<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Exclusion criteria import in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclusion-criteria-import/m-p/519488#M3058</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/196088"&gt;@RicardoWaffle&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could use an EDL -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list&lt;/A&gt; with the 700 IP addresses and add them to a block security rule (source address) with logging disabled.&amp;nbsp; The cool thing about an EDL is that updates are pushed to the security policy without the need for a commit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Fri, 28 Oct 2022 01:01:38 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2022-10-28T01:01:38Z</dc:date>
    <item>
      <title>Exclusion criteria import</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclusion-criteria-import/m-p/519423#M3055</link>
      <description>&lt;P&gt;Hi all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know of a way - or a work around for the following situation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a long list (about 700) IPs that I want to create an alert exclusion from. These are external scanners that our firewall blocks and we get a large amount of alerts because of this. I would like to create an alert exclusion so we no longer have to deal with these cluttering up our console. Manually entering 700 IPs into the Remote IP criteria field is not an option. Is there a way to get all the IPs into that criteria, or a way to silence these alerts in another way? I would prefer not to use CIDR ranges as I need a little more granularity than that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 16:31:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclusion-criteria-import/m-p/519423#M3055</guid>
      <dc:creator>RicardoWaffle</dc:creator>
      <dc:date>2022-10-27T16:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: Exclusion criteria import</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclusion-criteria-import/m-p/519488#M3058</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/196088"&gt;@RicardoWaffle&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could use an EDL -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy/external-dynamic-list&lt;/A&gt; with the 700 IP addresses and add them to a block security rule (source address) with logging disabled.&amp;nbsp; The cool thing about an EDL is that updates are pushed to the security policy without the need for a commit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 01:01:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclusion-criteria-import/m-p/519488#M3058</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-10-28T01:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: Exclusion criteria import</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclusion-criteria-import/m-p/519522#M3059</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/196088"&gt;@RicardoWaffle&lt;/a&gt;&amp;nbsp;there are a few workarounds to the ask&lt;/P&gt;
&lt;P&gt;1. import all IP addresses to IOC list, and create an exclusion policy for all alert sources as IOC, description containing IP addresses and action as Prevented (or variations of it, depending on how the firewall events are enumerated in XDR). This will exclude all alerts having the term IP in the description (including the ones that are not in the list of 700 IP's).&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bbarmanroy_0-1666947740797.png" style="width: 616px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44957iFFCC7A56921A0063/image-dimensions/616x134/is-moderation-mode/true?v=v2" width="616" height="134" role="button" title="bbarmanroy_0-1666947740797.png" alt="bbarmanroy_0-1666947740797.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. a wider action would be exclude all blocked events from the firewall&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bbarmanroy_1-1666947849777.png" style="width: 598px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44958i0DCDC916BC7CBA0D/image-dimensions/598x181/is-moderation-mode/true?v=v2" width="598" height="181" role="button" title="bbarmanroy_1-1666947849777.png" alt="bbarmanroy_1-1666947849777.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Give either action a shot depending on your preference, and see what works best for your environment.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 09:05:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclusion-criteria-import/m-p/519522#M3059</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2022-10-28T09:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Exclusion criteria import</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclusion-criteria-import/m-p/519689#M3071</link>
      <description>&lt;P&gt;Thank you both for your replies. Very helpful!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'll look into each solution for our environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 15:20:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/exclusion-criteria-import/m-p/519689#M3071</guid>
      <dc:creator>RicardoWaffle</dc:creator>
      <dc:date>2022-10-31T15:20:25Z</dc:date>
    </item>
  </channel>
</rss>

