Join the discussion
Question 5/17
An insider compromise investigation has been requested to provide evidence of an unauthorized removable drive being mounted on a company laptop. Cortex XDR agent is installed with default prevention agent settings profile and default extension "Device Configuration" profile. Where can an engineer find the evidence?
Correct Answer: A
In Cortex XDR, theDevice Configuration profile(an extension of the agent settings profile) controls how the Cortex XDR agent monitors and manages device-related activities, such as the mounting of removable drives.
By default, the Device Configuration profile includes monitoring for device mount events, such as when a USB drive or other removable media is connected to an endpoint. These events are logged and can be accessed for investigations, such as detecting unauthorized drive usage in an insider compromise scenario.
* Correct Answer Analysis (A):TheHost Inventory -> Mountssection in the Cortex XDR console provides a detailed view of mount events for each endpoint, including information about removable drives mounted on the system. This is the most straightforward place to find evidence of an unauthorized removable drive being mounted on the company laptop, as it aggregates device mount events captured by the default Device Configuration profile.
* Why not the other options?
* B. dataset = xdr_data | filter event_type = ENUM.MOUNT and event_sub_type = ENUM.
MOUNT_DRIVE_MOUNT: This XQL query is technically correct for retrieving mount events from thexdr_datadataset, but it requires manual query execution and knowledge of specific event types. The Host Inventory -> Mounts section is a more user-friendly and direct method for accessing this data, making it the preferred choice for an engineer investigating this issue.
* C. The requested data requires additional configuration to be captured: This is incorrect because the default Device Configuration profile already captures mount events for removable drives, so no additional configuration is needed.
* D. preset = device_control: Thedevice_controlpreset in XQL retrieves device control-related events (e.g., USB block or allow actions), but it may not specifically include mount events unless explicitly configured. The Host Inventory -> Mounts section is more targeted for this investigation.
Exact Extract or Reference:
TheCortex XDR Documentation Portaldescribes device monitoring: "The default Device Configuration profile logs mount events for removable drives, which can be viewed in the Host Inventory -> Mounts section of the console" (paraphrased from the Device Configuration section). TheEDU-262: Cortex XDR Investigation and Responsecourse covers investigation techniques, stating that "mount events for removable drives are accessible in the Host Inventory for endpoints with default device monitoring" (paraphrased from course materials). ThePalo Alto Networks Certified XDR Engineer datasheetincludes "maintenance and troubleshooting" as a key exam topic, encompassing investigation of endpoint events.
References:
Palo Alto Networks Cortex XDR Documentation Portal:https://docs-cortex.paloaltonetworks.com/ EDU-262: Cortex XDR Investigation and Response Course Objectives Palo Alto Networks Certified XDR Engineer Datasheet:https://www.paloaltonetworks.com/services/education
/certification#xdr-engineer
By default, the Device Configuration profile includes monitoring for device mount events, such as when a USB drive or other removable media is connected to an endpoint. These events are logged and can be accessed for investigations, such as detecting unauthorized drive usage in an insider compromise scenario.
* Correct Answer Analysis (A):TheHost Inventory -> Mountssection in the Cortex XDR console provides a detailed view of mount events for each endpoint, including information about removable drives mounted on the system. This is the most straightforward place to find evidence of an unauthorized removable drive being mounted on the company laptop, as it aggregates device mount events captured by the default Device Configuration profile.
* Why not the other options?
* B. dataset = xdr_data | filter event_type = ENUM.MOUNT and event_sub_type = ENUM.
MOUNT_DRIVE_MOUNT: This XQL query is technically correct for retrieving mount events from thexdr_datadataset, but it requires manual query execution and knowledge of specific event types. The Host Inventory -> Mounts section is a more user-friendly and direct method for accessing this data, making it the preferred choice for an engineer investigating this issue.
* C. The requested data requires additional configuration to be captured: This is incorrect because the default Device Configuration profile already captures mount events for removable drives, so no additional configuration is needed.
* D. preset = device_control: Thedevice_controlpreset in XQL retrieves device control-related events (e.g., USB block or allow actions), but it may not specifically include mount events unless explicitly configured. The Host Inventory -> Mounts section is more targeted for this investigation.
Exact Extract or Reference:
TheCortex XDR Documentation Portaldescribes device monitoring: "The default Device Configuration profile logs mount events for removable drives, which can be viewed in the Host Inventory -> Mounts section of the console" (paraphrased from the Device Configuration section). TheEDU-262: Cortex XDR Investigation and Responsecourse covers investigation techniques, stating that "mount events for removable drives are accessible in the Host Inventory for endpoints with default device monitoring" (paraphrased from course materials). ThePalo Alto Networks Certified XDR Engineer datasheetincludes "maintenance and troubleshooting" as a key exam topic, encompassing investigation of endpoint events.
References:
Palo Alto Networks Cortex XDR Documentation Portal:https://docs-cortex.paloaltonetworks.com/ EDU-262: Cortex XDR Investigation and Response Course Objectives Palo Alto Networks Certified XDR Engineer Datasheet:https://www.paloaltonetworks.com/services/education
/certification#xdr-engineer
Add Comments
- Other Question (17q)
- Q1. An administrator wants to employ reusable rules within custom parsing rules to apply consi...
- Q2. The most recent Cortex XDR agents are being installed at a newly acquired company. A list ...
- Q3. How are dynamic endpoint groups created and managed in Cortex XDR?...
- Q4. During deployment of Cortex XDR for Linux Agents, the security engineering team is asked t...
- Q5. An insider compromise investigation has been requested to provide evidence of an unauthori...
- Q6. What happens when the XDR Collector is uninstalled from an endpoint by using the Cortex XD...
- Q7. When isolating Cortex XDR agent components to troubleshoot for compatibility, which comman...
- Q8. How can a Malware profile be configured to prevent a specific executable from being upload...
- Q9. An XDR engineer is configuring an automation playbook to respond to high-severity malware ...
- Q10. A cloud administrator reports high network bandwidth costs attributed to Cortex XDR operat...
- Q11. Which statement describes the functionality of fixed filters and dashboard drilldowns in e...
- Q12. A correlation rule is created to detect potential insider threats by correlating user logi...
- Q13. What will enable a custom prevention rule to block specific behavior?...
- Q14. A Custom Prevention rule that was determined to be a false positive alert needs to be tune...
- Q15. Which components may be included in a Cortex XDR content update?...
- Q16. What are two possible actions that can be triggered by a dashboard drilldown? (Choose two....
- Q17. Some company employees are able to print documents when working from home, but not on netw...
[×]
Download PDF File
Enter your email address to download PaloAltoNetworks.XDR-Engineer.v2025-10-29.q17.pdf
