Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
About Cortex XDR Discussions

Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.

Please note: All postings in LIVEcommunity are visible to other users; please keep your network secure by refraining from posting live IP address’s or domain names here. Contact your Customer Success team for network-specific questions.

Discussions

Welcome to the Cortex XDR Discussions!

To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating: Rules and Best Practices Be Respectful: Treat fellow community members with professionalism and courtesy. Constructive discussions are encouraged; disrespectful or inflammatory comments are not. Stay On-Topic: This board is d...

JayGolf by Community Team Member
  • 4327 Views
  • 0 replies
  • 3 Likes

How to Get All Filter Parameters for Cortex XDR Incident or Alerts URL?

Hi Community, I'm currently working on building deep links for Cortex XDR to directly access filtered incident views via URLs like the one below: https://<tenant>.paloaltonetworks.com/incidents/assets_and_artifacts?severity=SEV_040_HIGH&mode=all I’m trying to understand: What are all the supported query parameters that can be ...

Resolved! BTD - PROCEXP152.SYS - Vulnerable Driver Loaded

Cortex blocked driver PROCEXP152.SYS from being loaded (rule: sync.vulnerable_driver_by_original_name_loaded_procexp)The thing it that this is a signed microsoft driver and it's kind of a known situation for many other vendors.Links: Process Explorer - ProcExp152.sys Driver Flagged As Vulnerable - Microsoft Q&A , SentinelOne annoyance! : r/s...

Panagiss by L1 Bithead
  • 15331 Views
  • 3 replies
  • 0 Likes

error when try to install cortex on redhat 10

Hello, I try to install Redhat 10. i downloaded last version of packages.When i try to install on rehdta, i have this error : ./cortex-8.8.0.133595.shVerifying archive integrity... All good.Uncompressing Cortex XDR 8.8.0.133595 installer 100%[!] Path '/bin' is not in PATH[!] Path '/sbin' is not in PATHActive kernel LSM: lockdown,capability...

action_process_image_command_line Filter Issue

Hi, I'm trying to build a query that would check for reg.exe launches. This is well and good, but the moment I add a filter action_process_image_command_line = "reg save" nothing appears, even though it was part of the initial result for reg.exe. When I checked the schema, action_process_image_command_line is a string, so I don't think my query ...

unfiltered.jpg
filtered.jpg
a2123k1 by L1 Bithead
  • 1001 Views
  • 2 replies
  • 0 Likes

Resolved! Cortex false positives for OneDriveLauncher.exe?

For the last few days I've had random machines (some with fresh Windows installs) triggering Cortex alerts when logging into OneDrive. The alert is Behavioral threat detected (rule: parent_process_spoofing) and the path is the legitimate OneDrive executable at C:\Program Files\Microsoft OneDrive\25.085.0504.0002\OneDriveLauncher.exe. Has anyon...

JGrover1 by L0 Member
  • 4485 Views
  • 7 replies
  • 1 Likes

Resolved! Policy scoping by partial endpoint_name --> Endpoint Group

We are doing a pretty rushed XDR rollout, and I need to be able to scope my policies fairly specifically. First idea is to use the 4th character of the endpoint_name (hostname) which is P for Prod, T for Test. But I cannot see a way to use the Endpt Grp filters "wildcard" syntax to do this. I have found some community posts and docs referencing ...

Resolved! where to find more Information about event types and event sub types in event metadata of Cortex XDR agent.

Hi Community, In event metadata of the Cortex XDR there are so many fields that have no associated information in the documentation portal, Kindly share with me the resource where I can find more information about these fields, for example, event_type: EPM event_sub_type: epm_k_injection_skipped, and so on..... Thanks & Regards, Abhinav D.

A.Dhade by L0 Member
  • 3178 Views
  • 2 replies
  • 0 Likes

Resolved! Broker VM ssl connection

Hi. I have configured a proxy for the Broker VM on the endpoints. The Cortex XDR agents on these endpoints are establishing SSL connections to the Broker VM over port 443. Should the agents on the endpoints establish an SSL connection to the Broker VM over port 443?If yes, what is the purpose of this connection?

Aristooo by L2 Linker
  • 1229 Views
  • 2 replies
  • 0 Likes

Cortex XDR hangs up the machines and finally crashes when working on even small files in customer cloud

Hello community, every time one of the colleagues tries to copy even a small file from the customer PC to the cloud, the system hangs and then crashes for him. There are no alerts or incidents from his PC to the Cortex console. The paths are always different and so it is not easy to add exceptions for the protection modules, to reduce the scann...

Resolved! Endpoint Blocked IP Addresses - visibility

We observed the cortex XDR setting "respond to malicious causality chain" in action, blocking a local IP while pentesting. A new entry appeared in the action center under "Endpoint Blocked IP Addresses". My question is, how do we know that this action took place while analyzing an incident?There is no info in the incidentThere is no info in th...

Cloud Identity Engine Visibility Scope

I have a CSP account with multiple individual XDR tenants. I would like to know if creating CIE visibility scope using TSG ID (as mentioned here Configure the Cloud Identity Engine Visibility Scope) is something that is available to me? I don't see an option called "Tenant Management" in my Hub and hence was confused. Ideally i would like to sco...

  • 2591 Posts
  • 97 Subscriptions
Top Solution Authors