Pathfinder is a component that deploys a non-persistent data collector on endpoints that are not managed by a Cortex XDR agent.
After you have configured and registered your Broker VM, activate the Pathfinder application.
Notice
Pathfinder requires a Cortex XDR Pro per Endpoint or Cortex XDR Pro per GB license.
Note
The Pathfinder applet isn't supported when configuring Broker VMs in high availability (HA) clusters.
Pathfinder is a highly recommended, but optional component integrated with the Broker VM that deploys a non-persistent data collector on network hosts, servers, and workstations that are not managed by a Cortex XDR agent. The collector is automatically triggered by Analytics type alerts with a severity of High and Medium as described in the Cortex XDR Analytics Reference Guide, providing insights into assets that you would previously be unable to scan.
When an alert is triggered, the data collector is able to run for up to 2 weeks gathering EDR data from unmanaged hosts. You can track and manage the collector directly from the Cortex XDR console, and investigate the EDR data by running a query from the Query Center.
Before activating Pathfinder, ensure to review and implement the applicable requirements:
Cortex XDR supports activating Pathfinder on Windows operating systems with PowerShell version 3 and above, excluding Vanilla Windows 7. Verify these requirements wherever you want to activate Pathfinder.
Your network needs to be configured by defining your internal IP address ranges as the Pathfinder configuration must contain at least one IP address range to run. To avoid a collision, IP address ranges can only be associated with one pathfinder applet. For more information on configuring your network with an IP address range, see Configure Your Network Parameters.Configure Your Network Parameters
When using Kerberos as the Authentication Method for the Pathfinder Credentials, confirm that you have a reverse DNS zone and reverse DNS records on your DNS server.
Verify connectivity between all your networks.
The Broker VM requires a Service Account (SA) that has administrator privileges on all Windows workstations and servers in your environment. Due to this, Cortex XDR recommends you limit the number of users granted access to the SA account as it poses a credential compromise security threat.
Perform the following procedures in the order listed below.
Select Settings → Configurations → Data Broker → Broker VMs .
In either the Brokers tab or Clusters tab, locate your Broker VM.
You can right-click the Broker VM and select Add App → Pathfinder, or in the APPS column, left-click Add → Pathfinder.
In the Pathfinder Activation wizard, complete the following steps:
Define the Pathfinder Credentials used by the applet to access and deploy the data collector. The Data Collector is deployed only within the ranges of your defined IP address ranges. You can either select to define the domain access credentials or alternatively, as of Broker VM version 9.0 and later, you can define Pathfinder to access target hosts using credentials stored in your CyberArk vault.
Domain name of your network.
Domain suffixes required for DNS resolving within your network. The domain suffixes list is read-only and populated by your defined Network Configurations.
Select either Kerberos or NTLM.
Tip
When selecting Kerberos, the Broker VM has access to domain controllers over port 88 and is able to acquire the authentication ticket. It is recommended to use Kerberos for better security.
Define the access credentials using either Domain Credentials or your CyberArk AAM parameters.
To define the access credentials, enter the following parameters using the Service Account with Local Admin privileges on the remote endpoint:
User Name: User name used by Pathfinder to access your target host.
Password: Password used by Pathfinder to access your target host.
Note
Only encrypted credentials are stored on the Broker VM.
To allow Pathfinder to use credentials stored in your CyberArk vault, enter the following parameters. Make sure you are following the CyberArk guidelines.
URL: Your CyberArk AAM URL address.
Port: Your CyberArk AAM port number.
App ID: The application ID configured in your CyberArk AAM. The ID allows you to access the path to where credentials are stored in the CyberArk vault.
Query: Define the CyberArk AAM path to the credentials required by Pathfinder to access the host. Make sure you are following the CyberArk formatting guidelines.
Browse for your Client Certificate, Client Key, and CA Certificate you use to identify. Cortex XDR will notify you when your certificates are about to expire.
Note
Credentials are not stored on the Broker VM, Pathfinder queries CyberArk each time according to the defined parameters.
Test the credentials and pathfinder permissions to ensure the Broker VM can successfully collect data from your defined hosts. Testing may take a few minutes to complete but ensures that pathfinder can indeed deploy a data collector.
Select Next.
Define the data collector settings:
Select on which Targets to deploy the data collector. Target types are detected according to your operating system.
All: Deploy on all assets within your network.
Servers: Deploy only on servers.
Workstations: Deploy only on workstations.
By default the proxy settings are disabled, data collected is sent directly to the cloud. If you want to enable the proxy, select one of the following options:
Use Agent Proxy Settings: Data collected will be routed using the settings provided in the Agent Proxy Applet must be enabled for this settings to work.
Use Custom Proxy: Define the IP address and port to route the data.
Select Next.
Select the IP Address Ranges to scan from your defined Network Configurations and deploy the data collector. You can Add IP Address Ranges if you don’t see a range in the populated list.
By default, every IP address range will use the Pathfinder credentials and settings you defined in the Credentials section and is labeled as an Applet Configuration.
If you want configure other credentials for a specific range, use the right pane to override the settings. IP address ranges you edit are labeled as a Custom Configuration. Make sure to Test the credentials for this specific range.
Activate your Pathfinder.
After a successful activation, the APPS field displays Pathfinder with a green dot indicating a successful connection.
To view metrics about the Pathfinder applet, left-click the Pathfinder connection displayed in the APPS field for your Broker VM:
Whether the applet is connected to Cortex XDR.
How many collectors are in progress, pending, or successfully running out of the number of collectors that need to be setup.
How many collectors have failed.
Displays the amount of CPU, Memory, and Disk space the applet is using.
Left-click the Pathfinder connection in the APPS column to display the Pathfinder settings, and select:
To redefine your pathfinder configurations.
To redefine the user name and password.
You can select to edit credentials for multiple Pathfinder applets. However, only IP address ranges that use the default defined credentials, labeled as Applet Configuration, will adopt your changes.
To remove Pathfinder.
After the Pathfinder collector has been triggered, when an analytics type alert is triggered on an unmanaged host, the data collector is deployed to unmanaged assets within the defined IP address ranges and domain names.
Note
The data collector is only deployed on unmanaged hosts, if you want to install the XDR agent on an unmanaged host you must first remove the collector.
To track the data collector:
In Cortex XDR , select Settings → Configurations → Data Collection → Pathfinder Collection Center.
The Pathfinder Collection Center table displays the following fields about each of the deployed collectors:
Field
Description
Collector Install Time
Timestamp of when the collector was installed in the host.
Initiating Alert ID
Displays the Alert ID of the analytics alert that triggered the collector.
Initiating VM
Name of the Broker VM initiating the collector.
Last Seen
Timestamp of the last collector heartbeat.
Result
Status of the collection process. Can be:
Collection Completed
Collection Completed
Start Time
Timestamp of when the collector was triggered.
Status
Status of the collector on the host, which can be one of the following:
Pending
Running
Completed
Failed
Removed
Target IP
IP Address of the host scanned by the collector.
Manage the collector.
Set the number of collectors you want deployed. Set Collectors Number to limit the number of collectors you want to deploy in your environment.
Locate the collector, right-click, and select:
Uninstall the collector from the host.
Pivot to the Alerts Table filtered according to the initiating alert.
Upload logs from the collector.
Download the collector logs to your local machine.
When you select and right-click the Target IP field, you can choose to view the IP address in the IP View or Open in Quick Launcher.
Data gathered by the data collector can be queried and investigated from the Query Center. To run a query on the EDR data from an unmanaged host:
Navigate to Investigation → Query Center.
Select the type of query you want to run and enter the search criteria.
When defining the Host attributes, for INSTALLATION TYPE make sure to select Data Collector.
View your query results.