<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help playbook XSOAR - XDR assest and vulnerability module in Cortex XSOAR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/help-playbook-xsoar-xdr-assest-and-vulnerability-module/m-p/589824#M3397</link>
    <description>&lt;P&gt;The XQL for devices without agent, works perfect thanks a lot.&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jun 2024 15:30:12 GMT</pubDate>
    <dc:creator>tlmarques</dc:creator>
    <dc:date>2024-06-18T15:30:12Z</dc:date>
    <item>
      <title>Help playbook XSOAR - XDR assest and vulnerability module</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/help-playbook-xsoar-xdr-assest-and-vulnerability-module/m-p/587138#M3316</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I am creating a playbook with the objective of integrating &lt;LI-PRODUCT title="Cortex XSOAR" id="Cortex_XSOAR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;and &lt;LI-PRODUCT title="Cortex XDR" id="Cortex_XDR"&gt;&lt;/LI-PRODUCT&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The idea is for &lt;LI-PRODUCT title="Cortex XSOAR" id="Cortex_XSOAR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;to query &lt;LI-PRODUCT title="Cortex XDR" id="Cortex_XDR"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;, retrieve all the assets detected by the broker scanner, and verify which assets do or do not have the XDR agent.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know if this is possible?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;My idea is to use both solutions to achieve as much automation as possible.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Another playbook later on will involve XSOAR querying the XDR vulnerability section to identify machines with missing CVEs, listing the machines and CVEs, and then identifying the necessary KBs.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Can anyone help me? Does anyone know if this is possible, even with an XQL query?&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2024 16:02:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/help-playbook-xsoar-xdr-assest-and-vulnerability-module/m-p/587138#M3316</guid>
      <dc:creator>tlmarques</dc:creator>
      <dc:date>2024-05-17T16:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: Help playbook XSOAR - XDR assest and vulnerability module</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/help-playbook-xsoar-xdr-assest-and-vulnerability-module/m-p/588891#M3373</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/307134"&gt;@tlmarques&lt;/a&gt;&amp;nbsp;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On this usecase, currently there seems to be no way to query the information on the IPs detected by Broker VM, However there is an option if you have cloud identity engine to get a list of assets added to the domain and validate if an agent is installed. This may be more accurate since it will ignore IP based devices which cannot have an engine setup.&lt;/P&gt;
&lt;P&gt;Here is a sample XQL you can utilize for this&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;config case_sensitive = false | preset = ad_computers &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;| fields name, domain_name, sam_account_name, distinguished_name, OS &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;| filter name not in (dataset = endpoints &lt;/SPAN&gt;&lt;SPAN&gt;| fields endpoint_name)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The next usecase, You can query the CVE for an endpoint from&amp;nbsp;va_endpoints , Once you get this list of CVE for every asset, you can use the CVE integration in XSOAR to fetch details about CVE and fixing it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jun 2024 02:27:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/help-playbook-xsoar-xdr-assest-and-vulnerability-module/m-p/588891#M3373</guid>
      <dc:creator>sramesh-7</dc:creator>
      <dc:date>2024-06-06T02:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: Help playbook XSOAR - XDR assest and vulnerability module</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/help-playbook-xsoar-xdr-assest-and-vulnerability-module/m-p/589824#M3397</link>
      <description>&lt;P&gt;The XQL for devices without agent, works perfect thanks a lot.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 15:30:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xsoar-discussions/help-playbook-xsoar-xdr-assest-and-vulnerability-module/m-p/589824#M3397</guid>
      <dc:creator>tlmarques</dc:creator>
      <dc:date>2024-06-18T15:30:12Z</dc:date>
    </item>
  </channel>
</rss>

