<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Basic Doubt - Analytics in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/basic-doubt-analytics/m-p/1249618#M9181</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1394400413"&gt;@EMARTINS BERNARDES&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="flex flex-col text-sm pb-25"&gt;
&lt;ARTICLE class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn="assistant" data-scroll-anchor="true" data-testid="conversation-turn-4" data-turn-id="request-WEB:d424d82f-090f-4f0a-bf26-8af5ba9bec59-1"&gt;
&lt;DIV class="text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)"&gt;
&lt;DIV class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn" tabindex="-1"&gt;
&lt;DIV class="flex max-w-full flex-col gap-4 grow"&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-1" dir="auto" data-message-model-slug="gpt-5-3" data-message-id="56f64d2f-22d4-4746-9de4-b8f8941c6bc2" data-message-author-role="assistant"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden"&gt;
&lt;DIV class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling"&gt;
&lt;P data-end="467" data-start="0"&gt;In Cortex XDR, Cases (referred to in the console as &lt;STRONG data-end="65" data-start="52"&gt;Incidents&lt;/STRONG&gt;) are automatically created based on the &lt;STRONG data-end="118" data-start="106"&gt;Severity&lt;/STRONG&gt; of the alerts generated. By default, only alerts with &lt;STRONG data-end="202" data-start="173"&gt;Medium, High, or Critical&lt;/STRONG&gt; severity trigger the creation of a new Incident. Alerts with &lt;STRONG data-end="271" data-start="264"&gt;Low&lt;/STRONG&gt; or &lt;STRONG data-end="292" data-start="275"&gt;Informational&lt;/STRONG&gt; severity are classified as &lt;STRONG data-end="332" data-start="320"&gt;Insights&lt;/STRONG&gt; and do not create standalone cases; they are only added to existing incidents if they can be correlated with higher-severity activity.&lt;/P&gt;
&lt;P data-end="467" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="669" data-start="469"&gt;If your Analytic Rules are generating alerts that are not appearing as cases, they are likely set to &lt;STRONG data-end="586" data-start="570"&gt;Low severity&lt;/STRONG&gt;. To automatically create cases for these alerts, use one of the following methods.&lt;/P&gt;
&lt;H4 data-end="724" data-start="676" data-section-id="4q8ds3"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="724" data-start="676" data-section-id="4q8ds3"&gt;Method 1: Use Correlation Rules (Recommended)&lt;/H4&gt;
&lt;P data-end="924" data-start="725"&gt;This is the most effective way to &lt;STRONG data-end="811" data-start="759"&gt;promote a specific analytic alert to an incident&lt;/STRONG&gt;. You create a custom rule that monitors for the analytic alert and generates a new alert with a higher severity.&lt;/P&gt;
&lt;P data-end="935" data-start="926"&gt;&lt;STRONG data-end="935" data-start="926"&gt;Steps&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL data-end="1136" data-start="937"&gt;
&lt;LI data-end="1001" data-start="937" data-section-id="iji8la"&gt;
&lt;P data-end="1001" data-start="940"&gt;Navigate to &lt;STRONG data-end="998" data-start="952"&gt;Detection &amp;gt; Detection Rules &amp;gt; Correlations&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1035" data-start="1002" data-section-id="e0s3rf"&gt;
&lt;P data-end="1035" data-start="1005"&gt;Click &lt;STRONG data-end="1032" data-start="1011"&gt;+ Add Correlation&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1136" data-start="1036" data-section-id="1ou6ka1"&gt;
&lt;P data-end="1136" data-start="1039"&gt;In the &lt;STRONG data-end="1060" data-start="1046"&gt;XQL Search&lt;/STRONG&gt; section, write a query to target your specific Analytic Alert. For example:&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl"&gt;
&lt;DIV class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback"&gt;
&lt;DIV class="pt-3"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&lt;SPAN&gt;dataset = alerts &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| filter alert_source = ENUM.XDR_ANALYTICS_BIOC and alert_name = "Your Analytic Alert Name"&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-end="1319" data-start="1257"&gt;Use &lt;CODE data-end="1279" data-start="1261"&gt;dataset = alerts&lt;/CODE&gt; to find the existing analytic triggers.&lt;/P&gt;
&lt;OL start="4" data-end="1616" data-start="1321"&gt;
&lt;LI data-end="1379" data-start="1321" data-section-id="1yx0s3d"&gt;
&lt;P data-end="1379" data-start="1324"&gt;In the &lt;STRONG data-end="1341" data-start="1331"&gt;Action&lt;/STRONG&gt; section, select &lt;STRONG data-end="1376" data-start="1358"&gt;Generate Alert&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1507" data-start="1380" data-section-id="rwpzaj"&gt;
&lt;P data-end="1507" data-start="1383"&gt;Set the &lt;STRONG data-end="1403" data-start="1391"&gt;Severity&lt;/STRONG&gt; to &lt;STRONG data-end="1417" data-start="1407"&gt;Medium&lt;/STRONG&gt; or &lt;STRONG data-end="1429" data-start="1421"&gt;High&lt;/STRONG&gt;. This ensures that when the rule triggers, a case is automatically created.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1616" data-start="1508" data-section-id="jojisf"&gt;
&lt;P data-end="1616" data-start="1511"&gt;In &lt;STRONG data-end="1539" data-start="1514"&gt;Alerts Fields Mapping&lt;/STRONG&gt;, ensure the fields are mapped correctly to maintain incident grouping logic.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-end="1678" data-start="1623" data-section-id="y35xd2"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="1678" data-start="1623" data-section-id="y35xd2"&gt;Method 2: Use Incident Configuration (Scoring Rules)&lt;/H4&gt;
&lt;P data-end="1850" data-start="1679"&gt;You can override the default severity of specific alerts using &lt;STRONG data-end="1768" data-start="1742"&gt;Incident Scoring rules&lt;/STRONG&gt;. This elevates the alert's score so it meets the threshold for incident creation.&lt;/P&gt;
&lt;P data-end="1861" data-start="1852"&gt;&lt;STRONG data-end="1861" data-start="1852"&gt;Steps&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL data-end="2287" data-start="1863"&gt;
&lt;LI data-end="1934" data-start="1863" data-section-id="2zfhjv"&gt;
&lt;P data-end="1934" data-start="1866"&gt;Navigate to &lt;STRONG data-end="1931" data-start="1878"&gt;Settings &amp;gt; Configuration &amp;gt; Incident Configuration&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1993" data-start="1935" data-section-id="d0oi1g"&gt;
&lt;P data-end="1993" data-start="1938"&gt;Select &lt;STRONG data-end="1963" data-start="1945"&gt;+ Add New Rule&lt;/STRONG&gt; under &lt;STRONG data-end="1990" data-start="1970"&gt;Incident Scoring&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="2105" data-start="1994" data-section-id="z7a74o"&gt;
&lt;P data-end="2105" data-start="1997"&gt;Define the scope by filtering for your Analytic Rule (for example, by &lt;STRONG data-end="2083" data-start="2067"&gt;Alert Source&lt;/STRONG&gt; or &lt;STRONG data-end="2101" data-start="2087"&gt;Alert Name&lt;/STRONG&gt;).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="2185" data-start="2106" data-section-id="12fyweq"&gt;
&lt;P data-end="2185" data-start="2109"&gt;Set a &lt;STRONG data-end="2131" data-start="2115"&gt;Manual Score&lt;/STRONG&gt; or &lt;STRONG data-end="2153" data-start="2135"&gt;severity level&lt;/STRONG&gt; that is &lt;STRONG data-end="2182" data-start="2162"&gt;Medium or higher&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="2287" data-start="2186" data-section-id="126qkbl"&gt;
&lt;P data-end="2287" data-start="2189"&gt;Save and activate the rule. Future alerts matching this configuration will now generate incidents.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-end="2321" data-start="2294" data-section-id="z6ez5y"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="2321" data-start="2294" data-section-id="z6ez5y"&gt;Important Considerations:&lt;/H4&gt;
&lt;P data-end="2530" data-start="2323"&gt;&lt;STRONG data-end="2339" data-start="2323"&gt;Immutability&lt;/STRONG&gt;&lt;BR data-end="2342" data-start="2339" /&gt;Built-in &lt;STRONG data-end="2369" data-start="2351"&gt;Analytic Rules&lt;/STRONG&gt; and &lt;STRONG data-end="2397" data-start="2374"&gt;Analytic BIOC rules&lt;/STRONG&gt; are predefined by Palo Alto Networks. You cannot directly change their severity or incident generation logic within the rule itself.&lt;/P&gt;
&lt;P data-end="2530" data-start="2323"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="2785" data-start="2532"&gt;&lt;STRONG data-end="2552" data-start="2532"&gt;Automation Rules&lt;/STRONG&gt;&lt;BR data-end="2555" data-start="2552" /&gt;Automation Rules can modify alert fields, but they primarily apply to alerts that are already grouped into incidents. If a low-severity alert does not create an incident, it may not appear in the &lt;STRONG data-end="2777" data-start="2751"&gt;Create Automation Rule&lt;/STRONG&gt; wizard.&lt;/P&gt;
&lt;P data-end="2785" data-start="2532"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3020" data-start="2787"&gt;&lt;STRONG data-end="2815" data-start="2787"&gt;Incident Creation Policy&lt;/STRONG&gt;&lt;BR data-end="2818" data-start="2815" /&gt;Ensure your global &lt;STRONG data-end="2865" data-start="2837"&gt;Incident Creation Policy&lt;/STRONG&gt; (located under &lt;STRONG data-end="2949" data-start="2881"&gt;Settings &amp;gt; Configuration &amp;gt; Detections &amp;gt; Incident Creation Policy&lt;/STRONG&gt;) does not exclude the alert sources or severities you want to monitor.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="z-0 flex min-h-[46px] justify-start"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/ARTICLE&gt;
&lt;/DIV&gt;
&lt;DIV class="pointer-events-none h-px w-px absolute bottom-0" data-edge="true" aria-hidden="true"&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 06 Mar 2026 14:33:46 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-03-06T14:33:46Z</dc:date>
    <item>
      <title>Basic Doubt - Analytics</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/basic-doubt-analytics/m-p/1249617#M9180</link>
      <description>&lt;DIV class="paragraph-in-scc-markdown-text ___1ngh792 ftgm304 f1iaxwol"&gt;Hello everyone,&lt;/DIV&gt;
&lt;DIV class="paragraph-in-scc-markdown-text ___1ngh792 ftgm304 f1iaxwol"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="paragraph-in-scc-markdown-text ___1ngh792 ftgm304 f1iaxwol"&gt;I’m configuring some features in Cortex and noticed that a few alerts are being generated by the &lt;STRONG&gt;Analytic Rules&lt;/STRONG&gt;. How can I automatically create a &lt;STRONG&gt;CASE&lt;/STRONG&gt; based on these alerts?&lt;/DIV&gt;
&lt;DIV class="paragraph-in-scc-markdown-text ___1ngh792 ftgm304 f1iaxwol"&gt;My intention is to open incidents (i.e., “Cases”) in the console.&lt;BR /&gt;This is meant to improve visibility and ensure proper alert monitoring.&lt;/DIV&gt;</description>
      <pubDate>Fri, 06 Mar 2026 14:26:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/basic-doubt-analytics/m-p/1249617#M9180</guid>
      <dc:creator>EMARTINS BERNARDES</dc:creator>
      <dc:date>2026-03-06T14:26:27Z</dc:date>
    </item>
    <item>
      <title>Re: Basic Doubt - Analytics</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/basic-doubt-analytics/m-p/1249618#M9181</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1394400413"&gt;@EMARTINS BERNARDES&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="flex flex-col text-sm pb-25"&gt;
&lt;ARTICLE class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn="assistant" data-scroll-anchor="true" data-testid="conversation-turn-4" data-turn-id="request-WEB:d424d82f-090f-4f0a-bf26-8af5ba9bec59-1"&gt;
&lt;DIV class="text-base my-auto mx-auto pb-10 [--thread-content-margin:var(--thread-content-margin-xs,calc(var(--spacing)*4))] @w-sm/main:[--thread-content-margin:var(--thread-content-margin-sm,calc(var(--spacing)*6))] @w-lg/main:[--thread-content-margin:var(--thread-content-margin-lg,calc(var(--spacing)*16))] px-(--thread-content-margin)"&gt;
&lt;DIV class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn" tabindex="-1"&gt;
&lt;DIV class="flex max-w-full flex-col gap-4 grow"&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-1" dir="auto" data-message-model-slug="gpt-5-3" data-message-id="56f64d2f-22d4-4746-9de4-b8f8941c6bc2" data-message-author-role="assistant"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden"&gt;
&lt;DIV class="markdown prose dark:prose-invert w-full wrap-break-word light markdown-new-styling"&gt;
&lt;P data-end="467" data-start="0"&gt;In Cortex XDR, Cases (referred to in the console as &lt;STRONG data-end="65" data-start="52"&gt;Incidents&lt;/STRONG&gt;) are automatically created based on the &lt;STRONG data-end="118" data-start="106"&gt;Severity&lt;/STRONG&gt; of the alerts generated. By default, only alerts with &lt;STRONG data-end="202" data-start="173"&gt;Medium, High, or Critical&lt;/STRONG&gt; severity trigger the creation of a new Incident. Alerts with &lt;STRONG data-end="271" data-start="264"&gt;Low&lt;/STRONG&gt; or &lt;STRONG data-end="292" data-start="275"&gt;Informational&lt;/STRONG&gt; severity are classified as &lt;STRONG data-end="332" data-start="320"&gt;Insights&lt;/STRONG&gt; and do not create standalone cases; they are only added to existing incidents if they can be correlated with higher-severity activity.&lt;/P&gt;
&lt;P data-end="467" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="669" data-start="469"&gt;If your Analytic Rules are generating alerts that are not appearing as cases, they are likely set to &lt;STRONG data-end="586" data-start="570"&gt;Low severity&lt;/STRONG&gt;. To automatically create cases for these alerts, use one of the following methods.&lt;/P&gt;
&lt;H4 data-end="724" data-start="676" data-section-id="4q8ds3"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="724" data-start="676" data-section-id="4q8ds3"&gt;Method 1: Use Correlation Rules (Recommended)&lt;/H4&gt;
&lt;P data-end="924" data-start="725"&gt;This is the most effective way to &lt;STRONG data-end="811" data-start="759"&gt;promote a specific analytic alert to an incident&lt;/STRONG&gt;. You create a custom rule that monitors for the analytic alert and generates a new alert with a higher severity.&lt;/P&gt;
&lt;P data-end="935" data-start="926"&gt;&lt;STRONG data-end="935" data-start="926"&gt;Steps&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL data-end="1136" data-start="937"&gt;
&lt;LI data-end="1001" data-start="937" data-section-id="iji8la"&gt;
&lt;P data-end="1001" data-start="940"&gt;Navigate to &lt;STRONG data-end="998" data-start="952"&gt;Detection &amp;gt; Detection Rules &amp;gt; Correlations&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1035" data-start="1002" data-section-id="e0s3rf"&gt;
&lt;P data-end="1035" data-start="1005"&gt;Click &lt;STRONG data-end="1032" data-start="1011"&gt;+ Add Correlation&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1136" data-start="1036" data-section-id="1ou6ka1"&gt;
&lt;P data-end="1136" data-start="1039"&gt;In the &lt;STRONG data-end="1060" data-start="1046"&gt;XQL Search&lt;/STRONG&gt; section, write a query to target your specific Analytic Alert. For example:&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl"&gt;
&lt;DIV class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback"&gt;
&lt;DIV class="pt-3"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&lt;SPAN&gt;dataset = alerts &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| filter alert_source = ENUM.XDR_ANALYTICS_BIOC and alert_name = "Your Analytic Alert Name"&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P data-end="1319" data-start="1257"&gt;Use &lt;CODE data-end="1279" data-start="1261"&gt;dataset = alerts&lt;/CODE&gt; to find the existing analytic triggers.&lt;/P&gt;
&lt;OL start="4" data-end="1616" data-start="1321"&gt;
&lt;LI data-end="1379" data-start="1321" data-section-id="1yx0s3d"&gt;
&lt;P data-end="1379" data-start="1324"&gt;In the &lt;STRONG data-end="1341" data-start="1331"&gt;Action&lt;/STRONG&gt; section, select &lt;STRONG data-end="1376" data-start="1358"&gt;Generate Alert&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1507" data-start="1380" data-section-id="rwpzaj"&gt;
&lt;P data-end="1507" data-start="1383"&gt;Set the &lt;STRONG data-end="1403" data-start="1391"&gt;Severity&lt;/STRONG&gt; to &lt;STRONG data-end="1417" data-start="1407"&gt;Medium&lt;/STRONG&gt; or &lt;STRONG data-end="1429" data-start="1421"&gt;High&lt;/STRONG&gt;. This ensures that when the rule triggers, a case is automatically created.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1616" data-start="1508" data-section-id="jojisf"&gt;
&lt;P data-end="1616" data-start="1511"&gt;In &lt;STRONG data-end="1539" data-start="1514"&gt;Alerts Fields Mapping&lt;/STRONG&gt;, ensure the fields are mapped correctly to maintain incident grouping logic.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-end="1678" data-start="1623" data-section-id="y35xd2"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="1678" data-start="1623" data-section-id="y35xd2"&gt;Method 2: Use Incident Configuration (Scoring Rules)&lt;/H4&gt;
&lt;P data-end="1850" data-start="1679"&gt;You can override the default severity of specific alerts using &lt;STRONG data-end="1768" data-start="1742"&gt;Incident Scoring rules&lt;/STRONG&gt;. This elevates the alert's score so it meets the threshold for incident creation.&lt;/P&gt;
&lt;P data-end="1861" data-start="1852"&gt;&lt;STRONG data-end="1861" data-start="1852"&gt;Steps&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL data-end="2287" data-start="1863"&gt;
&lt;LI data-end="1934" data-start="1863" data-section-id="2zfhjv"&gt;
&lt;P data-end="1934" data-start="1866"&gt;Navigate to &lt;STRONG data-end="1931" data-start="1878"&gt;Settings &amp;gt; Configuration &amp;gt; Incident Configuration&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1993" data-start="1935" data-section-id="d0oi1g"&gt;
&lt;P data-end="1993" data-start="1938"&gt;Select &lt;STRONG data-end="1963" data-start="1945"&gt;+ Add New Rule&lt;/STRONG&gt; under &lt;STRONG data-end="1990" data-start="1970"&gt;Incident Scoring&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="2105" data-start="1994" data-section-id="z7a74o"&gt;
&lt;P data-end="2105" data-start="1997"&gt;Define the scope by filtering for your Analytic Rule (for example, by &lt;STRONG data-end="2083" data-start="2067"&gt;Alert Source&lt;/STRONG&gt; or &lt;STRONG data-end="2101" data-start="2087"&gt;Alert Name&lt;/STRONG&gt;).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="2185" data-start="2106" data-section-id="12fyweq"&gt;
&lt;P data-end="2185" data-start="2109"&gt;Set a &lt;STRONG data-end="2131" data-start="2115"&gt;Manual Score&lt;/STRONG&gt; or &lt;STRONG data-end="2153" data-start="2135"&gt;severity level&lt;/STRONG&gt; that is &lt;STRONG data-end="2182" data-start="2162"&gt;Medium or higher&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="2287" data-start="2186" data-section-id="126qkbl"&gt;
&lt;P data-end="2287" data-start="2189"&gt;Save and activate the rule. Future alerts matching this configuration will now generate incidents.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-end="2321" data-start="2294" data-section-id="z6ez5y"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="2321" data-start="2294" data-section-id="z6ez5y"&gt;Important Considerations:&lt;/H4&gt;
&lt;P data-end="2530" data-start="2323"&gt;&lt;STRONG data-end="2339" data-start="2323"&gt;Immutability&lt;/STRONG&gt;&lt;BR data-end="2342" data-start="2339" /&gt;Built-in &lt;STRONG data-end="2369" data-start="2351"&gt;Analytic Rules&lt;/STRONG&gt; and &lt;STRONG data-end="2397" data-start="2374"&gt;Analytic BIOC rules&lt;/STRONG&gt; are predefined by Palo Alto Networks. You cannot directly change their severity or incident generation logic within the rule itself.&lt;/P&gt;
&lt;P data-end="2530" data-start="2323"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="2785" data-start="2532"&gt;&lt;STRONG data-end="2552" data-start="2532"&gt;Automation Rules&lt;/STRONG&gt;&lt;BR data-end="2555" data-start="2552" /&gt;Automation Rules can modify alert fields, but they primarily apply to alerts that are already grouped into incidents. If a low-severity alert does not create an incident, it may not appear in the &lt;STRONG data-end="2777" data-start="2751"&gt;Create Automation Rule&lt;/STRONG&gt; wizard.&lt;/P&gt;
&lt;P data-end="2785" data-start="2532"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="3020" data-start="2787"&gt;&lt;STRONG data-end="2815" data-start="2787"&gt;Incident Creation Policy&lt;/STRONG&gt;&lt;BR data-end="2818" data-start="2815" /&gt;Ensure your global &lt;STRONG data-end="2865" data-start="2837"&gt;Incident Creation Policy&lt;/STRONG&gt; (located under &lt;STRONG data-end="2949" data-start="2881"&gt;Settings &amp;gt; Configuration &amp;gt; Detections &amp;gt; Incident Creation Policy&lt;/STRONG&gt;) does not exclude the alert sources or severities you want to monitor.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="z-0 flex min-h-[46px] justify-start"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/ARTICLE&gt;
&lt;/DIV&gt;
&lt;DIV class="pointer-events-none h-px w-px absolute bottom-0" data-edge="true" aria-hidden="true"&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 06 Mar 2026 14:33:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/basic-doubt-analytics/m-p/1249618#M9181</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-03-06T14:33:46Z</dc:date>
    </item>
  </channel>
</rss>

