<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: xql query for moved directory or folder in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-moved-directory-or-folder/m-p/1230670#M8360</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/280058"&gt;@Joe-Oberfoell&lt;/a&gt;&amp;nbsp;\,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The reason is,&amp;nbsp;&lt;STRONG data-start="271" data-end="333"&gt;Cortex XDR agent does &lt;EM data-start="295" data-end="300"&gt;not&lt;/EM&gt; collect all Windows Event Logs&lt;/STRONG&gt;. It only collects &lt;STRONG data-start="352" data-end="389"&gt;specific security-relevant events&lt;/STRONG&gt; as defined in the policy.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Endpoint-Data-Collection" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Endpoint-Data-Collection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To detect events based on the folder, you can&amp;nbsp;Ingest Event ID 4660 and 4663 into Cortex XDR.&lt;/P&gt;
&lt;H3 data-start="389" data-end="442"&gt;&lt;STRONG data-start="396" data-end="442"&gt;Use Broker VM + Log Forwarding App&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="443" data-end="513"&gt;This is the most effective and supported method by Palo Alto Networks.&lt;/P&gt;
&lt;OL data-start="530" data-end="1739"&gt;
&lt;LI data-start="530" data-end="813"&gt;
&lt;P data-start="533" data-end="571"&gt;&lt;STRONG data-start="533" data-end="571"&gt;Enable Audit Policies on Endpoints&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="575" data-end="813"&gt;
&lt;LI data-start="575" data-end="813"&gt;
&lt;P data-start="577" data-end="615"&gt;Enable object access auditing via GPO:&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre!"&gt;&lt;SPAN&gt;Computer &lt;SPAN class="hljs-keyword"&gt;Configuration&lt;/SPAN&gt; → Windows Settings → &lt;SPAN class="hljs-keyword"&gt;Security&lt;/SPAN&gt; Settings → Advanced Audit &lt;SPAN class="hljs-keyword"&gt;Policy&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;Configuration&lt;/SPAN&gt; → Audit Policies → &lt;SPAN class="hljs-keyword"&gt;Object&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;Access&lt;/SPAN&gt; → Audit File &lt;SPAN class="hljs-keyword"&gt;System&lt;/SPAN&gt; → Success &lt;SPAN class="hljs-keyword"&gt;and&lt;/SPAN&gt; Failure
&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="815" data-end="1084"&gt;
&lt;P data-start="818" data-end="854"&gt;&lt;STRONG data-start="818" data-end="854"&gt;Configure SACLs on the Folder(s)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="858" data-end="1084"&gt;
&lt;LI data-start="858" data-end="934"&gt;
&lt;P data-start="860" data-end="934"&gt;Right-click the folder → Properties → Security → Advanced → Auditing → Add&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="938" data-end="1028"&gt;
&lt;P data-start="940" data-end="1028"&gt;Choose the user/group, and select "Delete", "Delete Subfolders and Files", "Write", etc.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1032" data-end="1084"&gt;
&lt;P data-start="1034" data-end="1084"&gt;This ensures events like 4663 and 4660 are logged.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="1086" data-end="1432"&gt;
&lt;P data-start="1089" data-end="1120"&gt;&lt;STRONG data-start="1089" data-end="1120"&gt;Forward Logs to Cortex XDR:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="1124" data-end="1432"&gt;
&lt;LI data-start="1124" data-end="1189"&gt;
&lt;P data-start="1126" data-end="1189"&gt;Install &lt;STRONG data-start="1134" data-end="1147"&gt;Broker VM&lt;/STRONG&gt; and configure the &lt;STRONG data-start="1166" data-end="1188"&gt;Log Forwarding App&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1193" data-end="1310"&gt;
&lt;P data-start="1195" data-end="1310"&gt;Use &lt;STRONG data-start="1199" data-end="1233"&gt;Windows Event Forwarding (WEF)&lt;/STRONG&gt; or &lt;STRONG data-start="1237" data-end="1257"&gt;Winlogbeat/NXLog&lt;/STRONG&gt; to forward the &lt;STRONG data-start="1273" data-end="1295"&gt;Security Event Log&lt;/STRONG&gt; to the Broker.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1314" data-end="1369"&gt;
&lt;P data-start="1316" data-end="1369"&gt;The Broker forwards logs to the &lt;STRONG data-start="1348" data-end="1368"&gt;Cortex Data Lake&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Create a correlation rule to create detection&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you feel this has answered your query, please let us know by clicking like and&amp;nbsp; on "mark this as a Solution". Thank you.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 02 Jun 2025 07:47:06 GMT</pubDate>
    <dc:creator>aspatil</dc:creator>
    <dc:date>2025-06-02T07:47:06Z</dc:date>
    <item>
      <title>xql query for moved directory or folder</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-moved-directory-or-folder/m-p/1230266#M8355</link>
      <description>&lt;P&gt;There is a canned search for files but what about folders?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are trying to find out who is moving or deleting a folder, hoping Cortex has something to help. Thx&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 19:13:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-moved-directory-or-folder/m-p/1230266#M8355</guid>
      <dc:creator>Joe-Oberfoell</dc:creator>
      <dc:date>2025-05-28T19:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: xql query for moved directory or folder</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-moved-directory-or-folder/m-p/1230670#M8360</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/280058"&gt;@Joe-Oberfoell&lt;/a&gt;&amp;nbsp;\,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The reason is,&amp;nbsp;&lt;STRONG data-start="271" data-end="333"&gt;Cortex XDR agent does &lt;EM data-start="295" data-end="300"&gt;not&lt;/EM&gt; collect all Windows Event Logs&lt;/STRONG&gt;. It only collects &lt;STRONG data-start="352" data-end="389"&gt;specific security-relevant events&lt;/STRONG&gt; as defined in the policy.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Endpoint-Data-Collection" target="_blank"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Endpoint-Data-Collection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To detect events based on the folder, you can&amp;nbsp;Ingest Event ID 4660 and 4663 into Cortex XDR.&lt;/P&gt;
&lt;H3 data-start="389" data-end="442"&gt;&lt;STRONG data-start="396" data-end="442"&gt;Use Broker VM + Log Forwarding App&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P data-start="443" data-end="513"&gt;This is the most effective and supported method by Palo Alto Networks.&lt;/P&gt;
&lt;OL data-start="530" data-end="1739"&gt;
&lt;LI data-start="530" data-end="813"&gt;
&lt;P data-start="533" data-end="571"&gt;&lt;STRONG data-start="533" data-end="571"&gt;Enable Audit Policies on Endpoints&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="575" data-end="813"&gt;
&lt;LI data-start="575" data-end="813"&gt;
&lt;P data-start="577" data-end="615"&gt;Enable object access auditing via GPO:&lt;/P&gt;
&lt;DIV class="contain-inline-size rounded-md border-[0.5px] border-token-border-medium relative bg-token-sidebar-surface-primary"&gt;
&lt;DIV class="overflow-y-auto p-4" dir="ltr"&gt;&lt;CODE class="whitespace-pre!"&gt;&lt;SPAN&gt;Computer &lt;SPAN class="hljs-keyword"&gt;Configuration&lt;/SPAN&gt; → Windows Settings → &lt;SPAN class="hljs-keyword"&gt;Security&lt;/SPAN&gt; Settings → Advanced Audit &lt;SPAN class="hljs-keyword"&gt;Policy&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;Configuration&lt;/SPAN&gt; → Audit Policies → &lt;SPAN class="hljs-keyword"&gt;Object&lt;/SPAN&gt; &lt;SPAN class="hljs-keyword"&gt;Access&lt;/SPAN&gt; → Audit File &lt;SPAN class="hljs-keyword"&gt;System&lt;/SPAN&gt; → Success &lt;SPAN class="hljs-keyword"&gt;and&lt;/SPAN&gt; Failure
&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="815" data-end="1084"&gt;
&lt;P data-start="818" data-end="854"&gt;&lt;STRONG data-start="818" data-end="854"&gt;Configure SACLs on the Folder(s)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="858" data-end="1084"&gt;
&lt;LI data-start="858" data-end="934"&gt;
&lt;P data-start="860" data-end="934"&gt;Right-click the folder → Properties → Security → Advanced → Auditing → Add&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="938" data-end="1028"&gt;
&lt;P data-start="940" data-end="1028"&gt;Choose the user/group, and select "Delete", "Delete Subfolders and Files", "Write", etc.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1032" data-end="1084"&gt;
&lt;P data-start="1034" data-end="1084"&gt;This ensures events like 4663 and 4660 are logged.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="1086" data-end="1432"&gt;
&lt;P data-start="1089" data-end="1120"&gt;&lt;STRONG data-start="1089" data-end="1120"&gt;Forward Logs to Cortex XDR:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="1124" data-end="1432"&gt;
&lt;LI data-start="1124" data-end="1189"&gt;
&lt;P data-start="1126" data-end="1189"&gt;Install &lt;STRONG data-start="1134" data-end="1147"&gt;Broker VM&lt;/STRONG&gt; and configure the &lt;STRONG data-start="1166" data-end="1188"&gt;Log Forwarding App&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1193" data-end="1310"&gt;
&lt;P data-start="1195" data-end="1310"&gt;Use &lt;STRONG data-start="1199" data-end="1233"&gt;Windows Event Forwarding (WEF)&lt;/STRONG&gt; or &lt;STRONG data-start="1237" data-end="1257"&gt;Winlogbeat/NXLog&lt;/STRONG&gt; to forward the &lt;STRONG data-start="1273" data-end="1295"&gt;Security Event Log&lt;/STRONG&gt; to the Broker.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1314" data-end="1369"&gt;
&lt;P data-start="1316" data-end="1369"&gt;The Broker forwards logs to the &lt;STRONG data-start="1348" data-end="1368"&gt;Cortex Data Lake&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Create a correlation rule to create detection&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you feel this has answered your query, please let us know by clicking like and&amp;nbsp; on "mark this as a Solution". Thank you.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 07:47:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xql-query-for-moved-directory-or-folder/m-p/1230670#M8360</guid>
      <dc:creator>aspatil</dc:creator>
      <dc:date>2025-06-02T07:47:06Z</dc:date>
    </item>
  </channel>
</rss>

