Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Cortex XDR Discussions
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.
About Cortex XDR Discussions

Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all PANW products in one place, telling the full story of what actually happened in seconds and allows seamless response.

Please note: All postings in LIVEcommunity are visible to other users; please keep your network secure by refraining from posting live IP address’s or domain names here. Contact your Customer Success team for network-specific questions.

Discussions

Resolved! Cortex XDR - Brute force alert rule

Hi,

 

I need to create a brute force rule.

When endpoints with tag "CRITICAL" has "action_evtlog_description = An account failed to log on" and has more than 50 logs, create a CRITICAL alert.

 

Could you help pls.

 

Regards,

Automation of Reports

Hello Team,

 

  • We need to create automated XDR report to detect executions of “Python.exe” and “PowerShell.exe & PowerShell_ise.exe” in our environment.
  • Can we query a incident/alerts to make a report or suggest us how we can generate reports based on
...

Resolved! Get info from different dataset and compare

Hi,

 

I need to get failed logins from critical assets.

 

So I was trying to get tag "CRITICAL" in endpoints dataset and if there are any "event_type = ENUM.EVENT_LOG and action_evtlog_event_id = 4625 in xdr_data dataset.

 

Could you help pls

 

Resolved! Palo Alto BIOC rule content error [specific rule]

Hello,

There is an issue with one of the BIOC rules provided by Palo Alto. Specifically in the rule with Global ID "94fed992-c1da-4b69-9caa-292221b8c070".

The wildcards for the command line arguments that this rule intents to detect, are off. To be p

...

ithermos by L1 Bithead
  • 1494 Views
  • 2 replies
  • 0 Likes

Resolved! XDR API File Retrieval

Hello,

 

I'm trying to connect an integration with our Cortex XDR for retrieving a file and its details. The only endpoint I see in the API docs that reference this action is the File Retrieval Details which uses the group_action_id from a different

...

Kevhardy by L0 Member
  • 1703 Views
  • 2 replies
  • 0 Likes

Resolved! Powershell Script and XDR

There is a PowerShell script that we would like to use within XDR. I understand that XDR currently is not able to run PowerShell scripts, the problem is I am not a coder. I have been trying to learn how to convert our script to Python but I am just a

...

Licence Cortex XDR Pro

Hello dear community, 

 

I know now, if you have less licences than installed agents, somehow they are degraded to Prevent. 

Can we see somewhere which one is degraded to Prevent version?

 

How is degrading happen and where can I see it?

 

BR

 

Rob 

RFeyertag by L4 Transporter
  • 849 Views
  • 1 replies
  • 0 Likes
  • 1926 Posts
  • 79 Subscriptions
Top Liked Authors