<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Creating BIOC Rule for Large FTP Sessions in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/creating-bioc-rule-for-large-ftp-sessions/m-p/560661#M5271</link>
    <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;I'm new to Cortex XDR and looking to enhance our network security alerts. I want to create a BIOC rule that triggers an alert whenever a data transfer larger than 100MB occurs between two devices (Local IP to Remote IP). This will help us monitor potentially malicious data transfers or data exfiltration.&lt;/P&gt;
&lt;P&gt;While we receive XDR Analytic Alerts for certain applications like Microsoft Teams uploading large amounts of data to remote servers, I'd like to implement a similar alerting mechanism for FTP/SFTP or any file transfer protocol. &lt;BR /&gt;&lt;BR /&gt;Currently, I'm using a query example from the Query Library (attached), but it's not providing results for FTP. It works when I replace "FTP" with "SMB" or other protocols.&lt;/P&gt;
&lt;P&gt;Is there something I'm missing, or do I need to set up the FTP Collector apllet on the BrokerVM to achieve this goal?&lt;/P&gt;
&lt;P&gt;Your insights and guidance would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;BR /&gt;&lt;BR /&gt;Just to clarify: I want an alert when data uploaded/downloaded is more than a certain size displaying Local and Remote IP table.&lt;/P&gt;</description>
    <pubDate>Thu, 05 Oct 2023 10:52:17 GMT</pubDate>
    <dc:creator>GoatBloke</dc:creator>
    <dc:date>2023-10-05T10:52:17Z</dc:date>
    <item>
      <title>Creating BIOC Rule for Large FTP Sessions</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/creating-bioc-rule-for-large-ftp-sessions/m-p/560661#M5271</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;I'm new to Cortex XDR and looking to enhance our network security alerts. I want to create a BIOC rule that triggers an alert whenever a data transfer larger than 100MB occurs between two devices (Local IP to Remote IP). This will help us monitor potentially malicious data transfers or data exfiltration.&lt;/P&gt;
&lt;P&gt;While we receive XDR Analytic Alerts for certain applications like Microsoft Teams uploading large amounts of data to remote servers, I'd like to implement a similar alerting mechanism for FTP/SFTP or any file transfer protocol. &lt;BR /&gt;&lt;BR /&gt;Currently, I'm using a query example from the Query Library (attached), but it's not providing results for FTP. It works when I replace "FTP" with "SMB" or other protocols.&lt;/P&gt;
&lt;P&gt;Is there something I'm missing, or do I need to set up the FTP Collector apllet on the BrokerVM to achieve this goal?&lt;/P&gt;
&lt;P&gt;Your insights and guidance would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;BR /&gt;&lt;BR /&gt;Just to clarify: I want an alert when data uploaded/downloaded is more than a certain size displaying Local and Remote IP table.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Oct 2023 10:52:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/creating-bioc-rule-for-large-ftp-sessions/m-p/560661#M5271</guid>
      <dc:creator>GoatBloke</dc:creator>
      <dc:date>2023-10-05T10:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: Creating BIOC Rule for Large FTP Sessions</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/creating-bioc-rule-for-large-ftp-sessions/m-p/560741#M5278</link>
      <description>&lt;P&gt;Hi GoatBloke,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There is an existing Analytics alert for&lt;/SPAN&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR-Analytics-Alert-Reference/Large-Upload-FTP" target="_blank"&gt; &lt;SPAN&gt;Large Upload (FTP) &lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;where our analytics engine identifies anomalous upload activity outside of the activity baseline established for the endpoint.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The Cortex XDR - Analytics alerts are detect-only and are heavily dependent upon receiving logs from network devices that would have been involved in transmitting the exfiltrated files. Please ensure that you have the appropriate license and onboarded NGFW logs to your tenant. Ingesting logs from Next-Generation Firewall requires a Cortex XDR Pro per GB license.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In regard to&lt;SPAN&gt;&amp;nbsp;the XQL query, please note not all BIOCs can be applied as Custom Prevention Rules. Reference &lt;/SPAN&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Create-a-BIOC-Rule" target="_blank"&gt;&lt;SPAN&gt;Create a BIOC Rule • Cortex XDR Pro Administrator Guide&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The following describes the event_type values for which you can create a BIOC rule.&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;FILE—Events relating to file create, write, read, and rename according to the file name and path.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;INJECTION—Events related to process injections.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;LOAD_IMAGE—Events relating to module IDs of processes.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;NETWORK—Events relating to incoming and outgoing network, filed IP addresses, port, host name, and protocol.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;PROCESS—Events relating to execution and injection of a process name, hash, path, and CMD.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;REGISTRY—Events relating to registry write, rename and delete according to registry path.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;STORY—Events relating to a combination of firewall and endpoint logs over the network.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;EVENT_LOG—Events relating to Windows event logs and Linux system authentication logs.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;Also, here is a LIVEcommunity walkthrough video on how to create custom prevention rules via BIOC’s:&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/cortex-xdr-videos/custom-prevention-rules/ta-p/347271" target="_blank"&gt; &lt;SPAN&gt;https://live.paloaltonetworks.com/t5/cortex-xdr-videos/custom-prevention-rules/ta-p/347271&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you found this response helpful, please Like and select Accept as Solution.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Oct 2023 20:27:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/creating-bioc-rule-for-large-ftp-sessions/m-p/560741#M5278</guid>
      <dc:creator>jtalton</dc:creator>
      <dc:date>2023-10-05T20:27:14Z</dc:date>
    </item>
  </channel>
</rss>

