Malware protection - Cortex XSIAM prevents malware attacks and provides protection on endpoints based on the different operating systems. - Administrator Guide - Cortex XSIAM - Cortex - Security Operations

Cortex XSIAM Documentation

Product
Cortex XSIAM
Creation date
2024-03-06
Last date published
2025-04-29
Category
Administrator Guide
Abstract

Cortex XSIAM prevents malware attacks and provides protection on endpoints based on the different operating systems.

Malicious files, known as malware, are often disguised as or embedded in non-malicious files. These files can attempt to gain control, gather sensitive information, or disrupt the normal operations of the system. Cortex XSIAM prevents malware by employing the Malware Prevention Engine. This approach combines several layers of protection to prevent both known and unknown malware from causing harm to your endpoints. The mitigation techniques that the Malware Prevention Engine employs vary by endpoint type.

The Malware Prevention Engine uses mitigation methods that implements malware protection on endpoints based on the different operating systems.

Malware protection type

Description

Portable executable and DLL

Enables Cortex XSIAM to analyze and prevent malicious executable files and DLL files from running on Windows endpoints.

Office files with macros examination

Enables Cortex XSIAM to analyze and prevent malicious macros embedded in Microsoft Office files (Word, Excel) from running on Windows endpoints.

PowerShell script file examination

Enables Cortex XSIAM to analyze and prevent malicious PowerShell script files from running on Windows endpoints.

Network packet inspection

Enables Cortex XSIAM to analyze network packet data for malicious behavior.

On-write file examination

Enables Cortex XSIAM to monitor and take action on malicious files during the on-write process.

Password theft protection

Enables Cortex XSIAM to prevent attacks that extract passwords from memory using the Mimikatz tool.

Malicious child process protection

Enables Cortex XSIAM to prevent script-based attacks. Such attacks can be used to deliver malware by blocking targeted processes that are commonly used to bypass traditional security methods.

Cryptominers protection

Enables Cortex XSIAM to protect against attempts to locate or steal cryptocurrencies.

Ransomware protection

Enables Cortex XSIAM to protect against encryption-based activity associated with ransomware attacks.

In-process shellcode protection

Enables Cortex XSIAM to protect against in-process shellcode attack threats.

IIS protection

Enables Cortex XSIAM to protect against Internet Information Server (IIS) attacks.

Anti tampering protection

Enables Cortex XSIAM to protect against tampering attempts.

Financial malware threat protection

Enables Cortex XSIAM to protect against techniques specific to financial and banking malware.

Malicious device protection

Enables Cortex XSIAM to protect against the connection of potentially malicious devices to endpoints.

UAC bypass prevention

Enables Cortex XSIAM to protect against the User Access Control (UAC) bypass mechanism that is associated with privilege elevation attempts.

ASP and ASPX file protection

Enables Cortex XSIAM to protect endpoint from malicious ASP and ASPX files being written to the file system.

Anti webshell protection

Enables Cortex XSIAM to protect endpoint processes from dropping malicious web shells.

Dynamic kernel protection

Enables Cortex XSIAM to protect endpoints from kernel-level threats such as bootkits, rootkits, and susceptible drivers.

Security measure bypass protection

Enables Cortex XSIAM to protect endpoints from malicious actors attempting to bypass Windows built-in security controls.

VB script file protection

Enables Cortex XSIAM to protect endpoints from malicious VB script files.

Credential gathering protection

Enables Cortex XSIAM to protect endpoints from processes trying to access or steal passwords and other credentials.

UEFI protection

Enables Cortex XSIAM to protect endpoints from Unified Extensible Firmware Interface (UEFI) manipulation attempts.

Malicious causality chain response

Enables Cortex XSIAM to respond automatically when malicious causality chains are identified.

Endpoint scanning

Enables Cortex XSIAM to scan endpoints and attached removable drives for dormant, inactive malware.

On-demand file examination

Enables Cortex XSIAM to scan endpoints and attached removable drives for dormant, inactive malware.

Global behavioral threat protection rules

Enables Cortex XSIAM to use rules to protect endpoints from malicious causality chains.

Malware protection type

Description

Anti tampering protection

Enables Cortex XSIAM to protect against tampering attempts.

Anti webshell protection

Enables Cortex XSIAM to protect endpoint processes from dropping malicious web shells.

Credential gathering protection

Enables Cortex XSIAM to protect endpoints from processes trying to access or steal passwords and other credentials.

Cryptominers protection

Enables Cortex XSIAM to protect against attempts to locate or steal cryptocurrencies.

DMG file examination

Enables Cortex XSIAM to check DMG files for malware.

Endpoint scanning

Enables Cortex XSIAM to scan endpoints and attached removable drives for dormant, inactive malware.

Financial malware threat protection

Enables Cortex XSIAM to protect against techniques specific to financial and banking malware.

Global behavioral threat protection rules

Enables Cortex XSIAM to use rules to protect endpoints from malicious causality chains.

Local file threat examination

Enables Cortex XSIAM to detect malicious files on the endpoint.

Mach-O file examination

Enables Cortex XSIAM to check Mach-O files for malware.

Malicious child process protection

Enables Cortex XSIAM to prevent script-based attacks. Such attacks can be used to deliver malware by blocking targeted processes that are commonly used to bypass traditional security methods.

Ransomware protection

Enables Cortex XSIAM to protect against encryption-based activity associated with ransomware attacks.

Malware protection type

Description

Anti webshell protection

Enables Cortex XSIAM to protect endpoint processes from dropping malicious web shells.

Container escaping protection

Enables Cortex XSIAM to protect against container-escaping attempts.

Credential gathering protection

Enables Cortex XSIAM to protect endpoints from processes trying to access or steal passwords and other credentials.

Cryptominers protection

Enables Cortex XSIAM to protect against attempts to locate or steal cryptocurrencies.

ELF file examination

Enables Cortex XSIAM to examine ELF files on endpoints and perform additional actions on them.

Endpoint scanning

Enables Cortex XSIAM to scan endpoints and attached removable drives for dormant, inactive malware.

Financial malware threat protection

Enables Cortex XSIAM to protect against techniques specific to financial and banking malware.

Global threat behavioral threat protection rules

Enables Cortex XSIAM to use rules to protect endpoints from malicious causality chains.

Local file threat examination

Enables Cortex XSIAM to detect malicious files on the endpoint.

Reverse shell protection

Enables Cortex XSIAM to prevent attempts to redirect standard input and output streams to network sockets.

Malware protection type

Description

APK files examination

Enables Cortex XSIAM to analyze and prevent malicious APK files from running on endpoints.

Malware protection type

Description

Call and messages blocking

Enables Cortex XSIAM to act on incoming calls and messages from known spam numbers.

Network and EDR security module

This module lets you configure granular control and monitoring of network traffic on iOS-based supervised devices. The devices' profiles must be also configured for this on the MDM side as explained in the Cortex XDR Agent iOS Guide.

Safari browser security module

This security module can provide proactive gating of suspicious sites accessed using Safari, and provides informative site analysis to the device user. This option is recommended for iOS devices that do not belong to your organization and do not use the Network Shield feature.

Spam reports

Enables Cortex XSIAM to report calls and messages as spam.

URL filtering

Enables Cortex XSIAM to analyze and block or report malicious URLs, and to block or allow custom URLs.