<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Playbook access to malicious website in Cortex XSOAR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/534836#M1904</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any playbook for "check website access if it is malicious"?&lt;/P&gt;
&lt;P&gt;To events that come from Cortex XDR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Fábio&lt;/P&gt;</description>
    <pubDate>Fri, 17 Mar 2023 11:44:13 GMT</pubDate>
    <dc:creator>FabioFerreira</dc:creator>
    <dc:date>2023-03-17T11:44:13Z</dc:date>
    <item>
      <title>Playbook access to malicious website</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/534836#M1904</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any playbook for "check website access if it is malicious"?&lt;/P&gt;
&lt;P&gt;To events that come from Cortex XDR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Fábio&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 11:44:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/534836#M1904</guid>
      <dc:creator>FabioFerreira</dc:creator>
      <dc:date>2023-03-17T11:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: Playbook access to malicious website</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/534847#M1906</link>
      <description>&lt;P&gt;The XDR integration will provide you with DOMAIN indicators for enrichment as seen in &lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Working-with-IOCs" target="_blank" rel="noopener"&gt;https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Pro-Administrator-Guide/Working-with-IOCs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use those:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://xsoar.pan.dev/docs/reference/integrations/cortex-xdr---ioc" target="_blank" rel="noopener"&gt;https://xsoar.pan.dev/docs/reference/integrations/cortex-xdr---ioc&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Outside of that if you log to the SIEM the web requests you can use other integrations for URL enrichment like&amp;nbsp; AutoFocus, Wildfire etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See the links below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=4gebN1ox8vU" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=4gebN1ox8vU&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=DVGWeYJMDQQ&amp;amp;t=378s" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=DVGWeYJMDQQ&amp;amp;t=378s&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/blog/security-operations/security-orchestration-use-case-automating-ioc-enrichment/" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/blog/security-operations/security-orchestration-use-case-automating-ioc-enrichment/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cortex.marketplace.pan.dev/marketplace/details/AutoFocus/" target="_blank" rel="noopener"&gt;https://cortex.marketplace.pan.dev/marketplace/details/AutoFocus/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=DVGWeYJMDQQ&amp;amp;t=378s" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=DVGWeYJMDQQ&amp;amp;t=378s&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://xsoar.pan.dev/docs/reference/playbooks/detonate-url---wild-fire-v2" target="_blank" rel="noopener"&gt;https://xsoar.pan.dev/docs/reference/playbooks/detonate-url---wild-fire-v2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 13:04:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/534847#M1906</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-03-17T13:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: Playbook access to malicious website</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/534858#M1907</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/153031"&gt;@nikoolayy1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your answer.&lt;/P&gt;
&lt;P&gt;Yeah, I'm already receiving incidents from Cortex XDR into XSOAR&lt;/P&gt;
&lt;P&gt;I know how to create a playbook for that, I only would like to know if there are any OOB playbooks created that I could use, instead create one for scratch &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Fábio&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2023 14:48:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/534858#M1907</guid>
      <dc:creator>FabioFerreira</dc:creator>
      <dc:date>2023-03-17T14:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: Playbook access to malicious website</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/534962#M1909</link>
      <description>&lt;P&gt;Well as XDR is again Palo Alto product like XSOAR there is antire pack about this: &lt;A href="https://cortex.marketplace.pan.dev/marketplace/details/CortexXDR/" target="_blank" rel="noopener"&gt;https://cortex.marketplace.pan.dev/marketplace/details/CortexXDR/&lt;/A&gt; did you test it ? Also I found this &lt;A href="https://xsoar.pan.dev/docs/reference/scripts/extract-domain-from-ioc-domain-match-res" target="_blank" rel="noopener"&gt;https://xsoar.pan.dev/docs/reference/scripts/extract-domain-from-ioc-domain-match-res&lt;/A&gt; but never tested this script with XDR IOC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also youtube has great examples about XSOAR and XDR working together. Here is an example but you can see others in youtube &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=fDFea0KLuGs" target="_blank"&gt;https://www.youtube.com/watch?v=fDFea0KLuGs&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2023 06:57:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/534962#M1909</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-03-19T06:57:01Z</dc:date>
    </item>
    <item>
      <title>Re: Playbook access to malicious website</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/535050#M1917</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/153031"&gt;@nikoolayy1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Already tested some, but that one not yet, going to check.&lt;/P&gt;
&lt;P&gt;I already have PA XDR and XSOAR with incident respond integration, assign with incident type, mappers and classifiers, and it is everything working.&lt;/P&gt;
&lt;P&gt;In this case I was only looking for a specific use case.&lt;/P&gt;
&lt;P&gt;Going to create a playbook myself &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Fábio Ferreira&lt;/P&gt;</description>
      <pubDate>Mon, 20 Mar 2023 11:38:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/535050#M1917</guid>
      <dc:creator>FabioFerreira</dc:creator>
      <dc:date>2023-03-20T11:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Playbook access to malicious website</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/535332#M1924</link>
      <description>&lt;P&gt;The Pack has example playbooks that you were talking about but as you want to "play yourself" as to learn the feature why not &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 08:03:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/playbook-access-to-malicious-website/m-p/535332#M1924</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-03-22T08:03:46Z</dc:date>
    </item>
  </channel>
</rss>

