Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
About Cortex XDR Discussions

Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.

Please note: All postings in LIVEcommunity are visible to other users; please keep your network secure by refraining from posting live IP address’s or domain names here. Contact your Customer Success team for network-specific questions.

Discussions

Welcome to the Cortex XDR Discussions!

To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating: Rules and Best Practices Be Respectful: Treat fellow community members with professionalism and courtesy. Constructive discussions are encouraged; disrespectful or inflammatory comments are not. Stay On-Topic: This board is d...

JayGolf by Community Team Member
  • 4325 Views
  • 0 replies
  • 3 Likes

Resolved! Intense SSO failures

Hello everyone,Recently after the update we started getting errors for SSO that say Intense SSO failures.While investigating execution chain, I only ran into outcome reason as "Strong authentication is required or device authentication failed".Is there anything else we can investigate here, is this something we need to worry about or?Best regards.

Agent Blocking files/processes dynamically based on conditions

Hello XDR Enthusiasts, I am working with multiple XDR Tenants and would like to block a file/process based on conditions. I understand that you can use the Prevention features to block files based on a block/black list. This can also be configured on the Malware Profile settings where specific severity incidents can induce the agent to block the...

Outlook stops syncing with Cortex XDR enabled

We have 2 Cortex tenants with a total of about 600 users. We encountered an issue where Outlook 365 will show "Needs password" and will not connect to Office 365 to sync. The only way to get it to sync is to stop the Cortex service. Once Outlook connects, you can enable it again, and be fine for a day or two, then it will do it again. I'm not 1...

Resolved! Disable Scheduled Scans on non-persistent VDI machines

In our environment we are using Cortex XDR. We are at the point where we want to start looking at maybe installing this on non-persistent virtual desktops. I found the documentation that talks about how to install on the master image but there was also mention of disabling scheduled scanning on the virtual desktops. I do not have access to the c...

Resolved! Cortex XDR - Brute force alert rule

Hi, I need to create a brute force rule. When endpoints with tag "CRITICAL" has "action_evtlog_description = An account failed to log on" and has more than 50 logs, create a CRITICAL alert. Could you help pls. Regards,

Resolved! Enable Endpoint File Scanning Documentation - Clarification

Hello - On step 16 of Add a New Malware Security Profile (Prevent), there is a note: We recommend that you disable scheduled scanning. VDI machine scans are based on the golden image and additional files will be examined upon execution. I'm assuming based on the the second sentence that this only applies to VDI machines. It is throwing me of...

Automation of Reports

Hello Team, We need to create automated XDR report to detect executions of “Python.exe” and “PowerShell.exe & PowerShell_ise.exe” in our environment. Can we query a incident/alerts to make a report or suggest us how we can generate reports based on the above requirements. Can we configure a scheduler in this report so that all the intende...

Resolved! Palo Alto BIOC rule content error [specific rule]

Hello, There is an issue with one of the BIOC rules provided by Palo Alto. Specifically in the rule with Global ID "94fed992-c1da-4b69-9caa-292221b8c070". The wildcards for the command line arguments that this rule intents to detect, are off. To be precise all leading wildcards in this detection have a space afterwards, thus rendering the rule u...

ithermos by L1 Bithead
  • 2529 Views
  • 2 replies
  • 0 Likes
  • 2591 Posts
  • 97 Subscriptions
Top Solution Authors