- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
06-10-2025 08:10 AM
We observed the cortex XDR setting "respond to malicious causality chain" in action, blocking a local IP while pentesting. A new entry appeared in the action center under "Endpoint Blocked IP Addresses".
My question is, how do we know that this action took place while analyzing an incident?
There is no info in the incident
There is no info in the alert
There is no entry under under prevented action in causality chain.
There is no timeline entry or similar.
Our customer had trouble continuing work, to connect to the target host, after we resolved the incident. Thats when we realized, XDR added the IP to the blocklist.
How do we know, that we have to unblock this IP in case of an False-Positive.
06-10-2025 08:38 AM
Hi @DennisHager,
You should see a "Block" icon in the causalty chain investigation card, close to the IP address.
You can create an Exception for this IP using the Legacy Agent Exceptions:
If this post answers your question, please mark it as the solution.
06-10-2025 08:38 AM
Hi @DennisHager,
You should see a "Block" icon in the causalty chain investigation card, close to the IP address.
You can create an Exception for this IP using the Legacy Agent Exceptions:
If this post answers your question, please mark it as the solution.
06-11-2025 01:54 AM
Thanks for the reply
I expected to see an icon like this, but there is none.
In all of the seven alerts. I might have to contact TAC for this.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!