<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cortex XDR MITRE ATT&amp;amp;CK v16 -- We're Now on v19. Can We Talk About This? in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-mitre-att-amp-ck-v16-we-re-now-on-v19-can-we-talk/m-p/1254034#M9337</link>
    <description>&lt;P&gt;Hey LIVEcommunity,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been sitting on this for a while and finally decided to write it up because I am pretty sure I am not the only one running into this. If you are a detection engineer or SOC analyst building BIOCs in Cortex XDR and leaning on MITRE ATT&amp;amp;CK to organize your detection coverage, this one is for you.&lt;/P&gt;
&lt;HR /&gt;
&lt;H3&gt;So Here Is What Happened&lt;/H3&gt;
&lt;P&gt;A few months back, I reached out to Palo Alto support with a question about which version of MITRE ATT&amp;amp;CK was mapped into Cortex XDR. The answer I got was &lt;STRONG&gt;v16&lt;/STRONG&gt; (that is the October 2024 release), and I was told there was a roadmap to bring it up to v17.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fair enough. These things take time. I get it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fast forward to today. MITRE has since shipped &lt;STRONG&gt;v17, v18, and v19&lt;/STRONG&gt;. That latest one dropped on April 28, 2026, and it was not a minor bump. I have been watching the BIOC rule creation workflow closely, and as far as I can tell, &lt;STRONG&gt;nothing has changed&lt;/STRONG&gt;. The Tactic and Technique dropdowns still look like v16 to me. The BIOC rule TYPE field in the documentation still lists "Evasion" as a category, which is a dead giveaway that v19 has not landed yet.&lt;/P&gt;
&lt;P&gt;So that roadmap to v17? I am not sure what happened to it, but we are now three versions behind and counting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;For reference, here is my current environment so there is no ambiguity about what I am looking at:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Environment Details&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="___i31lg00 f10pi13n f14t3ns0 f1nbblvp fat0sn4 f1ov4xf1 fekwl8i f1lmfglv f1oz7aqm f1abmfm4 f1w619qj f16h0jq8"&gt;
&lt;TABLE class="___1hm93bs f1ddd56o f16vktn6 f1enuhaj fdclmfp f1ev3kgc ftgm304 f1uinfot fibjyge fvueend f9yszdx f1fu4s3n f3l3pb3 f1s2k7dp f8fmt76 fjvbh62 fysh76l fic4ptz f1yenhzu f1yn6nvh f14tj6oe f1jq587y f1el8yx3 f1pymoxg f1ofu761 fe6itr f7coize f1794535 f70r78m f4zgifc fk1v6el f16pyhcb fo436u6 fzy4j18 fc43013 f1hmrcvb fc4t9fq fgp09rh fjnyn6r"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TH&gt;Component&lt;/TH&gt;
&lt;TH&gt;Version / Detail&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Cortex XDR&lt;/TD&gt;
&lt;TD&gt;v5.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;UI Version&lt;/TD&gt;
&lt;TD&gt;master-platform-v5.0.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;UI Build Time&lt;/TD&gt;
&lt;TD&gt;Feb 16, 2026&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Server Version&lt;/TD&gt;
&lt;TD&gt;master-platform-v4.4.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Server Build Time&lt;/TD&gt;
&lt;TD&gt;Feb 6, 2026&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Deployment Time&lt;/TD&gt;
&lt;TD&gt;Feb 8, 2026&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Automation Version&lt;/TD&gt;
&lt;TD&gt;8.13.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;XQL Content Version&lt;/TD&gt;
&lt;TD&gt;master-platform-v4.4.0-146&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;XDM Content Version&lt;/TD&gt;
&lt;TD&gt;master-platform-v4.4.0-111&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Content Version&lt;/TD&gt;
&lt;TD&gt;2250-35893&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;WildFire Server&lt;/TD&gt;
&lt;TD&gt;wildfire.paloaltonetworks.com&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;If anyone from Palo Alto engineering needs additional build details to investigate, I am happy to provide them privately.&lt;/P&gt;
&lt;/DIV&gt;
&lt;HR /&gt;
&lt;H3&gt;Why v19 Is Not Just Another Version Bump&lt;/H3&gt;
&lt;P&gt;Normally I would not make a big deal about being a version or two behind. Frameworks evolve, vendors catch up, life goes on. But &lt;STRONG&gt;v19 is different&lt;/STRONG&gt;. MITRE fundamentally restructured the Enterprise matrix this time, and it changes how we think about and classify adversary behavior:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Defense Evasion is gone.&lt;/STRONG&gt; That tactic we have all been mapping to for years (TA0005) has been split into two distinct tactics:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Stealth&lt;/STRONG&gt; (keeps TA0005) -- the adversary is hiding within legitimate activity&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Defense Impairment&lt;/STRONG&gt; (new, TA0112) -- the adversary is actively breaking, disabling, or degrading your security controls&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;That is a meaningful distinction. "Hiding from your tools" and "breaking your tools" are fundamentally different adversary behaviors that warrant different detection strategies, different response playbooks, and different risk conversations with leadership.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Beyond that, v19 brought the Enterprise matrix to &lt;STRONG&gt;15 Tactics, 222 Techniques, and 475 Sub-Techniques&lt;/STRONG&gt;. ICS ATT&amp;amp;CK got sub-techniques for the first time. T1562 (Impair Defenses) was restructured into T1685 (Disable or Modify Tools) and related techniques. There are new techniques covering AI-orchestrated espionage, social engineering aimed at impairing defenses, and cross-domain wipers. This was a big release.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And right now, none of that is available to me when I am building detections in XDR.&lt;/P&gt;
&lt;HR /&gt;
&lt;H3&gt;The Part That Really Bothers Me&lt;/H3&gt;
&lt;P&gt;Here is where I went from "mildly annoyed" to "I need to write a forum post about this."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto's own &lt;STRONG&gt;Unit 42&lt;/STRONG&gt; team is publishing Managed Threat Hunting reports that reference &lt;STRONG&gt;v19 tactics and techniques&lt;/STRONG&gt;. I am literally receiving threat intelligence from Palo Alto that is mapped to a framework version that Palo Alto's own detection platform does not support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the workflow looks like this:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;I get a Unit 42 report flagging activity mapped to, say, &lt;STRONG&gt;Defense Impairment (TA0112)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;I go into Cortex XDR to build a BIOC rule for that threat&lt;/LI&gt;
&lt;LI&gt;TA0112 does not exist in the dropdown because the platform is still on v16&lt;/LI&gt;
&lt;LI&gt;I now have to either shove it into the old "Evasion" bucket (which is technically wrong) or just leave the ATT&amp;amp;CK mapping blank&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Neither of those options is great. And for those of us who use ATT&amp;amp;CK coverage maps to identify detection gaps, report to leadership, or meet compliance requirements, inaccurate mappings are not just an annoyance. They erode the foundation of the whole threat-informed defense approach.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It feels like the left hand and the right hand are not talking to each other here.&lt;/P&gt;
&lt;HR /&gt;
&lt;H3&gt;What I Am Hoping to Get Out of This Thread&lt;/H3&gt;
&lt;P&gt;I am not here to bash Palo Alto. I genuinely like Cortex XDR and I think the platform does a lot of things well. But I do think this deserves some attention, and I have a few straightforward questions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;What version of MITRE ATT&amp;amp;CK is Cortex XDR currently aligned to?&lt;/STRONG&gt; Is it actually documented anywhere? I have not been able to find a definitive answer outside of asking support directly.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;What happened to the v17 roadmap, and what is the updated timeline?&lt;/STRONG&gt; If the plan has shifted to go straight to v19, great. But some transparency would go a long way.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;How does Palo Alto reconcile the gap between Unit 42's reporting and XDR's capabilities?&lt;/STRONG&gt; When your threat intel team and your detection platform are operating on different versions of the same framework, that is a problem worth addressing publicly.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Would Palo Alto consider committing to a regular ATT&amp;amp;CK update cadence?&lt;/STRONG&gt; Something like "within 90 days of each MITRE release" would give customers confidence and predictability.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;What should detection engineers do in the meantime?&lt;/STRONG&gt; If there is a recommended workaround for mapping BIOCs to v19 tactics and techniques today, I would love to hear it.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;HR /&gt;
&lt;H3&gt;If This Affects You Too, Please Chime In&lt;/H3&gt;
&lt;P&gt;I know I am not the only detection engineer staring at a BIOC dropdown wondering where half the new techniques went. If this gap is impacting your work, whether it is coverage reporting, compliance, or just the day-to-day frustration of not being able to map things correctly, drop a comment or hit the like button. The more visibility this gets, the more likely it is to land on someone's priority list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At the end of the day, accurate ATT&amp;amp;CK alignment is how modern SOCs measure what they can see, what they cannot see, and where to invest next. When the framework in our detection platform falls this far behind, it is not just an inconvenience. It is a blind spot in our ability to communicate risk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our adversaries are definitely not waiting for a dropdown menu to get updated. We should not have to either.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reading, and I am looking forward to the discussion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2026 16:51:22 GMT</pubDate>
    <dc:creator>D.Ogle</dc:creator>
    <dc:date>2026-05-14T16:51:22Z</dc:date>
    <item>
      <title>Cortex XDR MITRE ATT&amp;CK v16 -- We're Now on v19. Can We Talk About This?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-mitre-att-amp-ck-v16-we-re-now-on-v19-can-we-talk/m-p/1254034#M9337</link>
      <description>&lt;P&gt;Hey LIVEcommunity,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have been sitting on this for a while and finally decided to write it up because I am pretty sure I am not the only one running into this. If you are a detection engineer or SOC analyst building BIOCs in Cortex XDR and leaning on MITRE ATT&amp;amp;CK to organize your detection coverage, this one is for you.&lt;/P&gt;
&lt;HR /&gt;
&lt;H3&gt;So Here Is What Happened&lt;/H3&gt;
&lt;P&gt;A few months back, I reached out to Palo Alto support with a question about which version of MITRE ATT&amp;amp;CK was mapped into Cortex XDR. The answer I got was &lt;STRONG&gt;v16&lt;/STRONG&gt; (that is the October 2024 release), and I was told there was a roadmap to bring it up to v17.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fair enough. These things take time. I get it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Fast forward to today. MITRE has since shipped &lt;STRONG&gt;v17, v18, and v19&lt;/STRONG&gt;. That latest one dropped on April 28, 2026, and it was not a minor bump. I have been watching the BIOC rule creation workflow closely, and as far as I can tell, &lt;STRONG&gt;nothing has changed&lt;/STRONG&gt;. The Tactic and Technique dropdowns still look like v16 to me. The BIOC rule TYPE field in the documentation still lists "Evasion" as a category, which is a dead giveaway that v19 has not landed yet.&lt;/P&gt;
&lt;P&gt;So that roadmap to v17? I am not sure what happened to it, but we are now three versions behind and counting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV&gt;
&lt;P&gt;For reference, here is my current environment so there is no ambiguity about what I am looking at:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Environment Details&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV class="___i31lg00 f10pi13n f14t3ns0 f1nbblvp fat0sn4 f1ov4xf1 fekwl8i f1lmfglv f1oz7aqm f1abmfm4 f1w619qj f16h0jq8"&gt;
&lt;TABLE class="___1hm93bs f1ddd56o f16vktn6 f1enuhaj fdclmfp f1ev3kgc ftgm304 f1uinfot fibjyge fvueend f9yszdx f1fu4s3n f3l3pb3 f1s2k7dp f8fmt76 fjvbh62 fysh76l fic4ptz f1yenhzu f1yn6nvh f14tj6oe f1jq587y f1el8yx3 f1pymoxg f1ofu761 fe6itr f7coize f1794535 f70r78m f4zgifc fk1v6el f16pyhcb fo436u6 fzy4j18 fc43013 f1hmrcvb fc4t9fq fgp09rh fjnyn6r"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TH&gt;Component&lt;/TH&gt;
&lt;TH&gt;Version / Detail&lt;/TH&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Cortex XDR&lt;/TD&gt;
&lt;TD&gt;v5.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;UI Version&lt;/TD&gt;
&lt;TD&gt;master-platform-v5.0.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;UI Build Time&lt;/TD&gt;
&lt;TD&gt;Feb 16, 2026&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Server Version&lt;/TD&gt;
&lt;TD&gt;master-platform-v4.4.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Server Build Time&lt;/TD&gt;
&lt;TD&gt;Feb 6, 2026&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Deployment Time&lt;/TD&gt;
&lt;TD&gt;Feb 8, 2026&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Automation Version&lt;/TD&gt;
&lt;TD&gt;8.13.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;XQL Content Version&lt;/TD&gt;
&lt;TD&gt;master-platform-v4.4.0-146&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;XDM Content Version&lt;/TD&gt;
&lt;TD&gt;master-platform-v4.4.0-111&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;Content Version&lt;/TD&gt;
&lt;TD&gt;2250-35893&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;WildFire Server&lt;/TD&gt;
&lt;TD&gt;wildfire.paloaltonetworks.com&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;P&gt;If anyone from Palo Alto engineering needs additional build details to investigate, I am happy to provide them privately.&lt;/P&gt;
&lt;/DIV&gt;
&lt;HR /&gt;
&lt;H3&gt;Why v19 Is Not Just Another Version Bump&lt;/H3&gt;
&lt;P&gt;Normally I would not make a big deal about being a version or two behind. Frameworks evolve, vendors catch up, life goes on. But &lt;STRONG&gt;v19 is different&lt;/STRONG&gt;. MITRE fundamentally restructured the Enterprise matrix this time, and it changes how we think about and classify adversary behavior:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Defense Evasion is gone.&lt;/STRONG&gt; That tactic we have all been mapping to for years (TA0005) has been split into two distinct tactics:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Stealth&lt;/STRONG&gt; (keeps TA0005) -- the adversary is hiding within legitimate activity&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Defense Impairment&lt;/STRONG&gt; (new, TA0112) -- the adversary is actively breaking, disabling, or degrading your security controls&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;That is a meaningful distinction. "Hiding from your tools" and "breaking your tools" are fundamentally different adversary behaviors that warrant different detection strategies, different response playbooks, and different risk conversations with leadership.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Beyond that, v19 brought the Enterprise matrix to &lt;STRONG&gt;15 Tactics, 222 Techniques, and 475 Sub-Techniques&lt;/STRONG&gt;. ICS ATT&amp;amp;CK got sub-techniques for the first time. T1562 (Impair Defenses) was restructured into T1685 (Disable or Modify Tools) and related techniques. There are new techniques covering AI-orchestrated espionage, social engineering aimed at impairing defenses, and cross-domain wipers. This was a big release.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And right now, none of that is available to me when I am building detections in XDR.&lt;/P&gt;
&lt;HR /&gt;
&lt;H3&gt;The Part That Really Bothers Me&lt;/H3&gt;
&lt;P&gt;Here is where I went from "mildly annoyed" to "I need to write a forum post about this."&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto's own &lt;STRONG&gt;Unit 42&lt;/STRONG&gt; team is publishing Managed Threat Hunting reports that reference &lt;STRONG&gt;v19 tactics and techniques&lt;/STRONG&gt;. I am literally receiving threat intelligence from Palo Alto that is mapped to a framework version that Palo Alto's own detection platform does not support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the workflow looks like this:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;I get a Unit 42 report flagging activity mapped to, say, &lt;STRONG&gt;Defense Impairment (TA0112)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;I go into Cortex XDR to build a BIOC rule for that threat&lt;/LI&gt;
&lt;LI&gt;TA0112 does not exist in the dropdown because the platform is still on v16&lt;/LI&gt;
&lt;LI&gt;I now have to either shove it into the old "Evasion" bucket (which is technically wrong) or just leave the ATT&amp;amp;CK mapping blank&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Neither of those options is great. And for those of us who use ATT&amp;amp;CK coverage maps to identify detection gaps, report to leadership, or meet compliance requirements, inaccurate mappings are not just an annoyance. They erode the foundation of the whole threat-informed defense approach.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It feels like the left hand and the right hand are not talking to each other here.&lt;/P&gt;
&lt;HR /&gt;
&lt;H3&gt;What I Am Hoping to Get Out of This Thread&lt;/H3&gt;
&lt;P&gt;I am not here to bash Palo Alto. I genuinely like Cortex XDR and I think the platform does a lot of things well. But I do think this deserves some attention, and I have a few straightforward questions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;What version of MITRE ATT&amp;amp;CK is Cortex XDR currently aligned to?&lt;/STRONG&gt; Is it actually documented anywhere? I have not been able to find a definitive answer outside of asking support directly.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;What happened to the v17 roadmap, and what is the updated timeline?&lt;/STRONG&gt; If the plan has shifted to go straight to v19, great. But some transparency would go a long way.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;How does Palo Alto reconcile the gap between Unit 42's reporting and XDR's capabilities?&lt;/STRONG&gt; When your threat intel team and your detection platform are operating on different versions of the same framework, that is a problem worth addressing publicly.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Would Palo Alto consider committing to a regular ATT&amp;amp;CK update cadence?&lt;/STRONG&gt; Something like "within 90 days of each MITRE release" would give customers confidence and predictability.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;What should detection engineers do in the meantime?&lt;/STRONG&gt; If there is a recommended workaround for mapping BIOCs to v19 tactics and techniques today, I would love to hear it.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;HR /&gt;
&lt;H3&gt;If This Affects You Too, Please Chime In&lt;/H3&gt;
&lt;P&gt;I know I am not the only detection engineer staring at a BIOC dropdown wondering where half the new techniques went. If this gap is impacting your work, whether it is coverage reporting, compliance, or just the day-to-day frustration of not being able to map things correctly, drop a comment or hit the like button. The more visibility this gets, the more likely it is to land on someone's priority list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At the end of the day, accurate ATT&amp;amp;CK alignment is how modern SOCs measure what they can see, what they cannot see, and where to invest next. When the framework in our detection platform falls this far behind, it is not just an inconvenience. It is a blind spot in our ability to communicate risk.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Our adversaries are definitely not waiting for a dropdown menu to get updated. We should not have to either.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reading, and I am looking forward to the discussion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2026 16:51:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-mitre-att-amp-ck-v16-we-re-now-on-v19-can-we-talk/m-p/1254034#M9337</guid>
      <dc:creator>D.Ogle</dc:creator>
      <dc:date>2026-05-14T16:51:22Z</dc:date>
    </item>
  </channel>
</rss>

