<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detection of AI Agent Run Time via XDR in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250554#M126164</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1651192519"&gt;@D.Ciftci&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="0"&gt;The short answer is yes—XDR can definitely catch an AI agent in the act, but it isn’t actually looking for "AI" itself. Instead, it’s watching for the weird, hyper-active behavior that these agents tend to have when they're running.&lt;/P&gt;
&lt;P data-path-to-node="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="1"&gt;Since most AI agents usually run inside something like a Python interpreter, XDR keeps a close eye on that "parent" process. If it suddenly starts acting like a frantic human—spawning a bunch of command shells, running network scanners, or poking at random system files—it triggers an alert. Because an agent can "hallucinate" or just try things a lot faster than a person can type, that high-speed iteration is a huge red flag for a behavioral threshold.&lt;/P&gt;
&lt;P data-path-to-node="1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="2"&gt;It also catches agents trying to "live off the land." If an agent decides it needs to find credentials to finish a task and starts grepping through your .ssh folders or trying to read your Chrome password database, XDR sees that as "Credential Access" behavior. It doesn't care if a human or a bot typed the command; the action itself is shady.&lt;/P&gt;
&lt;P data-path-to-node="2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;Even if the agent is being sneaky and generating code on the fly in memory to avoid leaving files on the disk, modern XDR can intercept those scripts right at the moment they execute.&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;XDR watches the "heartbeat" of the agent. If a computer that usually stays quiet suddenly starts chatting constantly with an LLM provider like OpenAI and follows that up with a bunch of internal "discovery" traffic, the XDR engine connects those dots as one single suspicious chain of events.&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;Cheers&lt;/P&gt;</description>
    <pubDate>Thu, 19 Mar 2026 11:37:31 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2026-03-19T11:37:31Z</dc:date>
    <item>
      <title>Detection of AI Agent Run Time via XDR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250549#M126162</link>
      <description>&lt;P data-end="39" data-start="27"&gt;Hi everyone,&lt;/P&gt;
&lt;P data-end="298" data-start="41"&gt;I’m curious about XDR’s capability to detect AI agent runtime activity. My understanding is that XDR is quite effective at identifying post-incident artifacts, C2 IPs, and similar indicators.&lt;/P&gt;
&lt;P data-end="298" data-start="41"&gt;is it also possible to detect AI agent runtime behavior?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 09:44:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250549#M126162</guid>
      <dc:creator>D.Ciftci</dc:creator>
      <dc:date>2026-03-19T09:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: Detection of AI Agent Run Time via XDR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250553#M126163</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1651192519"&gt;@D.Ciftci&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG data-end="93" data-start="86"&gt;YES&lt;/STRONG&gt;, Cortex XDR is capable of detecting AI agent runtime behavior in addition to identifying post-incident artifacts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The platform uses AI, behavioral analytics, and machine learning to monitor endpoint, network, and cloud activity in real time, allowing it to uncover evasive threats. It provides behavioral threat protection by tracking malicious event chains and anomalies, such as fileless attacks or unexpected process behavior, that might result from AI agents.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With its agentic AI recognition in Cortex XDR 5.0, the system can identify when AI tools act autonomously inappropriately or maliciously. Runtime analysis and causality chain reconstruction enable XDR to detect malicious child processes spawned by legitimate applications, such as automation scripts or browsers. Additionally, user and entity behavior analytics (UEBA) profiles normal behavior to detect deviations that may indicate AI activity or compromise.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While XDR excels at identifying post-incident artifacts like C2 IPs, its focus on behavioral analytics and real-time monitoring allows it to detect and prevent active threats at runtime rather than relying solely on file signatures.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cortex XDR 5.0 Release Notes &amp;amp; Features (includes AI-driven threat detection updates) -&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/blog/security-operations/introducing-cortex-xdr-5-0-the-new-standard-for-endpoint-security/" target="_self"&gt;https://www.paloaltonetworks.com/blog/security-operations/introducing-cortex-xdr-5-0-the-new-standard-for-endpoint-security/&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please help out other users and “Accept as Solution” if a post helps solve your problem !&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/how-and-why-to-accept-solutions/ba-p/553827" target="_blank"&gt;Read more about how and why to accept solutions.&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 11:33:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250553#M126163</guid>
      <dc:creator>Vinothkumar_SBA</dc:creator>
      <dc:date>2026-03-19T11:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: Detection of AI Agent Run Time via XDR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250554#M126164</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1651192519"&gt;@D.Ciftci&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="0"&gt;The short answer is yes—XDR can definitely catch an AI agent in the act, but it isn’t actually looking for "AI" itself. Instead, it’s watching for the weird, hyper-active behavior that these agents tend to have when they're running.&lt;/P&gt;
&lt;P data-path-to-node="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="1"&gt;Since most AI agents usually run inside something like a Python interpreter, XDR keeps a close eye on that "parent" process. If it suddenly starts acting like a frantic human—spawning a bunch of command shells, running network scanners, or poking at random system files—it triggers an alert. Because an agent can "hallucinate" or just try things a lot faster than a person can type, that high-speed iteration is a huge red flag for a behavioral threshold.&lt;/P&gt;
&lt;P data-path-to-node="1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="2"&gt;It also catches agents trying to "live off the land." If an agent decides it needs to find credentials to finish a task and starts grepping through your .ssh folders or trying to read your Chrome password database, XDR sees that as "Credential Access" behavior. It doesn't care if a human or a bot typed the command; the action itself is shady.&lt;/P&gt;
&lt;P data-path-to-node="2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;Even if the agent is being sneaky and generating code on the fly in memory to avoid leaving files on the disk, modern XDR can intercept those scripts right at the moment they execute.&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;XDR watches the "heartbeat" of the agent. If a computer that usually stays quiet suddenly starts chatting constantly with an LLM provider like OpenAI and follows that up with a bunch of internal "discovery" traffic, the XDR engine connects those dots as one single suspicious chain of events.&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-path-to-node="3"&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 11:37:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250554#M126164</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2026-03-19T11:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Detection of AI Agent Run Time via XDR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250585#M126166</link>
      <description>&lt;P&gt;Thanks for the reply. I am more referring to runtime telemetry as mentioned &lt;A href="https://dev.to/willvelida/securing-ai-agents-implementing-the-owasp-top-10-for-agentic-applications-to-my-health-data-agent-2nk0#:~:text=ASI01%20%E2%80%94%20Agent%20Goal%20Hijack&amp;amp;text=An%20attacker%20manipulates%20the%20agent's,outputs%2C%20or%20poisoned%20external%20data." target="_self"&gt;here&lt;/A&gt;&amp;nbsp;(The OWASP Agentic Top 10).&amp;nbsp; The scenarios you are referring mostly related post incident activity.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 20:10:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250585#M126166</guid>
      <dc:creator>D.Ciftci</dc:creator>
      <dc:date>2026-03-19T20:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: Detection of AI Agent Run Time via XDR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250603#M126168</link>
      <description>&lt;P&gt;Thanks for sharing, I am wondering does Cortex XDR relies on the upload of the relevant telemetries from managed endpoints to detect or the detections are done at endpoint level (possibly through installed agent on endpoints)?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 23:58:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/detection-of-ai-agent-run-time-via-xdr/m-p/1250603#M126168</guid>
      <dc:creator>lawyu98</dc:creator>
      <dc:date>2026-03-19T23:58:44Z</dc:date>
    </item>
  </channel>
</rss>

