<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sorting out generic website fw rules in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sorting-out-generic-website-fw-rules/m-p/543469#M4443</link>
    <description>&lt;P&gt;Any update &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/232716"&gt;@anlynch&lt;/a&gt; . I've did something similar in this rule, don't know if this can help you out:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;/*&lt;BR /&gt;Query finds the last connection of a suspicious domain and then displays all connections 5 minutes prior and 10 seconds after the connection to a suspicious domain.&lt;BR /&gt;Fields AGENT and DOMAIN are mandatory. &lt;BR /&gt;You may change variables minutes_before_connection and seconds_after_connection to include more or less results around the connection.&lt;/P&gt;
&lt;P&gt;Last connection time used to filter for results is based both on established connections and dns queries.&lt;BR /&gt;*/&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;dataset = xdr_data&lt;BR /&gt;| filter agent_hostname = "AGENT" // &amp;lt;-- Agent that you are investigating&lt;BR /&gt;| alter suspicious_domain = "DOMAIN" // &amp;lt;-- Domain that caused the alert&lt;BR /&gt;| alter minutes_before_connection = 5&lt;BR /&gt;| alter seconds_after_connection = 10&lt;BR /&gt;| filter action_external_hostname != null or dns_query_name != null&lt;BR /&gt;| join type = inner (&lt;BR /&gt;dataset = xdr_data&lt;BR /&gt;| alter domain = if(action_external_hostname != null, action_external_hostname, dns_query_name != null, dns_query_name, null)&lt;BR /&gt;| filter domain != null and agent_hostname != null&lt;BR /&gt;| comp max(_time) as last_visit by domain, agent_hostname &lt;BR /&gt;) as X _time &amp;lt;= X.last_visit and X.domain = suspicious_domain and X.agent_hostname = agent_hostname&lt;BR /&gt;| filter &lt;BR /&gt;timestamp_diff(last_visit, _time, "MINUTE") &amp;lt;= minutes_before_connection and&lt;BR /&gt;timestamp_diff(_time, last_visit, "SECOND") &amp;lt;= seconds_after_connection&lt;BR /&gt;| fields &lt;BR /&gt;_time, &lt;BR /&gt;actor_process_image_name,&lt;BR /&gt;actor_process_image_command_line,&lt;BR /&gt;action_external_hostname as established_connection,&lt;BR /&gt;dns_query_name as dns_query, &lt;BR /&gt;_product&lt;BR /&gt;| sort desc _time&lt;BR /&gt;&lt;BR /&gt;As description shows, it is used to tell us number of connection before and after generic alert and incident. If this can help you, it's great. &lt;/P&gt;</description>
    <pubDate>Fri, 26 May 2023 08:45:00 GMT</pubDate>
    <dc:creator>DragomirGaliaIT</dc:creator>
    <dc:date>2023-05-26T08:45:00Z</dc:date>
    <item>
      <title>Sorting out generic website fw rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sorting-out-generic-website-fw-rules/m-p/542868#M4394</link>
      <description>&lt;P&gt;Hey everyone,&lt;BR /&gt;&lt;BR /&gt;We are trying to sort out generic firewall alerts that we get as the incidents. &lt;BR /&gt;&lt;BR /&gt;Currently, when there's site blocked that someone browsed through, we get the incident to check for it.&lt;BR /&gt;&lt;BR /&gt;I would like to implement some correlation rule that will only trigger alert for suspicious ad/website when there are more than 1 connection, especially established one, and not to give alert if there's one blocked connection.&lt;BR /&gt;So if someone for example has one blocked connection to the site that is suspicious, but other one is established, that would also be alert and incident to check.&lt;BR /&gt;&lt;BR /&gt;Any ideas on how to complete that?&lt;BR /&gt;&lt;BR /&gt;BR,&lt;BR /&gt;&lt;BR /&gt;Dragomir.&lt;/P&gt;</description>
      <pubDate>Mon, 22 May 2023 07:30:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sorting-out-generic-website-fw-rules/m-p/542868#M4394</guid>
      <dc:creator>DragomirGaliaIT</dc:creator>
      <dc:date>2023-05-22T07:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: Sorting out generic website fw rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sorting-out-generic-website-fw-rules/m-p/543114#M4411</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/269217"&gt;@DragomirGaliaIT&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reaching out through LIVEcommunity!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm going to do some research on this and get back to you.&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2023 01:33:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sorting-out-generic-website-fw-rules/m-p/543114#M4411</guid>
      <dc:creator>anlynch</dc:creator>
      <dc:date>2023-05-24T01:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: Sorting out generic website fw rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sorting-out-generic-website-fw-rules/m-p/543469#M4443</link>
      <description>&lt;P&gt;Any update &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/232716"&gt;@anlynch&lt;/a&gt; . I've did something similar in this rule, don't know if this can help you out:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;/*&lt;BR /&gt;Query finds the last connection of a suspicious domain and then displays all connections 5 minutes prior and 10 seconds after the connection to a suspicious domain.&lt;BR /&gt;Fields AGENT and DOMAIN are mandatory. &lt;BR /&gt;You may change variables minutes_before_connection and seconds_after_connection to include more or less results around the connection.&lt;/P&gt;
&lt;P&gt;Last connection time used to filter for results is based both on established connections and dns queries.&lt;BR /&gt;*/&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;dataset = xdr_data&lt;BR /&gt;| filter agent_hostname = "AGENT" // &amp;lt;-- Agent that you are investigating&lt;BR /&gt;| alter suspicious_domain = "DOMAIN" // &amp;lt;-- Domain that caused the alert&lt;BR /&gt;| alter minutes_before_connection = 5&lt;BR /&gt;| alter seconds_after_connection = 10&lt;BR /&gt;| filter action_external_hostname != null or dns_query_name != null&lt;BR /&gt;| join type = inner (&lt;BR /&gt;dataset = xdr_data&lt;BR /&gt;| alter domain = if(action_external_hostname != null, action_external_hostname, dns_query_name != null, dns_query_name, null)&lt;BR /&gt;| filter domain != null and agent_hostname != null&lt;BR /&gt;| comp max(_time) as last_visit by domain, agent_hostname &lt;BR /&gt;) as X _time &amp;lt;= X.last_visit and X.domain = suspicious_domain and X.agent_hostname = agent_hostname&lt;BR /&gt;| filter &lt;BR /&gt;timestamp_diff(last_visit, _time, "MINUTE") &amp;lt;= minutes_before_connection and&lt;BR /&gt;timestamp_diff(_time, last_visit, "SECOND") &amp;lt;= seconds_after_connection&lt;BR /&gt;| fields &lt;BR /&gt;_time, &lt;BR /&gt;actor_process_image_name,&lt;BR /&gt;actor_process_image_command_line,&lt;BR /&gt;action_external_hostname as established_connection,&lt;BR /&gt;dns_query_name as dns_query, &lt;BR /&gt;_product&lt;BR /&gt;| sort desc _time&lt;BR /&gt;&lt;BR /&gt;As description shows, it is used to tell us number of connection before and after generic alert and incident. If this can help you, it's great. &lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2023 08:45:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/sorting-out-generic-website-fw-rules/m-p/543469#M4443</guid>
      <dc:creator>DragomirGaliaIT</dc:creator>
      <dc:date>2023-05-26T08:45:00Z</dc:date>
    </item>
  </channel>
</rss>

