<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Create Alert from Data Lookup in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-alert-from-data-lookup/m-p/1234307#M8565</link>
    <description>&lt;P&gt;Hello G.Anshar,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lookup dataset is not eligible to create BIOC on them. You can create correlation rules for the lookup data and please note that this is not normalised data so it does not qualify for stitching or log aggregation. Hence, malicious file detection cannot happen around the same, unless your lookup dataset has a field that classifies a specific log containing a filename or a file hash or any prooperty of file as malicious. This value can be filtered as a search criteria for your correlation rule and then you can query it. But since this is not a streaming data, alert generation is not possible.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to stream data from Qradar into Cortex XDR, you should have the Pro per GB license to ingest data to be streamed(1), the correlation rules written on that data finding the desired value/log(2), then the alerts/incidets being triggered(3).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wonder why you want to raise an alert when a malicious file is attempted to be opened through querying a lookup dataset and BIOC rules if this is done already natively by the Cortex XDR agent and this should happen ideally on the basis of any logs being sent by the endpoints using Cortex XDR agent(only).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Hope this suffices your query. Feel free to mark the response as "Äccepted as Solution" if it answered your query.&lt;/P&gt;</description>
    <pubDate>Fri, 18 Jul 2025 13:08:30 GMT</pubDate>
    <dc:creator>eluis</dc:creator>
    <dc:date>2025-07-18T13:08:30Z</dc:date>
    <item>
      <title>Create Alert from Data Lookup</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-alert-from-data-lookup/m-p/1234280#M8563</link>
      <description>&lt;P&gt;Hello everyone,&lt;BR data-start="128" data-end="131" /&gt;I have a reference dataset from IBM QRadar that I’ve stored as a lookup dataset. My goal is to create an alert if a malicious file is downloaded or opened. How can I achieve this or is it possible using BIOC?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2025 03:38:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-alert-from-data-lookup/m-p/1234280#M8563</guid>
      <dc:creator>G.Anshar</dc:creator>
      <dc:date>2025-07-18T03:38:16Z</dc:date>
    </item>
    <item>
      <title>Re: Create Alert from Data Lookup</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-alert-from-data-lookup/m-p/1234307#M8565</link>
      <description>&lt;P&gt;Hello G.Anshar,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lookup dataset is not eligible to create BIOC on them. You can create correlation rules for the lookup data and please note that this is not normalised data so it does not qualify for stitching or log aggregation. Hence, malicious file detection cannot happen around the same, unless your lookup dataset has a field that classifies a specific log containing a filename or a file hash or any prooperty of file as malicious. This value can be filtered as a search criteria for your correlation rule and then you can query it. But since this is not a streaming data, alert generation is not possible.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to stream data from Qradar into Cortex XDR, you should have the Pro per GB license to ingest data to be streamed(1), the correlation rules written on that data finding the desired value/log(2), then the alerts/incidets being triggered(3).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wonder why you want to raise an alert when a malicious file is attempted to be opened through querying a lookup dataset and BIOC rules if this is done already natively by the Cortex XDR agent and this should happen ideally on the basis of any logs being sent by the endpoints using Cortex XDR agent(only).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Hope this suffices your query. Feel free to mark the response as "Äccepted as Solution" if it answered your query.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2025 13:08:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/create-alert-from-data-lookup/m-p/1234307#M8565</guid>
      <dc:creator>eluis</dc:creator>
      <dc:date>2025-07-18T13:08:30Z</dc:date>
    </item>
  </channel>
</rss>

