<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cortex Components in plain english / non-secops terms in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-components-in-plain-english-non-secops-terms/m-p/409332#M769</link>
    <description>&lt;DIV&gt;In a lot of conversations recently I've found that many, many people are confused by the names and functions of Cortex - especially given the rapid expansion of the platform. In this post I'm going to try to distill the basics of each product with as little jargon as I can and help people figure out which things they are and are not looking for from the platform.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;"Cortex"&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&amp;gt; name of the overall product platform for enabling Security Operations teams, technologies, and workflows. All other components referenced below are a part of this platform&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex XDR Prevent&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&amp;gt; Endpoint Protection agent. Table of capabilities&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-prevent-admin/endpoint-security/endpoint-protection-capabilities.html#id17CRA030DMY" target="_blank" rel="noopener"&gt;here&lt;/A&gt;. Modules and OS coverage&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-prevent-admin/endpoint-security/endpoint-protection-modules.html" target="_blank" rel="noopener"&gt;here.&lt;/A&gt;&amp;nbsp;This solution is designed to protect endpoints from various types of compromise and builds upon the concepts of Anti-Virus and NGAV that the industry have leveraged for years. This includes, but is not limited to, the protections of our legacy endpoint protection tool "Traps"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex XDR Pro (for endpoint)&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;-&amp;gt; same agent as above, but with &lt;A href="https://www.paloaltonetworks.com/cyberpedia/what-is-a-edr-platform" target="_self"&gt;EDR&lt;/A&gt; functionality enabled. EDR gathers important forensic data from endpoints and feeds into the combined Cortex platform (&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/cortex-xdr-overview/cortex-xdr-architecture.html#idfd151930-a9a2-4124-ad5d-0a61c3c9315d" target="_blank" rel="noopener"&gt;architecture described here&lt;/A&gt;) to allow Palo Alto Networks to detect many more types of threats in your environment. Detection coverage discussed within our docs&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/analytics-alerts-by-required-data-source.html" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&amp;nbsp;(see sections that include 'XDR agent' as data sources) as well as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/blog/2021/04/mitre-round-3-protecting-against-carbanak/" target="_blank" rel="noopener"&gt;analyzed by MITRE,&lt;/A&gt;&amp;nbsp;a 3rd party organization.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex XDR Pro (per TB)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&amp;gt; same Cortex platform for analytics and threat detection, but augmenting the EDR data set with Firewall logs and 3rd party data. See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/analytics-alerts-by-required-data-source.html" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&amp;nbsp;to understand use case coverage (all sections that do not require the XDR agent can be accomplished with this license alone).&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex XSOAR&lt;/STRONG&gt;&amp;nbsp;-&amp;gt; Orchestration and Automation platform for designing, documenting, and automating security and incident response workflows. Some top use cases are referenced&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xsoar/5-5/cortex-xsoar-admin/cortex-xsoar-overview/use-cases.html" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex Xpanse&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;-&amp;gt; discover your attack surface&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/cortex/cortex-xpanse" target="_blank" rel="noopener"&gt;from the outside / attacker perspective. &lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;This has many, many applications. For example, when acquiring or merging with another business it can allow you to do strong due diligence on their security posture before your unify your organizations or complete a purchase.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Or when a new vulnerability is released such as &lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21985" target="_self"&gt;CVE-2021-21985&lt;/A&gt;&amp;nbsp;and &lt;A href="https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/?comments=1" target="_self"&gt;Ars Technica writes that Shodan has already discovered 5K vulnerable servers on the internet&lt;/A&gt;&amp;nbsp;on the same day, you might be thinking 'uh oh, is one of them ours? do we need to go into full incident response mode?". Normally you'd go try to pull some asset inventory or something to figure it out, but hey maybe someone spun up something you didn't know about in an IaaS provider and it isn't encompassed in there. That's stressful ... well XPanse, by scanning the whole internet, would be able to tell you if you needed to get to work ASAP or if you can sit this one out!&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Wed, 26 May 2021 21:21:19 GMT</pubDate>
    <dc:creator>KPawlak</dc:creator>
    <dc:date>2021-05-26T21:21:19Z</dc:date>
    <item>
      <title>Cortex Components in plain english / non-secops terms</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-components-in-plain-english-non-secops-terms/m-p/409332#M769</link>
      <description>&lt;DIV&gt;In a lot of conversations recently I've found that many, many people are confused by the names and functions of Cortex - especially given the rapid expansion of the platform. In this post I'm going to try to distill the basics of each product with as little jargon as I can and help people figure out which things they are and are not looking for from the platform.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;"Cortex"&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&amp;gt; name of the overall product platform for enabling Security Operations teams, technologies, and workflows. All other components referenced below are a part of this platform&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex XDR Prevent&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&amp;gt; Endpoint Protection agent. Table of capabilities&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-prevent-admin/endpoint-security/endpoint-protection-capabilities.html#id17CRA030DMY" target="_blank" rel="noopener"&gt;here&lt;/A&gt;. Modules and OS coverage&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-prevent-admin/endpoint-security/endpoint-protection-modules.html" target="_blank" rel="noopener"&gt;here.&lt;/A&gt;&amp;nbsp;This solution is designed to protect endpoints from various types of compromise and builds upon the concepts of Anti-Virus and NGAV that the industry have leveraged for years. This includes, but is not limited to, the protections of our legacy endpoint protection tool "Traps"&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex XDR Pro (for endpoint)&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;-&amp;gt; same agent as above, but with &lt;A href="https://www.paloaltonetworks.com/cyberpedia/what-is-a-edr-platform" target="_self"&gt;EDR&lt;/A&gt; functionality enabled. EDR gathers important forensic data from endpoints and feeds into the combined Cortex platform (&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/cortex-xdr-overview/cortex-xdr-architecture.html#idfd151930-a9a2-4124-ad5d-0a61c3c9315d" target="_blank" rel="noopener"&gt;architecture described here&lt;/A&gt;) to allow Palo Alto Networks to detect many more types of threats in your environment. Detection coverage discussed within our docs&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/analytics-alerts-by-required-data-source.html" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&amp;nbsp;(see sections that include 'XDR agent' as data sources) as well as&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/blog/2021/04/mitre-round-3-protecting-against-carbanak/" target="_blank" rel="noopener"&gt;analyzed by MITRE,&lt;/A&gt;&amp;nbsp;a 3rd party organization.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex XDR Pro (per TB)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;-&amp;gt; same Cortex platform for analytics and threat detection, but augmenting the EDR data set with Firewall logs and 3rd party data. See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-analytics-alert-reference/cortex-xdr-analytics-alert-reference/analytics-alerts-by-required-data-source.html" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&amp;nbsp;to understand use case coverage (all sections that do not require the XDR agent can be accomplished with this license alone).&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex XSOAR&lt;/STRONG&gt;&amp;nbsp;-&amp;gt; Orchestration and Automation platform for designing, documenting, and automating security and incident response workflows. Some top use cases are referenced&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xsoar/5-5/cortex-xsoar-admin/cortex-xsoar-overview/use-cases.html" target="_blank" rel="noopener"&gt;here&lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Cortex Xpanse&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;-&amp;gt; discover your attack surface&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/cortex/cortex-xpanse" target="_blank" rel="noopener"&gt;from the outside / attacker perspective. &lt;/A&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;This has many, many applications. For example, when acquiring or merging with another business it can allow you to do strong due diligence on their security posture before your unify your organizations or complete a purchase.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Or when a new vulnerability is released such as &lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21985" target="_self"&gt;CVE-2021-21985&lt;/A&gt;&amp;nbsp;and &lt;A href="https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/?comments=1" target="_self"&gt;Ars Technica writes that Shodan has already discovered 5K vulnerable servers on the internet&lt;/A&gt;&amp;nbsp;on the same day, you might be thinking 'uh oh, is one of them ours? do we need to go into full incident response mode?". Normally you'd go try to pull some asset inventory or something to figure it out, but hey maybe someone spun up something you didn't know about in an IaaS provider and it isn't encompassed in there. That's stressful ... well XPanse, by scanning the whole internet, would be able to tell you if you needed to get to work ASAP or if you can sit this one out!&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 26 May 2021 21:21:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-components-in-plain-english-non-secops-terms/m-p/409332#M769</guid>
      <dc:creator>KPawlak</dc:creator>
      <dc:date>2021-05-26T21:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex Components in plain english / non-secops terms</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-components-in-plain-english-non-secops-terms/m-p/420901#M878</link>
      <description>&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 22:41:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-components-in-plain-english-non-secops-terms/m-p/420901#M878</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-07-20T22:41:09Z</dc:date>
    </item>
  </channel>
</rss>

