<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: create a tag in fireall in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-a-tag-in-fireall/m-p/581497#M6398</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/262549"&gt;@RajeshPremSingh&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It depends upon the scenario which model make of firewalls are you onboarding the data from? Every firewall that you onboard the data from has a firewall serial number, or device Id or device serial number which is part of the logs collected via broker vm and this can be used for investigation purposes in your causality of alert contexts. You should be able to trace it out from your firewall alerts or from XQLs as part of the raw logs and events.&lt;/P&gt;
&lt;P&gt;Circling back to your queries:&lt;/P&gt;
&lt;P&gt;1. No, Serial numbers/ firewall device name/ firewall device Id should help&lt;/P&gt;
&lt;P&gt;2. No, because broker vm is&amp;nbsp; not a context to that alert generation, rather it is a source, you can however, get collector IP address from XQL and events as part of the threat investigation efforts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please mark the response as "Accept as Solution" if it answers your query&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 25 Mar 2024 08:11:48 GMT</pubDate>
    <dc:creator>neelrohit</dc:creator>
    <dc:date>2024-03-25T08:11:48Z</dc:date>
    <item>
      <title>create a tag in fireall</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-a-tag-in-fireall/m-p/581455#M6396</link>
      <description>&lt;P&gt;"Hi,&lt;/P&gt;
&lt;P&gt;We have multiple VM brokers, each connected to the same model of firewall. However, in a recent incident, it was difficult to identify the source of the incident from which the firewall it originated. We're exploring two potential solutions:&lt;/P&gt;
&lt;P&gt;1. Is there a method to create tags on the firewall to distinguish the source?&lt;BR /&gt;2. Alternatively, is there a way to obtain the source broker VM name in the incident alert?&lt;/P&gt;
&lt;P&gt;Any insights or guidance on these options would be greatly appreciated. Thank you!"&lt;/P&gt;</description>
      <pubDate>Sat, 23 Mar 2024 13:13:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-a-tag-in-fireall/m-p/581455#M6396</guid>
      <dc:creator>RajeshPremSingh</dc:creator>
      <dc:date>2024-03-23T13:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: create a tag in fireall</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-a-tag-in-fireall/m-p/581497#M6398</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/262549"&gt;@RajeshPremSingh&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It depends upon the scenario which model make of firewalls are you onboarding the data from? Every firewall that you onboard the data from has a firewall serial number, or device Id or device serial number which is part of the logs collected via broker vm and this can be used for investigation purposes in your causality of alert contexts. You should be able to trace it out from your firewall alerts or from XQLs as part of the raw logs and events.&lt;/P&gt;
&lt;P&gt;Circling back to your queries:&lt;/P&gt;
&lt;P&gt;1. No, Serial numbers/ firewall device name/ firewall device Id should help&lt;/P&gt;
&lt;P&gt;2. No, because broker vm is&amp;nbsp; not a context to that alert generation, rather it is a source, you can however, get collector IP address from XQL and events as part of the threat investigation efforts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please mark the response as "Accept as Solution" if it answers your query&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2024 08:11:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-a-tag-in-fireall/m-p/581497#M6398</guid>
      <dc:creator>neelrohit</dc:creator>
      <dc:date>2024-03-25T08:11:48Z</dc:date>
    </item>
  </channel>
</rss>

