<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cortex XDR block  to execute Xcode Execution in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-block-to-execute-xcode-execution/m-p/426797#M966</link>
    <description>&lt;P&gt;The rule of thumb is to check with the business and IT operations if it is a sanctioned application. If it's allowed and you need to create an exception, there are multiple options based on the rate at which the process hash changes. An option is to add the hash to allow list -&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/investigation-and-response/investigate-files/manage-file-execution.html" target="_self"&gt;https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/investigation-and-response/investigate-files/manage-file-execution.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 13 Aug 2021 20:26:14 GMT</pubDate>
    <dc:creator>malalade</dc:creator>
    <dc:date>2021-08-13T20:26:14Z</dc:date>
    <item>
      <title>Cortex XDR block  to execute Xcode Execution</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-block-to-execute-xcode-execution/m-p/426486#M955</link>
      <description>&lt;P&gt;In some of user cortex XDR agent blocking the Xcode &lt;SPAN&gt;simulator-trampoline&amp;nbsp;program. Its detect as malware and&amp;nbsp;Suspicious executable detected. when we show alert after some time wildfire score display Benign and low confidence so is it safe to allow that file in environment ?&amp;nbsp; I have click on that file and check value in virus total portal but item&amp;nbsp;is not found on virus total.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Aug 2021 11:12:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-block-to-execute-xcode-execution/m-p/426486#M955</guid>
      <dc:creator>DChavda</dc:creator>
      <dc:date>2021-08-12T11:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR block  to execute Xcode Execution</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-block-to-execute-xcode-execution/m-p/426797#M966</link>
      <description>&lt;P&gt;The rule of thumb is to check with the business and IT operations if it is a sanctioned application. If it's allowed and you need to create an exception, there are multiple options based on the rate at which the process hash changes. An option is to add the hash to allow list -&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/investigation-and-response/investigate-files/manage-file-execution.html" target="_self"&gt;https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/investigation-and-response/investigate-files/manage-file-execution.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 20:26:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-block-to-execute-xcode-execution/m-p/426797#M966</guid>
      <dc:creator>malalade</dc:creator>
      <dc:date>2021-08-13T20:26:14Z</dc:date>
    </item>
  </channel>
</rss>

