<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Proofpoint TAP Integration - XQL Query Help in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/proofpoint-tap-integration-xql-query-help/m-p/587126#M6685</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;While I don't have specific experience with PP TAP integration and XQL queries, it's theoretically possible to identify potential malicious emails that users interacted with by analyzing the logs from PP TAP. One approach could involve creating XQL queries to search for patterns or indicators of malicious activity, such as URLs or domains associated with known threats. You could also look for anomalies in email behavior, such as a&amp;nbsp;&lt;A href="https://www.mgh-patientgateway.com" target="_self"&gt;mass general patient portal&lt;/A&gt; sudden increase in email clicks or interactions with suspicious content. Additionally, leveraging PP TAP's sandboxing data to correlate email interactions with later determinations of maliciousness could help identify potentially compromised emails. However, implementing such queries would depend on the specific logging capabilities and data schema provided by PP TAP, as well as your organization's policies and requirements for detecting and mitigating email threats. Consulting with security experts or leveraging community resources for XQL query examples related to email security may also be beneficial in this context.&lt;/P&gt;</description>
    <pubDate>Mon, 20 May 2024 05:07:15 GMT</pubDate>
    <dc:creator>david2658</dc:creator>
    <dc:date>2024-05-20T05:07:15Z</dc:date>
    <item>
      <title>Proofpoint TAP Integration - XQL Query Help</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/proofpoint-tap-integration-xql-query-help/m-p/587068#M6684</link>
      <description>&lt;P&gt;Has anyone worked with PP TAP integration and creating any useful XQL queries to help identify potential malicious mail that a user interacts with?&amp;nbsp; As example:&lt;BR /&gt;Email was not determined "bad" initially but after some sandbox from PP, it is later classified as "bad" and is blocked.&amp;nbsp; Before that scenario took place, there is potential for one or more users who clicked on the "bad link" from the email.&amp;nbsp; Is there any way to surface that via XQL query since we're ingesting those logs from PP?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 00:57:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/proofpoint-tap-integration-xql-query-help/m-p/587068#M6684</guid>
      <dc:creator>Marc_Denman</dc:creator>
      <dc:date>2024-05-17T00:57:32Z</dc:date>
    </item>
    <item>
      <title>Re: Proofpoint TAP Integration - XQL Query Help</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/proofpoint-tap-integration-xql-query-help/m-p/587126#M6685</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;While I don't have specific experience with PP TAP integration and XQL queries, it's theoretically possible to identify potential malicious emails that users interacted with by analyzing the logs from PP TAP. One approach could involve creating XQL queries to search for patterns or indicators of malicious activity, such as URLs or domains associated with known threats. You could also look for anomalies in email behavior, such as a&amp;nbsp;&lt;A href="https://www.mgh-patientgateway.com" target="_self"&gt;mass general patient portal&lt;/A&gt; sudden increase in email clicks or interactions with suspicious content. Additionally, leveraging PP TAP's sandboxing data to correlate email interactions with later determinations of maliciousness could help identify potentially compromised emails. However, implementing such queries would depend on the specific logging capabilities and data schema provided by PP TAP, as well as your organization's policies and requirements for detecting and mitigating email threats. Consulting with security experts or leveraging community resources for XQL query examples related to email security may also be beneficial in this context.&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 05:07:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/proofpoint-tap-integration-xql-query-help/m-p/587126#M6685</guid>
      <dc:creator>david2658</dc:creator>
      <dc:date>2024-05-20T05:07:15Z</dc:date>
    </item>
    <item>
      <title>Re: Proofpoint TAP Integration - XQL Query Help</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/proofpoint-tap-integration-xql-query-help/m-p/587291#M6708</link>
      <description>&lt;P&gt;Thanks for the response.&amp;nbsp; All makes sense.&amp;nbsp; I guess I was hoping I might find some example XQL queries that others have used with the Proofpoint TAP log integration to get me started in the proper direction.&amp;nbsp; &amp;nbsp;Perhaps I will just dig more and have to experiment with those logs to see what may (may not) be useful in surfacing evidence in the example scenario in original post.&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 14:16:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/proofpoint-tap-integration-xql-query-help/m-p/587291#M6708</guid>
      <dc:creator>Marc_Denman</dc:creator>
      <dc:date>2024-05-20T14:16:37Z</dc:date>
    </item>
  </channel>
</rss>

