<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to pick up the trail when it stops at the domain controller? in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/how-to-pick-up-the-trail-when-it-stops-at-the-domain-controller/m-p/582678#M6461</link>
    <description>&lt;P&gt;Hello Community!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Situation: We are seeing XDR incidents where NGFW detects something trying to reach out to malicious websites. This is automatically mitigated by dropping the connection on both ends, as it should. &lt;STRONG&gt;However, it seems this results in no causality chain&lt;/STRONG&gt;. The source shows the domain controller involved, but that's not the actual origin of the request.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas on how to query for more information that will lead us to what attempted to reach said malicious site? &lt;BR /&gt;&lt;BR /&gt;I'm fairly new to building XDR queries but have tried exploring datasets and trying to correlate the alert times stamps to other events/host network connections on the domain controller.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Example alert desc: "'generic:sussybadsite.bad along with 3 other alerts generated by PAN NGFW detected on host zdomainctrl1"&lt;BR /&gt;&lt;BR /&gt;We get a couple duplicate incidents per day and I'm burning with curiosity as what keeps attempting to reach out. Any and all thoughts/suggestions are most welcome!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Apr 2024 17:28:00 GMT</pubDate>
    <dc:creator>JacobYonkman</dc:creator>
    <dc:date>2024-04-04T17:28:00Z</dc:date>
    <item>
      <title>How to pick up the trail when it stops at the domain controller?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/how-to-pick-up-the-trail-when-it-stops-at-the-domain-controller/m-p/582678#M6461</link>
      <description>&lt;P&gt;Hello Community!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Situation: We are seeing XDR incidents where NGFW detects something trying to reach out to malicious websites. This is automatically mitigated by dropping the connection on both ends, as it should. &lt;STRONG&gt;However, it seems this results in no causality chain&lt;/STRONG&gt;. The source shows the domain controller involved, but that's not the actual origin of the request.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas on how to query for more information that will lead us to what attempted to reach said malicious site? &lt;BR /&gt;&lt;BR /&gt;I'm fairly new to building XDR queries but have tried exploring datasets and trying to correlate the alert times stamps to other events/host network connections on the domain controller.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Example alert desc: "'generic:sussybadsite.bad along with 3 other alerts generated by PAN NGFW detected on host zdomainctrl1"&lt;BR /&gt;&lt;BR /&gt;We get a couple duplicate incidents per day and I'm burning with curiosity as what keeps attempting to reach out. Any and all thoughts/suggestions are most welcome!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2024 17:28:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/how-to-pick-up-the-trail-when-it-stops-at-the-domain-controller/m-p/582678#M6461</guid>
      <dc:creator>JacobYonkman</dc:creator>
      <dc:date>2024-04-04T17:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to pick up the trail when it stops at the domain controller?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/how-to-pick-up-the-trail-when-it-stops-at-the-domain-controller/m-p/582767#M6462</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/325621"&gt;@JacobYonkman&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Before we dive into XQL query/investigation. It's better to understand how's the infrastructure being setup.&lt;/P&gt;
&lt;P&gt;Questions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Is your Domain Controller work as a DNS server&lt;/LI&gt;
&lt;LI&gt;Did the NGFW enable DNS sinkhole?&lt;/LI&gt;
&lt;LI&gt;Do all of your endpoints install with Cortex XDR agent?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Apart from Question 3, the investigation needs to be carry out from NGFW.&lt;/P&gt;
&lt;P&gt;Here's an article of DNSSinkhole that might help you identify the source that attempted to access a malicious website.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/use-dns-queries-to-identify-infected-hosts-on-the-network/dns-sinkholing" target="_blank"&gt;How DNS Sinkholing Works (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2024 08:38:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/how-to-pick-up-the-trail-when-it-stops-at-the-domain-controller/m-p/582767#M6462</guid>
      <dc:creator>Antony_Chan</dc:creator>
      <dc:date>2024-04-05T08:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to pick up the trail when it stops at the domain controller?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/how-to-pick-up-the-trail-when-it-stops-at-the-domain-controller/m-p/582805#M6467</link>
      <description>&lt;P&gt;Hello Antony!&lt;BR /&gt;The article is definitely helpful. &lt;BR /&gt;1. No &lt;BR /&gt;2. Yes &lt;BR /&gt;3. Yes. MOST endpoints have the XDR agent. (There is also a chance people are plugging personal devices into endpoints for charging, which naturally will not have any agents installed)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2024 15:47:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/how-to-pick-up-the-trail-when-it-stops-at-the-domain-controller/m-p/582805#M6467</guid>
      <dc:creator>JacobYonkman</dc:creator>
      <dc:date>2024-04-05T15:47:46Z</dc:date>
    </item>
  </channel>
</rss>

