<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cortex XDR Incident in Cortex XSOAR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/cortex-xdr-incident/m-p/524613#M1552</link>
    <description>&lt;P&gt;Hello everyone, we started dealing with Cortex XDR and after getting the furst Incident, I am kinda lost. I am not even sure whats the issue, there is a lot of "information" on the management console. For example, the Incident, under "Key Assets &amp;amp; Artifacts" shows conhost.exe and powershell.exe with WF verdict, benign in this case, however, when I go to "Alerts &amp;amp; Insights" it shows Category: Malware, and Action: Prevented (Blocked). Im not even sure what happened. I understand than my confusion is due to the lack of knowledge about Cortex. But Im looking for some recomendations in how to approach an Incident investigation, if someone could help somehow, I really appreciate that. Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 20 Dec 2022 17:19:47 GMT</pubDate>
    <dc:creator>klerini</dc:creator>
    <dc:date>2022-12-20T17:19:47Z</dc:date>
    <item>
      <title>Cortex XDR Incident</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/cortex-xdr-incident/m-p/524613#M1552</link>
      <description>&lt;P&gt;Hello everyone, we started dealing with Cortex XDR and after getting the furst Incident, I am kinda lost. I am not even sure whats the issue, there is a lot of "information" on the management console. For example, the Incident, under "Key Assets &amp;amp; Artifacts" shows conhost.exe and powershell.exe with WF verdict, benign in this case, however, when I go to "Alerts &amp;amp; Insights" it shows Category: Malware, and Action: Prevented (Blocked). Im not even sure what happened. I understand than my confusion is due to the lack of knowledge about Cortex. But Im looking for some recomendations in how to approach an Incident investigation, if someone could help somehow, I really appreciate that. Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Dec 2022 17:19:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/cortex-xdr-incident/m-p/524613#M1552</guid>
      <dc:creator>klerini</dc:creator>
      <dc:date>2022-12-20T17:19:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Incident</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/cortex-xdr-incident/m-p/524724#M1556</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this about the XSOAR and cortex XDR integration?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If so from the analyst perspective these pointers will be helpful&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Its always better to do the investigation from the XDR itself for high and critical incidents&lt;/LI&gt;
&lt;LI&gt;If this is an everyday incident lets say cracked file download, PUP I suggest automating the whole thing using the indicator reputation(VT, Xforce) so your analysts can focus on what matters.&lt;/LI&gt;
&lt;LI&gt;Even the incidents that cannot be fully automated, you can extract the indicators and run them through the TI services to save some time for the analyst and automate the incident assignment.&lt;/LI&gt;
&lt;LI&gt;Moreover if the incident needs to be raised, you can use XSOAR to automate ticketing process&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 21 Dec 2022 04:23:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/cortex-xdr-incident/m-p/524724#M1556</guid>
      <dc:creator>vidurasupun</dc:creator>
      <dc:date>2022-12-21T04:23:55Z</dc:date>
    </item>
  </channel>
</rss>

