<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: History of groups involved in an attack? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/history-of-groups-involved-in-an-attack/m-p/530266#M109428</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/271178"&gt;@jermomiu&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can manually go through all the logs but that's quite troublesome and time consuming.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Autofocus can help you with that. It enables you to easily identify critical attacks, so that you can triage effectively and take action without requiring additional IT resources. It correlates data from &lt;A href="https://docs.paloaltonetworks.com/wildfire/10-2/wildfire-admin" target="_blank" rel="noopener nofollow noreferrer"&gt;WildFire&lt;/A&gt;, the &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/url-filtering/url-filtering-overview" target="_blank" rel="noopener nofollow noreferrer"&gt;PAN-DB&lt;/A&gt; URL Filtering database, &lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener nofollow noreferrer"&gt;Unit 42&lt;/A&gt;, and from third-party feeds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, Autofocus is end-of-sale as of September 2022 (but still supported until 2025).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For alternatives to Autofocus you might want to look into &lt;A href="https://www.paloaltonetworks.com/cortex/threat-intel-management" target="_blank" rel="noopener"&gt;Cortex XSOAR TIM&lt;/A&gt; or &lt;A href="https://docs.paloaltonetworks.com/aiops/aiops-for-ngfw" target="_blank" rel="noopener"&gt;AIOps for NGFW&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/autofocus-end-of-sale-faq-and-alternatives/ba-p/516051" target="_blank" rel="noopener"&gt;Autofocus end-of-sale FAQ and Alternatives&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kiwi&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
    <pubDate>Wed, 08 Feb 2023 10:55:14 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2023-02-08T10:55:14Z</dc:date>
    <item>
      <title>History of groups involved in an attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/history-of-groups-involved-in-an-attack/m-p/529490#M109311</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when an attack occurs, where can I find the entire history of groups that where involved in that attack? Can I see that in Wildifre maybe or is it AutoFocus that is needed for that?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 15:25:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/history-of-groups-involved-in-an-attack/m-p/529490#M109311</guid>
      <dc:creator>jermomiu</dc:creator>
      <dc:date>2023-02-01T15:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: History of groups involved in an attack?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/history-of-groups-involved-in-an-attack/m-p/530266#M109428</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/271178"&gt;@jermomiu&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can manually go through all the logs but that's quite troublesome and time consuming.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Autofocus can help you with that. It enables you to easily identify critical attacks, so that you can triage effectively and take action without requiring additional IT resources. It correlates data from &lt;A href="https://docs.paloaltonetworks.com/wildfire/10-2/wildfire-admin" target="_blank" rel="noopener nofollow noreferrer"&gt;WildFire&lt;/A&gt;, the &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/url-filtering/url-filtering-overview" target="_blank" rel="noopener nofollow noreferrer"&gt;PAN-DB&lt;/A&gt; URL Filtering database, &lt;A href="https://unit42.paloaltonetworks.com/" target="_blank" rel="noopener nofollow noreferrer"&gt;Unit 42&lt;/A&gt;, and from third-party feeds.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, Autofocus is end-of-sale as of September 2022 (but still supported until 2025).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For alternatives to Autofocus you might want to look into &lt;A href="https://www.paloaltonetworks.com/cortex/threat-intel-management" target="_blank" rel="noopener"&gt;Cortex XSOAR TIM&lt;/A&gt; or &lt;A href="https://docs.paloaltonetworks.com/aiops/aiops-for-ngfw" target="_blank" rel="noopener"&gt;AIOps for NGFW&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/autofocus-end-of-sale-faq-and-alternatives/ba-p/516051" target="_blank" rel="noopener"&gt;Autofocus end-of-sale FAQ and Alternatives&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kiwi&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 08 Feb 2023 10:55:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/history-of-groups-involved-in-an-attack/m-p/530266#M109428</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2023-02-08T10:55:14Z</dc:date>
    </item>
  </channel>
</rss>

