<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Rule list in Cortex XSIAM Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/rule-list/m-p/595629#M71</link>
    <description>&lt;P&gt;Whatever incidents are triggering into XSIAM console , on what basis it is triggered ?&lt;/P&gt;
&lt;P&gt;Need to understand the logic behind that incident ?&lt;/P&gt;
&lt;P&gt;Which conditions met to trigger that incident ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So under incident details, is there any option to check incident triggered on which parameter (IP , URL, file etc)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;example :&lt;/P&gt;
&lt;P&gt;"Credentials gathering protection" incident -&amp;nbsp; where i can find Rule logic for this incident.&lt;/P&gt;</description>
    <pubDate>Thu, 22 Aug 2024 14:24:14 GMT</pubDate>
    <dc:creator>Vishal.raut</dc:creator>
    <dc:date>2024-08-22T14:24:14Z</dc:date>
    <item>
      <title>Rule list</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/rule-list/m-p/595611#M68</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;would like&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;to&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;see a list of rules regarding&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;types of&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;incidents&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;I receive&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;in&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;XSIAM.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I am not talking about IOC/BIOC&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Can anyone help with the path ?&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 11:09:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/rule-list/m-p/595611#M68</guid>
      <dc:creator>Vishal.raut</dc:creator>
      <dc:date>2024-08-22T11:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: Rule list</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/rule-list/m-p/595626#M69</link>
      <description>&lt;P&gt;Can you please clarify what you mean by rules?&amp;nbsp; Are you asking for detection rules?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 14:13:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/rule-list/m-p/595626#M69</guid>
      <dc:creator>afurze</dc:creator>
      <dc:date>2024-08-22T14:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Rule list</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/rule-list/m-p/595629#M71</link>
      <description>&lt;P&gt;Whatever incidents are triggering into XSIAM console , on what basis it is triggered ?&lt;/P&gt;
&lt;P&gt;Need to understand the logic behind that incident ?&lt;/P&gt;
&lt;P&gt;Which conditions met to trigger that incident ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So under incident details, is there any option to check incident triggered on which parameter (IP , URL, file etc)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;example :&lt;/P&gt;
&lt;P&gt;"Credentials gathering protection" incident -&amp;nbsp; where i can find Rule logic for this incident.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 14:24:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/rule-list/m-p/595629#M71</guid>
      <dc:creator>Vishal.raut</dc:creator>
      <dc:date>2024-08-22T14:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: Rule list</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/rule-list/m-p/595630#M72</link>
      <description>&lt;P&gt;This is a complex question.&amp;nbsp; For alerts triggered by a correlation rule, the answer is simple, however, other detections require some analysis to understand what happened.&amp;nbsp; The first place to start is with the Alert Name and Alert Description, these will give you more human-readable information about the alert.&amp;nbsp; As an example, the Credential Gathering Protection module may fire alerts that have a description such as "Mimikatz pattern" or "MiniDumpWriteDump() on lsass.exe".&amp;nbsp; Using this as a clue, we can open the Causality Card for the alert and investigate the chain, as well as the EDR data collected for the alert to understand what happened.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would encourage you to reach out to your Customer Success team for a deeper dive discussion on this.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 14:30:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsiam-discussions/rule-list/m-p/595630#M72</guid>
      <dc:creator>afurze</dc:creator>
      <dc:date>2024-08-22T14:30:58Z</dc:date>
    </item>
  </channel>
</rss>

