<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Incidents contain many alert types... but why? in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/533855#M1004</link>
    <description>&lt;P&gt;Hi&amp;nbsp; &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/255854"&gt;@Eric_Geater&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Looking at the Alert names it looks like those are triggered&amp;nbsp; by Inbound traffic - public addresses trying to connect to your public resources behind the FW. My guess is the XDR is grouping all of them in the same incident either because they are targeting the same destination IP, or are sourced from the same external IP or both (both).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 09 Mar 2023 21:45:34 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2023-03-09T21:45:34Z</dc:date>
    <item>
      <title>Incidents contain many alert types... but why?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/527442#M769</link>
      <description>&lt;P&gt;Hello, everyone.&amp;nbsp; Our product suite now includes receiving &lt;STRONG&gt;alerts&lt;/STRONG&gt; from the NGFW, in addition to XDR.&amp;nbsp; It seems, though, that a single &lt;STRONG&gt;incident&lt;/STRONG&gt; may include several different alerts.&amp;nbsp; This seems like a strange behavior, because the list of alerts come from many hosts, or threat type, or threat vector.&amp;nbsp; If the Incidents are grouping unrelated alerts, we'd like to understand why.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have one particular incident which is composed of seven wholly different alerts, and they're all being sent from the NGFW.&amp;nbsp; It would seem more sensible that there would be seven different incidents which match the alerts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I welcome your replies!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 18:35:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/527442#M769</guid>
      <dc:creator>Eric_Geater</dc:creator>
      <dc:date>2023-01-17T18:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: Incidents contain many alert types... but why?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/527552#M775</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/255854"&gt;@Eric_Geater&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Cortex XDR console should never group unrelated alerts in the same incident. There will always be some common artifact between the alerts in order for the console to put them under the same incident. I don't believe Palo Alto are officially sharing the complete logic of alert grouping, but if you look at the documentation you can see that there are multiple factors:&lt;BR /&gt;&lt;BR /&gt;"The logic behind which alert the &lt;SPAN class="phrase"&gt;Cortex XDR&lt;/SPAN&gt; app assigns to an incident is &lt;STRONG&gt;based on a set of rules&lt;/STRONG&gt; which take into &lt;STRONG&gt;account different attributes&lt;/STRONG&gt;. Examples of alert &lt;STRONG&gt;attributes include alert source, type, and time period&lt;/STRONG&gt;. The app extracts a set of artifacts related to the threat event, listed in each alert, and compares it with the artifacts appearing in existing alerts in the system. Alerts on the same causality chain are grouped with the same incident if an open incident already exists. Otherwise, the new incoming alert will create a new incident."&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs-cortex.paloaltonetworks.com/r/Cortex-XDR/Cortex-XDR-Prevent-Administrator-Guide/Incidents" target="_blank"&gt;Incidents • Cortex XDR Prevent Administrator Guide • Reader • Palo Alto Networks documentation portal&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my experience when comes to Incidents/Alerts from PAN FW usually they are:&lt;/P&gt;
&lt;P&gt;- Same public source triggering different threat log&lt;/P&gt;
&lt;P&gt;- Same destination targeted by different sources triggering different threat log&lt;/P&gt;
&lt;P&gt;- and of course different addresses triggering same threat log.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2023 14:27:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/527552#M775</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-01-18T14:27:40Z</dc:date>
    </item>
    <item>
      <title>Re: Incidents contain many alert types... but why?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/527957#M789</link>
      <description>&lt;P&gt;This may serve as a good example of a single alert we've received.&amp;nbsp; I'm not saying all alerts look like this, because many do not.&amp;nbsp; But when they do, well... it's interesting to parse.&amp;nbsp; You hope that the bulk of detail is "false positive" or "other" in your resolution.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Eric_Geater_0-1674221584933.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47276i486BA0376F8C3962/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Eric_Geater_0-1674221584933.png" alt="Eric_Geater_0-1674221584933.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 13:36:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/527957#M789</guid>
      <dc:creator>Eric_Geater</dc:creator>
      <dc:date>2023-01-20T13:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Incidents contain many alert types... but why?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/533855#M1004</link>
      <description>&lt;P&gt;Hi&amp;nbsp; &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/255854"&gt;@Eric_Geater&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Looking at the Alert names it looks like those are triggered&amp;nbsp; by Inbound traffic - public addresses trying to connect to your public resources behind the FW. My guess is the XDR is grouping all of them in the same incident either because they are targeting the same destination IP, or are sourced from the same external IP or both (both).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 21:45:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/533855#M1004</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-03-09T21:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: Incidents contain many alert types... but why?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/570860#M2308</link>
      <description>&lt;P&gt;Are all Alerts present within Incidents?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Dec 2023 12:31:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/incidents-contain-many-alert-types-but-why/m-p/570860#M2308</guid>
      <dc:creator>GRAVEREAPER</dc:creator>
      <dc:date>2023-12-26T12:31:40Z</dc:date>
    </item>
  </channel>
</rss>

