Cortex XSOAR Discussions
Cortex XSOAR enables SOC analysts to manage alerts across all sources, standardize processes with playbooks, take action on threat intel, and automate response for any security use case.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Cortex XSOAR Discussions
Cortex XSOAR enables SOC analysts to manage alerts across all sources, standardize processes with playbooks, take action on threat intel, and automate response for any security use case.
About Cortex XSOAR Discussions
Cortex XSOAR enables SOC analysts to manage alerts across all sources, standardize processes with playbooks, take action on threat intel, and automate response for any security use case.

Discussions

there any official training environments

I'm dedicated to self-learning the platform but understand the standalone Community Edition may have been discontinued.

Since I am not currently a Palo Alto Networks Partner or a paying customer, what are the recommended ways for an individual to get

...

Deduping in Playbooks

I'm confused as to how to use the DedupBy command/script in my Playbook. I have a set command that grabs all the UPNs from a list of alerts in the data. This results in the Context data of:
Defender:{
UPNs:[
0:"user1@domain.com"
1:"user2@domain.com"
2:"us

...

sackett by L1 Bithead
  • 329 Views
  • 1 replies
  • 0 Likes

Resolved! Cortex XSOAR intergration with Terraform Cloud?

As Cortex XSOAR  can use the API of Ansible Tower (the normal ansible does not have API so Tower is needed) to trigger playbooks (https://xsoar.pan.dev/docs/reference/integrations/ansible-tower ) for managing many kinds of devices it is interesting i

...

XSOAR SLA Script

Hi everyone,

 

I have a question regarding SLA tagged scripts on XSOAR. 

I have a field-change-triggerred script that starts an SLA timer within automation if the field is changed to certain values. This part is okay and we observe that the sla timer

...

SplunkPy Integration

Hi everyone,
I get data from splunk with the "search index=notable" query using Splunkpy. I assign the incoming data to the type named Splunk Generic Notable by default. Here, when an incident occurs, there are fields such as event_code, process_name

...

  • 1282 Posts
  • 43 Subscriptions
Top Liked Posts
Top Liked Authors