<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Triggering XDR Defender, how? in Cortex XSIAM Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/triggering-xdr-defender-how/m-p/1247936#M333</link>
    <description>&lt;P&gt;Thank you for your helpful answer. I have no defender admin rights and can't configure the passive mode, but point 3 are really good ideas.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Feb 2026 13:53:56 GMT</pubDate>
    <dc:creator>goenuel.trautmann.sp</dc:creator>
    <dc:date>2026-02-11T13:53:56Z</dc:date>
    <item>
      <title>Triggering XDR Defender, how?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/triggering-xdr-defender-how/m-p/1247658#M317</link>
      <description>&lt;P&gt;Hi Everyone!&lt;/P&gt;
&lt;P&gt;Does anyone have any idea how I can trigger XDR detection capabilities &lt;STRONG&gt;for 100% sure&lt;/STRONG&gt; without Windows Defender coming first?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;Günnie&lt;/P&gt;</description>
      <pubDate>Sat, 07 Feb 2026 18:36:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/triggering-xdr-defender-how/m-p/1247658#M317</guid>
      <dc:creator>goenuel.trautmann.sp</dc:creator>
      <dc:date>2026-02-07T18:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: Triggering XDR Defender, how?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/triggering-xdr-defender-how/m-p/1247874#M325</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1681767773"&gt;@goenuel.trautmann.sp&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To trigger &lt;STRONG&gt;Cortex XDR detection capabilities&lt;/STRONG&gt; without Windows Defender interfering—which can cause a "race condition" where Defender quarantines the file first—you must ensure that &lt;STRONG&gt;Windows Defender is running in Passive Mode&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;1. Verify Current Microsoft Defender Mode&lt;/H4&gt;
&lt;P&gt;Before testing, confirm the current running mode of Windows Defender by executing the following command in an elevated PowerShell session:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-powershell"&gt;Get-MpComputerStatus | select AMRunningMode
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Active Mode:&lt;/STRONG&gt; Defender attempts to block or quarantine threats before Cortex XDR can respond.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Passive Mode:&lt;/STRONG&gt; Defender provides telemetry but does not provide real-time protection, allowing Cortex XDR to handle detection and prevention.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;2. Configure Passive Mode&lt;/H4&gt;
&lt;P&gt;The method depends on the operating system:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Windows Workstations (10/11):&lt;/STRONG&gt;&lt;BR /&gt;Cortex XDR typically registers as the primary antivirus in the Windows Security Center (WSC). This integration causes WSC to automatically switch Microsoft Defender to passive or disabled mode. Ensure the &lt;STRONG&gt;Windows Security Center Integration&lt;/STRONG&gt; setting is enabled in the Cortex XDR Agent Settings Profile.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Windows Servers:&lt;/STRONG&gt;&lt;BR /&gt;Windows Server OS does not automatically set Defender to passive mode when a third-party AV is registered. You must manually force Passive Mode by modifying the registry and restarting the server:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Registry Path:&lt;/STRONG&gt; &lt;CODE&gt;HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\AM\&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Value Name:&lt;/STRONG&gt; &lt;CODE&gt;ForceDefenderPassiveMode&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Type:&lt;/STRONG&gt; &lt;CODE&gt;REG_DWORD&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Data:&lt;/STRONG&gt; &lt;CODE&gt;1&lt;/CODE&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;3. Recommended Detection Tests&lt;/H4&gt;
&lt;P&gt;Once Passive Mode is confirmed, you can trigger XDR alerts using the following methods:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;WildFire Test File:&lt;/STRONG&gt; Download and attempt to execute a WildFire test PE file. This triggers malware detection alerts without using a real virus.&lt;BR /&gt;(&lt;A href="https://docs.paloaltonetworks.com/advanced-wildfire/administration/configure-advanced-wildfire-analysis/verify-wildfire-submissions/test-a-sample-malware-file" target="_blank"&gt;https://docs.paloaltonetworks.com/advanced-wildfire/administration/configure-advanced-wildfire-analysis/verify-wildfire-submissions/test-a-sample-malware-file&lt;/A&gt;)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Malware Test PE File:&lt;/STRONG&gt; Generic malware test PE files generate alerts in XDR. EICAR tests may fail if Defender is not fully suppressed.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Anti-Ransomware Test:&lt;/STRONG&gt; Simulate ransomware behavior by copying &lt;CODE&gt;powershell.exe&lt;/CODE&gt; with a different name and attempting to modify files in protected "honeypot" directories.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;4. Troubleshooting Missing Alerts&lt;/H4&gt;
&lt;P&gt;If a test does not generate an alert, check the following:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Ensure &lt;STRONG&gt;XDR Pro Capabilities&lt;/STRONG&gt; are enabled in the agent settings to collect file, process, and network telemetry.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Verify the &lt;STRONG&gt;Malware Profile&lt;/STRONG&gt; has On-write File Examination and Quarantine malicious executables enabled.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Check for &lt;STRONG&gt;Informational (Severity 0) alerts&lt;/STRONG&gt;, as these may be hidden from the main Alert Table by default.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Tue, 10 Feb 2026 14:00:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/triggering-xdr-defender-how/m-p/1247874#M325</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-02-10T14:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: Triggering XDR Defender, how?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/triggering-xdr-defender-how/m-p/1247936#M333</link>
      <description>&lt;P&gt;Thank you for your helpful answer. I have no defender admin rights and can't configure the passive mode, but point 3 are really good ideas.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 13:53:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/triggering-xdr-defender-how/m-p/1247936#M333</guid>
      <dc:creator>goenuel.trautmann.sp</dc:creator>
      <dc:date>2026-02-11T13:53:56Z</dc:date>
    </item>
  </channel>
</rss>

