This website uses Cookies. By clicking Accept, you agree to the storing of cookies on your device to enhance your community experience. Read our Privacy Policy. Click Preferences to customize your cookie settings.
Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all Palo Alto Networks products in one place.
The message you are trying to access is permanently deleted.
Palo Alto Networks Approved
Community Expert Verified
Cortex XDR
Welcome to the Cortex XDR resource page. Cortex XDR allows you to rapidly detect and respond to threats across your networks, endpoints, and clouds. It assists SOC analysts by allowing them to view ALL the alerts from all Palo Alto Networks products in one place. On this page you can engage in Cortex XDR discussions and review helpful resources dedicated to Cortex XDR.
When setting the Agent profile in Cortex XDR, Under the check box when enabling "Monitor and Collect Enhanced Endpoint Data" is the following note:
No... —
Read more
I have tried using the below XQL query to identify the domains accessed and tried to test it using my own system but somehow I am not getting all the ... —
Read more
Hi,
I've just noticed this recently. A while ago when I added .csv file to a report, it was formatted with coma between columns. Now it is using a tab... —
Read more
What is the difference between Legacy agent exception and Disable prevention rules?
This was asked in another discussion but the answer does not res... —
Read more
3.10 activated in our tenant yesterday and along with that, our endpoints started upgrading to 8.3 (we are one release behind the latest).
This mornin... —
Read more
04-10-2024
—
April 2024
UPCOMING EVENTS
Alert Tuning Webinar Series
Join us for a Customer Success webinar series, Alert Tuning, starting on
April 24! You may register below for the series in advance.
Register here: Part 1 | Part 2 Symphony 2024: AI and Automation Come see
where security operations are heade... —
Read more
03-18-2024
—
March 2024
UPCOMING EVENTS
Parsing and Correlation Rules Webinar Series
Register now for the last part of the webinar series: Parsing &
Correlation Rules - Improving Application Security with Correlations.
Register here: Part 3 Investigation and Threat Hunting Virtual Workshop
Calling all custome... —
Read more
02-16-2024
—
February 2024
UPCOMING EVENTS
Parsing and Correlation Rules Webinar Series
Register now for Part 2 of the webinar series: Correlation Rules - the
core of detection. You may review the recording for Part 1 in the
On-Demand section below Register here: Part 2 | Part 3 Investigation and
Threat Hunti... —
Read more
01-10-2024
—
January 2024
UPCOMING EVENTS
Parsing and Correlation Rules Webinar Series
Register now for our upcoming webinar series: Parsing and Correlation
Rules - from Fundamentals to Practical Applications, starting on Jan
31st. Register below: Part 1 | Part 2 | Part 3 Investigation and Threat
Hunting Virt... —
Read more
04-25-2024
—
As cloud computing continues to evolve and becomes the ad-hoc standard
for many of the world’s largest enterprises, we also see attack surfaces
growing and the escalation of cyberthreats targeting the cloud and
traditional enterprise assets. These... —
Read more
Labels:
CDR CloudCortex XDRCortex XSIAMdetection and responseXDRXSIAM 1038
by
emgarciain Community Blogs
04-24-2024
—
This threat brief is frequently updated as new threat intelligence is
available for us to share. The full update log is at the end of this
post and offers the fullest account of all changes made. —
Read more
Labels:
CortexCortex XDRCortex XpanseCortex XSIAMthreat briefThreat Briefs and Assessmentsunit 42unit42 1692
by
emgarciain Community Blogs
04-11-2024
—
Machine learning (ML) powered methods are rapidly taking over the
cybersecurity medium, performing a variety of complex tasks, including
detection, prevention, and prioritization. —
Read more
03-25-2024
—
AI tends to be understood as one coherent field of study and application
where similar solutions apply for all the use cases. The reality is that
applying AI in real-world environments with high precision requires
specialization in the specific fi... —
Read more
03-18-2024
—
Identity analytics is a critical cybersecurity tool in combating the
challenges posed by compromised user accounts and malicious insiders.
Identity threats are pervasive across organizations of all sizes and
industries, potentially exposing sensit... —
Read more