Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
About Cortex XDR Discussions

Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.

Please note: All postings in LIVEcommunity are visible to other users; please keep your network secure by refraining from posting live IP address’s or domain names here. Contact your Customer Success team for network-specific questions.

Discussions

Welcome to the Cortex XDR Discussions!

To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating: Rules and Best Practices Be Respectful: Treat fellow community members with professionalism and courtesy. Constructive discussions are encouraged; disrespectful or inflammatory comments are not. Stay On-Topic: This board is d...

JayGolf by Community Team Member
  • 4319 Views
  • 0 replies
  • 3 Likes

Cortex XDR Device Control Violation Alerts

Hi All, We enabled device configurations to block external devices connecting to endpoints in the organization and its work fine. In the Cortex XDR console, I can see the device control violations. We want to create alerts to detect the Device Control Violation based on a BIOC rule, as this is the only available option. I tried several...

Brew package manager for MacOS

We utilise Brew for package manager for our Mac in our organisation and we have over 100+ engineers using it to manage their operating environment. Cortex doesnt pick up any of the applications installed via brew or any of the vulnerabilities associated with them and only detects anything once its in a running state. This seems like a very basic...

Vulnerability assessment report

Hello, In viewing this report I've noticed its still flagging servers that have been patched already and wondering how often that checks against all endpoints? I can go on a server and its not showing any updates needed and then look in the report and its in there showing it needs 68 updates which all come from a cumulative update (windows) but ...

Notepad++ block specific hash version

Guys, Does anyone know if it is possible to block the hashes associated with older versions of Notepad++? My goal is to allow only Notepad++ version 8.9.1 to be executed, and to block the installation and execution of all other versions.

tlmarques by L4 Transporter
  • 1821 Views
  • 3 replies
  • 0 Likes

API for exceptions?

Hi,looking for API for adding exceptions, is it exists ?I'd like to add programmatically exceptions which are done by UI > Settings > Exception Configuration > Legacy Agent Exceptions > Add Rule

ITApps by L1 Bithead
  • 3525 Views
  • 3 replies
  • 0 Likes

Correct Way to Add Cortex Exclusions

Often, we get requests from application admins and their vendors to exclude an application or folder from the anti-virus or security software. In the past, we have entered these requests into the Allow List of the related Malware Profile (which has been migrated to Legacy Exclusions now). I am not sure if this is the correct way to enter an excl...

Cortex XDR | Azure AD Single Sign On Unauthorized. Unauthorized - 4010507

Hello all, I am trying to setup SSO on my XDR tenant but I am getting the following message when login inUnauthorized. Unauthorized - 4010507 In the console "Management Audit Logs" i see the below logs: Custom Idp Saml User Invalid Error | invalid user: email address missing or misconfigured, please verify SAML attributes mapping I followed th...

Resolved! Push Cortex XDR datasets/logs to dedicated syslog server

Hi everyone,I’m looking for some guidance on whether it’s possible to forward Cortex datasets to a dedicated syslog server for long‑term retention. Has anyone successfully done this, or is there a recommended method?I’m also considering using Microsoft Sentinel as a destination, but I’m not sure if all Cortex datasets can be pushed there.Any ins...

Resolved! Installing Cortex Agent on Linux LXD

Hello everyone,I am looking to install the Cortex Agent on a Linux system within an LXD container. Does anyone have insights or a step-by-step guide on how to install the Cortex Agent in this environment?Additionally, is Cortex officially supported for installation on Linux LXD?Thank you,Amelia Cortex XDR

Cortex XDR installation on GKE AutoPilot cluster

Cortex XDR seems to support GKE AutoPilot in latest release 8.9. However, when generating the Kubernetes manifests on Cortex XDR dashboard, they will not deploy on AutoPilot cluster. Instead, error message is given after kubectl apply command:Violations details: {"[denied by autogke-default-linux-capabilities]":["linux capability 'SYS_ADMIN...

Pass-the-Ticket - PtT

Hi guys, I’d like to know if anyone already has a detection rule configured in XSIAM correlation for a Pass‑the‑Ticket attack.I’m building a rule from scratch, but it’s not as effective as I’d like. If anyone has a ready‑made rule or some solid ideas and can share them, it would greatly speed up the process.

XQL query to get a list of current applications installed on hosts

Hello everyone, Our team is trying to utilize the XDR host inventory dataset to gather details on what applications are installed on each host. We’re encountering an issue with Cortex XDR Host Inventory queries returning stale host data, which is producing duplicate host/application sets in our results. Is anyone aware of how we can resolve ...

Resolved! Exfiltration Simulation/Testing

I was wondering if anyone has good procedures or methodology for simulating various kinds of data exfiltrations. We have a handful of rules related to exfiltration but have not established a meaningful way of assuring they are functional and sufficient. Thanks!

M.Crow by L1 Bithead
  • 7842 Views
  • 3 replies
  • 0 Likes
  • 2582 Posts
  • 95 Subscriptions
Top Solution Authors