XDR Analytics BIOC

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

XDR Analytics BIOC

L3 Networker

Hello Team,

 

How can we create exception for XDR Analytics BIOC incidents?

3 REPLIES 3

L5 Sessionator

Hi @RamyashreeMada ,

 

Thank you for writing to live community!

 

Exceptions in Cortex XDR can be created only for events related to prevention by Cortex XDR agent. XDR analytics and analytics BIOC alerts are detect only. As a result, we cannot create exceptions for them. Alerts from XDR analytics and analytics BIOC are trainable as they are generated out of machine learning algorithms on pattern detection and profiling. If you have a use case of a false positive, you can resolve the alerts as false positives or create automation rules for analytics alerts generating incidents in a balanced and a granularly stable fashion to auto resolve them.

 

If the above also does not work, you can create alert exclusions from the same and XDR analytics and XDR analytics BIOC incidents will not be generated for such FP events. Please make sure, you keep the exclusion rule balanced enough to prevent the event of suppressing actual true positive events.

You can also search in live community for responses on previous related discussions on the same:

https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/bioc-analytics-specific-exceptions-and-v...

https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/xdr-analytics-bioc-alert-exclusion/m-p/5...

 

 

Hope this helps!

Hello,

We have created a automation rule for one of the the XDR analytics incidents.

The rule is alerts will be closed as false positive as it is legitimate.

The incidents are getting closed in XDR console automatically, but we are montitoring these incidents through SIEM tool and it is triggering the incidents over there.

 

Can you provide us the solution that resolved alerts should not be forwarded to SIEM.

 

Hi @RamyashreeMada ,

 

For use cases where you have SIEM tools, you would not need to create simple automation rules at all because in that circumstance, you can leverage automation from your SIEM tool itself to trigger automation rules to close the False Positives(as you might have been doing for other alerts).

 

However, if you still want XDR automation to exist and not SIEM not fetch it, you might have to opt for a not so recommended solution is to pull the alerts at higher intervals for status only for new and under investigation(which is risky as there can be some alerts which will never reach your SIEM if it falls within the gap interval).

 

As a result, in scenarios like this, where automations exists on SIEM tool, the option should be using the automation on SIEM level itself. The XDR automations are for those scenarios where the customers do not have a SOC so large to include a SIEM but would want some native scenarios to be automated.

  • 1000 Views
  • 3 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!