Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
About Cortex XDR Discussions

Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.

Please note: All postings in LIVEcommunity are visible to other users; please keep your network secure by refraining from posting live IP address’s or domain names here. Contact your Customer Success team for network-specific questions.

Discussions

Welcome to the Cortex XDR Discussions!

To make this forum valuable and enjoyable for everyone, please review the following guidelines before participating: Rules and Best Practices Be Respectful: Treat fellow community members with professionalism and courtesy. Constructive discussions are encouraged; disrespectful or inflammatory comments are not. Stay On-Topic: This board is d...

JayGolf by Community Team Member
  • 4319 Views
  • 0 replies
  • 3 Likes

Resolved! Basic Doubt - Analytics

Hello everyone, I’m configuring some features in Cortex and noticed that a few alerts are being generated by the Analytic Rules. How can I automatically create a CASE based on these alerts? My intention is to open incidents (i.e., “Cases”) in the console.This is meant to improve visibility and ensure proper alert monitoring.

Resolved! Request: XQL query for filename + optional hash logic (single stream)

Hi all,Could someone help me write an XQL query in Cortex XSIAM that: Detects process executions and file create/modify touches matching these names:svc.exe, pwrautomate.exe, mcs.bat, cleanup.bat, uri.bat, p.zip Also matches this masquerade regex (case-insensitive):^filters_update_.*_at_abdata\.com\.exe$ Treats hash IOCs as optional (include wh...

Problem with Juniper Syslog

Hi, this is my first post and I need help. I am trying to connect the syslog of a Juniper ACX7024X to my Broker, but I cannot see any logs. The router is sending logs, but I cannot see anything from Cortex. I set it to raw format, auto-select, but nothing. I understand that everything is configured correctly on the router, although we trie...

Cortex Data Lake - Windows 11 Build & Enablement(?) Info

Windows 11 (and 10 presumably) has a series of numbers which, together, identify the build and patch level of the OS. This would be a combination of Version: Windows 11 and/or Build Number: 10.0.22631. The Patch Level (or Enablement Level) is shown by an additional 4 digit number at the end of the Build Number like Windows Build 10.0.22631.431...

XDR as "SIEM" (challenge for discussion)

I wanted to leave a challenge here for discussion in the group.Why not use XDR as if it were a SIEM, in order to analyze more events with better accuracy, and to create more correlation and data enrichment? I’m referring to an environment with:XDR, XSOAR, Palo Alto/Fortigate firewalls, Windows and Linux systems, and O365. For systems that don’t ...

tlmarques by L4 Transporter
  • 879 Views
  • 1 replies
  • 0 Likes

Custom BIOC Rule won't apply to Prevention Profile

We are attempting to make a custom BIOC rule to prevent the use of certain softwares on our servers. Applying the BIOC to a prevention profile works, except for when we add any exceptions. Say we are attempting to block Google Chrome on servers, we add an exception for a prefix used for end user device names and the BIOC can no longer be applied...

Cortex XDR PoC: Monitoring Malicious Chrome Extensions

  PoC Lab: Monitoring Malicious Chrome Extensions By: @mfakhouri Executive Summary With the convenience Chrome extensions provide, such as ad blocking, enhanced web viewing, and improving user experiences, it is no surprise that malicious actors seek to leverage Web Store services to deliver malicious content. In recent times, strikingly...

CortexLogo.png
browsext-arc.PNG
ChromeDirName.PNG
testQuery.PNG
mfakhouri by L3 Networker
  • 15533 Views
  • 2 replies
  • 15 Likes

Resolved! Cortex XDR Pro / Browser extensions

Has anyone ever configured their environment to detect on unauthorized or unsupported browser extensions? Or conduct a threat hunt based on known facts? We've seen some slip through the cracks and I know Cortex doesn't natively detect abused or malicious extensions. Any XQL ideas out there perhaps?

CraigV123 by L3 Networker
  • 1296 Views
  • 2 replies
  • 0 Likes

Cortex XDR 8.9 Non-Persistent Citrix Servers and Cache Write Issue

Hello everyone, We have encountered and issue where the target servers do not get content updates. The citrix Windows servers reboot nightly with the golden image configurations but do not receive the latest content updates. At the same time, around noon we have to reboot the target servers due to write cache filling up to 100%. Have you enco...

Resolved! Windows Installer DB: Current agent installation is missing

I am currently experiencing an issue while attempting to upgrade agents in the Cortex XDR console. The upgrade process fails with the following error message: "Windows Installer DB: Current agent installation is missing." I attempted to clean the endpoint; however, the process was unsuccessful. I would like to ask if there is any alternative...

  • 2582 Posts
  • 95 Subscriptions
Top Solution Authors