<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Artifacts Query in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/artifacts-query/m-p/529890#M3554</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/251467"&gt;@VineethArumulla&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I believe it is the opposite (if I may put it this way).&lt;/P&gt;
&lt;P&gt;- XDR could generate Alert for various reasons.&lt;/P&gt;
&lt;P&gt;- This alert is associated with Incident. Incident is simply "container"/aggregator for related alerts&lt;/P&gt;
&lt;P&gt;- XDR console will collect the key artifacts from those alerts and present them in this tab. This is mainly to give you quick way to see all the files, IP addresses and users that are involved in this incident.&lt;/P&gt;
&lt;P&gt;- In addition to summarizing all the files and IP addresses, XDR will give you additional context for those by showing threat intelligence information (TI) from VirusTotal and WildFire.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do not expect XDR to raise alert if your host tries to connect to IP that have high suspicious score on VirusTotal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want XDR to raise alert if known suspicious IP/file, domain is seen in your organization, you need to create IOC. You can integrate another Threat Intelligence Platform, which will automatically import IOCs to your XDR, but this is completely different from Key Assets &amp;amp; Artifacts tab. The latter is only to give you additional context&lt;/P&gt;</description>
    <pubDate>Sat, 04 Feb 2023 21:40:37 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2023-02-04T21:40:37Z</dc:date>
    <item>
      <title>Artifacts Query</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/artifacts-query/m-p/529746#M3545</link>
      <description>&lt;P&gt;Assume alert has been generated in the XDR, if the IP involved in the artifacts are raised as malicious or suspicious by some of the security vendors in the VT(virus total) or shown as malware by wildfire. Is that really the IP is suspicious? Please explain&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2023 10:09:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/artifacts-query/m-p/529746#M3545</guid>
      <dc:creator>VineethArumulla</dc:creator>
      <dc:date>2023-02-03T10:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: Artifacts Query</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/artifacts-query/m-p/529890#M3554</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/251467"&gt;@VineethArumulla&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I believe it is the opposite (if I may put it this way).&lt;/P&gt;
&lt;P&gt;- XDR could generate Alert for various reasons.&lt;/P&gt;
&lt;P&gt;- This alert is associated with Incident. Incident is simply "container"/aggregator for related alerts&lt;/P&gt;
&lt;P&gt;- XDR console will collect the key artifacts from those alerts and present them in this tab. This is mainly to give you quick way to see all the files, IP addresses and users that are involved in this incident.&lt;/P&gt;
&lt;P&gt;- In addition to summarizing all the files and IP addresses, XDR will give you additional context for those by showing threat intelligence information (TI) from VirusTotal and WildFire.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do not expect XDR to raise alert if your host tries to connect to IP that have high suspicious score on VirusTotal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want XDR to raise alert if known suspicious IP/file, domain is seen in your organization, you need to create IOC. You can integrate another Threat Intelligence Platform, which will automatically import IOCs to your XDR, but this is completely different from Key Assets &amp;amp; Artifacts tab. The latter is only to give you additional context&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2023 21:40:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/artifacts-query/m-p/529890#M3554</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-02-04T21:40:37Z</dc:date>
    </item>
  </channel>
</rss>

