<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Solution: How To View Cortex XDR Behavioral Threat Protection (BTP) Rules in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/405048#M711</link>
    <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have, many times, received alerts with cryptic names like heuristic.agb.4477 or&amp;nbsp;heuristic.b.346. Imho, creating a support case and waiting for a response is inefficient. Also, expecting us to blindly accept the support engineer response on whether that is a FP or not is not acceptable. Additionally, sometimes, we work with developers and our in-house applications get flagged. We can't advice developers on how to alter the behavior of their applications if we don't have enough information. Further, in our experience, support is not always as useful as expected. Sometimes the support engineer answer is more cryptic than the alert itself. Sometimes, explaining the issue takes too much back-and-forth discussions that take too much time and effort.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore, we digged a bit deeper into the logs and found out that we can read for ourselves what these cryptic names mean. To find out, download the alert data to your machine, then open the file &lt;EM&gt;&lt;STRONG&gt;Logs\trapsd.log.&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;In that file, search for the cryptic alert name and you will be able to read the description of what it means. For example, one alert had the following description&lt;/P&gt;&lt;P&gt;&lt;EM&gt;a heuristic behavior that process created an exe file inside a system directory which isn't a subdir,copied itself,process relaunched itself,unsigned process was created,process launched external cmd.&amp;nbsp;&lt;/EM&gt;Another alert meant "&lt;EM&gt;suspicious Powershell AMSI string&lt;/EM&gt;", and so on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are considering making our own internal DB of these descriptions so investigators can immediately take action, instead of waiting for PAN support responses.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am sharing this with the community because I saw multiple questions about this and most answers were a variation of "talk to support".&lt;/P&gt;</description>
    <pubDate>Wed, 05 May 2021 22:24:28 GMT</pubDate>
    <dc:creator>YAlhazmi</dc:creator>
    <dc:date>2021-05-05T22:24:28Z</dc:date>
    <item>
      <title>Solution: How To View Cortex XDR Behavioral Threat Protection (BTP) Rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/405048#M711</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have, many times, received alerts with cryptic names like heuristic.agb.4477 or&amp;nbsp;heuristic.b.346. Imho, creating a support case and waiting for a response is inefficient. Also, expecting us to blindly accept the support engineer response on whether that is a FP or not is not acceptable. Additionally, sometimes, we work with developers and our in-house applications get flagged. We can't advice developers on how to alter the behavior of their applications if we don't have enough information. Further, in our experience, support is not always as useful as expected. Sometimes the support engineer answer is more cryptic than the alert itself. Sometimes, explaining the issue takes too much back-and-forth discussions that take too much time and effort.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Therefore, we digged a bit deeper into the logs and found out that we can read for ourselves what these cryptic names mean. To find out, download the alert data to your machine, then open the file &lt;EM&gt;&lt;STRONG&gt;Logs\trapsd.log.&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;In that file, search for the cryptic alert name and you will be able to read the description of what it means. For example, one alert had the following description&lt;/P&gt;&lt;P&gt;&lt;EM&gt;a heuristic behavior that process created an exe file inside a system directory which isn't a subdir,copied itself,process relaunched itself,unsigned process was created,process launched external cmd.&amp;nbsp;&lt;/EM&gt;Another alert meant "&lt;EM&gt;suspicious Powershell AMSI string&lt;/EM&gt;", and so on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are considering making our own internal DB of these descriptions so investigators can immediately take action, instead of waiting for PAN support responses.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am sharing this with the community because I saw multiple questions about this and most answers were a variation of "talk to support".&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 22:24:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/405048#M711</guid>
      <dc:creator>YAlhazmi</dc:creator>
      <dc:date>2021-05-05T22:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Solution: How To View Cortex XDR Behavioral Threat Protection (BTP) Rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/406008#M730</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/168587"&gt;@YAlhazmi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My name is Or from the XDR product management team.&lt;/P&gt;&lt;P&gt;It's actually available in the UI too with a lot more data.&lt;/P&gt;&lt;P&gt;Click on the alert icon on top of the process and scroll down.&lt;/P&gt;&lt;P&gt;The text you saw is a join of all the 'behavior description', and you also have two more useful things - MITRE tags and the actual description per behavior we saw (hover over the description field, text is a bit log there).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ocohen_0-1620728101946.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33754i10A14185AF0A3122/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ocohen_0-1620728101946.png" alt="ocohen_0-1620728101946.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If you have any additional questions please feel free to ping me ocohen@paloaltonetworks.com&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or.&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 10:15:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/406008#M730</guid>
      <dc:creator>ocohen</dc:creator>
      <dc:date>2021-05-11T10:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Solution: How To View Cortex XDR Behavioral Threat Protection (BTP) Rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/406118#M731</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/173355"&gt;@ocohen&lt;/a&gt;&amp;nbsp; are there times where perhaps the section you show where MITRE items would not show for a BTP?&lt;BR /&gt;On a Behavioral Threat I am seeing recently (Behavioral threat detected (rule: heuristic.agb.5637)) I am not seeing the "MITRE Attack" section of the blackbar your reflecting here.&amp;nbsp; Only the first two rows.&amp;nbsp; Am I just not clicking the right area perhaps?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KRisselada_1-1620748347017.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33765i50DB134AA397E2BD/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="KRisselada_1-1620748347017.png" alt="KRisselada_1-1620748347017.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Running on Cortex XDR V2.8&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 15:53:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/406118#M731</guid>
      <dc:creator>KRisselada</dc:creator>
      <dc:date>2021-05-11T15:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: Solution: How To View Cortex XDR Behavioral Threat Protection (BTP) Rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/406237#M732</link>
      <description>&lt;P&gt;while not all BTP alerts have mitre tags (yet), you can check by clicking on this button on the right side&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ocohen_0-1620768390656.png" style="width: 902px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33780iB5D4A1268E0F527F/image-dimensions/902x102/is-moderation-mode/true?v=v2" width="902" height="102" role="button" title="ocohen_0-1620768390656.png" alt="ocohen_0-1620768390656.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 21:26:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/406237#M732</guid>
      <dc:creator>ocohen</dc:creator>
      <dc:date>2021-05-11T21:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: Solution: How To View Cortex XDR Behavioral Threat Protection (BTP) Rules</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/514483#M2803</link>
      <description>&lt;P&gt;Is there a list of these published somewhere? With Analytics, Analytics BIOC, and BIOCs there are published lists that enable us to pre-classify the alerts in XSOAR. So far I have not found a list of BTP rules which has caused some FP or FN when choosing to automatically isolate via XSOAR because we don't know ahead of time what rules are going to come through.&lt;BR /&gt;&lt;BR /&gt;For example, there are BIOCs for DCSync attacks which trigger isolation but there is also at least one BTP rule for DCSync which we did not know about so isolation was not activated.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Sep 2022 22:05:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/solution-how-to-view-cortex-xdr-behavioral-threat-protection-btp/m-p/514483#M2803</guid>
      <dc:creator>ShubinBradley</dc:creator>
      <dc:date>2022-09-09T22:05:26Z</dc:date>
    </item>
  </channel>
</rss>

