<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XDR as &amp;quot;SIEM&amp;quot; (challenge for discussion) in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-as-quot-siem-quot-challenge-for-discussion/m-p/1249058#M9173</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/307134"&gt;@tlmarques&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="453" data-start="0"&gt;While using &lt;STRONG data-end="53" data-start="12"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Cortex XDR&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; as a SIEM replacement is technically possible using the Pro per GB license model, &lt;STRONG data-end="177" data-start="136"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Palo Alto Networks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; specifically designed &lt;STRONG data-end="241" data-start="200"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Cortex XSIAM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; (Extended Security Intelligence &amp;amp; Automation Management) to fulfill this requirement. XSIAM is built on XDR, XSOAR, and Xpanse foundations to automate the manual work typically associated with traditional SIEMs.&lt;/P&gt;
&lt;P data-end="453" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="593" data-start="455"&gt;Using XDR alone as a SIEM involves several technical considerations and limitations regarding data enrichment, correlation, and ingestion.&lt;/P&gt;
&lt;H4 data-end="637" data-start="600"&gt;1. (Log Ingestion and Data Modeling)&lt;/H4&gt;
&lt;H5 data-end="664" data-start="639"&gt;License Requirement:&lt;/H5&gt;
&lt;P data-end="866" data-start="665"&gt;Ingesting network, cloud, and third-party logs (such as &lt;STRONG data-end="762" data-start="721"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;FortiGate&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; or &lt;STRONG data-end="807" data-start="766"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Microsoft 365&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;) into Cortex XDR requires a Cortex XDR Pro per GB license.&lt;/P&gt;
&lt;P data-end="866" data-start="665"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5 data-end="904" data-start="868"&gt;Broker VM vs. Native Ingestion:&lt;/H5&gt;
&lt;P data-end="1167" data-start="905"&gt;While you can use a Broker VM with the Syslog Collector applet for third-party systems, logs ingested via syslog often lack the "log stitching" and Enhanced Application Logs (EALs) provided by native integrations like the Cloud Logging Collection Service (CLCS).&lt;/P&gt;
&lt;P data-end="1167" data-start="905"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5 data-end="1198" data-start="1169"&gt;Third-Party Limitations:&lt;/H5&gt;
&lt;P data-end="1430" data-start="1199"&gt;Logs from vendors like FortiGate ingested via syslog may not automatically feed into the Analytics or Causality engines. They often require manual creation of correlation rules and custom parsing rules to extract searchable fields.&lt;/P&gt;
&lt;P data-end="1430" data-start="1199"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="1478" data-start="1437"&gt;2. Correlation and Real-Time Detection:&lt;/H4&gt;
&lt;H4 data-end="1505" data-start="1480"&gt;Correlation Latency:&lt;/H4&gt;
&lt;P data-end="1717" data-start="1506"&gt;In XDR, correlation rules typically run on a schedule (for example, every 10 minutes) over a customizable data window. XSIAM, by contrast, is optimized for real-time alerts triggered upon single-event ingestion.&lt;/P&gt;
&lt;H4 data-end="1742" data-start="1719"&gt;Detection Engines:&lt;/H4&gt;
&lt;P data-end="1959" data-start="1743"&gt;XDR Analytics and BIOCs (Behavioral Indicators of Compromise) are primarily tuned for normalized logs from supported sensors. Unknown syslog sources usually do not automatically feed these advanced detection engines.&lt;/P&gt;
&lt;P data-end="1959" data-start="1743"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="2015" data-start="1966"&gt;3. Potential Performance and Management Issues:&lt;/H4&gt;
&lt;H5 data-end="2039" data-start="2017"&gt;Ingestion Quotas:&lt;/H5&gt;
&lt;P data-end="2254" data-start="2040"&gt;XDR Pro per GB licenses calculate usage based on a 7-day average. If high-volume logs (such as firewall traffic) exceed the daily quota, the system may generate notifications and eventually cause processing delays.&lt;/P&gt;
&lt;H5 data-end="2283" data-start="2256"&gt;Source-Side Filtering:&lt;/H5&gt;
&lt;P data-end="2483" data-start="2284"&gt;Licensing costs are incurred upon raw data receipt. To optimize costs, you must implement filtering at the source (Broker VM or Log Sender) to drop unwanted logs before they enter the cloud pipeline.&lt;/P&gt;
&lt;H5 data-end="2510" data-start="2485"&gt;Endpoint Contention:&lt;/H5&gt;
&lt;P data-end="2671" data-start="2511"&gt;Deploying both XDR and traditional SIEM agents on the same endpoint is not considered best practice and can cause performance issues due to resource contention.&lt;/P&gt;
&lt;H5 data-end="2697" data-start="2673"&gt;Export Limitations:&lt;/H5&gt;
&lt;P data-end="2918" data-start="2698"&gt;If you eventually need to forward raw EDR telemetry from XDR to external storage or another tool, the native syslog forwarding feature only supports alerts and audit logs—not comprehensive high-volume endpoint telemetry.&lt;/P&gt;
&lt;H4 data-end="2949" data-start="2925"&gt;Summary of Comparison:&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="TyagGW_tableContainer"&gt;
&lt;DIV class="group TyagGW_tableWrapper flex flex-col-reverse w-fit" tabindex="-1"&gt;
&lt;TABLE class="w-fit min-w-(--thread-content-width)" data-end="3589" data-start="2951"&gt;
&lt;THEAD data-end="3009" data-start="2951"&gt;
&lt;TR data-end="3009" data-start="2951"&gt;
&lt;TH class="" data-col-size="sm" data-end="2961" data-start="2951"&gt;Feature&lt;/TH&gt;
&lt;TH class="" data-col-size="md" data-end="2974" data-start="2961"&gt;Cortex XDR&lt;/TH&gt;
&lt;TH class="" data-col-size="md" data-end="3009" data-start="2974"&gt;Cortex XSIAM (SIEM Replacement)&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY data-end="3589" data-start="3071"&gt;
&lt;TR data-end="3174" data-start="3071"&gt;
&lt;TD data-col-size="sm" data-end="3087" data-start="3071"&gt;Primary Focus&lt;/TD&gt;
&lt;TD data-end="3127" data-start="3087" data-col-size="md"&gt;Endpoint &amp;amp; Network Detection/Response&lt;/TD&gt;
&lt;TD data-end="3174" data-start="3127" data-col-size="md"&gt;Centralized Log Management &amp;amp; SOC Automation&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-end="3257" data-start="3175"&gt;
&lt;TD data-col-size="sm" data-end="3189" data-start="3175"&gt;Correlation&lt;/TD&gt;
&lt;TD data-col-size="md" data-end="3225" data-start="3189"&gt;Scheduled rules (every X minutes)&lt;/TD&gt;
&lt;TD data-end="3257" data-start="3225" data-col-size="md"&gt;Real-time ingestion triggers&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-end="3388" data-start="3258"&gt;
&lt;TD data-col-size="sm" data-end="3282" data-start="3258"&gt;SaaS/Cloud Visibility&lt;/TD&gt;
&lt;TD data-end="3332" data-start="3282" data-col-size="md"&gt;Stitched causality for Microsoft 365 audit logs&lt;/TD&gt;
&lt;TD data-end="3388" data-start="3332" data-col-size="md"&gt;Broad ingestion across cloud services &amp;amp; applications&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-end="3474" data-start="3389"&gt;
&lt;TD data-col-size="sm" data-end="3402" data-start="3389"&gt;Automation&lt;/TD&gt;
&lt;TD data-end="3427" data-start="3402" data-col-size="md"&gt;Basic response actions&lt;/TD&gt;
&lt;TD data-end="3474" data-start="3427" data-col-size="md"&gt;Advanced orchestration via integrated XSOAR&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-end="3589" data-start="3475"&gt;
&lt;TD data-col-size="sm" data-end="3494" data-start="3475"&gt;NGFW Integration&lt;/TD&gt;
&lt;TD data-end="3537" data-start="3494" data-col-size="md"&gt;Traffic/Threat logs (stitching via CLCS)&lt;/TD&gt;
&lt;TD data-end="3589" data-start="3537" data-col-size="md"&gt;Full log set including System/Auth/GlobalProtect&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3843" data-start="3596"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3843" data-start="3596"&gt;In summary, while Cortex XDR Pro per GB can technically function as a limited SIEM solution, Cortex XSIAM is purpose-built to replace traditional SIEM platforms with real-time detection, broader log ingestion, and advanced automation capabilities.&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3843" data-start="3596"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
    <pubDate>Thu, 26 Feb 2026 13:41:53 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-02-26T13:41:53Z</dc:date>
    <item>
      <title>XDR as "SIEM" (challenge for discussion)</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-as-quot-siem-quot-challenge-for-discussion/m-p/1241914#M8867</link>
      <description>&lt;P data-start="79" data-end="290"&gt;&lt;STRONG&gt;I wanted to leave a challenge here for discussion in the group.&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR data-start="142" data-end="145" /&gt;Why not use XDR as if it were a SIEM, in order to analyze more events with better accuracy, and to create more correlation and data enrichment?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P data-start="292" data-end="406"&gt;I’m referring to an environment with:&lt;BR data-start="329" data-end="332" /&gt;XDR, XSOAR, Palo Alto/Fortigate firewalls, Windows and Linux systems, and O365.&lt;/P&gt;
&lt;P data-start="408" data-end="545"&gt;&lt;BR /&gt;For systems that don’t have direct integration support, you could even use a SYSLOG broker and then centralize all the logs in the XDR.&lt;/P&gt;
&lt;P data-start="547" data-end="623"&gt;&lt;BR /&gt;This way, you would only need to purchase log ingestion space for the XDR.&lt;/P&gt;
&lt;P data-start="625" data-end="673"&gt;&lt;BR /&gt;Does anyone see any issues with this approach?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Nov 2025 18:25:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-as-quot-siem-quot-challenge-for-discussion/m-p/1241914#M8867</guid>
      <dc:creator>tlmarques</dc:creator>
      <dc:date>2025-11-14T18:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: XDR as "SIEM" (challenge for discussion)</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-as-quot-siem-quot-challenge-for-discussion/m-p/1249058#M9173</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/307134"&gt;@tlmarques&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="453" data-start="0"&gt;While using &lt;STRONG data-end="53" data-start="12"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Cortex XDR&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; as a SIEM replacement is technically possible using the Pro per GB license model, &lt;STRONG data-end="177" data-start="136"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Palo Alto Networks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; specifically designed &lt;STRONG data-end="241" data-start="200"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Cortex XSIAM&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; (Extended Security Intelligence &amp;amp; Automation Management) to fulfill this requirement. XSIAM is built on XDR, XSOAR, and Xpanse foundations to automate the manual work typically associated with traditional SIEMs.&lt;/P&gt;
&lt;P data-end="453" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="593" data-start="455"&gt;Using XDR alone as a SIEM involves several technical considerations and limitations regarding data enrichment, correlation, and ingestion.&lt;/P&gt;
&lt;H4 data-end="637" data-start="600"&gt;1. (Log Ingestion and Data Modeling)&lt;/H4&gt;
&lt;H5 data-end="664" data-start="639"&gt;License Requirement:&lt;/H5&gt;
&lt;P data-end="866" data-start="665"&gt;Ingesting network, cloud, and third-party logs (such as &lt;STRONG data-end="762" data-start="721"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;FortiGate&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt; or &lt;STRONG data-end="807" data-start="766"&gt;&lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Microsoft 365&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;) into Cortex XDR requires a Cortex XDR Pro per GB license.&lt;/P&gt;
&lt;P data-end="866" data-start="665"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5 data-end="904" data-start="868"&gt;Broker VM vs. Native Ingestion:&lt;/H5&gt;
&lt;P data-end="1167" data-start="905"&gt;While you can use a Broker VM with the Syslog Collector applet for third-party systems, logs ingested via syslog often lack the "log stitching" and Enhanced Application Logs (EALs) provided by native integrations like the Cloud Logging Collection Service (CLCS).&lt;/P&gt;
&lt;P data-end="1167" data-start="905"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5 data-end="1198" data-start="1169"&gt;Third-Party Limitations:&lt;/H5&gt;
&lt;P data-end="1430" data-start="1199"&gt;Logs from vendors like FortiGate ingested via syslog may not automatically feed into the Analytics or Causality engines. They often require manual creation of correlation rules and custom parsing rules to extract searchable fields.&lt;/P&gt;
&lt;P data-end="1430" data-start="1199"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="1478" data-start="1437"&gt;2. Correlation and Real-Time Detection:&lt;/H4&gt;
&lt;H4 data-end="1505" data-start="1480"&gt;Correlation Latency:&lt;/H4&gt;
&lt;P data-end="1717" data-start="1506"&gt;In XDR, correlation rules typically run on a schedule (for example, every 10 minutes) over a customizable data window. XSIAM, by contrast, is optimized for real-time alerts triggered upon single-event ingestion.&lt;/P&gt;
&lt;H4 data-end="1742" data-start="1719"&gt;Detection Engines:&lt;/H4&gt;
&lt;P data-end="1959" data-start="1743"&gt;XDR Analytics and BIOCs (Behavioral Indicators of Compromise) are primarily tuned for normalized logs from supported sensors. Unknown syslog sources usually do not automatically feed these advanced detection engines.&lt;/P&gt;
&lt;P data-end="1959" data-start="1743"&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 data-end="2015" data-start="1966"&gt;3. Potential Performance and Management Issues:&lt;/H4&gt;
&lt;H5 data-end="2039" data-start="2017"&gt;Ingestion Quotas:&lt;/H5&gt;
&lt;P data-end="2254" data-start="2040"&gt;XDR Pro per GB licenses calculate usage based on a 7-day average. If high-volume logs (such as firewall traffic) exceed the daily quota, the system may generate notifications and eventually cause processing delays.&lt;/P&gt;
&lt;H5 data-end="2283" data-start="2256"&gt;Source-Side Filtering:&lt;/H5&gt;
&lt;P data-end="2483" data-start="2284"&gt;Licensing costs are incurred upon raw data receipt. To optimize costs, you must implement filtering at the source (Broker VM or Log Sender) to drop unwanted logs before they enter the cloud pipeline.&lt;/P&gt;
&lt;H5 data-end="2510" data-start="2485"&gt;Endpoint Contention:&lt;/H5&gt;
&lt;P data-end="2671" data-start="2511"&gt;Deploying both XDR and traditional SIEM agents on the same endpoint is not considered best practice and can cause performance issues due to resource contention.&lt;/P&gt;
&lt;H5 data-end="2697" data-start="2673"&gt;Export Limitations:&lt;/H5&gt;
&lt;P data-end="2918" data-start="2698"&gt;If you eventually need to forward raw EDR telemetry from XDR to external storage or another tool, the native syslog forwarding feature only supports alerts and audit logs—not comprehensive high-volume endpoint telemetry.&lt;/P&gt;
&lt;H4 data-end="2949" data-start="2925"&gt;Summary of Comparison:&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="TyagGW_tableContainer"&gt;
&lt;DIV class="group TyagGW_tableWrapper flex flex-col-reverse w-fit" tabindex="-1"&gt;
&lt;TABLE class="w-fit min-w-(--thread-content-width)" data-end="3589" data-start="2951"&gt;
&lt;THEAD data-end="3009" data-start="2951"&gt;
&lt;TR data-end="3009" data-start="2951"&gt;
&lt;TH class="" data-col-size="sm" data-end="2961" data-start="2951"&gt;Feature&lt;/TH&gt;
&lt;TH class="" data-col-size="md" data-end="2974" data-start="2961"&gt;Cortex XDR&lt;/TH&gt;
&lt;TH class="" data-col-size="md" data-end="3009" data-start="2974"&gt;Cortex XSIAM (SIEM Replacement)&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY data-end="3589" data-start="3071"&gt;
&lt;TR data-end="3174" data-start="3071"&gt;
&lt;TD data-col-size="sm" data-end="3087" data-start="3071"&gt;Primary Focus&lt;/TD&gt;
&lt;TD data-end="3127" data-start="3087" data-col-size="md"&gt;Endpoint &amp;amp; Network Detection/Response&lt;/TD&gt;
&lt;TD data-end="3174" data-start="3127" data-col-size="md"&gt;Centralized Log Management &amp;amp; SOC Automation&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-end="3257" data-start="3175"&gt;
&lt;TD data-col-size="sm" data-end="3189" data-start="3175"&gt;Correlation&lt;/TD&gt;
&lt;TD data-col-size="md" data-end="3225" data-start="3189"&gt;Scheduled rules (every X minutes)&lt;/TD&gt;
&lt;TD data-end="3257" data-start="3225" data-col-size="md"&gt;Real-time ingestion triggers&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-end="3388" data-start="3258"&gt;
&lt;TD data-col-size="sm" data-end="3282" data-start="3258"&gt;SaaS/Cloud Visibility&lt;/TD&gt;
&lt;TD data-end="3332" data-start="3282" data-col-size="md"&gt;Stitched causality for Microsoft 365 audit logs&lt;/TD&gt;
&lt;TD data-end="3388" data-start="3332" data-col-size="md"&gt;Broad ingestion across cloud services &amp;amp; applications&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-end="3474" data-start="3389"&gt;
&lt;TD data-col-size="sm" data-end="3402" data-start="3389"&gt;Automation&lt;/TD&gt;
&lt;TD data-end="3427" data-start="3402" data-col-size="md"&gt;Basic response actions&lt;/TD&gt;
&lt;TD data-end="3474" data-start="3427" data-col-size="md"&gt;Advanced orchestration via integrated XSOAR&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR data-end="3589" data-start="3475"&gt;
&lt;TD data-col-size="sm" data-end="3494" data-start="3475"&gt;NGFW Integration&lt;/TD&gt;
&lt;TD data-end="3537" data-start="3494" data-col-size="md"&gt;Traffic/Threat logs (stitching via CLCS)&lt;/TD&gt;
&lt;TD data-end="3589" data-start="3537" data-col-size="md"&gt;Full log set including System/Auth/GlobalProtect&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3843" data-start="3596"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3843" data-start="3596"&gt;In summary, while Cortex XDR Pro per GB can technically function as a limited SIEM solution, Cortex XSIAM is purpose-built to replace traditional SIEM platforms with real-time detection, broader log ingestion, and advanced automation capabilities.&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3843" data-start="3596"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2026 13:41:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-as-quot-siem-quot-challenge-for-discussion/m-p/1249058#M9173</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-02-26T13:41:53Z</dc:date>
    </item>
  </channel>
</rss>

