<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Quarantined Files not appearing in Action Center in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/quarantined-files-not-appearing-in-action-center/m-p/1253760#M9327</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1494946589"&gt;@M.Crow&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="314" data-start="0"&gt;Based on the internal documentation and case history, the issue where files are quarantined locally but do not appear in the &lt;STRONG data-end="160" data-start="125"&gt;Action Center &amp;gt; File Quarantine&lt;/STRONG&gt; view is often related to how the agent's policy is configured or how specific rule types (like BIOCs/BTP) report their actions to the management console.&lt;/P&gt;
&lt;P data-end="314" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="366" data-start="316" data-section-id="gbkq8j"&gt;1. Centralized vs. Local Quarantine Management&lt;/H4&gt;
&lt;P data-end="636" data-start="368"&gt;When a file is quarantined locally by the Cortex XDR agent as a result of certain local policy actions, it may be managed exclusively at the agent's local level. In such cases, the file will not appear in the centralized File Quarantine view in the management console.&lt;/P&gt;
&lt;P data-end="636" data-start="368"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="688" data-start="638" data-section-id="12hrhbd"&gt;2. Malware Profile Configuration Discrepancies&lt;/H4&gt;
&lt;P data-end="828" data-start="690"&gt;A common root cause for quarantined files missing from the console is an incomplete or restrictive Malware Security Profile configuration.&lt;/P&gt;
&lt;UL data-end="1349" data-start="830"&gt;
&lt;LI data-end="1079" data-start="830" data-section-id="oahx7d"&gt;&lt;STRONG data-end="853" data-start="832"&gt;Verdict Coverage:&lt;/STRONG&gt; If the Malware Profile is configured to quarantine only WildFire verdicts but the detection was triggered by Local Analysis, the agent may perform the local movement but fail to log the event centrally in the quarantine list.&lt;/LI&gt;
&lt;LI data-end="1349" data-start="1081" data-section-id="dh4i5v"&gt;&lt;STRONG data-end="1098" data-start="1083"&gt;Resolution:&lt;/STRONG&gt; Verify that the Malware Profile assigned to the affected endpoints has the following settings enabled:
&lt;UL data-end="1349" data-start="1204"&gt;
&lt;LI data-end="1254" data-start="1204" data-section-id="tyxu7w"&gt;&lt;STRONG data-end="1242" data-start="1206"&gt;Quarantine malicious executables&lt;/STRONG&gt; is checked.&lt;/LI&gt;
&lt;LI data-end="1349" data-start="1257" data-section-id="1nuk8ie"&gt;The quarantine scope is set to &lt;STRONG data-end="1348" data-start="1290"&gt;Quarantine WildFire and Local Analysis malware verdict&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1381" data-start="1351" data-section-id="1czh6mp"&gt;3. BIOC Rule and BTP Logic&lt;/H4&gt;
&lt;P data-end="1568" data-start="1383"&gt;The rule noted in your quarantine popup, &lt;CODE data-end="1457" data-start="1424"&gt;bitsjob_amsi_suspicious_strings&lt;/CODE&gt;, indicates a detection via the AMSI (Antimalware Scan Interface) or Behavioral Threat Protection (BTP) module.&lt;/P&gt;
&lt;UL data-end="2153" data-start="1570"&gt;
&lt;LI data-end="1891" data-start="1570" data-section-id="1f5lj22"&gt;&lt;STRONG data-end="1596" data-start="1572"&gt;Asynchronous Action:&lt;/STRONG&gt; BIOC rules and BTP are often post-execution and asynchronous. For certain script-based threats (like those involving BITS jobs or AMSI), the initial BIOC event may terminate the process (kill causality) but may not immediately trigger a centralized quarantine record for the script file itself.&lt;/LI&gt;
&lt;LI data-end="2153" data-start="1893" data-section-id="1i6p2pj"&gt;&lt;STRONG data-end="1909" data-start="1895"&gt;Reporting:&lt;/STRONG&gt; In some scenarios, if the quarantine is triggered by a Custom Prevention Rule (CPR), the alert action might be reported as &lt;CODE data-end="2045" data-start="2033"&gt;"Detected"&lt;/CODE&gt; or &lt;CODE data-end="2063" data-start="2049"&gt;"Terminated"&lt;/CODE&gt; rather than &lt;CODE data-end="2091" data-start="2076"&gt;"Quarantined"&lt;/CODE&gt; in the main alerts table, even if the file was moved locally.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2187" data-start="2155" data-section-id="rfpj4l"&gt;4. How to Correlate the Rule&lt;/H4&gt;
&lt;P data-end="2344" data-start="2189"&gt;The string &lt;CODE data-end="2233" data-start="2200"&gt;bitsjob_amsi_suspicious_strings&lt;/CODE&gt; is the internal &lt;CODE data-end="2264" data-start="2250"&gt;biocRuleName&lt;/CODE&gt; used by the agent's engine (CLIPS). To correlate this to a rule in the console:&lt;/P&gt;
&lt;OL data-end="2687" data-start="2346"&gt;
&lt;LI data-end="2388" data-start="2346" data-section-id="1eeg7oj"&gt;Navigate to &lt;STRONG data-end="2387" data-start="2361"&gt;Detection Rules &amp;gt; BIOC&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI data-end="2562" data-start="2389" data-section-id="155hxfw"&gt;Search for the rule name or use filters to find rule IDs. Note that the console typically displays the &lt;CODE data-end="2509" data-start="2495"&gt;friendlyName&lt;/CODE&gt;, which may differ slightly from the internal string.&lt;/LI&gt;
&lt;LI data-end="2687" data-start="2563" data-section-id="72agb"&gt;Alternatively, check your Restrictions profiles to see which BIOC rules have been added as Custom Prevention Rules (CPR).&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-end="2733" data-start="2689" data-section-id="1uy8zmn"&gt;5. Troubleshooting Steps on the Endpoint&lt;/H4&gt;
&lt;P data-end="2872" data-start="2735"&gt;To verify the status of these files locally, you can use the &lt;CODE data-end="2804" data-start="2796"&gt;cytool&lt;/CODE&gt; utility (requires the agent administrator/uninstallation password).&lt;/P&gt;
&lt;UL data-end="2903" data-start="2874"&gt;
&lt;LI data-end="2903" data-start="2874" data-section-id="s18o5r"&gt;&lt;STRONG data-end="2903" data-start="2876"&gt;List Quarantined Files:&amp;nbsp;&lt;/STRONG&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;cytool quarantine list&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL data-end="2970" data-start="2941"&gt;
&lt;LI data-end="2970" data-start="2941" data-section-id="1xpmxfp"&gt;&lt;STRONG data-end="2970" data-start="2943"&gt;Restore a File Locally:&amp;nbsp;&lt;/STRONG&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;cytool quarantine restore &amp;lt;QUARANTINE_ID&amp;gt; &amp;lt;DESTINATION_PATH&amp;gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&lt;SPAN&gt;Recommendation for Further Analysis:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-end="3173" data-start="3087"&gt;If packets are reaching the data broker but the data is still missing, please provide:&lt;/P&gt;
&lt;OL data-is-only-node="" data-is-last-node="" data-end="3487" data-start="3175"&gt;
&lt;LI data-end="3230" data-start="3175" data-section-id="b2eay6"&gt;A Tech Support File (TSF) from an affected endpoint.&lt;/LI&gt;
&lt;LI data-end="3354" data-start="3231" data-section-id="wkl3k0"&gt;The Debug Alert Data for the relevant incident&lt;BR data-end="3283" data-start="3280" /&gt;(&lt;STRONG data-end="3352" data-start="3287"&gt;Right-click the alert &amp;gt; Additional Data &amp;gt; Retrieve Alert Data&lt;/STRONG&gt;).&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="3487" data-start="3355" data-section-id="15d5usd"&gt;Confirmation whether any Alert Exclusion rules are active that might be suppressing these specific events from the console views.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;like&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
    <pubDate>Mon, 11 May 2026 14:22:18 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-05-11T14:22:18Z</dc:date>
    <item>
      <title>Quarantined Files not appearing in Action Center</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/quarantined-files-not-appearing-in-action-center/m-p/1253643#M9324</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are having issues with files being quarantined on BIOCs but they are not appearing in the Action Center--&amp;gt;File Quarantine.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have verified both Broker VM and local machines experiencing this issue are not anywhere near storage quota.&lt;/P&gt;
&lt;P&gt;We can see the quarantine appearing in the trapsd.log file and we can see the packets making it from the local machines to the data broker.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We tried reverting to an earlier version of the XDR to no avail so have re-upgraded to the latest.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additionally, I don't know how to correlate the noted Rule to the BIOC Rules. The Additional information 1 in the quarantine pop up shows "Rule bitsjob_amsi_suspicious_strings&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let me know if you have any ideas or what greater information might be helpful to solve this.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2026 18:35:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/quarantined-files-not-appearing-in-action-center/m-p/1253643#M9324</guid>
      <dc:creator>M.Crow</dc:creator>
      <dc:date>2026-05-07T18:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: Quarantined Files not appearing in Action Center</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/quarantined-files-not-appearing-in-action-center/m-p/1253760#M9327</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1494946589"&gt;@M.Crow&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="314" data-start="0"&gt;Based on the internal documentation and case history, the issue where files are quarantined locally but do not appear in the &lt;STRONG data-end="160" data-start="125"&gt;Action Center &amp;gt; File Quarantine&lt;/STRONG&gt; view is often related to how the agent's policy is configured or how specific rule types (like BIOCs/BTP) report their actions to the management console.&lt;/P&gt;
&lt;P data-end="314" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="366" data-start="316" data-section-id="gbkq8j"&gt;1. Centralized vs. Local Quarantine Management&lt;/H4&gt;
&lt;P data-end="636" data-start="368"&gt;When a file is quarantined locally by the Cortex XDR agent as a result of certain local policy actions, it may be managed exclusively at the agent's local level. In such cases, the file will not appear in the centralized File Quarantine view in the management console.&lt;/P&gt;
&lt;P data-end="636" data-start="368"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="688" data-start="638" data-section-id="12hrhbd"&gt;2. Malware Profile Configuration Discrepancies&lt;/H4&gt;
&lt;P data-end="828" data-start="690"&gt;A common root cause for quarantined files missing from the console is an incomplete or restrictive Malware Security Profile configuration.&lt;/P&gt;
&lt;UL data-end="1349" data-start="830"&gt;
&lt;LI data-end="1079" data-start="830" data-section-id="oahx7d"&gt;&lt;STRONG data-end="853" data-start="832"&gt;Verdict Coverage:&lt;/STRONG&gt; If the Malware Profile is configured to quarantine only WildFire verdicts but the detection was triggered by Local Analysis, the agent may perform the local movement but fail to log the event centrally in the quarantine list.&lt;/LI&gt;
&lt;LI data-end="1349" data-start="1081" data-section-id="dh4i5v"&gt;&lt;STRONG data-end="1098" data-start="1083"&gt;Resolution:&lt;/STRONG&gt; Verify that the Malware Profile assigned to the affected endpoints has the following settings enabled:
&lt;UL data-end="1349" data-start="1204"&gt;
&lt;LI data-end="1254" data-start="1204" data-section-id="tyxu7w"&gt;&lt;STRONG data-end="1242" data-start="1206"&gt;Quarantine malicious executables&lt;/STRONG&gt; is checked.&lt;/LI&gt;
&lt;LI data-end="1349" data-start="1257" data-section-id="1nuk8ie"&gt;The quarantine scope is set to &lt;STRONG data-end="1348" data-start="1290"&gt;Quarantine WildFire and Local Analysis malware verdict&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1381" data-start="1351" data-section-id="1czh6mp"&gt;3. BIOC Rule and BTP Logic&lt;/H4&gt;
&lt;P data-end="1568" data-start="1383"&gt;The rule noted in your quarantine popup, &lt;CODE data-end="1457" data-start="1424"&gt;bitsjob_amsi_suspicious_strings&lt;/CODE&gt;, indicates a detection via the AMSI (Antimalware Scan Interface) or Behavioral Threat Protection (BTP) module.&lt;/P&gt;
&lt;UL data-end="2153" data-start="1570"&gt;
&lt;LI data-end="1891" data-start="1570" data-section-id="1f5lj22"&gt;&lt;STRONG data-end="1596" data-start="1572"&gt;Asynchronous Action:&lt;/STRONG&gt; BIOC rules and BTP are often post-execution and asynchronous. For certain script-based threats (like those involving BITS jobs or AMSI), the initial BIOC event may terminate the process (kill causality) but may not immediately trigger a centralized quarantine record for the script file itself.&lt;/LI&gt;
&lt;LI data-end="2153" data-start="1893" data-section-id="1i6p2pj"&gt;&lt;STRONG data-end="1909" data-start="1895"&gt;Reporting:&lt;/STRONG&gt; In some scenarios, if the quarantine is triggered by a Custom Prevention Rule (CPR), the alert action might be reported as &lt;CODE data-end="2045" data-start="2033"&gt;"Detected"&lt;/CODE&gt; or &lt;CODE data-end="2063" data-start="2049"&gt;"Terminated"&lt;/CODE&gt; rather than &lt;CODE data-end="2091" data-start="2076"&gt;"Quarantined"&lt;/CODE&gt; in the main alerts table, even if the file was moved locally.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2187" data-start="2155" data-section-id="rfpj4l"&gt;4. How to Correlate the Rule&lt;/H4&gt;
&lt;P data-end="2344" data-start="2189"&gt;The string &lt;CODE data-end="2233" data-start="2200"&gt;bitsjob_amsi_suspicious_strings&lt;/CODE&gt; is the internal &lt;CODE data-end="2264" data-start="2250"&gt;biocRuleName&lt;/CODE&gt; used by the agent's engine (CLIPS). To correlate this to a rule in the console:&lt;/P&gt;
&lt;OL data-end="2687" data-start="2346"&gt;
&lt;LI data-end="2388" data-start="2346" data-section-id="1eeg7oj"&gt;Navigate to &lt;STRONG data-end="2387" data-start="2361"&gt;Detection Rules &amp;gt; BIOC&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI data-end="2562" data-start="2389" data-section-id="155hxfw"&gt;Search for the rule name or use filters to find rule IDs. Note that the console typically displays the &lt;CODE data-end="2509" data-start="2495"&gt;friendlyName&lt;/CODE&gt;, which may differ slightly from the internal string.&lt;/LI&gt;
&lt;LI data-end="2687" data-start="2563" data-section-id="72agb"&gt;Alternatively, check your Restrictions profiles to see which BIOC rules have been added as Custom Prevention Rules (CPR).&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-end="2733" data-start="2689" data-section-id="1uy8zmn"&gt;5. Troubleshooting Steps on the Endpoint&lt;/H4&gt;
&lt;P data-end="2872" data-start="2735"&gt;To verify the status of these files locally, you can use the &lt;CODE data-end="2804" data-start="2796"&gt;cytool&lt;/CODE&gt; utility (requires the agent administrator/uninstallation password).&lt;/P&gt;
&lt;UL data-end="2903" data-start="2874"&gt;
&lt;LI data-end="2903" data-start="2874" data-section-id="s18o5r"&gt;&lt;STRONG data-end="2903" data-start="2876"&gt;List Quarantined Files:&amp;nbsp;&lt;/STRONG&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;cytool quarantine list&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;UL data-end="2970" data-start="2941"&gt;
&lt;LI data-end="2970" data-start="2941" data-section-id="1xpmxfp"&gt;&lt;STRONG data-end="2970" data-start="2943"&gt;Restore a File Locally:&amp;nbsp;&lt;/STRONG&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;cytool quarantine restore &amp;lt;QUARANTINE_ID&amp;gt; &amp;lt;DESTINATION_PATH&amp;gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&lt;SPAN&gt;Recommendation for Further Analysis:&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-end="3173" data-start="3087"&gt;If packets are reaching the data broker but the data is still missing, please provide:&lt;/P&gt;
&lt;OL data-is-only-node="" data-is-last-node="" data-end="3487" data-start="3175"&gt;
&lt;LI data-end="3230" data-start="3175" data-section-id="b2eay6"&gt;A Tech Support File (TSF) from an affected endpoint.&lt;/LI&gt;
&lt;LI data-end="3354" data-start="3231" data-section-id="wkl3k0"&gt;The Debug Alert Data for the relevant incident&lt;BR data-end="3283" data-start="3280" /&gt;(&lt;STRONG data-end="3352" data-start="3287"&gt;Right-click the alert &amp;gt; Additional Data &amp;gt; Retrieve Alert Data&lt;/STRONG&gt;).&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="3487" data-start="3355" data-section-id="15d5usd"&gt;Confirmation whether any Alert Exclusion rules are active that might be suppressing these specific events from the console views.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;like&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2026 14:22:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/quarantined-files-not-appearing-in-action-center/m-p/1253760#M9327</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-05-11T14:22:18Z</dc:date>
    </item>
  </channel>
</rss>

