- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
06-27-2023 05:09 AM
There is an option Response Action under agent configuration, which means we can allow access to a certain application in case the endpoint is isolated.
Which application access should ideally be provided in it.
Thanks
06-27-2023 07:24 AM
Hello @Shahwaz_Md
Thanks for reaching out to Live Community.
When you isolate an endpoint, it will halt all network traffic except for cortex XDR traffic. "Response Actions" feature under Agent settings profile allow you to add specific applications to be allowed in case of Network Isolation.
Allowing a specific application depends on the customer environment and use cases. There is no recommendation from our side.
For example,
(Windows) For VDI sessions, using the network isolation response action can disrupt communication with the VDI host management system thereby halting access to the VDI session. As a result, before using the response action you must add the VDI processes and corresponding IP addresses to your allow list.
Please keep network access to bare minimum in case of Isolation to restrict attacker’s mobility on your network. Below is the link for your reference.
06-27-2023 07:24 AM
Hello @Shahwaz_Md
Thanks for reaching out to Live Community.
When you isolate an endpoint, it will halt all network traffic except for cortex XDR traffic. "Response Actions" feature under Agent settings profile allow you to add specific applications to be allowed in case of Network Isolation.
Allowing a specific application depends on the customer environment and use cases. There is no recommendation from our side.
For example,
(Windows) For VDI sessions, using the network isolation response action can disrupt communication with the VDI host management system thereby halting access to the VDI session. As a result, before using the response action you must add the VDI processes and corresponding IP addresses to your allow list.
Please keep network access to bare minimum in case of Isolation to restrict attacker’s mobility on your network. Below is the link for your reference.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!