- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
When running a SIEM, you need to have a huge team of many Analysts Level 1, Level 2, Level 3… Escalations to lateral teams (sometimes to take actions such as isolating endpoints/servers, gathering/deleting suspicious files, etc). It takes a huge effort of labor and up to several weeks for simple actions, like creating an alert.
Here is an example:
With Cortex XDR, you just login into the console and out of the box the attacks were blocked in a proactive approach. You have all the incidents armed, fully populated with many alerts (with their correspondent criticality) related to the same incident and enriched with meaningful context coming from different events, users involved on the alerts/incidents, assets, artifacts, endpoints and other network assets firewalls included. Start a live terminal towards the endpoints under investigation with or without notification to the user. You can perform forensics on the affected endpoints, set up correlation rules automatically from a XQL query and a lot more. It's day 0 and Cortex XDR has already blocked the attack before the malicious actors succeeded and given you tons of actionable information to investigate and respond further with just a few clicks, without the intervention and/or escalation to lateral teams.
This is possible thanks to our intensive use of machine learning to profile malicious behavior. After a training period, a baseline is established and from there we can identify abnormal behavior.
On top of that, Cortex XDR has been entirely designed and built as cloud native, able to stitch together your cloud logs, on-premise logs, third party logs, endpoint logs.
Example: Investigate the causality chain, ask XDR for the parent and child processes of the CGO-Causality Group Owner which is the process that originated the alert. The verdicts (malicious, benign) are already there at your disposal, MITRE ATT&CK framework mapped techniques and tactics related to the incident.
And on top of that you can gather suspicious files, erase them, quarantine them, isolate endpoints or groups of them, block the execution at certain paths, inspect hashes and another myriad of information and reports. As previously mentioned, it's already available out of the box and fully automated.
With Cortex XDR, You do not need to waste your time, labor and budget trying to look for the needle in the haystack anymore.
As an example, please see the following screenshots:
Thank you for reading!
Palo Alto Networks Contributors:
Luis Escobar, Cortex Customer Success Architect
Maor Hojberg, Technical Marketing Engineer
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Subject | Likes |
---|---|
4 Likes | |
3 Likes | |
3 Likes | |
2 Likes | |
2 Likes |
User | Likes Count |
---|---|
11 | |
4 | |
3 | |
2 | |
2 |