<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PLease Correct the XQL query I have Created for the objective in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250288#M9193</link>
    <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to implement this objective so developed two queries with regex and non regex but it is giving tons of logs, can anyone help me on fine tuning or change the queries or correct them. Thank you&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;SPAN class="TextRun SCXW97627832 BCX8" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW97627832 BCX8"&gt;Destructive Wipe / Anti‑Recovery Utilities&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW97627832 BCX8" data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Objective&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To detect destructive actions where adversaries attempt to wipe data or remove recovery options by invoking tools and commands associated with file wiping, shadow copy deletion, log clearing, and backup removal. By correlating processes that&amp;nbsp;exhibit&amp;nbsp;destructive intent with command‑line patterns linked to anti‑recovery behavior, the hunt surfaces early indicators of system‑wipe preparation and evidence‑removal tactics. This aligns with T1561.002 (Disk Structure Wipe) and T1070 (Indicator Removal).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:0,&amp;quot;335551620&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;dataset = xdr_data&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter event_type = ENUM.PROCESS&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter action_process_image_name in ("cipher.exe","robocopy.exe","wevtutil.exe","vssadmin.exe","fsutil.exe","sdelete.exe","wbadmin.exe")&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter lowercase(action_process_image_command_line) ~= "(?i)(cipher\\s+/w:|sdelete|robocopy.+/mir|wevtutil\\s+cl\\s+|vssadmin\\s+delete\\s+shadows|wbadmin\\s+delete)"&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| fields _time, agent_hostname, actor_process_image_name, action_process_image_name,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action_process_image_command_line,&amp;nbsp;action_username&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| sort desc _time&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Without regex:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;dataset = xdr_data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter event_type = ENUM.PROCESS&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter action_process_image_name in ("cipher.exe","robocopy.exe","wevtutil.exe","vssadmin.exe","fsutil.exe","sdelete.exe","wbadmin.exe")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter (&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lowercase(action_process_image_command_line) contains "cipher /w:"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line) contains "sdelete"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line)&amp;nbsp;contains&amp;nbsp;"/mir"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line) contains "wevtutil&amp;nbsp;cl "&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line)&amp;nbsp;contains&amp;nbsp;"vssadmin&amp;nbsp;delete shadows"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line)&amp;nbsp;contains&amp;nbsp;"wbadmin&amp;nbsp;delete"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| fields _time, agent_hostname, actor_process_image_name, action_process_image_name,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action_process_image_command_line, action_username&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| sort desc _time&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 16 Mar 2026 18:02:32 GMT</pubDate>
    <dc:creator>N.B238890</dc:creator>
    <dc:date>2026-03-16T18:02:32Z</dc:date>
    <item>
      <title>PLease Correct the XQL query I have Created for the objective</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250288#M9193</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to implement this objective so developed two queries with regex and non regex but it is giving tons of logs, can anyone help me on fine tuning or change the queries or correct them. Thank you&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;SPAN class="TextRun SCXW97627832 BCX8" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW97627832 BCX8"&gt;Destructive Wipe / Anti‑Recovery Utilities&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW97627832 BCX8" data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Objective&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;To detect destructive actions where adversaries attempt to wipe data or remove recovery options by invoking tools and commands associated with file wiping, shadow copy deletion, log clearing, and backup removal. By correlating processes that&amp;nbsp;exhibit&amp;nbsp;destructive intent with command‑line patterns linked to anti‑recovery behavior, the hunt surfaces early indicators of system‑wipe preparation and evidence‑removal tactics. This aligns with T1561.002 (Disk Structure Wipe) and T1070 (Indicator Removal).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;134233117&amp;quot;:false,&amp;quot;134233118&amp;quot;:false,&amp;quot;201341983&amp;quot;:0,&amp;quot;335551550&amp;quot;:0,&amp;quot;335551620&amp;quot;:0,&amp;quot;335559738&amp;quot;:0,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:300}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;Query&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;dataset = xdr_data&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter event_type = ENUM.PROCESS&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter action_process_image_name in ("cipher.exe","robocopy.exe","wevtutil.exe","vssadmin.exe","fsutil.exe","sdelete.exe","wbadmin.exe")&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter lowercase(action_process_image_command_line) ~= "(?i)(cipher\\s+/w:|sdelete|robocopy.+/mir|wevtutil\\s+cl\\s+|vssadmin\\s+delete\\s+shadows|wbadmin\\s+delete)"&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| fields _time, agent_hostname, actor_process_image_name, action_process_image_name,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action_process_image_command_line,&amp;nbsp;action_username&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| sort desc _time&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Without regex:&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;dataset = xdr_data&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter event_type = ENUM.PROCESS&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter action_process_image_name in ("cipher.exe","robocopy.exe","wevtutil.exe","vssadmin.exe","fsutil.exe","sdelete.exe","wbadmin.exe")&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| filter (&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lowercase(action_process_image_command_line) contains "cipher /w:"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line) contains "sdelete"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line)&amp;nbsp;contains&amp;nbsp;"/mir"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line) contains "wevtutil&amp;nbsp;cl "&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line)&amp;nbsp;contains&amp;nbsp;"vssadmin&amp;nbsp;delete shadows"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp; or lowercase(action_process_image_command_line)&amp;nbsp;contains&amp;nbsp;"wbadmin&amp;nbsp;delete"&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;)&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| fields _time, agent_hostname, actor_process_image_name, action_process_image_name,&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; action_process_image_command_line, action_username&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;| sort desc _time&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:2,&amp;quot;335559739&amp;quot;:120,&amp;quot;335559740&amp;quot;:240}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Mar 2026 18:02:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250288#M9193</guid>
      <dc:creator>N.B238890</dc:creator>
      <dc:date>2026-03-16T18:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: PLease Correct the XQL query I have Created for the objective</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250384#M9194</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/924691441"&gt;@N.B238890&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;How can signer information (action&lt;EM&gt;process&lt;/EM&gt;signature&lt;EM&gt;vendor, action&lt;/EM&gt;process&lt;EM&gt;signature&lt;/EM&gt;product) and integrity levels be used in XQL to differentiate between authorized system processes and suspicious activity?&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P data-end="337" data-start="63"&gt;In Cortex XDR, signer information and integrity levels can be combined in XQL to distinguish between legitimate system activity and potentially malicious behavior. These fields help establish both the trustworthiness of a binary and the privilege level at which it operates.&lt;/P&gt;
&lt;H4 data-end="386" data-start="339" data-section-id="tttuwo"&gt;Using Signer Information to Establish Trust:&lt;/H4&gt;
&lt;P data-end="476" data-start="388"&gt;Signer-related fields help determine whether a process originates from a trusted source.&lt;/P&gt;
&lt;P data-end="493" data-start="478"&gt;&lt;STRONG data-end="493" data-start="478"&gt;Key fields:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-end="702" data-start="494"&gt;
&lt;LI data-end="615" data-start="494" data-section-id="1o22v3v"&gt;
&lt;P data-end="615" data-start="496"&gt;&lt;CODE data-end="529" data-start="496"&gt;action_process_signature_vendor&lt;/CODE&gt;: The name of the vendor that signed the binary (for example, "Microsoft Corporation")&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="702" data-start="616" data-section-id="f0bcnw"&gt;
&lt;P data-end="702" data-start="618"&gt;&lt;CODE data-end="652" data-start="618"&gt;action_process_signature_product&lt;/CODE&gt;: The product family associated with the signature&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="723" data-start="704"&gt;&lt;STRONG data-end="723" data-start="704"&gt;How this helps:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-end="1296" data-start="724"&gt;
&lt;LI data-end="860" data-start="724" data-section-id="urhfom"&gt;
&lt;P data-end="860" data-start="726"&gt;&lt;STRONG data-end="743" data-start="726"&gt;Reduce noise:&lt;/STRONG&gt; You can exclude known trusted vendors (such as Microsoft or approved enterprise tools) to focus on unusual activity.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1027" data-start="861" data-section-id="16versc"&gt;
&lt;P data-end="1027" data-start="863"&gt;&lt;STRONG data-end="887" data-start="863"&gt;Detect masquerading:&lt;/STRONG&gt; A process using a legitimate system name (like &lt;CODE data-end="948" data-start="935"&gt;svchost.exe&lt;/CODE&gt;) but marked as unsigned (&lt;CODE data-end="1011" data-start="974"&gt;action_process_signature_status = 3&lt;/CODE&gt;) is suspicious.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1172" data-start="1028" data-section-id="n4jx55"&gt;
&lt;P data-end="1172" data-start="1030"&gt;&lt;STRONG data-end="1050" data-start="1030"&gt;Ensure accuracy:&lt;/STRONG&gt; Vendor name matching in XQL must be exact. Even small differences in punctuation or formatting can cause filters to fail.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1296" data-start="1173" data-section-id="zt423s"&gt;
&lt;P data-end="1296" data-start="1175"&gt;&lt;STRONG data-end="1197" data-start="1175"&gt;Handle edge cases:&lt;/STRONG&gt; On some systems (like macOS), vendor names may appear truncated, requiring broader matching logic.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1346" data-start="1298" data-section-id="q3pw2i"&gt;Using Integrity Levels to Identify Elevation&lt;/H4&gt;
&lt;P data-end="1448" data-start="1348"&gt;Integrity levels indicate the privilege context of a process and are represented as integers in XQL.&lt;/P&gt;
&lt;P data-end="1468" data-start="1450"&gt;&lt;STRONG data-end="1468" data-start="1450"&gt;Common values:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-end="1604" data-start="1469"&gt;
&lt;LI data-end="1491" data-start="1469" data-section-id="klu5av"&gt;
&lt;P data-end="1491" data-start="1471"&gt;&lt;CODE data-end="1474" data-start="1471"&gt;0&lt;/CODE&gt;: Low / Untrusted&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1524" data-start="1492" data-section-id="lawz3j"&gt;
&lt;P data-end="1524" data-start="1494"&gt;&lt;CODE data-end="1500" data-start="1494"&gt;4096&lt;/CODE&gt;: Medium (standard user)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1566" data-start="1525" data-section-id="l46ied"&gt;
&lt;P data-end="1566" data-start="1527"&gt;&lt;CODE data-end="1533" data-start="1527"&gt;8192&lt;/CODE&gt;: High (elevated / administrator)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1604" data-start="1567" data-section-id="j6jacd"&gt;
&lt;P data-end="1604" data-start="1569"&gt;&lt;CODE data-end="1576" data-start="1569"&gt;16384&lt;/CODE&gt;: System (highest privilege)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-end="1625" data-start="1606"&gt;&lt;STRONG data-end="1625" data-start="1606"&gt;How this helps:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-end="2014" data-start="1626"&gt;
&lt;LI data-end="1723" data-start="1626" data-section-id="13rf34z"&gt;
&lt;P data-end="1723" data-start="1628"&gt;&lt;STRONG data-end="1657" data-start="1628"&gt;Baseline normal behavior:&lt;/STRONG&gt; Core Windows processes typically run at High or System integrity.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="1877" data-start="1724" data-section-id="11ax36g"&gt;
&lt;P data-end="1877" data-start="1726"&gt;&lt;STRONG data-end="1758" data-start="1726"&gt;Detect privilege escalation:&lt;/STRONG&gt; A process running at a higher integrity level than expected—especially relative to its parent—may indicate escalation.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="2014" data-start="1878" data-section-id="1dbtwkp"&gt;
&lt;P data-end="2014" data-start="1880"&gt;&lt;STRONG data-end="1903" data-start="1880"&gt;Hunt for anomalies:&lt;/STRONG&gt; Filtering for processes above Medium integrity (&lt;CODE data-end="1960" data-start="1952"&gt;&amp;gt; 4096&lt;/CODE&gt;) can highlight elevated activity worth investigating.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2037" data-start="2016" data-section-id="16xaf45"&gt;Example XQL Logic&lt;/H4&gt;
&lt;P data-end="2099" data-start="2039"&gt;To find elevated processes that are not signed by Microsoft:&lt;/P&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl"&gt;
&lt;DIV class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback"&gt;
&lt;DIV class="pe-11 pt-3"&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&lt;SPAN&gt;dataset = xdr_data &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| filter event_type = ENUM.PROCESS &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| filter action_process_integrity_level &amp;gt; 4096 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;| filter action_process_signature_vendor != "Microsoft Corporation"&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;H5&gt;&lt;SPAN&gt;Limitations to Consider&lt;/SPAN&gt;&lt;/H5&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;UL data-end="2658" data-start="2311"&gt;
&lt;LI data-end="2428" data-start="2311" data-section-id="ztzt55"&gt;
&lt;P data-end="2428" data-start="2313"&gt;&lt;STRONG data-end="2342" data-start="2313"&gt;Self-signed certificates:&lt;/STRONG&gt; May result in null or empty signer fields if the certificate is not publicly trusted.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="2527" data-start="2429" data-section-id="lla41b"&gt;
&lt;P data-end="2527" data-start="2431"&gt;&lt;STRONG data-end="2453" data-start="2431"&gt;Enrichment delays:&lt;/STRONG&gt; Signature data may take a short time to populate after process execution.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-end="2658" data-start="2528" data-section-id="skxwv6"&gt;
&lt;P data-end="2658" data-start="2530"&gt;&lt;STRONG data-end="2556" data-start="2530"&gt;Internal certificates:&lt;/STRONG&gt; Binaries signed with private enterprise certificates may still appear as unsigned in some detections.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Tue, 17 Mar 2026 15:07:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250384#M9194</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-03-17T15:07:35Z</dc:date>
    </item>
    <item>
      <title>Re: PLease Correct the XQL query I have Created for the objective</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250446#M9198</link>
      <description>&lt;P&gt;Thank you for the solution, but if we use this:&lt;/P&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;| filter action_process_signature_vendor != "Microsoft Corporation"&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="scriptor-paragraph"&gt;&lt;SPAN&gt;&lt;SPAN&gt;| filter action_process_signature_status = 3&amp;nbsp;&amp;nbsp; // unsigned, it&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;will &lt;/SPAN&gt;&lt;SPAN&gt;drop&lt;/SPAN&gt;&lt;SPAN&gt; many real attack instances that LOLBAS.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 12:47:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250446#M9198</guid>
      <dc:creator>N.B238890</dc:creator>
      <dc:date>2026-03-18T12:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: PLease Correct the XQL query I have Created for the objective</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250447#M9199</link>
      <description>&lt;P&gt;What is your time range, how many results are you getting, and is the activity expected?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 13:05:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250447#M9199</guid>
      <dc:creator>ChrisDavila</dc:creator>
      <dc:date>2026-03-18T13:05:55Z</dc:date>
    </item>
    <item>
      <title>Re: PLease Correct the XQL query I have Created for the objective</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250450#M9200</link>
      <description>&lt;P&gt;Time range: 90 days, getting 10 lakh results that is max output. yes, it is grabbing some of the legitimate processes with the key words we are troughing.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 13:45:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/please-correct-the-xql-query-i-have-created-for-the-objective/m-p/1250450#M9200</guid>
      <dc:creator>N.B238890</dc:creator>
      <dc:date>2026-03-18T13:45:12Z</dc:date>
    </item>
  </channel>
</rss>

