- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
01-11-2023 05:53 AM
Pretty simple need here....
Installing the latest version of WSUS Automated Maintenance from AJ Tek on our WSUS server and Cortex is blocking it with the description "Suspicious executable detected". How do I allow this to install? Is the best way to temporarily pause protection on the endpoint, install the software and then re-enable protection?
01-11-2023 06:38 AM
I think can depend how your environment is setup. you potentially could use the "report verdict as incorrect" in the incident... or could whitelist the hash... now if your setup to not allow unsigned app and that is unsigned that would be different. sorry for being slightly vague but some of this depends on your environment.
01-11-2023 11:05 AM - edited 01-11-2023 11:05 AM
Hi @cemcga
As suggested above, you can add files hashes to your allow list. Adding files to the block list or allow list takes precedence of any other policy rules that may have otherwise been applied to these files.
In order to add file hashes to your allow-lists:
You can read more about managing file execution here.
If this helped, please click Accept as Solution!
01-12-2023 07:27 AM
Thanks for this. To make sure I understand, this would allow the file to be executed on any endpoint, not just the one server, correct?
01-12-2023 07:41 AM
Yes, you are correct.
01-12-2023 06:05 PM
You can add the exception to an endpoint by creating a new Malware security profile, add the file to the PE and DLL Examination Allow List (Step 3c) and assigning it to the endpoint.
01-17-2023 01:14 AM
Hi @cemcga ,
Let me jump in and clarify @PeteJacobCF reply:
- Report incorrect verdict is applicable only if the prevention is triggered by the WildFire. If Wildfire verdict is unknown at the time of the execution (or WF is unreachable) XDR agent will perform static analysis, called Local Analysis. Local Analysis is using machine learning models to search for suspicious behavior in the exe. It is very common for local analysis to trigger false positive for legitimate file.
- If the execution is blocked by Local Analysis, reporting verdict to WF is not applicable here. As @PeteJacobCF mentioned the solution in this case it to add the file hash to the allow list.
In my humble opinion - if you absolutely trust this file and want execute it on a machine, then it should be safe to allow this file hash globally. So the easiest way would be to add it to the allow list, wait for the xdr agent to check-in (to get the update from the cloud console).
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!