<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BIOC rule in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-rule/m-p/572872#M5876</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/312460"&gt;@Anirudha_Jadhav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reaching out on LiveCommunity!&lt;/P&gt;
&lt;P&gt;You can use the Network entity within query builder which provides you with pre build format in order to s&lt;SPAN&gt;earch network activity by IP address, port, host name, protocol, and more. In addition to network activity you can add acting process where you can define the Powershell parameters like command line, path, SHA256 etc in order to capture powershell details.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Apart from it you can take help from query library by searching for "upload" keyword. There are several prebuilt queries to detect data upload. You can take reference from them and build you own.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please click&amp;nbsp;&lt;STRONG&gt;Accept as Solution&lt;/STRONG&gt;&amp;nbsp;to acknowledge that the answer to your question has been provided.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jan 2024 14:41:04 GMT</pubDate>
    <dc:creator>nsinghvirk</dc:creator>
    <dc:date>2024-01-12T14:41:04Z</dc:date>
    <item>
      <title>BIOC rule</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-rule/m-p/572156#M5857</link>
      <description>&lt;P&gt;How to make BIOC rule in cortex xdr if an attacker tries to upload data to aws from PowerShell CLI? &lt;LI-PRODUCT title="Cortex XDR" id="Cortex_XDR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 18:18:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-rule/m-p/572156#M5857</guid>
      <dc:creator>Anirudha_Jadhav</dc:creator>
      <dc:date>2024-01-08T18:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: BIOC rule</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-rule/m-p/572872#M5876</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/312460"&gt;@Anirudha_Jadhav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reaching out on LiveCommunity!&lt;/P&gt;
&lt;P&gt;You can use the Network entity within query builder which provides you with pre build format in order to s&lt;SPAN&gt;earch network activity by IP address, port, host name, protocol, and more. In addition to network activity you can add acting process where you can define the Powershell parameters like command line, path, SHA256 etc in order to capture powershell details.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Apart from it you can take help from query library by searching for "upload" keyword. There are several prebuilt queries to detect data upload. You can take reference from them and build you own.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please click&amp;nbsp;&lt;STRONG&gt;Accept as Solution&lt;/STRONG&gt;&amp;nbsp;to acknowledge that the answer to your question has been provided.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 14:41:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-rule/m-p/572872#M5876</guid>
      <dc:creator>nsinghvirk</dc:creator>
      <dc:date>2024-01-12T14:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: BIOC rule</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-rule/m-p/573196#M5891</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/312460"&gt;@Anirudha_Jadhav&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please share the XQL query of the BIOC rule. You can get it by going to BIOC rule and then right click to &lt;STRONG&gt;Open in XQL&lt;/STRONG&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2024 14:58:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-rule/m-p/573196#M5891</guid>
      <dc:creator>nsinghvirk</dc:creator>
      <dc:date>2024-01-16T14:58:16Z</dc:date>
    </item>
  </channel>
</rss>

