<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Forensics - Data Collection [A question from a Cortex XDR CS Webinar] in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/forensics-data-collection-a-question-from-a-cortex-xdr-cs/m-p/559918#M5234</link>
    <description>&lt;P&gt;A reply by Paul Anderson:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'd say no; it's actually really important to make sure that critical forensic artefacts are backed up at a regular cadence. The reason for this is that, firstly, for efficiency reasons, most Windows event log files will roll over at certain sizes. Also, threat actors will be 'anti-forensic' quite regularly and delete forensic artefacts to try and hide malicious activity. But, if there's no XDR platform in place, and no 'live' monitoring taking place, host-based forensics provide us with our best opportunity to get some answers.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Sep 2023 18:37:17 GMT</pubDate>
    <dc:creator>rtsedaka</dc:creator>
    <dc:date>2023-09-28T18:37:17Z</dc:date>
    <item>
      <title>Forensics - Data Collection [A question from a Cortex XDR CS Webinar]</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/forensics-data-collection-a-question-from-a-cortex-xdr-cs/m-p/559917#M5233</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Do I have to collect forensic data all the time? it's sufficient to ingest data just after an incident?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;*Note: This question was asked during the&amp;nbsp;&lt;A id="link_9" class="page-link lia-link-navigation lia-custom-event" href="https://live.paloaltonetworks.com/t5/cortex-xdr-webinars/cortex-xdr-customer-success-webinar-uncover-the-power-of/ta-p/559778" target="_blank"&gt;Cortex XDR Customer Success Webinar: Uncover the Power of Forensics - Part 1&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 18:36:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/forensics-data-collection-a-question-from-a-cortex-xdr-cs/m-p/559917#M5233</guid>
      <dc:creator>rtsedaka</dc:creator>
      <dc:date>2023-09-28T18:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Forensics - Data Collection [A question from a Cortex XDR CS Webinar]</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/forensics-data-collection-a-question-from-a-cortex-xdr-cs/m-p/559918#M5234</link>
      <description>&lt;P&gt;A reply by Paul Anderson:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'd say no; it's actually really important to make sure that critical forensic artefacts are backed up at a regular cadence. The reason for this is that, firstly, for efficiency reasons, most Windows event log files will roll over at certain sizes. Also, threat actors will be 'anti-forensic' quite regularly and delete forensic artefacts to try and hide malicious activity. But, if there's no XDR platform in place, and no 'live' monitoring taking place, host-based forensics provide us with our best opportunity to get some answers.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 18:37:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/forensics-data-collection-a-question-from-a-cortex-xdr-cs/m-p/559918#M5234</guid>
      <dc:creator>rtsedaka</dc:creator>
      <dc:date>2023-09-28T18:37:17Z</dc:date>
    </item>
  </channel>
</rss>

