<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Es posible bloquear una IP en cortex xdr pro in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/es-posible-bloquear-una-ip-en-cortex-xdr-pro/m-p/1253474#M9310</link>
    <description>&lt;P&gt;Thank you so much&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241098"&gt;@susekar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, what can I do by using IOC?&lt;/P&gt;</description>
    <pubDate>Tue, 05 May 2026 16:38:36 GMT</pubDate>
    <dc:creator>QuestionAb</dc:creator>
    <dc:date>2026-05-05T16:38:36Z</dc:date>
    <item>
      <title>Es posible bloquear una IP en cortex xdr pro</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/es-posible-bloquear-una-ip-en-cortex-xdr-pro/m-p/1253455#M9301</link>
      <description>&lt;P data-path-to-node="6"&gt;Hello Community,&lt;/P&gt;
&lt;P data-path-to-node="7"&gt;I am working with &lt;STRONG data-index-in-node="18" data-path-to-node="7"&gt;Cortex XDR Pro&lt;/STRONG&gt; and investigating the &lt;STRONG data-index-in-node="55" data-path-to-node="7"&gt;"Endpoint Blocked IP Addresses"&lt;/STRONG&gt; section within the &lt;STRONG data-index-in-node="106" data-path-to-node="7"&gt;Action Center&lt;/STRONG&gt;. I have a few specific questions regarding how entries are populated in this table and the best practices for targeted blocking:&lt;/P&gt;
&lt;OL start="1" data-path-to-node="8"&gt;
&lt;LI&gt;
&lt;P data-path-to-node="8,0,0"&gt;&lt;STRONG data-index-in-node="0" data-path-to-node="8,0,0"&gt;Orchestration:&lt;/STRONG&gt; How exactly are IPs added to this list? Does it only reflect &lt;STRONG data-index-in-node="76" data-path-to-node="8,0,0"&gt;automated response actions&lt;/STRONG&gt; triggered by a playbook/prevention policy, or does it also include &lt;STRONG data-index-in-node="170" data-path-to-node="8,0,0"&gt;manual "Block IP"&lt;/STRONG&gt; actions initiated by an analyst from an Incident or Causality view?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="8,1,0"&gt;&lt;STRONG data-index-in-node="0" data-path-to-node="8,1,0"&gt;Granular Blocking:&lt;/STRONG&gt; If I want to block a specific remote IP (e.g., an internal host performing a port scan) on a &lt;STRONG data-index-in-node="112" data-path-to-node="8,1,0"&gt;specific endpoint only&lt;/STRONG&gt;, what is the recommended workflow if the "Block IP" option is not appearing in the Incident artifacts?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="8,2,0"&gt;&lt;STRONG data-index-in-node="0" data-path-to-node="8,2,0"&gt;IOC/BIOC vs. Restriction Profiles:&lt;/STRONG&gt; Is it possible to trigger a persistent block in this section by creating an &lt;STRONG data-index-in-node="111" data-path-to-node="8,2,0"&gt;IOC&lt;/STRONG&gt; (providing the indicator, type, and severity)? Or should this be handled strictly through &lt;STRONG data-index-in-node="205" data-path-to-node="8,2,0"&gt;IP Lists&lt;/STRONG&gt; within &lt;STRONG data-index-in-node="221" data-path-to-node="8,2,0"&gt;Restriction Profiles&lt;/STRONG&gt; in the Endpoint Policy Management?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-path-to-node="8,3,0"&gt;&lt;STRONG data-index-in-node="0" data-path-to-node="8,3,0"&gt;Action Persistence:&lt;/STRONG&gt; According to documentation, these actions expire after 90 days. If a block needs to be permanent, should it be moved from the Action Center to a Global Block List?&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P data-path-to-node="9"&gt;I recently encountered a &lt;STRONG data-index-in-node="25" data-path-to-node="9"&gt;"Suspicious Port Scan"&lt;/STRONG&gt; alert from an internal host (XDR Analytics source). While the alert was generated, the IP was not automatically blocked. I am trying to determine the most efficient way to manually push that IP to the blocked list for the targeted server.&lt;/P&gt;
&lt;P data-path-to-node="10"&gt;Any insights on the internal logic Cortex uses to populate this specific view would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="QuestionAb_0-1777933071076.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/71336i51B0D0CE1E3C7C85/image-size/medium?v=v2&amp;amp;px=400" role="button" title="QuestionAb_0-1777933071076.png" alt="QuestionAb_0-1777933071076.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 22:20:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/es-posible-bloquear-una-ip-en-cortex-xdr-pro/m-p/1253455#M9301</guid>
      <dc:creator>QuestionAb</dc:creator>
      <dc:date>2026-05-04T22:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Es posible bloquear una IP en cortex xdr pro</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/es-posible-bloquear-una-ip-en-cortex-xdr-pro/m-p/1253469#M9307</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/804344437"&gt;@QuestionAb&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;SECTION class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto [content-visibility:auto] supports-[content-visibility:auto]:[contain-intrinsic-size:auto_100lvh] R6Vx5W_threadScrollVars scroll-mb-[calc(var(--scroll-root-safe-area-inset-bottom,0px)+var(--thread-response-height))] scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" data-turn="assistant" data-scroll-anchor="false" data-testid="conversation-turn-6" data-turn-id="request-WEB:1bca8f7b-5d3b-4d1b-9f45-e577caf4b9b6-2"&gt;
&lt;DIV class="text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)"&gt;
&lt;DIV class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn"&gt;
&lt;DIV class="flex max-w-full flex-col gap-4 grow"&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal outline-none keyboard-focused:focus-ring [.text-message+&amp;amp;]:mt-1" dir="auto" tabindex="0" data-turn-start-message="true" data-message-model-slug="gpt-5-3" data-message-id="d469c338-6a8b-4c0c-9072-5257de3f35d9" data-message-author-role="assistant"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden"&gt;
&lt;DIV class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling"&gt;
&lt;P data-end="219" data-start="0"&gt;Based on the internal sources and support resources for Cortex XDR, here is a detailed breakdown of the internal logic for the "Endpoint Blocked IP Addresses" section and the recommended workflows for IP blocking.&lt;/P&gt;
&lt;P data-end="219" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="279" data-start="226" data-section-id="1k08odw"&gt;1. Orchestration: How IPs are Added to the List&lt;/H4&gt;
&lt;P data-end="437" data-start="280"&gt;The Endpoint Blocked IP Addresses tab within the Action Center is primarily designed to reflect automated response actions performed by the Cortex XDR agent.&lt;/P&gt;
&lt;UL data-end="1118" data-start="439"&gt;
&lt;LI data-end="810" data-start="439" data-section-id="gi864z"&gt;&lt;STRONG data-end="461" data-start="441"&gt;Automated Logic:&lt;/STRONG&gt; IPs are added to this list when the "Respond to Malicious Causality Chains" feature is enabled in the Malware Security Profile. The agent automatically blocks a remote IP if it identifies a network connection as part of a causality chain that triggered a high-confidence prevention alert (e.g., ransomware behavior or malicious script execution).&lt;/LI&gt;
&lt;LI data-end="1118" data-start="811" data-section-id="qzlne3"&gt;&lt;STRONG data-end="832" data-start="813"&gt;Manual Actions:&lt;/STRONG&gt; While some administrative tasks are tracked in the Action Center, manual IP blocking is not natively performed via a "Block IP" button in the same way file hashes are added to the block list. Manual enforcement of specific IP blocks is instead handled through the Host Firewall module.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1173" data-start="1125" data-section-id="x0rewv"&gt;2. Granular Blocking: Recommended Workflow&lt;/H4&gt;
&lt;P data-end="1434" data-start="1174"&gt;If the "Block IP" option is not available (as it is not a standard manual artifact response for IP addresses) and you need to block a specific internal host (e.g., a port scanner) on a specific server, the recommended workflow is to use Host Firewall Profiles:&lt;/P&gt;
&lt;OL data-end="1884" data-start="1436"&gt;
&lt;LI data-end="1516" data-start="1436" data-section-id="1mpdvhl"&gt;Navigate to: &lt;STRONG data-end="1514" data-start="1452"&gt;Endpoints → Policy Management → Extensions → Host Firewall&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI data-end="1612" data-start="1517" data-section-id="1qjvp5s"&gt;Create a new Host Firewall Profile (or edit an existing one applied to the target server).&lt;/LI&gt;
&lt;LI data-end="1801" data-start="1613" data-section-id="15cpbnf"&gt;Add a rule with the following configuration:
&lt;UL data-end="1801" data-start="1666"&gt;
&lt;LI data-end="1687" data-start="1666" data-section-id="igeckl"&gt;&lt;STRONG data-end="1679" data-start="1668"&gt;Action:&lt;/STRONG&gt; Block&lt;/LI&gt;
&lt;LI data-end="1727" data-start="1691" data-section-id="a294of"&gt;&lt;STRONG data-end="1707" data-start="1693"&gt;Direction:&lt;/STRONG&gt; Inbound (or Both)&lt;/LI&gt;
&lt;LI data-end="1801" data-start="1731" data-section-id="19d3e6g"&gt;&lt;STRONG data-end="1755" data-start="1733"&gt;Remote IP Address:&lt;/STRONG&gt; Enter the specific IP of the internal host.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-end="1884" data-start="1802" data-section-id="1oxli6n"&gt;Ensure this profile is attached to a policy rule targeting the specific server.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-end="1944" data-start="1891" data-section-id="fyccn1"&gt;Why the Port Scan Alert Did Not Trigger a Block&lt;/H4&gt;
&lt;P data-end="2393" data-start="1945"&gt;The "Suspicious Port Scan" alert from XDR Analytics is a server-side detection based on ingested logs. The automated blocking mechanism ("Respond to Malicious Causality Chains") only triggers when the agent's local BTP/Malware engine identifies a high-confidence prevention event in real-time on the endpoint. Since Analytics alerts are generated after log processing on the server, they do not automatically trigger the agent-side WFP block rules.&lt;/P&gt;
&lt;H4 data-end="2448" data-start="2400" data-section-id="19v32w"&gt;Troubleshooting Tip: Checking Local Blocks&lt;/H4&gt;
&lt;P data-end="2537" data-start="2449"&gt;You can verify if an IP is currently blocked on an endpoint by using the cytool utility:&lt;/P&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl"&gt;
&lt;DIV class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback"&gt;
&lt;DIV class="pointer-events-none absolute end-1.5 top-1 z-2 md:end-2 md:top-1"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="pe-11 pt-3"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼd ͼr" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;PRE class="cm-content q9tKkq_readonly m-0"&gt;&lt;CODE&gt;&lt;SPAN&gt;"C:\Program Files\Palo Alto Networks\Traps\cytool" unblock_remote_ip operation list&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/SECTION&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;like&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and on&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 13:54:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/es-posible-bloquear-una-ip-en-cortex-xdr-pro/m-p/1253469#M9307</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-05-05T13:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: Es posible bloquear una IP en cortex xdr pro</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/es-posible-bloquear-una-ip-en-cortex-xdr-pro/m-p/1253474#M9310</link>
      <description>&lt;P&gt;Thank you so much&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/241098"&gt;@susekar&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, what can I do by using IOC?&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 16:38:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/es-posible-bloquear-una-ip-en-cortex-xdr-pro/m-p/1253474#M9310</guid>
      <dc:creator>QuestionAb</dc:creator>
      <dc:date>2026-05-05T16:38:36Z</dc:date>
    </item>
  </channel>
</rss>

