- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-06-2024 02:51 PM
hi
i have cortex xdr on several endpoints, can you explain me more about the new feature Agent Certificates and its implication and how to work? i want to set enabled this function because is disabled for old tenants
03-07-2024 01:31 AM
Dear @sebasnova ,
Hope you are doing well and thank you for reaching out to the live community. From the above query I understand that you have a query around our new changes to the Agent Certificates.
Please note to improve security, the Cortex XDR agent 8.3 is now ensuring the use of a provided certificate without using the local fallback store (trusted root CA file). In order to graduate the adoption of this requirement, Disabled (Notify) is default for existing tenants; new tenants will have the Enabled configuration by default.
This means that for the new tenants Palo alto networks will be providing the certificate and we will not be relying on the fallback store anymore. For tenants who has not enabled this will be notified by the banner when they login to the portal. More information can be found in the link provided below, thank you:
If you feel this has answered your query, please let us know by clicking on "mark this as a Solution". Thank you.
03-07-2024 10:59 AM
Hi,thanks, but
one cuestion more, What was the local certificate used for?
07-17-2024 10:07 PM - edited 07-17-2024 10:10 PM
Hi @abdrahman ,
Can you explain what is the use of Local certificate.
Does it uses during agent installation on Windows for authenticity or something else...?
If yes, then PA certificate going to be installed via Agent on windows machine. Please provide some more detailed information.
07-17-2024 11:31 PM
Hello @Lakshminarayan @sebasnova ,
Previously the agent does not validate which certificate is used to sign the traffic, as long as it is validly signed. Hence Validating the signer, using Root CA Local certificate store makes the agent vulnerable to Man In The Middle attacks.
This feature is created as a security effort to mitigate Man In The Middle attacks.By enabling the feature, customers can decide not to use the Local Root CA certificate Store anymore and use only the pinned roots.pem certificate file, this way protecting from Man In The Middle (MITM) attacks.
In case due to any reason, agent is not able to use roots.pem, it will fall back to local CA and will make the agents Partially protected.
If this post answers your question, please mark it as the solution.
07-17-2024 11:47 PM
Hi Ashutosh,
Thanks for the detailed explanation. In short if my understanding is correct then agent will push roots.pem certificate to windows machine which will be used to validate the traffic.
07-17-2024 11:56 PM
Hello @Lakshminarayan ,
You can find certificate in the below location:
Windows – "C:\Program Files\Palo Alto Networks\Traps\config\roots.pem”
If this post answers your question, please mark it as the solution.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!