<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CONTERX XDR Agent Brute-Force attack and NMAP scan detection. in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/conterx-xdr-agent-brute-force-attack-and-nmap-scan-detection/m-p/1086367#M7754</link>
    <description>&lt;P&gt;Thanks !&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt;&lt;SPAN&gt;Cortex XDR definitely has UEBA based capabilities and network traffic detection capabilities based on telemetry collection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Yes. It could be done via XQL queries with traffic and events patterns. It's not TRUE NIDS, but it it works.&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jan 2025 07:12:51 GMT</pubDate>
    <dc:creator>M.Sorokins</dc:creator>
    <dc:date>2025-01-16T07:12:51Z</dc:date>
    <item>
      <title>CONTERX XDR Agent Brute-Force attack and NMAP scan detection.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/conterx-xdr-agent-brute-force-attack-and-nmap-scan-detection/m-p/1066046#M7709</link>
      <description>&lt;P&gt;Hello !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible with CORTEX XDR Agent installed on Windows/Linux Server to detect:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- ssh/rdp/ftp and WEB apps brute force attack.&lt;/P&gt;
&lt;P&gt;-NMAP scans.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;
&lt;P&gt;Max&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2025 15:53:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/conterx-xdr-agent-brute-force-attack-and-nmap-scan-detection/m-p/1066046#M7709</guid>
      <dc:creator>M.Sorokins</dc:creator>
      <dc:date>2025-01-13T15:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: CONTERX XDR Agent Brute-Force attack and NMAP scan detection.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/conterx-xdr-agent-brute-force-attack-and-nmap-scan-detection/m-p/1085642#M7738</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1136172031"&gt;@M.Sorokins&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for writing to live community!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;While this forum is directed for cortex xdr related discussions, we do not have a specific capability endorsement or discussion that we generally cite. Cortex XDR definitely has UEBA based capabilities and network traffic detection capabilities based on telemetry collection. However, specific attack use cases require patterns and attack cycles which qualify as a MITRE ATT&amp;amp;CK lifecycle use case.&amp;nbsp; I would highly recommend reviewing this &lt;A href="https://www.google.com/search?q=cortex+xdr+analytics+alert+reference&amp;amp;oq=cortex+xdr+&amp;amp;gs_lcrp=EgZjaHJvbWUqBggAEEUYOzIGCAAQRRg7MgYIARBFGDsyBggCEEUYOzIGCAMQRRg5MgYIBBBFGDwyBggFEEUYPDIGCAYQRRhBMgYIBxBFGEHSAQgyMzM4ajBqMagCALACAA&amp;amp;sourceid=chrome&amp;amp;ie=UTF-8" target="_self"&gt;analytics reference&lt;/A&gt;&amp;nbsp;for detailed insights on detection rules and encourage testing the specific use cases for validation.&lt;/P&gt;
&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-unlink="true"&gt;Hope this helps&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2025 16:40:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/conterx-xdr-agent-brute-force-attack-and-nmap-scan-detection/m-p/1085642#M7738</guid>
      <dc:creator>neelrohit</dc:creator>
      <dc:date>2025-01-15T16:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: CONTERX XDR Agent Brute-Force attack and NMAP scan detection.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/conterx-xdr-agent-brute-force-attack-and-nmap-scan-detection/m-p/1086367#M7754</link>
      <description>&lt;P&gt;Thanks !&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt;&lt;SPAN&gt;Cortex XDR definitely has UEBA based capabilities and network traffic detection capabilities based on telemetry collection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Yes. It could be done via XQL queries with traffic and events patterns. It's not TRUE NIDS, but it it works.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 07:12:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/conterx-xdr-agent-brute-force-attack-and-nmap-scan-detection/m-p/1086367#M7754</guid>
      <dc:creator>M.Sorokins</dc:creator>
      <dc:date>2025-01-16T07:12:51Z</dc:date>
    </item>
  </channel>
</rss>

