<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat Hunting Scenerios in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/threat-hunting-scenerios/m-p/574089#M5933</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/336866"&gt;@Kelvin_Ng&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reaching out on LiveCommunity!&lt;/P&gt;
&lt;P&gt;Apologies for delayed response. Below are the answers to your queries.&lt;/P&gt;
&lt;P&gt;1. In order to identify the user as administrator we need the AD group information. We can build query to look for login events (e.g. Event id. 4624) and then correlate these events with group information to find out whether the user was an admin on not. If you are using Cloud Identity Engine then you can use&amp;nbsp;pan_dss_raw&amp;nbsp; dataset to query AD data.&lt;/P&gt;
&lt;P&gt;Reference-&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Set-Up-Cloud-Identity-Engine" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Set-Up-Cloud-Identity-Engine&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;2. Window has different event IDs for various services start and stop status. I have used the 5025 event id for window firewall service being stopped and built below query which also checks the status of endpoint. You can modify below query according to your use case.&lt;/P&gt;
&lt;P&gt;dataset = xdr_data &lt;BR /&gt;| filter action_evtlog_event_id = 5025 //Event id for firewall service being stopped.&lt;BR /&gt;| join (dataset=endpoints | filter endpoint_status = CONNECTED | fields endpoint_status , endpoint_name , operational_status ) as ep ep.endpoint_name = agent_hostname &lt;BR /&gt;| fields action_evtlog_event_id , action_evtlog_message , endpoint_name , operational_status , endpoint_status&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Regarding endpoint status change, I have built below query which check for endpoint status being changed from Protected.&lt;/P&gt;
&lt;P&gt;dataset=endpoints &lt;BR /&gt;| filter (operational_status != PROTECTED) &lt;BR /&gt;| fields endpoint_name , operational_status , endpoint_status , operating_system&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope these queries will help you to create your own based on use case. Please c&lt;SPAN&gt;lick&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Accept as Solution&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to acknowledge that the answer to your question has been provided.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Jan 2024 13:50:49 GMT</pubDate>
    <dc:creator>nsinghvirk</dc:creator>
    <dc:date>2024-01-23T13:50:49Z</dc:date>
    <item>
      <title>Threat Hunting Scenerios</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/threat-hunting-scenerios/m-p/572808#M5892</link>
      <description>&lt;P&gt;I would like to set the alert to detect the following scenerios&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I config the XQL/Query in BIOC to detect: &lt;LI-PRODUCT title="Cortex XDR" id="Cortex_XDR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Login of local admin user (user with local administrators privilege)&lt;/LI&gt;
&lt;LI&gt;Stop of a windows service e.g “abc.exe” while the endpoint can still be ping or alive&lt;/LI&gt;
&lt;LI&gt;Change the status of Cortex Agent, e.g. from protected to unprotected&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 02:22:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/threat-hunting-scenerios/m-p/572808#M5892</guid>
      <dc:creator>Kelvin_Ng</dc:creator>
      <dc:date>2024-01-12T02:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: Threat Hunting Scenerios</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/threat-hunting-scenerios/m-p/574089#M5933</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/336866"&gt;@Kelvin_Ng&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reaching out on LiveCommunity!&lt;/P&gt;
&lt;P&gt;Apologies for delayed response. Below are the answers to your queries.&lt;/P&gt;
&lt;P&gt;1. In order to identify the user as administrator we need the AD group information. We can build query to look for login events (e.g. Event id. 4624) and then correlate these events with group information to find out whether the user was an admin on not. If you are using Cloud Identity Engine then you can use&amp;nbsp;pan_dss_raw&amp;nbsp; dataset to query AD data.&lt;/P&gt;
&lt;P&gt;Reference-&amp;nbsp;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Set-Up-Cloud-Identity-Engine" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Set-Up-Cloud-Identity-Engine&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;2. Window has different event IDs for various services start and stop status. I have used the 5025 event id for window firewall service being stopped and built below query which also checks the status of endpoint. You can modify below query according to your use case.&lt;/P&gt;
&lt;P&gt;dataset = xdr_data &lt;BR /&gt;| filter action_evtlog_event_id = 5025 //Event id for firewall service being stopped.&lt;BR /&gt;| join (dataset=endpoints | filter endpoint_status = CONNECTED | fields endpoint_status , endpoint_name , operational_status ) as ep ep.endpoint_name = agent_hostname &lt;BR /&gt;| fields action_evtlog_event_id , action_evtlog_message , endpoint_name , operational_status , endpoint_status&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. Regarding endpoint status change, I have built below query which check for endpoint status being changed from Protected.&lt;/P&gt;
&lt;P&gt;dataset=endpoints &lt;BR /&gt;| filter (operational_status != PROTECTED) &lt;BR /&gt;| fields endpoint_name , operational_status , endpoint_status , operating_system&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope these queries will help you to create your own based on use case. Please c&lt;SPAN&gt;lick&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Accept as Solution&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to acknowledge that the answer to your question has been provided.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 13:50:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/threat-hunting-scenerios/m-p/574089#M5933</guid>
      <dc:creator>nsinghvirk</dc:creator>
      <dc:date>2024-01-23T13:50:49Z</dc:date>
    </item>
  </channel>
</rss>

