<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do you handle Low Severity alerts/issues? in Cortex XSIAM Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/how-do-you-handle-low-severity-alerts-issues/m-p/1247947#M343</link>
    <description>&lt;P&gt;Thanks for the response and appreciated.. but cannot accept AI responses as a solution being source of truth at this stage&lt;/P&gt;
&lt;P&gt;I can ask AI and get the same response..&lt;/P&gt;
&lt;P&gt;I was hoping to get a more personalized answer as to how you handle this in your environment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 11 Feb 2026 14:43:01 GMT</pubDate>
    <dc:creator>PA_nts</dc:creator>
    <dc:date>2026-02-11T14:43:01Z</dc:date>
    <item>
      <title>How do you handle Low Severity alerts/issues?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/how-do-you-handle-low-severity-alerts-issues/m-p/1242731#M282</link>
      <description>&lt;P&gt;want to know how you guys deal with low severity alerts..&amp;nbsp;&lt;/P&gt;
&lt;P&gt;do you monitor/analyze them or only focus on incidents&amp;nbsp; with medium/high/critical severity?&lt;/P&gt;
&lt;P&gt;do you run any playbook automation against these low sev alerts?&lt;/P&gt;
&lt;P&gt;are there any best practices from PAN around handling of low severity alerts? i cannot seem to find any.&lt;/P&gt;
&lt;P&gt;thanks in adv&lt;/P&gt;</description>
      <pubDate>Thu, 27 Nov 2025 11:24:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/how-do-you-handle-low-severity-alerts-issues/m-p/1242731#M282</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2025-11-27T11:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: How do you handle Low Severity alerts/issues?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/how-do-you-handle-low-severity-alerts-issues/m-p/1247941#M338</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Cortex XSIAM, the handling of low-severity alerts is governed by a design philosophy focused on reducing alert fatigue and prioritizing actionable threats.&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;Monitoring and Analysis:&lt;/H4&gt;
&lt;P&gt;By default, Cortex XSIAM does &lt;STRONG&gt;not&lt;/STRONG&gt; automatically create incidents for alerts with &lt;STRONG&gt;Low&lt;/STRONG&gt; or &lt;STRONG&gt;Informational&lt;/STRONG&gt; severity. These alerts are typically categorized as &lt;STRONG&gt;Insights&lt;/STRONG&gt;, which provide contextual metadata to help analysts understand the broader attack chain within an existing incident.&lt;/P&gt;
&lt;H4&gt;Exceptions&lt;/H4&gt;
&lt;P&gt;There are specific scenarios where Low severity alerts &lt;EM&gt;do&lt;/EM&gt; generate incidents automatically because they are considered high-fidelity or critical for early detection:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Identity and ITDR:&lt;/STRONG&gt; Analytics and BIOC alerts related to Identity modules&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Cloud Detection:&lt;/STRONG&gt; Alerts generated from Cloud Detection modules&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Analytics (Magnifier):&lt;/STRONG&gt; Certain detections such as Large Upload, Port Scan, or Failed Connections&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;Playbook Automation:&lt;/H4&gt;
&lt;P&gt;Standard Automation Rules and Playbook Triggers are tied to the &lt;STRONG&gt;incident lifecycle&lt;/STRONG&gt;. Since most Low severity alerts do not create incidents, they do not automatically trigger playbooks.&lt;/P&gt;
&lt;H4&gt;Workarounds for Automating Low Severity Alerts&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Scheduled Jobs&lt;/STRONG&gt;&lt;BR /&gt;Create a scheduled playbook (Job) that runs an XQL query to identify specific Low severity alerts and perform programmatic actions.&lt;BR /&gt;For example, a script can use:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE&gt;setAlertStatus
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;to automatically resolve or update qualifying alerts.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Severity Elevation&lt;/STRONG&gt;&lt;BR /&gt;Modify the source detection (BIOC, Correlation Rule, or Analytics Rule) to raise the severity to &lt;STRONG&gt;Medium&lt;/STRONG&gt;.&lt;BR /&gt;This forces incident creation and allows standard automation rules to trigger.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Manual Execution&lt;/STRONG&gt;&lt;BR /&gt;Analysts can manually execute playbooks directly from the Alerts table for Low severity entries.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4&gt;Best Practices:&lt;/H4&gt;
&lt;P&gt;To effectively manage Low severity alert volume:&lt;/P&gt;
&lt;H4&gt;Treat as Contextual Insights:&lt;/H4&gt;
&lt;P&gt;Rather than reviewing Low alerts individually, examine them within the &lt;STRONG&gt;Alerts &amp;amp; Insights&lt;/STRONG&gt; tab of a related Medium or High severity incident to gain a complete attack narrative.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;Tune at the Source:&lt;/H4&gt;
&lt;P&gt;If specific Low severity alerts are consistently noisy and provide little value:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Use &lt;STRONG&gt;Alert Exclusions&lt;/STRONG&gt;, or&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Tune the originating detection rule (for example, firewall rules or analytics logic)&lt;BR /&gt;to prevent unnecessary alerts from reaching the console.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;SOC Tiering Approach:&lt;/H5&gt;
&lt;P&gt;Use a Tier 1 or Triage Specialist role to periodically review the raw Alerts table (via XQL queries) for emerging patterns that may not yet meet the Medium severity threshold.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H5&gt;Future Enhancement:&lt;/H5&gt;
&lt;P&gt;A feature enhancement request is currently tracked to allow playbooks to trigger directly from Low and Informational alerts in future releases.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 14:19:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/how-do-you-handle-low-severity-alerts-issues/m-p/1247941#M338</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-02-11T14:19:04Z</dc:date>
    </item>
    <item>
      <title>Re: How do you handle Low Severity alerts/issues?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/how-do-you-handle-low-severity-alerts-issues/m-p/1247947#M343</link>
      <description>&lt;P&gt;Thanks for the response and appreciated.. but cannot accept AI responses as a solution being source of truth at this stage&lt;/P&gt;
&lt;P&gt;I can ask AI and get the same response..&lt;/P&gt;
&lt;P&gt;I was hoping to get a more personalized answer as to how you handle this in your environment.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 14:43:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/how-do-you-handle-low-severity-alerts-issues/m-p/1247947#M343</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2026-02-11T14:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: How do you handle Low Severity alerts/issues?</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/how-do-you-handle-low-severity-alerts-issues/m-p/1248285#M349</link>
      <description>&lt;P&gt;As a customer one way how to handle it is 'check-ups' for low severity/informational alerts. LIke&amp;nbsp;&lt;STRONG&gt;Windows Event Log was cleared using wevtutil.exe&amp;nbsp;&lt;/STRONG&gt;trigger as low severity, but logs clean-up from the system is not common 'user activity'. I recommend to setup regular human process (potentially via reports/dashboards) to review low severity alerts. The most interesting alerts are those with the lowest frequency of generation (only one or two per week).&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 15:41:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/how-do-you-handle-low-severity-alerts-issues/m-p/1248285#M349</guid>
      <dc:creator>MDovirak</dc:creator>
      <dc:date>2026-02-16T15:41:40Z</dc:date>
    </item>
  </channel>
</rss>

