<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cortex XDR - Brute force alert rule in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-brute-force-alert-rule/m-p/534835#M3862</link>
    <description>&lt;P&gt;Hi Ben,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did it with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;preset = xdr_event_log | filter action_evtlog_event_id = 4625 | filter agent_hostname in (dataset = endpoints | filter tags contains "CRITICAL" | fields endpoint_name)&lt;BR /&gt;//|alter actor_effective_username = action_evtlog_data_fields(to_json_string($.TargetUserName))&lt;BR /&gt;| alter TargetUserName = trim(json_extract(action_evtlog_data_fields, "$.TargetUserName"), "\"")&lt;BR /&gt;| alter ClientHostname = trim(json_extract(action_evtlog_data_fields, "$.WorkstationName"), "\"")&lt;BR /&gt;| alter ProcessName = trim(json_extract(action_evtlog_data_fields, "$.ProcessName"), "\"")&lt;BR /&gt;| fields agent_hostname, agent_ip_addresses, action_evtlog_description, TargetUserName, ClientHostname, insert_timestamp &lt;BR /&gt;| comp count(agent_hostname) as counter by agent_hostname,agent_ip_addresses,action_evtlog_description,TargetUserName,ClientHostname, insert_timestamp &lt;BR /&gt;| filter counter &amp;gt; 50&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Fábio&lt;/P&gt;</description>
    <pubDate>Fri, 17 Mar 2023 11:40:35 GMT</pubDate>
    <dc:creator>FabioFerreira</dc:creator>
    <dc:date>2023-03-17T11:40:35Z</dc:date>
    <item>
      <title>Cortex XDR - Brute force alert rule</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-brute-force-alert-rule/m-p/534750#M3851</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to create a brute force rule.&lt;/P&gt;
&lt;P&gt;When endpoints with tag "CRITICAL" has "action_evtlog_description =&amp;nbsp;An account failed to log on" and has more than 50 logs, create a CRITICAL alert.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you help pls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2023 17:21:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-brute-force-alert-rule/m-p/534750#M3851</guid>
      <dc:creator>FabioFerreira</dc:creator>
      <dc:date>2023-03-16T17:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - Brute force alert rule</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-brute-force-alert-rule/m-p/534761#M3852</link>
      <description>&lt;P&gt;Hi FabioFerreira,&lt;BR /&gt;&lt;BR /&gt;I would recommend following the instructions linked &lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Create-a-Correlation-Rule" target="_self"&gt;here&lt;/A&gt; to build a correlation rule. You could try using the below query as a template for creating the correlation rule.&lt;BR /&gt;&lt;BR /&gt;config case_sensitive = false &lt;BR /&gt;|dataset = xdr_data &lt;BR /&gt;|filter agent_hostname in(dataset = endpoints |filter tags contains "CRITICAL" |fields endpoint_name)&lt;BR /&gt;|filter action_evtlog_description = "An account failed to log on"&lt;BR /&gt;|comp count() as failure_count by agent_hostname&lt;BR /&gt;|filter failure_count &amp;gt; 50&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Ben&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2023 19:23:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-brute-force-alert-rule/m-p/534761#M3852</guid>
      <dc:creator>bbucao</dc:creator>
      <dc:date>2023-03-16T19:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR - Brute force alert rule</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-brute-force-alert-rule/m-p/534835#M3862</link>
      <description>&lt;P&gt;Hi Ben,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did it with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;preset = xdr_event_log | filter action_evtlog_event_id = 4625 | filter agent_hostname in (dataset = endpoints | filter tags contains "CRITICAL" | fields endpoint_name)&lt;BR /&gt;//|alter actor_effective_username = action_evtlog_data_fields(to_json_string($.TargetUserName))&lt;BR /&gt;| alter TargetUserName = trim(json_extract(action_evtlog_data_fields, "$.TargetUserName"), "\"")&lt;BR /&gt;| alter ClientHostname = trim(json_extract(action_evtlog_data_fields, "$.WorkstationName"), "\"")&lt;BR /&gt;| alter ProcessName = trim(json_extract(action_evtlog_data_fields, "$.ProcessName"), "\"")&lt;BR /&gt;| fields agent_hostname, agent_ip_addresses, action_evtlog_description, TargetUserName, ClientHostname, insert_timestamp &lt;BR /&gt;| comp count(agent_hostname) as counter by agent_hostname,agent_ip_addresses,action_evtlog_description,TargetUserName,ClientHostname, insert_timestamp &lt;BR /&gt;| filter counter &amp;gt; 50&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Fábio&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 11:40:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-brute-force-alert-rule/m-p/534835#M3862</guid>
      <dc:creator>FabioFerreira</dc:creator>
      <dc:date>2023-03-17T11:40:35Z</dc:date>
    </item>
  </channel>
</rss>

