gt;Policy Management Daemon: Handles policy application, process injection, and forensic reporting&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="118.375px" height="30px"&gt;clad&lt;/TD&gt;
&lt;TD width="837.484px" height="30px"&gt;Cortex Local Analysis Daemon: Responsible for local malware analysis of files&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="118.375px" height="30px"&gt;dypd&lt;/TD&gt;
&lt;TD width="837.484px" height="30px"&gt;Dynamic Protection Daemon: Powers Behavioral Threat Protection (BTP) to stop suspicious behavior and ransomware&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="118.375px" height="30px"&gt;sandboxd&lt;/TD&gt;
&lt;TD width="837.484px" height="30px"&gt;Sandbox Daemon: Used for local analysis/emulation of suspicious files&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="118.375px" height="30px"&gt;lted&lt;/TD&gt;
&lt;TD width="837.484px" height="30px"&gt;Live Terminal Engine Daemon: Enables remote investigation and response actions&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="118.375px" height="30px"&gt;pyxd&lt;/TD&gt;
&lt;TD width="837.484px" height="30px"&gt;Python Executor: Executes scripts and payloads for response actions&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="118.375px" height="30px"&gt;cned (stopped)&lt;/TD&gt;
&lt;TD width="837.484px" height="30px"&gt;Cortex Network Engine Daemon: Introduced in v8.7; expected to be stopped if features are not active&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="118.375px" height="10px"&gt;piud (stopped)&lt;/TD&gt;
&lt;TD width="837.484px" height="10px"&gt;Post Installation Upgrade Daemon: Introduced in v8.7; expected to be stopped if not in use&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P data-end="1992" data-start="1781"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="3042" data-start="3004" data-section-id="ehm5xi"&gt;4. Verification of Protection Scope:&lt;/H4&gt;
&lt;P data-end="3092" data-start="3044"&gt;Your summary of the protection areas is correct:&lt;/P&gt;
&lt;UL data-end="3491" data-start="3094"&gt;
&lt;LI data-end="3185" data-start="3094" data-section-id="1yllwra"&gt;&lt;STRONG data-end="3126" data-start="3096"&gt;Known and unknown malware:&lt;/STRONG&gt; Protected via WildFire (cloud) and local analysis (clad)&lt;/LI&gt;
&lt;LI data-end="3301" data-start="3186" data-section-id="cw22q0"&gt;&lt;STRONG data-end="3201" data-start="3188"&gt;Exploits:&lt;/STRONG&gt; Protected via the Policy Management Daemon (pmd), which manages Exploit Protection Modules (EPMs)&lt;/LI&gt;
&lt;LI data-end="3408" data-start="3302" data-section-id="1sn43u3"&gt;&lt;STRONG data-end="3341" data-start="3304"&gt;Suspicious behavior / ransomware:&lt;/STRONG&gt; Protected via Behavioral Threat Protection (BTP) managed by dypd&lt;/LI&gt;
&lt;LI data-end="3491" data-start="3409" data-section-id="s7rezz"&gt;&lt;STRONG data-end="3447" data-start="3411"&gt;Remote access for investigation:&lt;/STRONG&gt; Enabled via the Live Terminal Engine (lted)&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="3515" data-start="3498" data-section-id="1ayo5sc"&gt;Recommendation:&lt;/H4&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3759" data-start="3517"&gt;For a production OpenShift environment, it is strongly recommended to switch to the Cortex XDR Cloud per Host license and deploy the agent as a DaemonSet using the Kubernetes YAML or Helm installer to ensure full compatibility and visibility.&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3759" data-start="3517"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;like&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 13:13:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-endpoint-with-containers/m-p/1251754#M9241</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-04-07T13:13:53Z</dc:date>
    </item>
  </channel>
</rss>

