<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cortex XDR FIM in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-fim/m-p/1253002#M9272</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1365926749"&gt;@M.Rather&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greeting for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="471" data-start="0"&gt;In Cortex XDR, the File Integrity Monitoring (FIM) module (introduced in Agent version 8.9) is configured via Extension Policies and does not currently feature a built-in "Exclusion" toggle within the FIM rule definition itself. Unlike Malware Protection profiles, which use Legacy Agent Exceptions to whitelist paths, FIM rules are intended to be high-priority and are specifically protected from standard EDR pipeline filtering to ensure compliance data is not dropped.&lt;/P&gt;
&lt;P data-end="471" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="659" data-start="473"&gt;To achieve your requirement of "excluding" specific subfolders while monitoring a broad directory like &lt;CODE data-end="590" data-start="576"&gt;C:\Windows\*&lt;/CODE&gt;, you should use the following strategies based on official guidance:&lt;/P&gt;
&lt;P data-end="990" data-start="661"&gt;&lt;STRONG data-end="697" data-start="661"&gt;1. Use Granular Monitoring Rules&lt;/STRONG&gt;&lt;BR data-end="700" data-start="697" /&gt;Instead of defining a single broad rule with a wildcard at the root of the Windows directory, create multiple specific rules for the subfolders you actually need to monitor. This prevents the agent from capturing noise in high-volume directories like Temp or application-specific folders.&lt;/P&gt;
&lt;UL data-end="1192" data-start="991"&gt;
&lt;LI data-end="1029" data-start="991" data-section-id="h6jc4e"&gt;Broad Rule (Avoid): &lt;CODE data-end="1027" data-start="1013"&gt;C:\Windows\*&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI data-end="1192" data-start="1030" data-section-id="1aj2b14"&gt;Granular Rules (Recommended): Define individual rules for critical paths such as:
&lt;UL data-end="1192" data-start="1118"&gt;
&lt;LI data-end="1157" data-start="1118" data-section-id="t2fao3"&gt;&lt;CODE data-end="1155" data-start="1120"&gt;C:\Windows\System32\drivers\etc\*&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI data-end="1192" data-start="1160" data-section-id="iqj4oa"&gt;&lt;CODE data-end="1192" data-start="1162"&gt;C:\Windows\System32\config\*&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="1565" data-start="1194"&gt;&lt;STRONG data-end="1237" data-start="1194"&gt;2. Configure Specific Events to Monitor&lt;/STRONG&gt;&lt;BR data-end="1240" data-start="1237" /&gt;If you cannot avoid monitoring a folder that generates high volume, you can reduce noise by limiting the types of operations tracked. Within the rule configuration in the FIM profile, you can deselect “Monitor All Events” and choose only the most critical ones (for example, monitor only Delete and Rename instead of Modify).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P data-end="1689" data-start="1567"&gt;&lt;STRONG data-end="1609" data-start="1567"&gt;3. Monitoring Constraints &amp;amp; Thresholds&lt;/STRONG&gt;&lt;BR data-end="1612" data-start="1609" /&gt;Be aware of the following system limits when configuring Windows FIM rules:&lt;/P&gt;
&lt;UL data-end="2167" data-start="1690"&gt;
&lt;LI data-end="1748" data-start="1690" data-section-id="4p2538"&gt;Agent Version: Requires Cortex XDR Agent 8.9 or higher&lt;/LI&gt;
&lt;LI data-end="2006" data-start="1749" data-section-id="1o217yj"&gt;Event Quota: There is a daily threshold of 15,000 FIM events per agent. If this limit is reached due to broad rules (like monitoring all of &lt;CODE data-end="1905" data-start="1891"&gt;C:\Windows\*&lt;/CODE&gt;), the agent will generate an audit log and stop sending FIM telemetry for the remainder of the day&lt;/LI&gt;
&lt;LI data-end="2167" data-start="2007" data-section-id="a65lf7"&gt;Path Requirements: Windows paths must start with a valid root (e.g., &lt;CODE data-end="2083" data-start="2078"&gt;C:\&lt;/CODE&gt; or &lt;CODE data-end="2091" data-start="2087"&gt;*\&lt;/CODE&gt;) and cannot end in a bare slash unless followed by a wildcard or filename&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="2417" data-start="2169"&gt;&lt;STRONG data-end="2211" data-start="2169"&gt;4. Suppression of Alerts (Server-Side)&lt;/STRONG&gt;&lt;BR data-end="2214" data-start="2211" /&gt;If the events are already reaching the console and you want to stop them from appearing as alerts, you can create an Alert Exclusion rule under:&lt;BR data-end="2361" data-start="2358" /&gt;Settings → Exception Configurations → Alert Exclusions&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="2591" data-start="2419"&gt;Note that this suppresses the alert in the console but does not stop the agent from generating the underlying telemetry or counting toward its 15,000-event daily threshold.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;like&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 24 Apr 2026 17:52:34 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-04-24T17:52:34Z</dc:date>
    <item>
      <title>Cortex XDR FIM</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-fim/m-p/1252971#M9270</link>
      <description>&lt;P&gt;Hi Team&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P data-end="290" data-start="164"&gt;I am configuring &lt;STRONG data-end="226" data-start="191"&gt;File Integrity Monitoring (FIM)&lt;/STRONG&gt; in &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Cortex XDR&lt;/SPAN&gt;&lt;/SPAN&gt; for Windows endpoints.&lt;/P&gt;
&lt;P data-end="360" data-start="292"&gt;I have defined a monitoring rule for the directory:&lt;BR data-end="346" data-start="343" /&gt;&lt;CODE data-end="360" data-start="346"&gt;C:\Windows\*&lt;/CODE&gt;&lt;/P&gt;
&lt;P data-end="542" data-start="362"&gt;However, within this path, I need to &lt;STRONG data-end="430" data-start="399"&gt;exclude specific subfolders&lt;/STRONG&gt; from being monitored (for example, system or application folders that generate excessive or irrelevant events).I am not seeing any option in rule to define exclusion!&lt;BR /&gt;In malware protection there we can add exception but under FIM there is no option.&lt;/P&gt;
&lt;P data-end="542" data-start="362"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="542" data-start="362"&gt;TIA&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 08:30:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-fim/m-p/1252971#M9270</guid>
      <dc:creator>M.Rather</dc:creator>
      <dc:date>2026-04-24T08:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR FIM</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-fim/m-p/1253002#M9272</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1365926749"&gt;@M.Rather&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greeting for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="471" data-start="0"&gt;In Cortex XDR, the File Integrity Monitoring (FIM) module (introduced in Agent version 8.9) is configured via Extension Policies and does not currently feature a built-in "Exclusion" toggle within the FIM rule definition itself. Unlike Malware Protection profiles, which use Legacy Agent Exceptions to whitelist paths, FIM rules are intended to be high-priority and are specifically protected from standard EDR pipeline filtering to ensure compliance data is not dropped.&lt;/P&gt;
&lt;P data-end="471" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="659" data-start="473"&gt;To achieve your requirement of "excluding" specific subfolders while monitoring a broad directory like &lt;CODE data-end="590" data-start="576"&gt;C:\Windows\*&lt;/CODE&gt;, you should use the following strategies based on official guidance:&lt;/P&gt;
&lt;P data-end="990" data-start="661"&gt;&lt;STRONG data-end="697" data-start="661"&gt;1. Use Granular Monitoring Rules&lt;/STRONG&gt;&lt;BR data-end="700" data-start="697" /&gt;Instead of defining a single broad rule with a wildcard at the root of the Windows directory, create multiple specific rules for the subfolders you actually need to monitor. This prevents the agent from capturing noise in high-volume directories like Temp or application-specific folders.&lt;/P&gt;
&lt;UL data-end="1192" data-start="991"&gt;
&lt;LI data-end="1029" data-start="991" data-section-id="h6jc4e"&gt;Broad Rule (Avoid): &lt;CODE data-end="1027" data-start="1013"&gt;C:\Windows\*&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI data-end="1192" data-start="1030" data-section-id="1aj2b14"&gt;Granular Rules (Recommended): Define individual rules for critical paths such as:
&lt;UL data-end="1192" data-start="1118"&gt;
&lt;LI data-end="1157" data-start="1118" data-section-id="t2fao3"&gt;&lt;CODE data-end="1155" data-start="1120"&gt;C:\Windows\System32\drivers\etc\*&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI data-end="1192" data-start="1160" data-section-id="iqj4oa"&gt;&lt;CODE data-end="1192" data-start="1162"&gt;C:\Windows\System32\config\*&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="1565" data-start="1194"&gt;&lt;STRONG data-end="1237" data-start="1194"&gt;2. Configure Specific Events to Monitor&lt;/STRONG&gt;&lt;BR data-end="1240" data-start="1237" /&gt;If you cannot avoid monitoring a folder that generates high volume, you can reduce noise by limiting the types of operations tracked. Within the rule configuration in the FIM profile, you can deselect “Monitor All Events” and choose only the most critical ones (for example, monitor only Delete and Rename instead of Modify).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P data-end="1689" data-start="1567"&gt;&lt;STRONG data-end="1609" data-start="1567"&gt;3. Monitoring Constraints &amp;amp; Thresholds&lt;/STRONG&gt;&lt;BR data-end="1612" data-start="1609" /&gt;Be aware of the following system limits when configuring Windows FIM rules:&lt;/P&gt;
&lt;UL data-end="2167" data-start="1690"&gt;
&lt;LI data-end="1748" data-start="1690" data-section-id="4p2538"&gt;Agent Version: Requires Cortex XDR Agent 8.9 or higher&lt;/LI&gt;
&lt;LI data-end="2006" data-start="1749" data-section-id="1o217yj"&gt;Event Quota: There is a daily threshold of 15,000 FIM events per agent. If this limit is reached due to broad rules (like monitoring all of &lt;CODE data-end="1905" data-start="1891"&gt;C:\Windows\*&lt;/CODE&gt;), the agent will generate an audit log and stop sending FIM telemetry for the remainder of the day&lt;/LI&gt;
&lt;LI data-end="2167" data-start="2007" data-section-id="a65lf7"&gt;Path Requirements: Windows paths must start with a valid root (e.g., &lt;CODE data-end="2083" data-start="2078"&gt;C:\&lt;/CODE&gt; or &lt;CODE data-end="2091" data-start="2087"&gt;*\&lt;/CODE&gt;) and cannot end in a bare slash unless followed by a wildcard or filename&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="2417" data-start="2169"&gt;&lt;STRONG data-end="2211" data-start="2169"&gt;4. Suppression of Alerts (Server-Side)&lt;/STRONG&gt;&lt;BR data-end="2214" data-start="2211" /&gt;If the events are already reaching the console and you want to stop them from appearing as alerts, you can create an Alert Exclusion rule under:&lt;BR data-end="2361" data-start="2358" /&gt;Settings → Exception Configurations → Alert Exclusions&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="2591" data-start="2419"&gt;Note that this suppresses the alert in the console but does not stop the agent from generating the underlying telemetry or counting toward its 15,000-event daily threshold.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;like&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2026 17:52:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-fim/m-p/1253002#M9272</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-04-24T17:52:34Z</dc:date>
    </item>
  </channel>
</rss>

