[Cortex XDR Agent Configuration]
Which two steps should be considered when configuring the Cortex XDR agent for a sensitive and highly regulated environment? (Choose two.)
Answer : B, C
[Detection Engineering]
What is the earliest time frame an alert could be automatically generated once the conditions of a new correlation rule are met?
Answer : C
[Detection Engineering]
An XDR engineer is creating a correlation rule to monitor login activity on specific systems. When the activity is identified, an alert is created. The alerts are being generated properly but are missing the username when viewed. How can the username information be included in the alerts?
Answer : C
[Post-Deployment Management and Configuration]
A cloud administrator reports high network bandwidth costs attributed to Cortex XDR operations and asks for bandwidth usage to be optimized without compromising agent functionality. Which two techniques should the engineer implement? (Choose two.)
Answer : A, C
[Data Ingestion and Integration]
A multinational company with over 300,000 employees has recently deployed Cortex XDR in North Americ
a. The solution includes the Identity Threat Detection and Response (ITDR) add-on, and the Cortex team has onboarded the Cloud Identity Engine to the North American tenant. After waiting the required soak period and deploying enough agents to receive Identity and threat analytics detections, the team does not see user, group, or computer details for individuals from the European offices. What may be the reason for the issue?
Answer : A
[Data Ingestion and Integration]
Which step is required to configure a proxy for an XDR Collector?
Answer : A
[Cortex XDR Agent Configuration]
Based on the Malware profile image below, what happens when a new custom-developed application attempts to execute on an endpoint?
Answer : B