- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
07-04-2024 05:02 AM
Apart from Allow or Block Hash action, in rest of the actions you can scope the target.
Here is the conversation of 2022, where the user was looking for the same .
07-04-2024 03:39 AM
Hello @A.Bisht584260 ,
Thanks for reaching out on LiveCommunity!
You cannot scope the endpoints to allow or block the hash from the Action Center as Cortex XDR is not a Application Control tool.
Your use case can be achieved but there are lot of if and else.
To block the hash on the specific EP, you need to use the BIOC to BTP feature. But if the alert count reaches 5000, then the rule will get disable. Please refer to below article and have a look on accepted answer:
https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/blocking-file-execution-based-on-nameand...
To allow hash, you need to use Disable Prevent Rule. But you will still get those alerts.
If you feel this has answered your query, please let us know by clicking on Like and "mark this as a Solution".
07-04-2024 04:06 AM
Hi @aspatil ,
Thanks for your response, actually we had a Official session from the Palo Alto and the tutor was also officially sent by Palo Alto itself.
He showed us in his instance that we can target a number of endpoints accordingly.
07-04-2024 05:02 AM
Apart from Allow or Block Hash action, in rest of the actions you can scope the target.
Here is the conversation of 2022, where the user was looking for the same .
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!