<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XSIAM Threat Intelligence Management Module in Cortex XSIAM Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/xsiam-threat-intelligence-management-module/m-p/1254195#M403</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1401872841"&gt;@A.Velusamy&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="343" data-start="0"&gt;Utilizing a Threat Intelligence Management (TIM) license in Cortex XSIAM allows you to transform passive threat data into actionable security logic. The license unlocks the ability to manage indicator lifecycles, automate enrichment from third-party sources, and create active detection rules based on ingested Indicators of Compromise (IOCs).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H4 data-end="383" data-start="345" data-section-id="1qfql18"&gt;1. Effectively Utilizing Enrichment:&lt;/H4&gt;
&lt;P data-end="517" data-start="385"&gt;Enrichment in XSIAM involves adding context (reputation, tags, related incidents) to indicators like IPs, domains, hashes, and URLs.&lt;/P&gt;
&lt;H4 data-end="548" data-start="519" data-section-id="1ej9mdq"&gt;Native Unit 42 Enrichment:&lt;/H4&gt;
&lt;P data-end="703" data-start="549"&gt;-Unit 42 Intel is a continuous feed integrated into the XSIAM data lake. It functions in the background for automated threat matching and incident scoring.&lt;/P&gt;
&lt;H3 data-end="722" data-start="705" data-section-id="7z56h9"&gt;Manual Update&lt;/H3&gt;
&lt;P data-end="789" data-start="723"&gt;To manually pull the latest Unit 42 data for a specific indicator:&lt;/P&gt;
&lt;OL data-end="892" data-start="791"&gt;
&lt;LI data-end="825" data-start="791" data-section-id="1k1id8d"&gt;Navigate to the indicator view.&lt;/LI&gt;
&lt;LI data-end="862" data-start="826" data-section-id="87ryjv"&gt;Select the &lt;STRONG data-end="857" data-start="840"&gt;Unit 42 Intel&lt;/STRONG&gt; tab.&lt;/LI&gt;
&lt;LI data-end="892" data-start="863" data-section-id="t2d2fo"&gt;Click &lt;STRONG data-end="891" data-start="872"&gt;Update &amp;amp; Enrich&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3 data-end="937" data-start="894" data-section-id="1hheqea"&gt;Automated Enrichment via Playbooks/Jobs&lt;/H3&gt;
&lt;P data-end="1106" data-start="938"&gt;By default, ingested indicators are not automatically enriched by external services (for example, VirusTotal). You should automate this process to scale SOC operations.&lt;/P&gt;
&lt;H4 data-end="1124" data-start="1108"&gt;Jobs Engine&lt;/H4&gt;
&lt;P data-end="1202" data-start="1125"&gt;Configure a job triggered by a "delta in feed" to run an enrichment playbook.&lt;/P&gt;
&lt;H4 data-end="1227" data-start="1204"&gt;Enrichment Command&lt;/H4&gt;
&lt;P data-end="1314" data-start="1228"&gt;Use the following command within your automation playbooks to batch-enrich indicators:&amp;nbsp;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;!enrichIndicators&lt;/CODE&gt;&lt;/P&gt;
&lt;H4 data-end="1376" data-start="1347" data-section-id="f9u3t6"&gt;Indicator Exclusion Lists&lt;/H4&gt;
&lt;P data-end="1562" data-start="1377"&gt;To manage API quotas and prevent noise, use the Exclusion List feature (unlocked by the TIM license) to prevent the auto-enrichment of private IP ranges (RFC 1918) and internal domains.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H4 data-end="1607" data-start="1569" data-section-id="1nvpsvg"&gt;2. Improving Detection and Alerting:&lt;/H4&gt;
&lt;P data-end="1759" data-start="1609"&gt;Ingested indicators are stored passively in the TIM Indicators table and do not automatically trigger alerts in the general Analytics or BIOC engines.&lt;/P&gt;
&lt;H4 data-end="1809" data-start="1761" data-section-id="1bvfy24"&gt;Method 1: Indicator Rules (Active Detection)&lt;/H4&gt;
&lt;P data-end="1946" data-start="1810"&gt;This is the primary method for generating alerts from TIM data. These rules actively check ingested event data against your stored IOCs.&lt;/P&gt;
&lt;UL data-end="2100" data-start="1948"&gt;
&lt;LI data-end="2028" data-start="1948" data-section-id="1hx0fyx"&gt;Path: &lt;STRONG data-end="2028" data-start="1956"&gt;Detection &amp;amp; Threat Intel → Threat Intel Management → Indicator Rules&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI data-end="2100" data-start="2029" data-section-id="1mk1c2t"&gt;When a match occurs, XSIAM generates a &lt;STRONG data-end="2093" data-start="2070"&gt;Threat Intelligence&lt;/STRONG&gt; alert.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2146" data-start="2102" data-section-id="81cl1f"&gt;Method 2: Custom Correlation Rules (XQL)&lt;/H4&gt;
&lt;P data-end="2286" data-start="2147"&gt;For advanced logic (for example, joining network traffic with specific threat actor indicators), you can use the indicators dataset in XQL.&lt;/P&gt;
&lt;H4 data-end="2317" data-start="2288"&gt;XQL Dataset Verification&lt;/H4&gt;
&lt;P data-end="2412" data-start="2318"&gt;Ensure your platform is version 3.2+ to access this dataset. You can verify availability with:&lt;/P&gt;
&lt;P data-end="2412" data-start="2318"&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;dataset = indicators&lt;/CODE&gt;&lt;/P&gt;
&lt;P data-end="2412" data-start="2318"&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;&lt;/CODE&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;| fields *&lt;/CODE&gt;&lt;/P&gt;
&lt;P data-end="2412" data-start="2318"&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;&lt;/CODE&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;| limit 10&lt;/CODE&gt;&lt;/P&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;STRONG&gt;3. Key Learnings and Best Practices:&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H4 data-end="2533" data-start="2514" data-section-id="sx6e5z"&gt;Feed Management&lt;/H4&gt;
&lt;P data-end="2554" data-start="2534"&gt;Distinguish between:&lt;/P&gt;
&lt;UL data-end="2690" data-start="2555"&gt;
&lt;LI data-end="2602" data-start="2555" data-section-id="a3n9i2"&gt;&lt;STRONG data-end="2586" data-start="2557"&gt;Unit 42 proprietary feeds&lt;/STRONG&gt; (included), and&lt;/LI&gt;
&lt;LI data-end="2690" data-start="2603" data-section-id="krksb9"&gt;&lt;STRONG data-end="2626" data-start="2605"&gt;Third-party feeds&lt;/STRONG&gt; (which require separate commercial agreements with the vendor).&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2707" data-start="2692" data-section-id="1slvjq6"&gt;Permissions:&lt;/H4&gt;
&lt;P data-end="2786" data-start="2708"&gt;For SOC analysts to effectively use TIM during investigations, they must have:&lt;/P&gt;
&lt;UL data-end="2872" data-start="2787"&gt;
&lt;LI data-end="2872" data-start="2787" data-section-id="1pmppfa"&gt;View/Edit permissions for:
&lt;UL data-end="2872" data-start="2818"&gt;
&lt;LI data-end="2852" data-start="2818" data-section-id="11cfzxf"&gt;Threat Intelligence → Indicators&lt;/LI&gt;
&lt;LI data-end="2872" data-start="2855" data-section-id="1advg1m"&gt;Detection Rules&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2895" data-start="2874" data-section-id="fgl0gq"&gt;Indicator Merging:&lt;/H4&gt;
&lt;P data-end="3133" data-start="2896"&gt;Be aware that XSIAM uses merging logic to deduplicate indicators. If a third-party vendor provides incorrect hash correlation data, it may overwrite fields (for example, linking different SHA256 hashes to the same file via a shared MD5).&lt;/P&gt;
&lt;H4 data-end="3163" data-start="3135" data-section-id="1v3o3fo"&gt;Prevention vs. Detection:&lt;/H4&gt;
&lt;P data-end="3242" data-start="3164"&gt;IOCs managed via Indicator Rules are primarily for detection (post-execution).&lt;/P&gt;
&lt;P data-end="3285" data-start="3244"&gt;For real-time prevention (blocking), use:&lt;/P&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="3386" data-start="3286"&gt;
&lt;LI data-end="3330" data-start="3286" data-section-id="21v89a"&gt;&lt;STRONG data-end="3315" data-start="3288"&gt;Global Block List (GBL)&lt;/STRONG&gt; for hashes, or&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="3386" data-start="3331" data-section-id="1jlu122"&gt;&lt;STRONG data-end="3365" data-start="3333"&gt;External Dynamic Lists (EDL)&lt;/STRONG&gt; for IPs and domains.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&amp;nbsp;&lt;STRONG&gt;like&amp;nbsp;&lt;/STRONG&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution"&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 18 May 2026 15:14:36 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-05-18T15:14:36Z</dc:date>
    <item>
      <title>XSIAM Threat Intelligence Management Module</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/xsiam-threat-intelligence-management-module/m-p/1254103#M401</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have Threat Intel license in XSIAM. I need some guidance on how it can be effectively utilized in improving enrichment and detection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please share your experience and learnings. Thank you!&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2026 11:40:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/xsiam-threat-intelligence-management-module/m-p/1254103#M401</guid>
      <dc:creator>A.Velusamy</dc:creator>
      <dc:date>2026-05-15T11:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: XSIAM Threat Intelligence Management Module</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/xsiam-threat-intelligence-management-module/m-p/1254195#M403</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1401872841"&gt;@A.Velusamy&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="343" data-start="0"&gt;Utilizing a Threat Intelligence Management (TIM) license in Cortex XSIAM allows you to transform passive threat data into actionable security logic. The license unlocks the ability to manage indicator lifecycles, automate enrichment from third-party sources, and create active detection rules based on ingested Indicators of Compromise (IOCs).&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H4 data-end="383" data-start="345" data-section-id="1qfql18"&gt;1. Effectively Utilizing Enrichment:&lt;/H4&gt;
&lt;P data-end="517" data-start="385"&gt;Enrichment in XSIAM involves adding context (reputation, tags, related incidents) to indicators like IPs, domains, hashes, and URLs.&lt;/P&gt;
&lt;H4 data-end="548" data-start="519" data-section-id="1ej9mdq"&gt;Native Unit 42 Enrichment:&lt;/H4&gt;
&lt;P data-end="703" data-start="549"&gt;-Unit 42 Intel is a continuous feed integrated into the XSIAM data lake. It functions in the background for automated threat matching and incident scoring.&lt;/P&gt;
&lt;H3 data-end="722" data-start="705" data-section-id="7z56h9"&gt;Manual Update&lt;/H3&gt;
&lt;P data-end="789" data-start="723"&gt;To manually pull the latest Unit 42 data for a specific indicator:&lt;/P&gt;
&lt;OL data-end="892" data-start="791"&gt;
&lt;LI data-end="825" data-start="791" data-section-id="1k1id8d"&gt;Navigate to the indicator view.&lt;/LI&gt;
&lt;LI data-end="862" data-start="826" data-section-id="87ryjv"&gt;Select the &lt;STRONG data-end="857" data-start="840"&gt;Unit 42 Intel&lt;/STRONG&gt; tab.&lt;/LI&gt;
&lt;LI data-end="892" data-start="863" data-section-id="t2d2fo"&gt;Click &lt;STRONG data-end="891" data-start="872"&gt;Update &amp;amp; Enrich&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3 data-end="937" data-start="894" data-section-id="1hheqea"&gt;Automated Enrichment via Playbooks/Jobs&lt;/H3&gt;
&lt;P data-end="1106" data-start="938"&gt;By default, ingested indicators are not automatically enriched by external services (for example, VirusTotal). You should automate this process to scale SOC operations.&lt;/P&gt;
&lt;H4 data-end="1124" data-start="1108"&gt;Jobs Engine&lt;/H4&gt;
&lt;P data-end="1202" data-start="1125"&gt;Configure a job triggered by a "delta in feed" to run an enrichment playbook.&lt;/P&gt;
&lt;H4 data-end="1227" data-start="1204"&gt;Enrichment Command&lt;/H4&gt;
&lt;P data-end="1314" data-start="1228"&gt;Use the following command within your automation playbooks to batch-enrich indicators:&amp;nbsp;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;!enrichIndicators&lt;/CODE&gt;&lt;/P&gt;
&lt;H4 data-end="1376" data-start="1347" data-section-id="f9u3t6"&gt;Indicator Exclusion Lists&lt;/H4&gt;
&lt;P data-end="1562" data-start="1377"&gt;To manage API quotas and prevent noise, use the Exclusion List feature (unlocked by the TIM license) to prevent the auto-enrichment of private IP ranges (RFC 1918) and internal domains.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;H4 data-end="1607" data-start="1569" data-section-id="1nvpsvg"&gt;2. Improving Detection and Alerting:&lt;/H4&gt;
&lt;P data-end="1759" data-start="1609"&gt;Ingested indicators are stored passively in the TIM Indicators table and do not automatically trigger alerts in the general Analytics or BIOC engines.&lt;/P&gt;
&lt;H4 data-end="1809" data-start="1761" data-section-id="1bvfy24"&gt;Method 1: Indicator Rules (Active Detection)&lt;/H4&gt;
&lt;P data-end="1946" data-start="1810"&gt;This is the primary method for generating alerts from TIM data. These rules actively check ingested event data against your stored IOCs.&lt;/P&gt;
&lt;UL data-end="2100" data-start="1948"&gt;
&lt;LI data-end="2028" data-start="1948" data-section-id="1hx0fyx"&gt;Path: &lt;STRONG data-end="2028" data-start="1956"&gt;Detection &amp;amp; Threat Intel → Threat Intel Management → Indicator Rules&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI data-end="2100" data-start="2029" data-section-id="1mk1c2t"&gt;When a match occurs, XSIAM generates a &lt;STRONG data-end="2093" data-start="2070"&gt;Threat Intelligence&lt;/STRONG&gt; alert.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2146" data-start="2102" data-section-id="81cl1f"&gt;Method 2: Custom Correlation Rules (XQL)&lt;/H4&gt;
&lt;P data-end="2286" data-start="2147"&gt;For advanced logic (for example, joining network traffic with specific threat actor indicators), you can use the indicators dataset in XQL.&lt;/P&gt;
&lt;H4 data-end="2317" data-start="2288"&gt;XQL Dataset Verification&lt;/H4&gt;
&lt;P data-end="2412" data-start="2318"&gt;Ensure your platform is version 3.2+ to access this dataset. You can verify availability with:&lt;/P&gt;
&lt;P data-end="2412" data-start="2318"&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;dataset = indicators&lt;/CODE&gt;&lt;/P&gt;
&lt;P data-end="2412" data-start="2318"&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;&lt;/CODE&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;| fields *&lt;/CODE&gt;&lt;/P&gt;
&lt;P data-end="2412" data-start="2318"&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;&lt;/CODE&gt;&lt;CODE style="color: #3e3e3e; font-size: 13px;"&gt;| limit 10&lt;/CODE&gt;&lt;/P&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class=""&gt;&lt;STRONG&gt;3. Key Learnings and Best Practices:&lt;/STRONG&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H4 data-end="2533" data-start="2514" data-section-id="sx6e5z"&gt;Feed Management&lt;/H4&gt;
&lt;P data-end="2554" data-start="2534"&gt;Distinguish between:&lt;/P&gt;
&lt;UL data-end="2690" data-start="2555"&gt;
&lt;LI data-end="2602" data-start="2555" data-section-id="a3n9i2"&gt;&lt;STRONG data-end="2586" data-start="2557"&gt;Unit 42 proprietary feeds&lt;/STRONG&gt; (included), and&lt;/LI&gt;
&lt;LI data-end="2690" data-start="2603" data-section-id="krksb9"&gt;&lt;STRONG data-end="2626" data-start="2605"&gt;Third-party feeds&lt;/STRONG&gt; (which require separate commercial agreements with the vendor).&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2707" data-start="2692" data-section-id="1slvjq6"&gt;Permissions:&lt;/H4&gt;
&lt;P data-end="2786" data-start="2708"&gt;For SOC analysts to effectively use TIM during investigations, they must have:&lt;/P&gt;
&lt;UL data-end="2872" data-start="2787"&gt;
&lt;LI data-end="2872" data-start="2787" data-section-id="1pmppfa"&gt;View/Edit permissions for:
&lt;UL data-end="2872" data-start="2818"&gt;
&lt;LI data-end="2852" data-start="2818" data-section-id="11cfzxf"&gt;Threat Intelligence → Indicators&lt;/LI&gt;
&lt;LI data-end="2872" data-start="2855" data-section-id="1advg1m"&gt;Detection Rules&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2895" data-start="2874" data-section-id="fgl0gq"&gt;Indicator Merging:&lt;/H4&gt;
&lt;P data-end="3133" data-start="2896"&gt;Be aware that XSIAM uses merging logic to deduplicate indicators. If a third-party vendor provides incorrect hash correlation data, it may overwrite fields (for example, linking different SHA256 hashes to the same file via a shared MD5).&lt;/P&gt;
&lt;H4 data-end="3163" data-start="3135" data-section-id="1v3o3fo"&gt;Prevention vs. Detection:&lt;/H4&gt;
&lt;P data-end="3242" data-start="3164"&gt;IOCs managed via Indicator Rules are primarily for detection (post-execution).&lt;/P&gt;
&lt;P data-end="3285" data-start="3244"&gt;For real-time prevention (blocking), use:&lt;/P&gt;
&lt;UL data-is-only-node="" data-is-last-node="" data-end="3386" data-start="3286"&gt;
&lt;LI data-end="3330" data-start="3286" data-section-id="21v89a"&gt;&lt;STRONG data-end="3315" data-start="3288"&gt;Global Block List (GBL)&lt;/STRONG&gt; for hashes, or&lt;/LI&gt;
&lt;LI data-is-last-node="" data-end="3386" data-start="3331" data-section-id="1jlu122"&gt;&lt;STRONG data-end="3365" data-start="3333"&gt;External Dynamic Lists (EDL)&lt;/STRONG&gt; for IPs and domains.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking&amp;nbsp;&lt;STRONG&gt;like&amp;nbsp;&lt;/STRONG&gt;and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution"&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2026 15:14:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/xsiam-threat-intelligence-management-module/m-p/1254195#M403</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-05-18T15:14:36Z</dc:date>
    </item>
  </channel>
</rss>

