<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XQL Query to identify Log4j impacted systems CVE-2021-44228 in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/452796#M1354</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39734"&gt;@GarethDavies&lt;/a&gt;&amp;nbsp;, I'd suggest you to use the file hashes instead of file names to search for the vulnerable libraries to narrow down to the exact list.&amp;nbsp;&lt;BR /&gt;If your search results are still exceeding maximum results, please consider searching via subsets of hosts by OS type, or a subset of hashes at a time. This is dependent of your search results, and I recommend you to tune it as you dig around.&lt;/P&gt;</description>
    <pubDate>Mon, 13 Dec 2021 09:59:13 GMT</pubDate>
    <dc:creator>bbarmanroy</dc:creator>
    <dc:date>2021-12-13T09:59:13Z</dc:date>
    <item>
      <title>XQL Query to identify Log4j impacted systems CVE-2021-44228</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/452723#M1352</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am wanting to use XQL and file search to identify any effected machines. searching for files that contain the word log4j results in exceeding maximum results. Has any one developed a query for this yet thats more accurate?&lt;/P&gt;</description>
      <pubDate>Sun, 12 Dec 2021 20:52:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/452723#M1352</guid>
      <dc:creator>GarethDavies</dc:creator>
      <dc:date>2021-12-12T20:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: XQL Query to identify Log4j impacted systems CVE-2021-44228</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/452796#M1354</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39734"&gt;@GarethDavies&lt;/a&gt;&amp;nbsp;, I'd suggest you to use the file hashes instead of file names to search for the vulnerable libraries to narrow down to the exact list.&amp;nbsp;&lt;BR /&gt;If your search results are still exceeding maximum results, please consider searching via subsets of hosts by OS type, or a subset of hashes at a time. This is dependent of your search results, and I recommend you to tune it as you dig around.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 09:59:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/452796#M1354</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2021-12-13T09:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: XQL Query to identify Log4j impacted systems CVE-2021-44228</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/452804#M1356</link>
      <description>&lt;P&gt;Dear&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39734" target="_blank"&gt;@gareth.d&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Cortex XDR does not collect content of the files as telemetry data. Which means that you cannot search particular string which is in file by XQL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But you can write a python script for file content check and upload and execute via Action Center or execute command from action center again.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;grep -inR "log4j" /var/www&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But please be aware, This action will be pretty exhaustive and might create so much Disk IO.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 11:56:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/452804#M1356</guid>
      <dc:creator>etugriceri</dc:creator>
      <dc:date>2021-12-13T11:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: XQL Query to identify Log4j impacted systems CVE-2021-44228</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/452901#M1360</link>
      <description>&lt;P&gt;Any chance you could give an example XQL query that would let me load 30+ hashes into one search?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 18:15:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/452901#M1360</guid>
      <dc:creator>benjaminmurray</dc:creator>
      <dc:date>2021-12-13T18:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: XQL Query to identify Log4j impacted systems CVE-2021-44228</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/453088#M1362</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/202959"&gt;@benjaminmurray&lt;/a&gt;&amp;nbsp;fresh off the press from Palo Alto Network's Managed Threat Hunting team, you've the query that you're looking for in the section&amp;nbsp;Hunting for Log4Shell in Your Network Section A. Search for the phrase "Attempt to target all hosts that contain a file that matches the SHA256 hash of the Log4j vulnerable versions.". This will only detect any invocation/use of the vulnerable libraries. For searching for the presence of the same, you'd can use the method&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179256"&gt;@etugriceri&lt;/a&gt;&amp;nbsp;suggested for searching via Action Center or Python script with the well-known hashes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Link:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/blog/security-operations/hunting-for-log4j-cve-20210-44228-log4shell-exploit-activity/" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/blog/security-operations/hunting-for-log4j-cve-20210-44228-log4shell-exploit-activity/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 07:28:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/453088#M1362</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2021-12-14T07:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: XQL Query to identify Log4j impacted systems CVE-2021-44228</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/453938#M1393</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a possibility to extend the xql search to the firewall logs "Session end reason"? Because, if i see sesssion end reason Threat, then i'm not interested because it is blocked. But in the xdr_data dataset is the session end reason not present.&lt;/P&gt;&lt;P&gt;How can Cortex XDR stiching the Agent Logs togther with the firewall logs? Do they build a key in both datasets, like time, srcIP,dstIP, srcPort,dstPort,Protocol?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 14:14:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-to-identify-log4j-impacted-systems-cve-2021-44228/m-p/453938#M1393</guid>
      <dc:creator>fhu_omi</dc:creator>
      <dc:date>2021-12-17T14:14:46Z</dc:date>
    </item>
  </channel>
</rss>

