Just curious, did you try to run these binaries or leverage a scan. What enforcement did you specify in your profiles / policy rules? On the malware side there are several checks:
for unknown, the local analysis should do the examination at the point of execution.
In addition to the malware prevention, Cortex XDR includes behavior threat protection, anti-ransomware, password theft protection, child process protection, and approximately 30 ways to exploitation.
If you are using a scan for dormant malware, it is not the same as having all of the different protection levels that are leveraged during point of execution. Are you able to share any hash / artifact info for verification?
I would actually be happy to set up a Zoom with you to look over your configuration. Based on your screenshot from MB, I believe that you may not have Cortex XDR configured to your needs. For instance, in your screenshot, I see a large number of Potentially Unwanted Applications. These are not malware. Cortex XDR can be configured to treat these the same as malware. On the malware side, I'd be very interested in checking into these as well.
Please let me know if you would like to set up a session.
Right click on that entry and select Additional Data.
Once in the details screen, right click on the entry in the list to download the TSF.
On the malware scan log. Same thing. Right click on the entry within the All Actions interface and select additional data.
From there, locate the entry, right-click and select View Related Alerts.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!