Cortex Xdr Pro Admin
Cortex Xdr Pro Admin
Guide
docs.paloaltonetworks.com
Contact Informaon
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support.html
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
©2018–2021 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks menoned herein may be trademarks of their respecve
companies.
Last Revised
December 6, 2021
Cortex® XDR™ Pro Administrator’s Guide 2 ©2021 Palo Alto Networks, Inc.
Table of Contents
Cortex® XDR™ Overview..............................................................................11
Cortex® XDR™ Architecture..................................................................................................12
Cortex® XDR™ Concepts....................................................................................................... 14
XDR................................................................................................................................... 14
Sensors..............................................................................................................................14
Log Stching....................................................................................................................14
Causality Analysis Engine.............................................................................................15
Causality Chain...............................................................................................................15
Causality Group Owner (CGO)................................................................................... 15
Cortex® XDR™ Licenses......................................................................................................... 16
Features by Cortex® XDR™ License Type.............................................................. 16
Cortex® XDR™ License Allocaon........................................................................... 20
Cortex® XDR™ License Expiraon........................................................................... 21
Cortex® XDR™ License Monitoring..........................................................................22
Migrate Your Cortex® XDR™ License...................................................................... 23
Cortex® XDR™ Pro Administrator’s Guide 3 ©2021 Palo Alto Networks, Inc.
Table of Contents
Cortex® XDR™ Pro Administrator’s Guide 4 ©2021 Palo Alto Networks, Inc.
Table of Contents
Cortex® XDR™ Pro Administrator’s Guide 5 ©2021 Palo Alto Networks, Inc.
Table of Contents
Invesgate Files.......................................................................................................................440
Manage File Execuon...............................................................................................440
Manage Quaranned Files........................................................................................ 441
Review WildFire® Analysis Details......................................................................... 443
Import File Hash Excepons.....................................................................................445
Forensic Data Analysis...........................................................................................................447
Forensics Add-on Opons.........................................................................................452
Response Acons....................................................................................................................463
Iniate a Live Terminal Session................................................................................464
Isolate an Endpoint..................................................................................................... 470
Remediate Changes from Malicious Acvity........................................................ 471
Run Scripts on an Endpoint...................................................................................... 474
Search and Destroy Malicious Files........................................................................ 490
Manage External Dynamic Lists...............................................................................493
Cortex® XDR™ Pro Administrator’s Guide 6 ©2021 Palo Alto Networks, Inc.
Table of Contents
Cortex® XDR™ Pro Administrator’s Guide 7 ©2021 Palo Alto Networks, Inc.
Table of Contents
Analycs...........................................................................................................831
Analycs Concepts................................................................................................................. 832
Analycs Engine...........................................................................................................832
Cortex® XDR™ Pro Administrator’s Guide 8 ©2021 Palo Alto Networks, Inc.
Table of Contents
Analycs Sensors.........................................................................................................833
Coverage of the MITRE Aack Taccs.................................................................. 835
Analycs Detecon Time Intervals.........................................................................837
Analycs Alerts and Analycs BIOCs.................................................................... 839
Identy Analycs.........................................................................................................840
Asset Management........................................................................................841
Network Asset Management............................................................................................... 842
Configure Your Network Parameters......................................................................842
Manage Your Network Assets..................................................................................845
Manage User Scores................................................................................................... 848
Cloud Inventory Assets......................................................................................................... 851
All Cloud Assets...........................................................................................................851
Specific Cloud Assets................................................................................................. 855
Manage Your Cloud Inventory Assets.................................................................... 857
Monitoring....................................................................................................... 871
Cortex® XDR™ Dashboard.................................................................................................. 872
Dashboard Widgets.................................................................................................... 872
Manage Your Widget Library....................................................................................881
Predefined Dashboards.............................................................................................. 884
Build a Custom Dashboard....................................................................................... 891
Manage Dashboards................................................................................................... 894
Run or Schedule Reports...........................................................................................894
Monitor Cortex XDR Incidents............................................................................................897
Monitor Cortex XDR Gateway Management Acvity................................................... 898
Monitor Administrave Acvity..........................................................................................900
Monitor Agent Acvity..........................................................................................................903
Monitor Agent Operaonal Status..................................................................................... 906
Log Forwarding...............................................................................................909
Log Forwarding Data Types..................................................................................................910
Integrate Slack for Outbound Noficaons..................................................................... 911
Integrate a Syslog Receiver.................................................................................................. 914
Configure Noficaon Forwarding..................................................................................... 917
Cortex® XDR™ Log Noficaon Formats........................................................................ 919
Management Audit Log Messages.......................................................................... 919
Alert Noficaon Format.......................................................................................... 957
Agent Audit Log Noficaon Format..................................................................... 967
Management Audit Log Noficaon Format........................................................ 969
Cortex® XDR™ Log Format for IOC and BIOC Alerts....................................... 970
Cortex® XDR™ Analycs Log Format....................................................................980
Cortex® XDR™ Pro Administrator’s Guide 9 ©2021 Palo Alto Networks, Inc.
Table of Contents
Cortex® XDR™ Pro Administrator’s Guide 10 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
The Cortex® XDR™ app offers you complete visibility over network traffic, user
behavior, and endpoint acvity. It simplifies threat invesgaon by correlang logs
from your sensors to reveal threat causalies and melines. This enables you to easily
idenfy the root cause of every alert. The app also allows you to perform immediate
response acons. Finally, to stop future aacks, you can pro-acvely define Cortex
XDR Rules (BIOCs, IOCs, and Correlaon Rules) to detect and respond to malicious
acvity.
11
Cortex® XDR™ Overview
Cortex® XDR™ consumes data from Cortex® Data Lake—which is a kind of a cloud logging service
for endpoints, firewalls, cloud sources, and third-party data—and can correlate and stch together
logs across your different log sensors to derive event causality and melines.
A Cortex XDR deployment which uses the full set of sensors can include the following
components:
• Cortex XDR—The Cortex XDR app provides complete visibility into all your data in the Cortex
Data Lake. The app provides a single interface from which you can invesgate and triage alerts,
take remediaon acons, and define policies to detect the malicious acvity in the future.
• Cortex Data Lake—A cloud-based logging infrastructure that allows you to centralize the
collecon and storage of logs from your log data sources.
• Cortex XDR Pro per TB:
• Analycs engine—The Cortex XDR analycs engine is a security service that ulizes
network data to automacally detect and report on post-intrusion threats. The analycs
engine does this by idenfying good (normal) behavior on your network, so that it can noce
bad (anomalous) behavior.
• Palo Alto Networks next-generaon firewalls—On-premises or virtual firewalls that enforce
network security policies in your campus, branch offices, and cloud data centers.
• Palo Alto Networks Prisma Access and GlobalProtect—If you extend your firewall security
policy to mobile users and remote networks using Prisma Access or GlobalProtect, you can
also forward related traffic logs to Cortex Data Lake. The analycs engine can then analyze
those logs and raise alerts on anomalous behavior.
• External firewalls and alerts—Cortex XDR can ingest traffic logs from external firewall
vendors—such as Check Point—and use the analycs engine to analyze those logs and raise
alerts on anomalous behavior. For addional context in your incidents, you can also send
alerts from external alert sources.
Cortex® XDR™ Pro Administrator’s Guide 12 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
Cortex® XDR™ Pro Administrator’s Guide 13 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
XDR
With Endpoint Detecon and Response (EDR), enterprises rely on endpoint data as a means
to trigger cybersecurity incidents. As cybercriminals and their taccs have become more
sophiscated, the me to idenfy and contain breaches has only increased. Extended Detecon
and Response (XDR) goes beyond the tradional EDR approach of using only endpoint data to
idenfy and respond to threats by applying machine learning across all your enterprise, network,
cloud, and endpoint data. This approach enables you to quickly find and stop targeted aacks and
insider abuse and remediate compromised endpoints.
Sensors
Cortex® XDR™ uses your exisng Palo Alto Networks products as sensors to collect logs and
telemetry data. The sensors that are available to you depend on your Cortex XDR license type.
With a Cortex XDR Pro per TB license, a sensor can be any of the following:
• Virtual (VM-Series) or physical firewalls—Idenfies known threats in your network and cloud
data center environments
• Prisma Access or GlobalProtect—Idenfies known threats in your mobile user and remote
network traffic
• External vendors—You can forward logs from supported vendors and addional vendors that
adhere to required formats.
With a Cortex XDR Pro per Endpoint license, a sensor can be any of the following:
• Cortex XDR agents—Idenfies threats on your Windows, Mac, Linux, and Android endpoints
and halts any malicious behavior or files
While more sensors increases the amount of data Cortex XDR can analyze, you only need to
deploy one type of sensor to begin detecng and stopping threats with Cortex XDR.
Log Stching
To provide a complete and comprehensive picture of the events and acvity surrounding an event,
Cortex XDR™ correlates together firewall network logs, endpoint raw data, and cloud data across
your detecon sensors. The act of correlang logs from different sources is referred to as log
Cortex® XDR™ Pro Administrator’s Guide 14 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
stching and helps you idenfy the source and desnaon of security processes and connecons
made over the network.
Log stching allows you to:
• Run invesgaon queries based on stched network and endpoint logs
• Create granular BIOC and Correlaon Rules over logs from Palo Alto Networks Next-
Generaon Firewalls and raw endpoint data
• Invesgate correlated network and endpoint events in the Network Causality View
Log stching streamlines detecon and reduces response me by eliminang the need for manual
analysis across different data sensors. Stching data across the firewalls and endpoints allows
you to obtain data form different sensors in a unified view, each sensor adding another layer
of visibility. For example, when a connecon is seen through the firewall and the endpoint, the
endpoint can provide informaon on the processes involved and on the chain of execuon while
the firewall can provide informaon on the amount of data transferred over the connecon and
the different app ids involved.
Causality Chain
When a malicious file, behavior, or technique is detected, Cortex XDR™ correlates available
data across your detecon sensors to display the sequence of acvity that led to the alert. This
sequence of events is called the causality chain. The causality chain is built from processes, events,
insights, and alerts associated with the acvity. During alert invesgaon you should review the
enre causality chain to fully understand why the alert occurred.
Cortex® XDR™ Pro Administrator’s Guide 15 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
Feature Cortex XDR Cortex XDR Pro Cortex XDR Cortex XDR Pro
Prevent per Endpoint Cloud per Host per TB
Kubernetes Host — — —
Support
Cortex® XDR™ Pro Administrator’s Guide 16 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
Feature Cortex XDR Cortex XDR Pro Cortex XDR Cortex XDR Pro
Prevent per Endpoint Cloud per Host per TB
Host Insights, — —
including:
Without the Without the
• Host add-on license, add-on license,
Inventory Host Insights is Host Insights is
available with available with
• Vulnerability
Cortex XDR Pro Cloud Host
Assessment
per Endpoint for Protecon for
• File Search a 1-month trial Cortex XDRfor
and Destroy period. a 1-month
trial period.
Forensics — —
Without the Without the
add-on license, add-on license,
Forensics is Forensics is
available with available with
Cortex XDR Pro Cloud Host
per Endpoint for Protecon for
a 1-month trial Cortex XDR
period. for a 1-month
trial period.
Compute Unit —
Without the Without the Without the
add-on license, add-on license, add-on license,
Compute unit Compute unit Compute unit
is available with is available with is available with
Cortex XDR Pro Cloud Host Cortex XDR
per Endpoint for Protecon for Pro per TBfor
a 1-month trial Cortex XDR for a 1-month trial
period. a 1-month trial period.
period.
XDR RTN —
(retenon)
Endpoint —
management
Device control —
Host firewall —
Cortex® XDR™ Pro Administrator’s Guide 17 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
Feature Cortex XDR Cortex XDR Pro Cortex XDR Cortex XDR Pro
Prevent per Endpoint Cloud per Host per TB
Disk encrypon —
Response Acons
Live Terminal —
Endpoint —
isolaon
External —
dynamic list
(EDL)
Script execuon — —
Remediaon — —
analysis
Incident Scoring —
Rules
Featured Alert —
Fields
Widget Library —
Assets
Asset —
Management
Analysis
Analycs —
Cortex XDR —
agent alerts
Prisma Cloud — — —
and Prisma
Cloud Compute
Third-Party — — —
Cloud Security
Cortex® XDR™ Pro Administrator’s Guide 18 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
Feature Cortex XDR Cortex XDR Pro Cortex XDR Cortex XDR Pro
Prevent per Endpoint Cloud per Host per TB
Data (AWS,
Azure, Google)
Enhanced data — —
collecon for
EDR and other
Pro features
Other alerts —
(from Palo Alto
(API)
Networks and
third-party
sources)
Other logs — — —
(from Palo Alto
Networks and
third-party
sources)
Integraons
Threat
intelligence
(AutoFocus,
VirusTotal)
Outbound
integraon and
+ agent audit + agent audit
noficaon
logs logs
forwarding
(Slack, Syslog)
Broker VM
Agent Proxy
Syslog Collector — — —
CSV Collector — — —
Database — — —
Collector
FTP Collector — — —
Cortex® XDR™ Pro Administrator’s Guide 19 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
Feature Cortex XDR Cortex XDR Pro Cortex XDR Cortex XDR Pro
Prevent per Endpoint Cloud per Host per TB
NetFlow — — —
Collector
Network —
Mapper
Pathfinder —
Windows Event — — —
Collector
MSSP
MSSP (requires
addional MSSP
license)
Managed — —
Threat Hunng
+ a minimum of
(requires an
500 endpoints
addional
Managed Threat
Hunng License)
Cortex® XDR™ Pro Administrator’s Guide 20 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
of agents aer 14 days. If addional Pro agents are required, increase your Cortex XDR Pro per
Endpoint license capacity.
To view the Pro license status for specific endpoints, see the View Details About an Endpoint.
License Revocaon
With Cortex XDR Prevent and Cortex XDR Pro per Endpoint licenses, Cortex XDR manages
licensing for all endpoints in your organizaon. Each me you install a new Cortex XDR agent on
an endpoint, the Cortex XDR agent registers with Cortex XDR to obtain a license. In the case of
non-persistent VDI, the Cortex XDR agent registers with Cortex XDR as soon as the user logs in
to the endpoint.
Cortex XDR issues licenses unl you exhaust the number of license seats available. Cortex XDR
also enforces a license cleanup policy to automacally return unused licenses to the pool of
available licenses. The me at which a license returns to the license pool depends on the type of
endpoint:
Endpoint Type License Return Agent Removal from Agent Removal from
Cortex XDR console Cortex XDR Database
Standard and Aer 30 days Aer 180 days Aer 180 days
mobile devices
Aer a license is revoked, if the agent connects to Cortex XDR, reconnecon will succeed as long
as the agent has not been deleted.
If a deleted agent tries to connect to Cortex XDR during the 180 days period, the agent can
resume connecon and maintain its agent ID. Aer the 180 days period, the agent ID is deleted
alongside all the associated data. In order to reconnect the agent, you must use Cytool to
reconnect it or reinstall it on the endpoint, and the agent will be assigned a new ID and a fresh
start.
Cortex® XDR™ Pro Administrator’s Guide 21 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
For the first 30 days of your expired license, Cortex XDR connues to protect your endpoints
and/or network and retains data in the Cortex Data Lake according to your Cortex Data Lake data
retenon policy and licensing. Aer 30 days, the tenant is decommissioned and agent prevenon
capabilies cease.
Cortex® XDR™ Pro Administrator’s Guide 22 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
• For each license, Cortex XDR displays a le with the expiraon date of your license and
addional details specific to your license type:
• Cortex XDR Prevent—Total number of concurrent agents permied by your license.
• Cortex XDR Pro per Endpoint—Total number of installed agents in addion to the number
and percentage of agents with Pro features enabled.
• Cortex XDR Pro per TB—Amount of total storage included with your license.
• Cortex XDR Cloud per Host—Total number of hosts collecng cloud-based data.
• Combinaon of Cortex XDR Pro per Endpoint and Cortex XDR Pro per TB Cortex XDR Pro
per Endpoint—Total number of installed agents, while Cortex XDR Pro per TB displays how
many agents are enabled with endpoint data collecon, allowing them to collect and send
data to the server.
Addons
• Hover over the informaon icon to view a list of all available add-ons including the start and
expired dates.
• For each add-on associated to your Cortex XDR instance, Cortex XDR displays a le with
details specific to the add-on type.
For informaon on your data usage and storage license, navigate to (Sengs) > Configuraons
> Data Management > Dataset Management.
To keep you informed of updates made to your license and avoid service disrupons, Cortex XDR
displays license noficaons when you log in. The noficaon idenfies any changes made to your
license and describes any required acons. Cortex XDR also indicates when you have exceeded
your Cortex XDR Pro per Endpoint license capacity. To view the Pro license status for specific
endpoints, see the View Details About an Endpoint. For more informaon, see Enforcement of
Cortex XDR Pro Endpoint Licenses.
Cortex® XDR™ Pro Administrator’s Guide 23 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
• Cortex XDR Pro per TB license—Amount of network data used for network traffic analysis and
third-party data.
Endpoints • For each Cortex 1.0 license, 1 TB = 200 Pro per Endpoints (with
EDR collecon).
The number of endpoints is converted based on the quota allocated
in Hub > Cortex Data Lake > Cortex XDR > Endpoint XDR Data,
previously Traps > Endpoint Data.
Network Data • For each Cortex XDR 1.0 license, 1 TB = 1 TB of network data.
Aer migraon of Cortex 2.0, when selecng Sengs ( ) > Cortex XDR License, the license
displays the converted amounts of network data or its equivalent number of endpoints allocated
to your license. The following table displays a conversion comparison between Cortex XDR 1.0
and 2.0 licenses.
Aer you convert your legacy license to Cortex XDR 2.0 license structure, your new
network and endpoint allocaon are applied immediately. You can edit the allocaon at
any me, however, aer you convert to the new license structure you cannot revert to
your legacy license.
Cortex® XDR™ Pro Administrator’s Guide 24 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
STEP 1 | In Cortex XDR app, select Sengs ( ) > Cortex XDR License.
Cortex® XDR™ Pro Administrator’s Guide 25 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
STEP 2 | Convert your Cortex XDR 1.0 license to Cortex XDR 2.0 license.
1. Select Convert License.
2. Use the Network Allocaon slide bar to allocate your license between network and
endpoints (1 network TB = 200 endpoints).
If you allocate all of your license to network data then you disable endpoint
capabilies (and vice versa).
3. Apply your new license allocaons.
Cortex® XDR™ Pro Administrator’s Guide 26 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
STEP 3 | In your new Cortex XDR 2.0 license, review or Edit your license allocaon:
• Number of Cortex XDR agents
• Amount of network TB
• Number of installed endpoints and endpoints enabled with EDR Data collecon according
to the number of agents allocated to your license, rather than the Cortex Data Lake
distribuon.
• Number of days remaining for Cortex XDR to retain your data.
STEP 4 | Should you require addional TB or agent coverage, contact your Sales representave.
Cortex® XDR™ Pro Administrator’s Guide 27 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Overview
Cortex® XDR™ Pro Administrator’s Guide 28 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
> Cortex® XDR™ Pro Setup Overview
29
Get Started with Cortex® XDR™ Pro
STEP 2 | (Cortex XDR Pro per TB license only) Deploy your Network Devices.
STEP 5 | (Oponal) Set Up Cloud Identy Engine (Formally Directory Sync Services (DSS))
1. Acvate and Set Up a Cloud Identy Engine Instance.
2. Add the Cloud Identy Engine Instance to Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 30 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 6 | (Cortex XDR Pro per Endpoint only) Set up Endpoint Protecon.
1. Plan your Cortex XDR agent deployment.
2. Create Cortex XDR agent installaon packages.
3. Define endpoint groups.
4. Deploy the Cortex XDR agent to your endpoints.
5. Configure your endpoint security policy.
STEP 7 | (Cortex XDR Pro per TB license only) Configure your Network Devices.
STEP 8 | (Cortex XDR Pro per TB license only) Set up Network Analysis.
1. Perform any remaining setup of your network sensors.
2. Configure the internal networks that you want Cortex XDR to monitor.
3. Verify that Cortex XDR is receiving alerts.
4. If you set up a Directory Sync Service instance, enable Cortex XDR to use it.
Cortex® XDR™ Pro Administrator’s Guide 31 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
New Cortex XDR Use the to determine the amount of log storage you need for
tenants your Cortex XDR deployment. Talk to your Partner or Sales
Representave to determine whether you must purchase addional
Cortex Data Lake storage.
Determine the region in which you want to host Cortex XDR and
any associated services, such as Cortex Data Lake and Directory
Sync Service:
• US—All Cortex XDR logs and data remain within the US
boundary.
• UK—All Cortex XDR logs and data remain within the UK
boundary.
• EU—All Cortex XDR logs and data remain within the Europe
boundary.
• SG—All Cortex XDR logs and data remain within the Singapore
boundary.
• JP—All Cortex XDR logs and data remain within the Japan
boundary.
• CA—All Cortex XDR logs and data remain within the Canada
boundary. However, if you have a WildFire Canada cloud
subscripon, consider the following:
• You can not send file submissions for bare-metal analysis.
• You will not be protected against macOS-borne zero-day
threats. However, you will receive protecons against other
macOS malware in regular WildFire updates.
• You will not be able to see file submissions in AutoFocus™.
• AU—All Cortex XDR logs and data remain within the Australia
boundary.
• IN—All Cortex XDR logs and data remain within the India
boundary. However, if you have a WildFire India cloud
subscripon, consider the following:
• When the Cortex XDR agent idenfies unknown files, Cortex
XDR sends the files to the WildFire Singapore Cloud for
analysis. Starng October 2021 Cortex XDR will integrate
Cortex® XDR™ Pro Administrator’s Guide 32 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 33 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 2 | Upgrade firewalls and Panorama to the latest soware and content releases.
PAN-OS 8.0.6 is the minimum required soware release version for Palo Alto Networks
firewalls and Panorama. However, to enable Cortex XDR to leverage the Directory Sync Service
and Enhanced Applicaon Logs, upgrade firewalls and Panorama to PAN-OS 8.1.1 or later and
to the latest content release:
Get the latest applicaon and threat content updates.
Upgrade to PAN-OS 8.1.1.
STEP 3 | Ensure that firewalls have visibility into internal traffic and applicaons.
It’s important that at least one firewall sending logs to the Cortex Data Lake is processing or
has visibility into internal traffic and applicaons.
If you have deployed only internet gateway firewalls, one opon might be to configure a tap
interface to give a firewall visibility into data center traffic even though the firewall is not in the
traffic flow. Connect the tap mode interface to a data center switch SPAN or mirror port that
provides the firewall with the mirrored traffic, and make sure that the firewall is enabled to log
the traffic and send it to the Cortex Data Lake.
Because data center firewalls already have visibility into internal network traffic, you
don’t need to configure these firewalls in tap mode; however, contact Palo Alto Networks
Professional Services for best pracces to ensure that the Cortex Data Lake and Cortex XDR-
required configuraon updates do not affect data center firewall deployments.
Cortex® XDR™ Pro Administrator’s Guide 34 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
The Cortex Data Lake quota management and sizing calculator are managed on the hub.
Acvang a Cortex XDR tenant is a one-me task you’ll need to perform when you first start
using Cortex XDR. Aer you’ve acvated your Cortex XDR tenant—and completed all the steps
described in Cortex® XDR™ Pro Setup Overview—you’ll only need to repeat the acvaon if you
want to add addional Cortex XDR tenants.
The following are prerequisites to acvate Cortex XDR:
• Locate the email that contains your acvaon informaon.
• Ensure you have CSP Super User role permissions to your exisng administrator accounts. This
role cannot be removed or changed through the Cortex XDR Gateway.
• You created and acvated a Cortex Data Lake instance and know the instance name.
This is a prerequisite for new customers, exisng customers can link the Cortex XDR
tenant to their exisng CDL.
To acvate your Cortex XDR tenant:
Cortex® XDR™ Pro Administrator’s Guide 35 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 1 | Navigate to the acvaon link you received in email and sign in to begin acvaon in the
Cortex XDR Gateway.
As a first user with CSP Super User permissions to access the Cortex XDR Gateway,
you are automacally granted XDR Account Admin permissions to the Cortex XDR
Gateway. With these permissions, you are able to acvate Cortex XDR tenants, create
new roles, and assign permissions to users allocated to your tenant.
The Cortex XDR Gateway displays tenants Available for Acvaon and Available Tenants.
In the Available for Acvaon secon, you can view all the tenants allocated to your CSP
account that are ready for acvaon. You can review the tenant details, such as license type,
number of endpoints, and purchase date.
The Available Tenants secon lists tenants that have already been acvated. If you have more
than one CSP account, the tenants are displayed according the CSP account name.
STEP 2 | In the Available for Acvaon secon, locate the tenant you want to acvate according to
the serial number and Acvate to launch the Tenant Acvaon wizard.
Cortex® XDR™ Pro Administrator’s Guide 36 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 3 | In Tenant Acvaon > Select Support Account, ensure the tenant you want to acvate is
allocated to the correct CSP account. You can expand Cortex XDR and Cortex Data Lake to
view the tenants and Cortex Data Lake instances associated within the CSP account.
If you manage mulple company CSP accounts, make sure you select the specific
account to which you want to allocate the Cortex XDR tenant before proceeding with
acvaon. Once acvated, the tenant will be associated with the account and cannot
be moved.
Cortex® XDR™ Pro Administrator’s Guide 37 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 4 | In Tenant Acvaon > Define Tenant Sengs, define the following tenant details:
• Tenant Name—Give your Cortex XDR app instance an easily-recognizable name. Choose a
name that is 59 or fewer characters and is unique across your company account.
• Region—Select a region in which you want to set up your Cortex Data Lake instance. If
you selected an exisng Cortex Data Lake instance, this field automacally displays the
region in which your Cortex Data Lake instance is deployed and cannot be changed.
• Tenant Subdomain—Give your Cortex XDR instance an easy to recognize
name that is used to access the tenant directly using the full URL ( https://
<subdomain>.xdr.<region>.paloaltonetworks.com).
Note this is a public FQDN, so be careful with sensive informaon such as the
company name.
• Cortex Data Lake—Select the Cortex Data Lake instance name you created.
• Review and agree to the terms and condions of the Privacy policy, Term of Use, EULA.
STEP 6 | Select Back to main gateway and in the Available Tenant secon, search for your tenant
name. Hover over a tenant to display the Tenant Status and License Details. When the
tenant displays an Acve status, select the tenant name to confirm you can successfully
access the Cortex XDR management console.
Cortex® XDR™ Pro Administrator’s Guide 38 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 39 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Permission Management
You can manage roles and permissions for a single tenant or a number of tenants at the same me
using the Cortex® XDR™ Permission Management console, which is accessible via the Cortex
XDR Gateway. The Permission Management console is used for first me acvaons. To create
and assign roles, you must first acvate your Cortex XDR tenant and be assigned a XDR Account
Admin role in the Cortex XDR Gateway.
The Permission Management console is divided into two subcategories, Permissions and Roles,
which you can view on separate pages.
In the Permissions page, Cortex XDR lists all the users allocated to a specific CSP account and
tenant name. The Permissions table provides different fields of informaon as detailed below.
You can select whether to Show User Subset to display only the users who are not designated
as a Hidden user (default). For example, this is useful when you have users, who are not related
to Cortex XDR and will not be designated with a Cortex XDR role, such as CSP Super Users, and
you want to hide them from the list. You can also select whether to View By Users (default) or
Tenants.
Cortex® XDR™ Pro Administrator’s Guide 40 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
• User Name—Displays the first and last name of the user and whether the user is a CSP Super
User and Account Admin. If the user is allocated to more than one tenant, expand the user name
to display the details for each tenant.
• Email—Email address of the user.
• Tenant—Name of the tenant the user has permission to access. Next to the user name, expand
( ) to view the tenant name.
• XDR Role—Name of the role assigned to the user. Next to the user name, expand ( ) to view
the role assigned per tenant, if the user does not have any Cortex XDR access permission, the
field displays No-Role.
• Last Login Time—Last date and me the user accessed the tenant.
• Status—Displays whether the user is Acve or Inacve.
In the Roles page, Cortex XDR lists the Predefined User Roles for Cortex® XDR™ and custom
defined roles. Use roles to assign specific view and acon access privileges to administrave user
accounts. The way you configure administrave access depends on the security requirements of
your organizaon. The built-in roles provide specific access rights that cannot be changed. The
roles you create provide more granular access control.
The Roles table provides the following fields of informaon.
Cortex® XDR™ Pro Administrator’s Guide 41 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 42 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 43 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
You cannot deacvate a user that has a CSP Super User or Account Admin role.
Access Management
You can manage roles for a specific tenant only using the Cortex® XDR™ Access Management
console.In addion, you can also set manage user access permissions for the various XQL datasets
as part of managing roles.
To create and assign roles, you must first acvate your Cortex XDR tenant and be assigned a XDR
Account Admin role in the Cortex XDR Gateway.
The Access Management console is divided into two subcategories, Users and Roles, which you
can view on separate pages.
In the Users page, Cortex XDR lists all the users allocated to a specific tenant name. The Users
table provides different fields of informaon as detailed below. At the top of the page, you can
perform the following acons.
• Import Mulple User Roles as a CSV (Comma-separated values) file.
• Show User Subset to display only the users who are not designated as a Hidden user (default).
Cortex® XDR™ Pro Administrator’s Guide 44 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 45 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 46 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
enforce the separaon of viewing access and iniang acons among funconal or regional areas
of your organizaon. In addion, Cortex XDR supports XQL dataset permission enforcement
as part of managing roles or specific permissions using role-based access control (RBAC). The
Datasets secon of the Create Role window is where you can enable or disable the access
permissions for the various datasets listed. The Datasets permissions control the dataset access
across the enre product components, as opposed to the Components RBAC secon, which
controls access to a specific component. When a dataset component is enabled for a parcular
role, the Alert and Incidents pages display all the alerts and incidents, where informaon about
the datasets is included. By default, the Enable dataset access management feature is selected,
so users have access to all datasets. Once you disable this feature, you need to define for each
dataset type the access permissions you want to grant for the role.
STEP 1 | Select Sengs ( ) > Configuraons > Access Management.
Cortex® XDR™ Pro Administrator’s Guide 47 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
for each dataset type the access permissions you want to grant for the role in any of the
following ways.
-Select a parcular dataset type to enable access to all datasets that currently exist for
this type.
-Select Future datasets beside the dataset type to configure access to all datasets that
will be created in the future for this dataset type.
-Select the expander icon (>) beside the dataset type to display the datasets that
currently exist for this dataset type, and select the specific datasets that you want to
configure access.
Cortex® XDR™ Pro Administrator’s Guide 48 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
3. In the Components secon, select the Views and Acons permissions you want the role
to include.
4. In the Datasets secon, the Enable dataset access management permissions feature
is selected, so the user role has access to all datasets. By default, access management
permissions are enabled unless you disable them. Once you disable this feature, you need
to define for each dataset type the access permissions you want to grant for the role in
any of the following ways.
-Select a parcular dataset type to enable access to all datasets that currently exist for
this type.
-Select Future datasets beside the dataset type to configure access to all datasets that
will be created in the future for this dataset type.
-Select the expander icon (>) beside the dataset type to display the datasets that
currently exist for this dataset type, and select the specific datasets that you want to
configure access.
5. Create the role.
• Edit role permissions (only available for roles you create).
1. Locate the custom role you want to edit, right-click, and select Edit Role.
2. In the Components secon of the Edit Role window, update the Views and Acons
permissions you want the role to include.
3. In the Datasets secon, you can enable and disable dataset access permissions for the
various datasets listed as required.
4. Edit the role.
Cortex® XDR™ Pro Administrator’s Guide 49 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
2. Select a Role from the list of default and custom roles that you want to assign the user
and Update the role.
• Deacvate a user.
Locate the user you want to deacvate, right-click, and select Deacvate User.
You cannot deacvate a user that has a CSP Super User or Account Admin role.
2. Click Remove.
Cortex® XDR™ Pro Administrator’s Guide 50 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
You cannot remove a user that has a CSP Super User or Account Admin role.
Some features are license-dependent. Accordingly, users may not see a specific feature
if the feature is not supported by the license type or if they do not have access based on
their assigned role.
Cortex® XDR™ Pro Administrator’s Guide 51 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 52 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 53 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 54 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
• Configuraons • Configuraons
• Dashboards • Dashboards
• Dashboards
• Reports
• Reports
• Incidents • Configuraons
Cortex® XDR™ Pro Administrator’s Guide 55 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 56 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
• Scripts • Remediaon
• Configuraons • Endpoints
Cortex® XDR™ Pro Administrator’s Guide 57 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 58 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 59 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 60 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 61 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Viewer • Endpoints -
View the majority of the • Endpoint Policies
features of the Cortex
• Endpoint Profiles
XDR app for this instance.
• Endpoint Management
• Endpoint Groups
• Endpoint Installaons
• Device Control
• Global Excepons
• Host Insights
• Invesgaon
• Alerts
• Incidents
• Rules
• Invesgaon Query
• Response
• Acon Center
• Scripts
• Configuraons
• General Configuraons
• Auding
• Pathfinder Applet
• Pathfinder Data
Collecon
• Assets
• Asset Management
• Dashboards
• Dashboards
• Reports
• Reports
Cortex® XDR™ Pro Administrator’s Guide 62 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 63 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 64 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Important: The rest of the funconal areas and their permissions in Cortex XDR do not
support SBAC. Accordingly, if these permissions are granted to a scoped user, the user
will be able to access all endpoints in the tenant within this funconal area. For example,
a scoped user with a permission to view incidents, can view all incidents in the system
without limitaon to a scope.
Also note that the Agent Installaon widget is not available for scoped users.
STEP 2 | Select and then right-click the user or users to which you want to assign a scope, and then
select Assign Endpoint Scope.
The Assign Endpoint Scope dialog box appears.
Cortex® XDR™ Pro Administrator’s Guide 65 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 4 | Apply.
The users to whom you have scoped parcular endpoints are now able to use Cortex XDR only
within the scope of their assigned endpoints.
Cortex® XDR™ Pro Administrator’s Guide 66 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Make sure to assign the required default permissions for scoped users. This depends on
the structure and divisions within your organizaon, and the parcular purpose of each
organizaonal unit to which scoped users belong.
For more informaon about user roles, see Manage User Roles.
Cortex® XDR™ Pro Administrator’s Guide 67 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
When using the Cloud Identy Engine (previously called Directory Sync Service (DSS))
with a Cortex XDR Pro license, you can use XQL Search to query the data using the
pan_dss_raw dataset.
Aer you finish the setup, Cortex XDR automacally updates when the Cloud Identy Engine
updates.
To set up the Cloud Identy Engine:
STEP 1 | Navigate and log into the hub.
STEP 2 | Acvate and configure your Cloud Identy Engine instance as described in the Cloud Identy
Engine Geng Started guide.
Acvang a Cloud Identy Engine instance on your Cortex XDR account will allow you to pair
your Cortex XDR tenant with the Acve Directory informaon collected by the Cloud Identy
Engine instance. During the Acvaon step, make sure to take note of the instance name you
create.
STEP 3 | Aer you complete the Cloud Identy Engine Geng Started steps, navigate and log into
your Cortex XDR management console.
Wait about ten minutes aer you have acvated the instance before you do this.
1. In the Cortex XDR app, select Sengs ( ) > Configuraon > Integraons > Cloud
Identy Engine.
2. Add the Cloud Identy Engine instance you want to Cortex XDR to use.
3. In the Add Cloud Identy Engine dialog, select the App Instance Name you created in
the hub and Save.
Cortex® XDR™ Pro Administrator’s Guide 68 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
The Cortex XDR Agent and Cortex XDR Stched data is not counted against your
daily ingeson quota.
• PAN-XDR-RTN-TB—For retenon enforcement, each license allows the storage of 1TB of
data.
For a Cortex XDR Pro per TB license, your daily ingeson limit is your PAN-XDR-ADV-1TB
license divided by 30. For example, if you purchased 90 PAN-XDR-ADV-1TB, you are allowed
to ingest up to 3 TB per day. Your retenon limit is your PAN-XDR-ADV-1TB license + PAN-
XDR-RTN-1TB license. For example, if you purchased 9 PAN-XDR-ADV-1TB and 6 PAN-XDR-
RTN-1TB, your retenon capacity will be 15 TB.
To increase your capacity, contact your Palo Alto Network account representave.
When you acvate Cortex XDR, Cortex Data Lake assigns a default storage allocaon for your
logs, EDR data, and alerts. While some Cortex apps receive a default allocaon, with a Cortex XDR
Pro per TB license, you must manually allocate storage for firewall logs. Aer you acvate Cortex
XDR, review and adjust your log storage allocaon depending on your storage requirements.
Cortex Data Lake displays the current possible allocaon but does not display the storage
usage.
Cortex® XDR™ Pro Administrator’s Guide 69 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 70 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
By default, Cortex XDR will not remove data less than 30 days, however you must
allocate the quotain order for Cortex XDR to support the retenon.
• Current number of days your data has been stored in Cortex XDR Data Lake. The
count begins the as soon as you acvate Cortex XDR.
• Number of retenon days permied according to the quota you allocated.
3. If needed, update your Cortex XDR allocated quota.
Cortex® XDR™ Pro Administrator’s Guide 71 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 6 | Define Endpoint Groups to which you can apply endpoint security policy.
STEP 7 | Customize your Endpoint Security Profiles and assign them to your endpoints.
Cortex XDR provides out-of-the box exploit and malware protecon. However, at minimum,
you must enable Data Collecon in an Agent Sengs profile to leverage endpoint data in
Cortex XDR apps. Data collecon for Windows endpoints is available with Traps 6.0 and later
releases and on endpoints running Windows 7 SP1 and later releases. Data collecon on
macOS and Linux endpoints are available with Traps 6.1 and later releases.
STEP 8 | (Oponal) Configure Device Control profiles to restrict file execuon on USB-connected
devices.
STEP 9 | Verify that the Cortex XDR agent can connect to your Cortex XDR instance.
If successful, the Cortex XDR console displays a Connected status. You can view the status
of all agents on the Endpoints > Endpoint Management of your Cortex XDR management
console.
Cortex® XDR™ Pro Administrator’s Guide 72 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 10 | Configure the internal networks that you want Cortex XDR to monitor.
1. From the Cortex XDR management console, navigate to Assets > Network Configuraon >
IP Address Ranges.
2. Define your IP Address Ranges.
This page provides a table of the IP address ranges Cortex XDR Analycs monitors, which is
pre-populated with the default IPv4 and IPv6 address spaces.
3. Define your Domain Names.
STEP 11 | If you also have a Cortex XDR Pro per TB license, proceed to Set up Network Analysis.
Otherwise, proceed to Configure Cortex® XDR™.
0. Calculate the bandwidth as needed For every 100,000 agents, you will need
required to support the number to allocate 120Mbps of bandwidth. The
of agents you plan to deploy. bandwidth requirement scales linearly. For
example, to support 300,000 agents, plan
to allocate 360Mbps of bandwidth (three
mes the amount required for 100,000
agents).
1. Install Cortex XDR on 1 week Install the Cortex XDR agent on a small
endpoints. number of endpoints (3 to 10).
Cortex® XDR™ Pro Administrator’s Guide 73 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
3. Complete the Cortex XDR 2 or more Broadly distribute the Cortex XDR agent
installaon. weeks throughout the organizaon unl all
endpoints are protected.
4. Define corporate policy and Up to 1 week Add protecon rules for third-party or in-
protected processes. house applicaons and then test them.
5. Refine corporate policy and Up to 1 week Deploy security policy rules to a small
protected processes. number of endpoints that use the
applicaons frequently. Fine tune the
policy as needed.
6. Finalize corporate policy and A few minutes Deploy protecon rules globally.
protected processes.
Cortex® XDR™ Pro Administrator’s Guide 74 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 2 | In your firewall configuraon, enable access to Cortex XDR communicaon servers, storage
buckets, and resources.
For the complete list or resources, refer to Resources Required to Enable Access to Cortex®
XDR™.
With Palo Alto Networks firewalls, we recommend that you use the following App-IDs to allow
communicaon between Cortex XDR agents and the Cortex XDR management console when
you configure your security policy:
• cortex-xdr—Requires PAN-OS Applicaons and Threats content update version 8279 or
a later release.
• traps-management-service—Requires PAN-OS Applicaons and Threats content
update version 793 or a later release.
If you use App-ID in your security policy, you must also allow access for addional resources
that are not covered by the App-ID. If you do not use Palo Alto Networks firewalls with App-ID
you must allow access to the full list of resources.
STEP 3 | To establish secure communicaon (TLS) to Cortex XDR, the endpoints, and any other
devices that iniate a TLS connecon with Cortex, you must have the following cerficates
installed on the operang system:
Cerficate Fingerprint
Cortex® XDR™ Pro Administrator’s Guide 75 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cerficate Fingerprint
For the Cortex XDR agent 5.X release installed on endpoints
running a Windows version that does not support SHA256
by default, you must install KB2868626 to establish a
connecon between Cortex XDR and the agent. This applies
to Windows Server 2003 R2 (32-bit) (SP2 & later), Windows
Server 2003 (32-bit) (SP2 & later), Windows XP (32-bit)
(SP3 & later), Windows Server 2008 (all edions; FIPS
Mode), and Windows Vista (SP1 & later; FIPS Mode).
STEP 5 | (Supported on Cortex XDR agent 7.0 or a later for Windows endpoints and Cortex XDR
agent 7.3 or later for Mac and Linux endpoints) Enable peer-to-peer (P2) content updates.
By default, the Cortex XDR agent retrieves content updates from its peer Cortex XDR agents
on the same subnet. To enable P2P, you must enable UDP and TCP over port 33221. You can
change the port number or choose to download the content directly from the Cortex XDR
sever in the Agent sengs profile.
STEP 6 | Verify that you can access your Cortex XDR tenant.
Aer you download and install the Cortex XDR agent soware on your endpoints and
configure your endpoint security policy, verify that the Cortex XDR agents can check in with
Cortex XDR to receive the endpoint policy.
Cortex® XDR™ Pro Administrator’s Guide 76 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 7 | If you use SSL decrypon and experience difficulty in connecng the Cortex XDR agent
to the server, we recommend that you add the FQDNs required for access to your SSL
Decrypon Exclusion list.
In PAN-OS 8.0 and later releases, you can configure the list in Device > Cerficate
Management > SSL Decrypon Exclusion.
Some of the IP addresses required for access are registered in the United States. As a
result, some GeoIP databases do not correctly pinpoint the locaon in which IP addresses
are used. In regard to customer data, Cortex Data Lake stores all data in your deployment
region, regardless of the IP address registraon and restricts data transmission through
any infrastructure to that region. For consideraons, see Plan Your Cortex® XDR™
Deployment.
Throughout this topic, <xdr-tenant> refers to the chosen subdomain of your Cortex
XDR tenant and <region> is the region in which your Cortex Data Lake is deployed (see
Plan Your Cortex® XDR™ Deployment for supported regions).
Refer to the following tables for the FQDNs, IP addresses, ports, and App-ID coverage for your
deployment:
• Required Resources by Region
• Required Resources for Federal (United States - Government)
For IP address ranges in GCP, refer to the following tables for IP address coverage for your
deployment:
• hps://www.gstac.com/ipranges/goog.json—Refer to this list to look up and allow access to
the IP address ranges subnets.
• hps://www.gstac.com/ipranges/cloud.json—Refer to this list to look up and allow access to
the IP address ranges associated with your region.
Cortex® XDR™ Pro Administrator’s Guide 77 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 78 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 79 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Broker VM Resources
Required for deployments that use Broker VM features
Cortex® XDR™ Pro Administrator’s Guide 80 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
identy.paloaltonetworks.com • IP address— —
34.107.215.35
(SSO)
• Port—443
login.paloaltonetworks.com • IP address— —
34.107.190.184
(SSO)
• Port—443
data.pendo.io Port—443 —
pendo- Port—443 —
stac-5664029141630976.storage.googleapis.com
Cortex® XDR™ Pro Administrator’s Guide 81 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
app- • IP address— —
proxy.federal.paloaltonetworks.com104.155.148.118
• Port—443
api-<xdr- • IP address— —
130.211.195.231
tenant>.xdr.federal.paloaltonetworks.com
Used for API requests and responses. • Port—443
Broker VM Resources
Cortex® XDR™ Pro Administrator’s Guide 82 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
br-<xdr- • IP address— —
34.71.185.11
tenant>.xdr.federal.paloaltonetworks.com:443
• Port—443
identy.paloaltonetworks.com • IP address— —
34.107.215.35
(SSO)
• Port—443
login.paloaltonetworks.com • IP address— —
34.107.190.184
(SSO)
• Port—443
data.pendo.io Port—443 —
pendo- Port—443 —
stac-5664029141630976.storage.googleapis.com
Proxy Communicaon
You can configure communicaon through proxy servers between the Cortex XDR server and the
Cortex XDR agents running on Windows, Mac, and Linux endpoints. The Cortex XDR agent uses
the proxy sengs defined as part of the Internet & Network sengs or WPAD protocol on the
endpoint. You can also configure a list of proxy servers that your Cortex XDR agent will use to
communicate the with Cortex XDR server.
Cortex XDR supports the following types of proxy configuraons:
• System-wide proxy—Use system-wide proxy to send all communicaon on the endpoint
including to and from the Cortex XDR agent through a proxy server configured for the
endpoint. Cortex XDR supports proxy communicaon for proxy sengs defined explicitly on
the endpoint, as well as proxy sengs configured in a proxy auto-config (PAC) file.
• Applicaon-specific proxy—(Available with Traps agent 5.0.9, Traps agent 6.1.2, and Cortex
XDR agent 7.0 and later releases) Configure a Cortex XDR specific proxy that applies only to
the Cortex XDR agent and does not enforce proxy communicaons with other apps or services
Cortex® XDR™ Pro Administrator’s Guide 83 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
on your endpoint. You can set up to five proxy servers either during the Cortex XDR agent
installaon process, or following agent installaon, directly from the Cortex XDR management
console.
If the endpoints in your environment are not connected directly to the internet, you can deploy
a Palo Alto Networks broker VM.
Applicaon-specific proxy configuraons take precedence over system-wide proxy configuraons.
The Cortex XDR agent retrieves the proxy list defined on the endpoint and tries to establish
communicaon with the Cortex XDR server first through app-specific proxies. Then, if
communicaon is unsuccessful, the agent tries to connect using the system-wide proxy, if defined.
If none are defined, the Cortex XDR agent aempts communicaon with the Cortex XDR server
directly. The Cortex XDR agent does not support proxy communicaon in environments where
proxy authencaon is required.
Cortex® XDR™ Pro Administrator’s Guide 84 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 2 | Configure firewalls to forward Cortex XDR-required logs to Cortex Data Lake.
The Cortex Data Lake provides centralized, cloud-based log storage for firewalls, and Panorama
provides an interface you can use to view the stored logs. The rich log data that firewalls
forward to the Cortex Data Lake provides the Cortex XDR analycs engine the network
visibility it requires to perform data analycs.
To support Cortex XDR, firewalls must forward at least Traffic logs to the Cortex Data Lake.
The complete set of log types that a firewall should forward to the Cortex Data Lake are:
Traffic (required)
Threat (spyware, an-exploit, an-malware, dns security, etc)
URL Filtering
User-ID
HIP
Enhanced applicaon logs (PAN-OS 8.1.1 or later)
Enhanced applicaon logs are designed to increase visibility into network acvity for Palo Alto
Networks Cloud Services apps, and Cortex XDR requires these logs to support certain features.
Follow the complete workflow to configure Panorama-managed firewalls to forward logs to the
Cortex Data Lake.
Cortex® XDR™ Pro Administrator’s Guide 85 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 2 | Configure the internal networks that you want Cortex XDR to monitor.
1. From the Cortex XDR management console, navigate to Assets > Network Configuraon.
2. Define your .
This page provides a table of the IP address ranges Cortex XDR Analycs monitors, which is
pre-populated with the default IPv4 and IPv6 address spaces.
3. Define your .
STEP 3 | If you use , add the GlobalProtect VPN IP address pool for the VPN traffic that you want to
monitor.
1. To enable the Cortex XDR app to analyze your VPN traffic, add (+) a new segment and
specify the first and last IP address of your GlobalProtect VPN IP address pool.
2. Idenfy this network segment as Reserved for VPN. GlobalProtect dynamically assigns
IP addresses from the IP pool to the mobile endpoints that connect to your network. The
Cortex XDR analycs engine creates virtual enty profiles for network segments that are
reserved for VPN.
3. Save ( ) the network segment. If the Configuraon saved noficaon does not appear,
save again.
STEP 4 | If you selected a Directory Sync instance during the Cortex XDR acvaon process, .
Cortex® XDR™ Pro Administrator’s Guide 86 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 87 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 2 | Aer you acvate Cortex XDR apps and services, wait 24 hours and then configure the
Cortex XDR analycs.
1. Specify the internal networks that you want Cortex XDR to monitor.
2. (Recommended) If you want to use Pathfinder to scan unmanaged endpoints, Acvate
Pathfinder.
3. Enable Cortex XDR - Analycs.
By default, Cortex XDR - Analycs is disabled. Acvang Cortex XDR - Analycs enables
the Cortex XDR analycs engine to analyze your endpoint data to develop a baseline and
raise Analycs and Analycs BIOC alerts when anomalies and malicious behaviors are
detected.
To create a baseline for enabling Analycs, Cortex XDR requires a minimum set of data;
EDR or Network logs from at least 30 endpoints over a minimum of 2 weeks or cloud
Cortex® XDR™ Pro Administrator’s Guide 88 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
audit logs over a minimum of 5 days. Once this requirement is met, Cortex XDR allows to
enable analycs and begin triggering alerts within a few hours.
1. In Cortex XDR, select Sengs ( ) > Configuraons > Cortex XDR - Analycs.
The Enable opon will be grayed out if you do not have the required data set.
2. When available, Enable Cortex XDR - Analycs. The analycs engine will immediately
begin analyzing your Cortex data for anomalies.
STEP 5 | (Oponal) Palo Alto Networks also automacally delivers behavioral indicators of
compromise (BIOCs) rules defined by the Palo Alto Networks threat research team to all
Cortex XDR tenants, but you can also import any addional indicators as rules, as needed.
To alert on specific BIOCs, Create a BIOC Rule. To immediately being alerng on known
malicious indicators of compromise (IOCs)—such as known malicious IP addresses—Create an
IOC Rule or Create a Correlaon Rule.
Cortex® XDR™ Pro Administrator’s Guide 89 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
score displays in the incident details page under Key Arfacts. Without a VirusTotal license key,
you can sll pivot from Cortex XDR to the service to iniate a query for the arfact.
• WildFire®—WildFire detects known and unknown threats, such as malware. The WildFire
verdict contains detailed insights into the behavior of idenfied threats. The WildFire verdict
displays next to relevant Key Arfacts in the incidents details page, the causality view, and
within the Live Terminal view of processes.
WildFire provides verdicts and analysis reports to Cortex XDR users without requiring a
license key. Using WildFire for next-generaon firewalls or other use-cases connues to
require an acve license.
Before you can view external threat intelligence in Cortex XDR incidents, you must obtain the
license key for the service and add it to the Cortex XDR Configuraon. Aer you integrate any
services, you will see the verdict or verdict score when you invesgate the incident..
To integrate an external threat intelligence service:
STEP 1 | Get your the API License Key for the service.
• Get your AutoFocus API key.
• Get your VirusTotal API key.
Cortex® XDR™ Pro Administrator’s Guide 90 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Select Timezone
Select your own specific mezone. Selecng a mezone affects the mestamps displayed in the
Cortex XDR management console, auding logs, and when exporng files.
In the Timezone secon, select the mezone in which you want to display your Cortex XDR
data.
Cortex® XDR™ Pro Administrator’s Guide 91 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
In the Timestamp Format secon, select the mestamp format in which you want to display
your Cortex XDR data.
In the Email Contacts secon, enter email addresses you want to include in a distribuon list.
Make sure to select aer each email address.
In the Define the Incident target MTTR per incident severity secon, enter within how many
days and hours you want incidents resolved according to the incident severity High, Medium,
and Low.
The defined MTTR is used to display the Resolved Incident MTTR dashboard widgets.
Impersonaon Role
Define the type of role permissions granted to Palo Alto Networks Support team when opening
support ckets. By default, Palo Alto Networks Support is granted read-only access to your
tenant.
In the Impersonaon Sengs secon, define the level and duraon of the permissions.
• Select one of the following Role permissions:
• Read-Only—Default seng, grants read only access to your tenant.
• Support related acons—Grants permissions to tech support file collecon, dump file
collecon, invesgaon query, Correlaon Rule, BIOC and IOC rule eding, alert starring,
exclusion and excepon eding.
• Full role permissions—No limitaons are applied, grants full permissions to all acons and
content on your tenant.
• Set the Permission Reset Timeframe.
If you selected Support related acons or Full role permissions in the Role field, set a
specific meframe for how long these permissions are valid. Select either 7 Days, 30 Days,
or No me limitaon.
We recommend that Role permissions are granted only for a specific meframe, and full
administrave permissions is granted only when specifically requested by the support team.
Cortex® XDR™ Pro Administrator’s Guide 92 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
• Session Expiraon—Enables you to define the number of hours aer which the user login
session will expire. You can also define a one-week expiraon me for the Cortex XDR
dashboard.
• Allowed Sessions—Enables you to define approved domains and approved IP ranges through
which access to Cortex XDR should be allowed.
• User Expiraon—Enables you to deacvate an inacve user, and also set the user deacvaon
trigger period.
• Allowed Domains—Enables you to specify one or more domain names that can be used in your
distribuon lists.
Cortex® XDR™ Pro Administrator’s Guide 93 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
From the Cortex XDR management console, select Sengs ( ) > Configuraons > Security
Sengs.
Cortex® XDR™ Pro Administrator’s Guide 94 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 95 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Under User Expiraon, define if you want to Deacvate Inacve User. By default, user
expiraon is Disabled, when Enabled enter the number of days aer which inacve users
should be deacvated.
Under Allowed Domains, specify one or more domain names that users in your organizaon
can be used in your distribuon list. For example, when generang a report, ensure the reports
are not sent to email addresses outside your organizaon.
Save.
Cortex® XDR™ Pro Administrator’s Guide 96 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 97 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Depending on your license and assigned role, you can explore and the following areas in the app.
Interface Descripon
Reporng From this menu, you can manage your dashboards and
run reports.
Invesgaon From this menu you can invesgate a lead or hunt for
threats. You can access the Query Builder to search logs
from your Palo Alto Networks sensors, or the Query
Center to view the status of all queries, and Scheduled
Queries to view the status and modify the frequency of
reoccurring queries.
You can also view all incidents, priorize incidents, and
set alert excepons.
Cortex® XDR™ Pro Administrator’s Guide 98 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Interface Descripon
Rules With a Cortex XDR Pro per TB license, you can define
indicators of known threats to enable Cortex XDR to
raise alerts when detected. As you invesgate and
research threats and uncover specific indicators and
behaviors associated with a threat, you can create rules
to detect and alert you when the behavior occurs.
User From the User, see who is logged into Cortex XDR.
Right click and select:
• About to view addional version and tenant ID
informaon.
• What’s New to view selected new features available
for your license type.
• Hide / Show Guide Center to toggle between
displaying the Guide Center icon.
Cortex® XDR™ Pro Administrator’s Guide 99 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Interface Descripon
• Log Out to terminate connecon with your Cortex
XDR Management Console.
The following topics describe addional management acons you can perform on page results:
• Filter Page Results
• Save and Share Filters
• Show or Hide Results
• Manage Columns and Rows
Manage Tables
Most pages in Cortex XDR present data in table format and provide controls to help you manage
and filter the results. If addional views or acons are available for a specific value, you can pivot
(right-click) from the value in the table. For example, you can view the incident details, or pivot to
the Causality View for an alert or you can pivot to the results for a query.
On most pages, you can also refresh ( ) the content on the page.
To manage tables in the app:
• Filter Page Results
• Export Results to File
• Save and Share Filters
• Show or Hide Results
• Manage Columns and Rows
• Display Quick Acons
Cortex® XDR™ Pro Administrator’s Guide 100 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
CMD fields have a 128 character limit. Shorten longer query strings to 127
characters and add an asterisk (*).
Alternavely, you can select Include empty values to create a filter that excludes or
includes results when the field has an empty values.
STEP 3 | To add addional filters, click +AND (within the filter brackets) to display results that must
match all specified criteria, or +OR to display results that match any of the criteria.
STEP 4 | Click out of the filter area into the results table to see the results.
Cortex® XDR™ Pro Administrator’s Guide 101 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Save a filter:
Saved filters are listed on the Filters tab for the table layout and filter manager menu.
1. Save ( ) the acve filter.
2. Enter a name to idenfy the filter.
You can create mulple filters with the same name. Saving a filter with an exisng name
will not override the exisng filter.
3. Choose whether to Share this filter or whether to keep it private for your own use only.
Share a filter:
You can share a filter across your organizaon.
1. Select the table layout and filter menu indicated by the three vercal dots, then select
Filters.
CMD fields are limited to 128 characters. If you pivot on a CMD field with a truncated
value, the app shows or hides all results that match the first 128 characters.
The show or hide acon is a temporary means of filtering the results: If you navigate away from
the page and later return, any results you previously hid will appear again.
This opon is available for fields which have a finite list of opons.
To hide or show only results that match a specific field value:
Cortex® XDR™ Pro Administrator’s Guide 102 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
STEP 1 | Right-click the matching field value by which you want to hide or show.
Cortex® XDR™ Pro Administrator’s Guide 103 ©2021 Palo Alto Networks, Inc.
Get Started with Cortex® XDR™ Pro
Cortex® XDR™ Pro Administrator’s Guide 104 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Endpoint security features require a Cortex® XDR™ Pro - Endpoint license.
105
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 106 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 107 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 108 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• Periodic and automated scanning—Enables you to block dormant malware that has not yet
tried to execute on endpoints. Scanning requires Cortex XDR agent 7.1 or a later release.
Malware Protection for Linux
• WildFire integraon—Enables automac detecon of known malware and analysis of unknown
malware using WildFire threat intelligence. WildFire integraon requires Traps agent 6.0 or a
later release.
• Local stac analysis—Enables the Cortex XDR agent to use machine learning to analyze
unknown files and issue a verdict. The Cortex XDR agent uses the verdict returned by the local
analysis module unl it receives the WildFire verdict from Cortex XDR. Local analysis requires
Traps agent 6.0 or a later release.
• Behavioral threat protecon—Enables connuous monitoring of endpoint acvity to idenfy
and analyze chains of events—known as causality chains. This enables Cortex XDR to detect
malicious acvity that could otherwise appear legimate if inspected as individual events.
Behavioral threat protecon requires Traps agent 6.1 or a later release.
• ELF file protecon—Enables you to block known malicious and unknown ELF files executed
on a host server or within a container on a Cortex XDR-protected endpoint. Cortex XDR
automacally suspends the file execuon unl a WildFire or local analysis verdict is obtained.
ELF file protecon requires Traps agent 6.0 or a later release.
• Malware protecon modules—Targets the execuon behavior of a file—such as those
associated with reverse shell protecon.
Malware Protection for Android
• WildFire integraon—Enables automac detecon of known malware and grayware, and
analysis of unknown APK files using WildFire threat intelligence.
• APK files examinaon—Analyze and prevent malicious APK files from running.
• Evaluaon of trusted signers—Permits unknown files that are signed by trusted signers to run
on the Android device.
Cortex® XDR™ Pro Administrator’s Guide 109 ©2021 Palo Alto Networks, Inc.
Endpoint Security
When a user opens a non-executable file, such as a PDF or Word document, and the process that
opened the file is protected, the Cortex XDR agent seamlessly injects code into the soware.
This occurs at the earliest possible stage before any files belonging to the process are loaded
into memory. The Cortex XDR agent then acvates one or more protecon modules inside
the protected process. Each protecon module targets a specific exploitaon technique and is
designed to prevent aacks on program vulnerabilies based on memory corrupon or logic flaws.
In addion to automacally protecng processes from such aacks, the Cortex XDR agent reports
any security events to Cortex XDR and performs addional acons as defined in the endpoint
security policy. Common acons that the Cortex XDR agent performs include collecng forensic
data and nofying the user about the event.
The default endpoint security policy protects the most vulnerable and most commonly used
applicaons but you can also add other third-party and proprietary applicaons to the list of
protected processes.
Malware Protecon
The Cortex XDR agent provides malware protecon in a series of four evaluaon phases:
Cortex® XDR™ Pro Administrator’s Guide 110 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 111 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 112 ©2021 Palo Alto Networks, Inc.
Endpoint Security
3. WildFire verdict—If a file is not signed by a highly trusted signer on Windows and Mac
endpoints, the Cortex XDR agent performs a hash verdict lookup to determine if a verdict
already exists in its local cache.
If the executable file has a malware verdict, the Cortex XDR agent reports the security event to
the Cortex XDR and, depending on the configured behavior for malicious files, the Cortex XDR
agent then does one of the following:
• Blocks the malicious executable file
• Blocks and quarannes the malicious executable file
• Nofies the user about the file but sll allows the file to execute
• Logs the issue without nofying the user and allows the file to execute.
If the verdict is benign, the Cortex XDR agent moves on to the next stage of evaluaon (see
Phase 4: Evaluaon of Malware Protecon Policy).
If the hash does not exist in the local cache or has an unknown verdict, the Cortex XDR agent
next evaluates whether the file is signed by a known signer.
4. Local analysis—When an unknown executable, DLL, or macro aempts to run on a Windows
or Mac endpoint, the Cortex XDR agent uses local analysis to determine if it is likely to be
malware. On Windows endpoints, if the file is signed by a known signer, the Cortex XDR agent
permits the file to run and does not perform addional analysis. For files on Mac endpoints
and files that are not signed by a known signer on Windows endpoints, the Cortex XDR agent
performs local analysis to determine whether the file is malware. Local analysis uses a stac
set of paern-matching rules that inspect mulple file features and aributes, and a stascal
model that was developed with machine learning on WildFire threat intelligence. The model
enables the Cortex XDR agent to examine hundreds of characteriscs for a file and issue a
local verdict (benign or malicious) while the endpoint is offline or Cortex XDR is unreachable.
The Cortex XDR agent can rely on the local analysis verdict unl it receives an official WildFire
verdict or hash excepon.
Local analysis is enabled by default in a Malware Security profile. Because local analysis always
returns a verdict for an unknown file, if you enable the Cortex XDR agent to Block files with
unknown verdict, the agent only blocks unknown files if a local analysis error occurs or local
analysis is disabled. To change the default sengs (not recommended), see Add a New Malware
Security Profile.
Phase 4: Evaluation of Malware Security Policy
If the prior evaluaon phases do not idenfy a file as malware, the Cortex XDR agent observes
the behavior of the file and applies addional malware protecon rules. If a file exhibits malicious
behavior, such as encrypon-based acvity common with ransomware, the Cortex XDR agent
blocks the file and reports the security event to the Cortex XDR.
If no malicious behavior is detected, the Cortex XDR agent permits the file (process) to connue
running but connues to monitor the behavior for the lifeme of the process.
Cortex® XDR™ Pro Administrator’s Guide 113 ©2021 Palo Alto Networks, Inc.
Endpoint Security
customize in a security profile. The table also indicates which plaorms support the protecon
capability (a dash (—) indicates the capability is not supported).
Cortex® XDR™ Pro Administrator’s Guide 114 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Unpatched Vulnerabilies — — —
Protecon
If you have Windows endpoints in
your network that are unpatched
and exposed to a known
vulnerability, Palo Alto Networks
strongly recommends that you
upgrade to the latest Windows
Update that has a fix for that
vulnerability. If you choose not to
patch the endpoint, the Unpatched
Vulnerabilies Protecon capability
allows the Cortex XDR agent to
apply a workaround to protect
the endpoints from the known
vulnerability.
Ransomware Protecon — — —
Targets encrypon based acvity
associated with ransomware to
analyze and halt ransomware before
any data loss occurs.
Cortex® XDR™ Pro Administrator’s Guide 115 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 116 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Execuon Paths — — —
Many aack scenarios are based on
wring malicious executable files to
certain folders such as the local temp
or download folder and then running
them. Use this capability to restrict
the locaons from which executable
files can run.
Network Locaons — — —
To prevent aack scenarios that
are based on wring malicious files
to remote folders, you can restrict
access to all network locaons
except for those that you explicitly
trust.
Removable Media — — —
To prevent malicious code from
gaining access to endpoints using
external media such as a removable
drive, you can restrict the executable
files, that users can launch from
external drives aached to the
endpoints in your network.
Opcal Drive — — —
To prevent malicious code from
gaining access to endpoints using
opcal disc drives (CD, DVD,
and Blu-ray), you can restrict the
executable files, that users can
launch from opcal disc drives
Cortex® XDR™ Pro Administrator’s Guide 117 ©2021 Palo Alto Networks, Inc.
Endpoint Security
An-Ransomware — — —
Targets encrypon-
based acvity
associated with
ransomware and has
the ability to analyze
and halt ransomware
acvity before any data
loss occurs.
APC Protecon — — —
Prevents aacks
that change the
execuon order of a
process by redirecng
an asynchronous
procedure call (APC) to
point to the malicious
shellcode.
Behavioral Threat —
Prevents sophiscated
aacks that leverage
built-in OS executables
and common
administraon ulies
Cortex® XDR™ Pro Administrator’s Guide 118 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Child Process — — —
Protecon
Prevents script-based
aacks that are used
to deliver malware,
such as ransomware,
by blocking known
targeted processes
from launching child
processes that are
commonly used to
bypass tradional
security approaches.
CPL Protecon — — —
Protects against
vulnerabilies related
to the display roune
for Windows Control
Panel Library (CPL)
shortcut images,
which can be used as
a malware infecon
vector.
Data Execuon — — —
Prevenon (DEP)
Prevents areas of
memory defined to
contain only data from
running executable
code.
Cortex® XDR™ Pro Administrator’s Guide 119 ©2021 Palo Alto Networks, Inc.
Endpoint Security
DLL Hijacking — — —
Prevents DLL-hijacking
aacks where the
aacker aempts to
load dynamic-link
libraries on Windows
operang systems from
unsecure locaons
to gain control of a
process.
DLL Security — — —
Prevents access to
crucial DLL metadata
from untrusted code
locaons.
Dylib Hijacking — — —
Prevents Dylib-
hijacking aacks where
the aacker aempts to
load dynamic libraries
on Mac operang
systems from unsecure
locaons to gain control
of a process.
Font Protecon — — —
Cortex® XDR™ Pro Administrator’s Guide 120 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Gatekeeper — — —
Enhancement
Enhances the
macOS gatekeeper
funconality that
allows apps to run
based on their digital
signature. This module
provides an addional
layer of protecon by
extending gatekeeper
funconality to bundles
and child processes so
you can enforce the
signature level of your
choice.
Hash Excepon
Halts execuon of files
that an administrator
idenfied as malware
regardless of the
WildFire verdict.
Java Deserializaon — — —
Blocks aempts to
execute malicious code
during the Java objects
deserializaon process
on Java-based servers.
JIT — —
Prevents an aacker
from bypassing the
Cortex® XDR™ Pro Administrator’s Guide 121 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Kernel Integrity — — —
Monitor (KIM)
Prevents rootkit
and vulnerability
exploitaon on Linux
endpoints. On the
first detecon of
suspicious rootkit
behavior, the behavioral
threat protecon (BTP)
module generates
an XDR Agent alert.
Cortex XDR stches
logs about the process
that loaded the kernel
module with other logs
relang to the kernel
module to aid in alert
invesgaon. When
the Cortex XDR agent
detects subsequent
rootkit behavior, it
blocks the acvity.
Local Analysis —
Examines hundreds of
characteriscs of an
unknown executable
file, DLL, or macro to
determine if it is likely
to be malware. The
local analysis module
uses a stac set of
paern-matching
rules that inspect
mulple file features
and aributes, and
a stascal model
that was developed
using machine learning
Cortex® XDR™ Pro Administrator’s Guide 122 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Local Privilege —
Escalaon Protecon
Prevents aackers
from performing
malicious acvies
that require privileges
that are higher than
those assigned to the
aacked or malicious
process.
Network Packet — — —
Inspecon Engine
Analyze network packet
data to detect malicious
behavior already at
the network level. The
engine leverages both
Palo Alto Networks
NGFW content rules,
and new Cortex XDR
content rules created
by the Research Team
which are updated
through the security
content.
Null Dereference — — —
Prevents malicious
code from mapping
to address zero in
the memory space,
making null dereference
vulnerabilies
unexploitable.
Cortex® XDR™ Pro Administrator’s Guide 123 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Restricted Execuon - — — —
Local Path
Prevents unauthorized
execuon from a local
path.
Restricted Execuon - — — —
Network Locaon
Prevents unauthorized
execuon from a
network path.
Restricted Execuon - — — —
Removable Media
Prevents unauthorized
execuon from
removable media.
Reverse Shell — — —
Protecon
Blocks malicious
acvity where an
aacker redirects
standard input and
output streams to
network sockets.
ROP —
Protects against the
use of return-oriented
programming (ROP) by
protecng APIs used in
ROP chains.
SEH — — —
Prevents hijacking
of the structured
excepon handler
(SEH), a commonly
exploited control
structure that can
contain mulple SEH
blocks that form a
linked list chain, which
Cortex® XDR™ Pro Administrator’s Guide 124 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Shellcode Protecon — — —
Reserves and protects
certain areas of
memory commonly
used to house payloads
using heap spray
techniques.
ShellLink — — —
Prevents shell-link
logical vulnerabilies.
SO Hijacking — — —
Protecon
Prevents dynamic
loading of libraries from
unsecure locaons
to gain control of a
process.
SysExit — — —
Prevents using system
calls to bypass other
protecon capabilies.
UASLR — — —
Improves or altogether
implements ASLR
(address space layout
randomizaon) with
greater entropy,
robustness, and strict
enforcement.
Vulnerable Drivers — — —
Protecon
Detect aempts to load
vulnerable drivers.
WildFire
Cortex® XDR™ Pro Administrator’s Guide 125 ©2021 Palo Alto Networks, Inc.
Endpoint Security
WildFire Post-
Detecon (Malware
and Grayware)
Idenfies a file that
was previously allowed
to run on an endpoint
that is now determined
to be malware. Post-
detecon events
provide noficaons for
each endpoint on which
the file executed.
Cortex® XDR™ Pro Administrator’s Guide 126 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 127 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 3 | Enter a unique Name and an oponal Descripon to idenfy the installaon package.
The package Name must be no more than 100 characters and can contain leers, numbers,
hyphens, underscores, commas, and spaces.
Cortex® XDR™ Pro Administrator’s Guide 128 ©2021 Palo Alto Networks, Inc.
Endpoint Security
the proxy by entering the FQDN and port number. When you enter the FQDN, you can
use both lowercase and uppercase leers. Avoid using special characters or spaces.Use
commas to separate mulple addresses.
The Cortex XDR agent does not support proxy communicaon in environments
where proxy authencaon is required.
• You can configure the Cortex XDR agent to Run on master node, or Run on all nodes.
When you upgrade a Cortex XDR agent version without package manager, Cortex
XDR will upgrade the installaon process to package manager by default, according
to the endpoint Linux distribuon.
• For Kubernetes clusters on Linux endpoints, download the YAML file. Palo Alto Networks
strongly recommends that you do not edit this file.
• For Android endpoints, Cortex XDR creates a tenant-specific download link which you
can distribute to Android endpoints. When a newer agent version is available, Cortex XDR
idenfies older package versions as [Outdated].
Cortex® XDR™ Pro Administrator’s Guide 129 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Since Cortex XDR relies on the installaon package ID to approve agent registraon
during install, it is not recommended to delete the installaon package of acve
endpoints. If you install the Cortex XDR agent from a package aer you delete it,
Cortex XDR denies the registraon request leaving the agent in an unprotected
state. Hiding the installaon package will remove it from the default list of
available installaon packages, and can be useful to eliminate confusion within
the management console main view. These hidden installaon can be viewed by
removing the default filter.
• Copy text to clipboard to copy the text from a specific field in the row of an installaon
package.
• Hide installaon packages. Using the Hide opon provides a quick method to filter out
results based on a specific value in the table. You can also use the filters at the top of the
page to build a filter from scratch. To create a persistent filter, save ( ) it.
In environments where agents communicate with the Cortex XDR server through a wide-system
proxy, you can now set an applicaon-specific proxy for the Traps and Cortex XDR agent without
affecng the communicaon of other applicaons on the endpoint. You can set the proxy in one
of three ways: during the agent installaon or aer installaon using Cytool on the endpoint or
from Endpoints Management in Cortex XDR as described in this topic. You can assign up to five
different proxy servers per agent. The proxy server the agent uses is selected randomly and with
equal probability. If the communicaon between the agent and the Cortex XDR sever through
the app-specific proxies fails, the agent resumes communicaon through the system-wide proxy
defined on the endpoint. If that fails as well, the agent resumes communicaon with Cortex XDR
directly.
STEP 1 | From Cortex XDR, select Endpoints > Endpoint Management > Endpoint Administraon.
Cortex® XDR™ Pro Administrator’s Guide 130 ©2021 Palo Alto Networks, Inc.
Endpoint Security
3. You can assign up to five different proxies per agent. For each proxy, enter the IP address
and port number. For Cortex XDR agents 7.2.1 and later, you can also configure the
proxy by entering the FQDN and port number. When you enter the FQDN, you can
use either all lowercase leers or all uppercase leers. Avoid using special characters or
spaces.
For example:
my.network.name:808,YOUR.NETWORK.COM:888,10.196.20.244:8080.
4. Set when you’re done.
5. If necessary, you can later Disable Endpoint Proxy from the right-click menu.
When you disable the proxy configuraon, all proxies associated with that agent are
removed. The agent resumes communicaon with the Cortex XDR sever through
the wide-system proxy if defined, otherwise if a wide-system is not defined the
agent resumes communicang directly with the Cortex XDR server. If neither a wide-
system proxy nor direct communicaon exist and you disable the proxy, the agent will
disconnect from Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 131 ©2021 Palo Alto Networks, Inc.
Endpoint Security
3. Enter the ID number of the installaon package you obtained in Step 1. If you selected
agents running on different operang systems, for example Windows and Linux, you
must provide an ID for each operang system. When done, click Move.
Cortex® XDR™ Pro Administrator’s Guide 132 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• You cannot upgrade VDI endpoints. Addionally, you cannot upgrade a Golden
Image from Cortex XDR agent 6.1.x or an earlier release to a Cortex XDR agent
7.1.0 or a later release.
• Before upgrading a Cortex XDR agent 7.0 or later running on macOS 10.15.4 or
later, you must ensure that the System Extensions were approved on the endpoint.
Otherwise, if the extensions were not approved, aer the upgrade the extensions
remain on the endpoint without any opon to remove them which could cause
the agent to display unexpected behavior. To check whether the extensions
were approved, you can either verify that the endpoint is in Fully Protected state
in Cortex XDR, or execute the following command line on the endpoint to list
the extensions: systemextensionsctl list. If you need to approve the
extensions, follow the workflow explained in the Cortex XDR agent administraon
guide for approving System Extensions, either manually or using an MDM profile.
Upgrades are supported using acons which you can iniate from the Acon Center or from
Endpoint Administraon as described in this workflow.
STEP 1 | Create an Agent Installaon Package for each operang system version for which you want
to upgrade the Cortex XDR agent.
Note the installaon package names.
Cortex® XDR™ Pro Administrator’s Guide 133 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 4 | Right-click your selecon and select Endpoint Control > Upgrade agent version.
For each plaorm, select the name of the installaon package you want to push to the selected
endpoints.
Starng in the Cortex XDR agent 7.1 release, you can install the Cortex XDR agent on Linux
endpoints using package manager. When you upgrade an agent on a Linux endpoint that is not
using package manager, Cortex XDR upgrades the installaon process by default according to
Cortex® XDR™ Pro Administrator’s Guide 134 ©2021 Palo Alto Networks, Inc.
Endpoint Security
the endpoint Linux distribuon. Alternavely, if you do not want to use the package manage,
clear the opon Upgrade to installaon by package manager.
The Cortex XDR agent keeps the name of the original installaon package aer every
upgrade.
STEP 5 | Upgrade.
Cortex XDR distributes the installaon package to the selected endpoints at the next heartbeat
communicaon with the agent. To monitor the status of the upgrades, go to Response > Acon
Center. From the Acon Center you can also view addional informaon about the upgrade
(right-click the acon and select Addional data) or cancel the upgrade (right-click the acon
and select Cancel Agent Upgrade).
• During the upgrade process, the endpoint operang system might request for a
reboot. However, you do not have to perform the reboot for the Cortex XDR agent
upgrade process to complete successfully.
• Aer you upgrade to a Cortex XDR agent 7.2 or a later release on an endpoint with
Cortex XDR Device Control rules, you need to reboot the endpoint for the rules to
take effect.
Cortex® XDR™ Pro Administrator’s Guide 135 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• The endpoint status changes to Deleted, and the license returns immediately to the license
pool. Aer a retenon period of 90 days, the agent is deleted from the database and is
displayed in Cortex XDR as Endpoint Name - N/A (Deleted).
• Data associated with the deleted endpoint is displayed in the Acon Center tables and in the
Causality View for the standard 90 days retenon period.
• Alerts that already include the endpoint data at the me of the alert creaon are not affected.
Addionally, Cortex XDR automacally deletes agents aer a long period of inacvity:
• Standard agents are deleted aer 180 days of inacvity.
• VDI and TS agents are deleted aer 6 hours of inacvity.
The following workflow describes how to delete the Cortex XDR agent from one or more
Windows, Mac, or Linux endpoints.
STEP 1 | Select Endpoints > Endpoint Management > Endpoint Administraon.
Cortex® XDR™ Pro Administrator’s Guide 136 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Before upgrading a Cortex XDR agent 7.0 or later running on macOS 10.15.4 or later, you
must ensure that the System Extensions were approved on the endpoint. Otherwise, if the
extensions were not approved, aer the upgrade the extensions remain on the endpoint
without any opon to remove them which could cause the agent to display unexpected
behavior. To check whether the extensions were approved, you can either verify that the
endpoint is in Fully Protected state in Cortex XDR, or execute the following command
line on the endpoint to list the extensions: systemextensionsctl list. If you
need to approve the extensions, follow the workflow explained in the Cortex XDR agent
administraon guide for approving System Extensions, either manually or using an MDM
profile.
The following workflow describes how to uninstall the Cortex XDR agent from one or more
Windows, Mac, or Linux endpoints. To uninstall the Cortex XDR app for Android, you must do so
from the Android endpoint.
STEP 1 | Log in to Cortex XDR.
Go to Response > Acon Center > + New Acon.
STEP 4 | Select the target endpoints (up to 100) for which you want to uninstall the Cortex XDR
agent.
STEP 6 | Review the acon summary and click Done when finished.
STEP 7 | To track the status of the uninstallaon, return to the Acon Center.
Cortex® XDR™ Pro Administrator’s Guide 137 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 6 | Use the Quick Launcher to search the endpoints by alias across the Cortex XDR management
console.
Cortex® XDR™ Pro Administrator’s Guide 138 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 2 | Select either Create New to create an endpoint group from scratch or Upload From File,
using plain text files with new line separator, to populate a stac endpoint group from a file
containing IP addresses, hostnames, or aliases.
STEP 3 | Enter a Group Name and oponal Descripon to idenfy the endpoint group. The name you
assign to the group will be visible when you assign endpoint security profiles to endpoints.
Cortex® XDR™ Pro Administrator’s Guide 139 ©2021 Palo Alto Networks, Inc.
Endpoint Security
* to match any string of characters. As you apply filters, Cortex XDR displays any registered
endpoint matches to help you validate your filter criteria.
• Stac—Select specific registered endpoints that you want to include in the endpoint group.
Use the filters, as needed, to reduce the number of results.
When you create a stac endpoint group from a file, the IP address, hostname, or alias of
the endpoint must match an exisng agent that has registered with Cortex XDR. You can
select up to 250 endpoints.
Cortex® XDR™ Pro Administrator’s Guide 140 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Disconnecng Cloud Identy Engine in your Cortex XDR deployment can affect
exisng endpoint groups and policy rules based on Acve Directory properes.
Cortex® XDR™ Pro Administrator’s Guide 141 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 142 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Starng with the Cortex XDR 7.1 agent release, Cortex XDR delivers to the agent the
content update in parts and not as a single file, allowing the agent to retrieve only the
updates and addions it needs.
• Default security policy including exploit, malware, restricon, and agent sengs profiles
• Default compability rules per module
• Protected processes
• Local analysis logic
• Trusted signers
• Processes included in your block list by signers
• Behavioral threat protecon rules
• Ransomware module logic including Windows network folders suscepble to ransomware
aacks
• Event Log for Windows event logs and Linux system authencaon logs
• Python scripts provided by Palo Alto Networks
• Python modules supported in script execuon
• Maximum file size for hash calculaons in File search and destroy
• List of common file types included in File search and destroy
• Network Packet Inspecon Engine rules
When a new update is available, Cortex XDR nofies the Cortex XDR agent. The Cortex XDR
agent then randomly chooses a me within a six-hour window during which it will retrieve the
content update from Cortex XDR. By staggering the distribuon of content updates, Cortex XDR
reduces the bandwidth load and prevents bandwidth saturaon due to the high volume and size of
the content updates across many endpoints. You can view the distribuon of endpoints by content
update version from the Cortex® XDR™ Dashboard.
The Cortex XDR research team releases more frequent content updates in-between major
content versions to ensure your network is constantly protected against the latest and newest
threats in the wild. When you enable minor content updates, the Cortex XDR agent receives
minor content updates, starng with the next content releases. Otherwise, if you do not wish
to deploy minor content updates, your Cortex XDR agents will keep receiving content updates
for major releases which usually occur on a weekly basis. The content version numbering format
remains XXX-YYYY, where XXX indicates the version and YYYY indicates the build number. To
disnguish between major and minor releases, XXX is rounded up to the nearest ten for every
major release, and incremented by one for a minor release. For example, 180-<build_num> and
190-<build_num> are major releases, and 181-<build_num>, 182-<build_num>, and 191-
<build_num> are minor releases.
Cortex® XDR™ Pro Administrator’s Guide 143 ©2021 Palo Alto Networks, Inc.
Endpoint Security
To adjust content update distribuon for your environment, you can configure the following
oponal sengs:
• Content management sengs as part of the Cortex XDR global agent configuraons.
• Content download source, as part of the Cortex XDR agent seng profile.
Otherwise, if you want the Cortex XDR agent to retrieve the latest content from the server
immediately, you can force the Cortex XDR agent to connect to the server in one of the following
methods:
• (Windows and Mac only) Perform manual check-in from the Cortex XDR agent console.
• Iniate a check-in using the Cytool checkin command.
Cortex® XDR™ Pro Administrator’s Guide 144 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 145 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Aer you add the new security profile, you can Manage Endpoint Security Profiles.
Cortex® XDR™ Pro Administrator’s Guide 146 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 3 | Configure the acon to take when the Cortex XDR agent detects an aempt to exploit each
type of soware flaw.
For details on the different exploit protecon capabilies, see Endpoint Protecon Capabilies.
• Block—Block the exploit aack.
• Report—Allow the exploit acvity but report it to Cortex XDR.
• Disabled—Disable the module and do not analyze or report exploit aempts.
• Default—Use the default configuraon to determine the acon to take. Cortex XDR displays
the current default configuraon for each capability in parenthesis. For example, Default
(Block).
To view which processes are protected by each capability, see Processes Protected by Exploit
Security Policy .
For Logical Exploits Protecon, you can also configure a block list for the DLL Hijacking
module. The block list enables you to block specific DLLs when run by a protected process.
The DLL folder or file must include the complete path. To complete the path, you can use
environment variables or the asterisk ( *) as a wildcard to match any string of characters (for
example, */windows32/).
For Exploit Protecon for Addional Processes, you also add one or more addional
processes.
In Exploit Security profiles, if you change the acon mode for processes, you must
restart the protected processes for the following security modules to take effect on the
process and its forked processes: Brute Force Protecon, Java Deserializaon, ROP, and
SO Hijacking.
STEP 4 | (Windows only) Configure how to address unpatched known vulnerabilies in your network.
If you have Windows endpoints in your network that are unpatched and exposed to a
known vulnerability, Palo Alto Networks strongly recommends that you upgrade to the
latest Windows Update that has a fix for that vulnerability.
If you choose not to patch the endpoint, the Unpatched Vulnerabilies Protecon capability
allows the Cortex XDR agent to apply a workaround to protect the endpoints from the known
vulnerability. It takes the Cortex XDR agent up to 6 hours to enforce your configured policy on
the endpoints.
To address known vulnerabilies CVE-2021-24074, CVE-2021-24086, and CVE-2021-24094,
you can Modify IPv4 and IPv6 sengs as follows:
• Do not modify system sengs (default)—Do not modify the IPv4 and IPv6 sengs
currently set on the endpoint, whether the current values are your original values or values
that were modified as part of this workaround.
• Modify system sengs unl the endpoint is patched—If the endpoint is already patched,
this opon does not modify any system sengs. For unpatched endpoints, the Cortex
XDR agent runs the following commands to temporarily modify the IPv4 and IPv6 sengs
unl the endpoint is patched. Aer the endpoint is patched for CVE-2021-24074,
CVE-2021-24086, and CVE-2021-24094, all modified Windows system sengs as part
of this workaround are automacally reverted to their values before modificaon. Palo
Cortex® XDR™ Pro Administrator’s Guide 147 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Alto Networks strongly recommends that you review these commands before applying this
workaround in your network to ensure your crical business components are not affected
or harmed:
netsh int ipv6 set global reassemblylimit=0, this command disables IPv6
fragmentaon on the endpoint.
netsh int ipv4 set global sourceroutingbehavior=drop, this command
disables LSR / loose source roung for IPv4.
• Revert system sengs to your previous sengs—Revert all Windows system sengs
to their values before modificaon as part of this workaround, regardless of whether the
endpoint was patched or not.
This workaround applies only to the specific Windows versions listed as exposed to
these CVEs, and requires a Cortex XDR agent 7.1 or later and content 167-51646
or later. This workaround in not recommended for non-persistent, stateless, or linked-
clone environments. In some cases, enabling this workaround can affect the network
funconality on the endpoint.
Cortex® XDR™ Pro Administrator’s Guide 148 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 149 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 150 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 151 ©2021 Palo Alto Networks, Inc.
Endpoint Security
By default, the Cortex XDR agent will receive the default profile that contains a pre-defined
configuraon for each malware protecon capability supported by the plaorm. To fine-tune
your Malware security policy, you can override the configuraon of each capability to block the
malicious behavior or file, allow but report it, or disable the module. For each seng you override,
clear the opon to Use Default.
To configure a Malware security profile:
STEP 1 | Add a new profile.
1. From Cortex XDR, select Endpoints > Policy Management > Profiles > + New Profile.
2. Select the plaorm to which the profile applies and Malware as the profile type.
STEP 3 | Configure the Cortex XDR agent to examine executable files, macros, or DLL files on
Windows endpoints, Mach-O files or DMG files on Mac endpoints, ELF files on Linux
endpoints, or APK files on Android endpoints.
1. Configure the Acon Mode—the behavior of the Cortex XDR agent—when malware is
detected:
• Block—Block aempts to run malware.
• Report—Report but do not block malware that aempts to run.
• (Android only) Prompt—Enable the Cortex XDR agent to prompt the user when
malware is detected and allow the user to choose to allow malware, dismiss the
noficaon, or uninstall the app.
• Disabled—Disable the module and do not examine files for malware.
2. Configure addional acons to examine files for malware.
By default, Cortex XDR uses the sengs specified in the default malware security profile
and displays the default configuraon in parenthesis. When you select a seng other
than the default, you override the default configuraon for the profile.
• (Windows, Mac starng with Cortex XDR agent 7.4, Linux starng with Cortex XDR
agent 7.5) Quaranne Malicious Executables / Mach-O / ELF files—By default, the
Cortex XDR agent blocks malware from running but does not quaranne the file.
Enable this opon to quaranne files depending on the verdict issuer (local analysis,
WildFire, or both local analysis and WildFire).
The quaranne feature is not available for malware idenfied in network drives.
• Upload <file_type> files for cloud analysis—Enable the Cortex XDR agent to send
unknown files to Cortex XDR, and for Cortex XDR to send the files to WildFire for
analysis. With macro analysis, the Cortex XDR agent sends the Microso Office file
Cortex® XDR™ Pro Administrator’s Guide 152 ©2021 Palo Alto Networks, Inc.
Endpoint Security
containing the macro. The file types that the Cortex XDR agent analyzes depend on
the plaorm type. WildFire accepts files up to 100MB in size.
• Treat Grayware as Malware—Treat all grayware with the same Acon Mode you
configure for malware. Otherwise, if this opon is disabled, grayware is considered
benign and is not blocked.
• Acon on Unknown to WildFire—Select the behavior of the Cortex XDR agent
when an unknown file tries to run on the endpoint (Allow, Run Local Analysis, or
Block). With local analysis, the Cortex XDR agent uses embedded machine learning to
determine the likelihood that an unknown file is malware and issues a local verdict for
the file. If you block unknown files but do not run local analysis, unknown files remain
blocked unl the Cortex XDR agent receives an official WildFire verdict.
• (Cortex XDR agent 7.5 and later for Windows only)Acon when WildFire verdict is
Benign with Low Confidence—Select the behavior of the Cortex XDR agent when a
file with Benign Low Confidence verdict from WildFire tries to run on the endpoint
(Allow, Run Local Analysis, or Block). With local analysis, the Cortex XDR agent
uses embedded machine learning to determine the likelihood that an unknown file
is malware and issues a local verdict for the file. If you block these files but do not
run local analysis, they remain blocked unl the Cortex XDR agent receives a high-
confidence WildFire verdict. To enable this capability, ensure that WildFire analysis
scoring is enabled in your Global Agent Sengs.
• For opmal user experience, Palo Alto Networks recommends you set the
acon mode to either Allow or Run Local Analysis.
• Acon on Benign LC verdict is supported from agent version 7.5 and
above. For agent version 7.4.X, acon on Benign LC verdict is the same as
the acon for files with Unknown verdict.
• (Windows only) Examine Office Files From Network Drives—Enable the Cortex XDR
agent to examine Microso Office files in network drives when they contain a macro
that aempts to run. If this opon is disabled, the Cortex XDR agent will not examine
macros in network drives.
(Windows only) As part of the an-malware security flow, the Cortex XDR
agent leverages the OS capability to idenfy revoked cerficates for executables
and DLL files that aempt to run on the endpoint by accessing the Windows
Cerficate Revocaon List (CRL). To allow the Cortex XDR agent access the CRL,
you must enable internet access over port 80 for Windows endpoints running
Traps 6.0.3 and later releases, Traps 6.1.1 and later releases, or Cortex XDR
7.0 and later releases. If the endpoint is not connected to the internet, or you
experience delays with executables and DLLs running on the endpoint, please
contact Palo Alto Networks Support.
3. (Oponal) Add files and folders to your allow list to exclude them from examinaon.
1. +Add a file or folder.
2. Enter the path and press Enter or click the check mark when done. You can also use
a wildcard to match files and folders containing a paral name. Use ? to match a
Cortex® XDR™ Pro Administrator’s Guide 153 ©2021 Palo Alto Networks, Inc.
Endpoint Security
single character or * to match any string of characters. To match a folder, you must
terminate the path with * to match all files in the folder (for example, c:\temp\*).
3. Repeat to add addional files or folders.
4. Add signers to your allow list to exclude them from examinaon.
When a file that is signed by a signer you included in your allow list aempts to run,
1. +Add a trusted signer.
2. Enter the name of the trusted signer (Windows) or the SHA1 hash of the cerficate
that signs the file (Mac) and press Enter or click the check mark when done. You can
also use a wildcard to match a paral name for the signer. Use ? to match any single
character or * to match any string of characters.
3. Repeat to add addional folders.
STEP 4 | (Windows, Mac, and Linux only) Configure Behavioral Threat Protecon.
Behavioral threat protecon requires Traps agent 6.0 or a later release for Windows
endpoints, and Traps 6.1 or later versions for Mac and Linux endpoints.
With Behavioral threat protecon, the agent connuously monitors endpoint acvity to
idenfy and analyze chains of events—known as causality chains. This enables the agent to
detect malicious acvity in the chain that could otherwise appear legimate if inspected
individually. A causality chain can include any sequence of network, process, file, and registry
acvies on the endpoint. Behavioral threat protecon can also idenfy behavior related
to vulnerable drivers on Windows endpoints. For more informaon on data collecon for
Behavioral Threat Protecon, see Endpoint Data Collected by Cortex XDR.
Palo Alto Networks researchers define the causality chains that are malicious and distribute
those chains as behavioral threat rules. When the Cortex XDR agent detects a match to a
behavioral threat protecon rule, the Cortex XDR agent carries out the configured acon
(default is Block). In addion, the Cortex XDR agent reports the behavior of the enre event
chain up to the process, known as the causality group owner (CGO), that the Cortex XDR agent
idenfied as triggering the event sequence.
To configure Behavioral Threat Protecon:
1. Define the Acon mode to take when the Cortex XDR agent detects malicious causality
chains:
• Block (default)—Block all processes and threads in the event chain up to the CGO.
• Report—Allow the acvity but report it to Cortex XDR.
• Disabled—Disable the module and do not analyze or report the acvity.
2. Define whether to quaranne the CGO when the Cortex XDR agent detects a malicious
event chain.
• Enabled—Quaranne the CGO if the file is not signed by a highly trusted signer.
When the CGO is signed by a highly trusted signer or powershell.exe, wscript.exe,
cscript.exe, mshta.exe, excel.exe, word.exe or powerpoint.exe, the Cortex XDR agent
Cortex® XDR™ Pro Administrator’s Guide 154 ©2021 Palo Alto Networks, Inc.
Endpoint Security
parses the command-line arguments and instead quarannes any scripts or files called
by the CGO.
• Disabled (default)—Do not quaranne the CGO of an event chain nor any scripts or
files called by the CGO.
3. (Windows only, requires a Cortex XDR agent 7.2 or a later release) Define the Acon
Mode for Vulnerable Drivers Protecon.
Behavioral threat protecon rules can also detect aempts to load vulnerable drivers. As
with other rules, Palo Alto Networks threat researchers can deliver changes to vulnerable
driver rules with content updates.
• Block (default)—Block all aempts to run vulnerable drivers.
• Report—Allow vulnerable drivers to run but report the acvity.
• Disabled—Disable the module and do not analyze or report the acvity.
4. (Oponal) Add files that you do not want the Cortex XDR agent to terminate when a
malicious causality chain is detected to your allow list. The allow list does not apply to
vulnerable drivers.
1. +Add a file path.
2. Enter the file path you want to exclude from evaluaon. Use ? to match a single
character or * to match any string of characters.
3. Click the checkmark to confirm the file path.
4. Repeat the process to add any addional file paths to your allow list.
This module is supported with Cortex XDR agent 7.3.0 and later release.
1. Select the Acon Mode to take when the Cortex XDR agent detects remote malicious
causality chains:
• Enabled (default)—Terminate connecon and block IP address of the remote
connecon.
• Disabled—Do not block remote IP addresses.
2. To allow specific and known safe IP address or IP address ranges that you do not want
the Cortex XDR to block, add these IP addresses to your allow list.
+Add and then specify the IP address.
Cortex® XDR™ Pro Administrator’s Guide 155 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 156 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 7 | (Windows only) Configure the Cortex XDR agent to Prevent Malicious Child Process
Execuon.
1. Select the Acon Mode to take when the Cortex XDR agent detects malicious child
process execuon:
• Block—Block the acvity.
• Report—Allow the acvity but report it to Cortex XDR.
2. To allow specific processes to launch child processes for legimate purposes, add the
child process to your allow list with oponal execuon criteria.
+Add and then specify the allow list criteria including the Parent Process Name, Child
Process Name, and Command Line Params. Use ? to match a single character or * to
match any string of characters.
If you are adding child process evaluaon criteria based on a specific security
event, the event indicates both the source process and the command line
parameters in one line. Copy only the command line parameter for use in the
profile.
Cortex® XDR™ Pro Administrator’s Guide 157 ©2021 Palo Alto Networks, Inc.
Endpoint Security
is powered-on again. The scheduling of future scans is not affected by this delay. To beer
understand how the agent scans the endpoint, refer to Scan an Endpoint for Malware.
When periodic scanning is enabled in your profile, the Cortex XDR agent iniates an
inial scan when it is first installed on the endpoint, regardless of the periodic scanning
scheduling me.
1. Configure the Acon Mode for the Cortex XDR agent to periodically scan the endpoint
for malware: Enabled to scan at the configured intervals, Disabled (default) if you don’t
want the Cortex XDR agent to scan the endpoint.
2. To configure the scan schedule, set the frequency (Run Weekly or Run Monthly) and day
and me at which the scan will run on the endpoint.
Just as with an on-demand scan, a scheduled scan will resume aer a reboot, process
interrupon, or operang system crash.
3. (Windows only) To include removable media drives in the scheduled scan, enable the
Cortex XDR agent to Scan Removable Media Drives.
4. Add folders you your allow list to exclude them from examinaon.
1. Add (+) a folder.
2. Enter the folder path. Use ? to match a single character or * to match any string of
characters in the folder path (for example, C:\*\temp).
3. Press Enter or click the check mark when done.
4. Repeat to add addional folders.
STEP 9 | (Windows Vista and later Windows releases) Enable Password The Protecon.
Select Enabled to enable the Cortex XDR agent to prevent aacks that use the Mimikatz
tool to extract passwords from memory. When set to Enabled, the Cortex XDR agent silently
Cortex® XDR™ Pro Administrator’s Guide 158 ©2021 Palo Alto Networks, Inc.
Endpoint Security
prevents aempts to steal credenals (no noficaons are provided when these events occur).
The Cortex XDR agent enables this protecon module following the next endpoint reboot. If
you don’t want to enable the module, select Disabled.
This module is supported with Traps agent 5.0.4 and later release.
This module is supported with Cortex XDR agent 7.5.0 and later release.
1. Define the Acon mode to take when the Cortex XDR agent detects malicious behavior:
• Terminate Session (default)—Drop the malicious connecons. In case of an outgoing
connecon, also terminate all associated processes.
• Report—Allow the packets in your network but report it to Cortex XDR.
• Disabled—Disable the module and do not analyze or report the acvity.
This module is supported with Cortex XDR agent 7.2.0 and later release.
1. Select the Acon Mode to take when the Cortex XDR agent detects the malicious
behavior.
• Enable—Enable the Cortex XDR agent to analyze the endpoint for PHP files arriving
from the web server and alert of any malicious PHP scripts.
• Disable—Disable the module and do not analyze or report the acvity.
2. Quaranne malicious files.
When Enabled, the Cortex XDR agents quaranne malicious PHP files on the endpoint.
The agent quarannes newly created PHP files only, and does not quaranne updated
files.
3. (Oponal) Add files and folders to your allow list to exclude them from examinaon.
1. +Add a file or folder.
2. Enter the path and press Enter or click the check mark when done. You can also use
* to match files and folders containing a paral name. To match a folder, you must
terminate the path with * to match all files in the folder (for example, /usr/bin/*).
3. Repeat to add addional files or folders.
Cortex® XDR™ Pro Administrator’s Guide 159 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 160 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 161 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• Benign—The sample is safe and does not exhibit malicious behavior. If Low Confidence is
indicated for the Benign verdict, Cortex XDR can treat this hash as if the verdict is unknown
and further run Local Analysis to get a verdict with higher confidence.
• Malware—The sample is malware and poses a security threat. Malware can include viruses,
worms, Trojans, Remote Access Tools (RATs), rootkits, botnets, and malicious macros. For files
idenfied as malware, WildFire generates and distributes a signature to prevent against future
exposure to the threat.
• Grayware—The sample does not pose a direct security threat, but might display otherwise
obtrusive behavior. Grayware typically includes adware, spyware, and Browser Helper Objects
(BHOs).
When WildFire is not available or integraon is disabled, the Cortex XDR agent can also assign a
local verdict for the sample using addional methods of evaluaon: When the Cortex XDR agent
performs local analysis on a file, it uses paern-matching rules and machine learning to determine
the verdict. The Cortex XDR agent can also compare the signer of a file with a local list of trusted
signers to determine whether a file is malicious:
• Local analysis verdicts:
• Benign—Local analysis determined the sample is safe and does not exhibit malicious
behavior.
• Malware—The sample is malware and poses a security threat. Malware can include viruses,
worms, Trojans, Remote Access Tools (RATs), rootkits, botnets, and malicious macros.
• Trusted signer verdicts:
• Trusted—The sample is signed by a trusted signer.
• Not Trusted—The sample is not signed by a trusted signer.
Local Verdict Cache
The Cortex XDR agent stores hashes and the corresponding verdicts for all files that aempt to
run on the endpoint inits local cache. The local cache scales in size to accommodate the number
of unique executable files opened on the endpoint. On Windows endpoints, the cache is stored in
the C:\ProgramData\Cyvera\LocalSystem folder on the endpoint. When service protecon
is enabled (see Add a New Agent Sengs Profile), the local cache is accessible only by the Cortex
XDR agent and cannot be changed.
Each me a file aempts to run, the Cortex XDR agent performs a lookup in its local cache to
determine if a verdict already exists. If known, the verdict is either the official WildFire verdict or
manually set as a hash excepon. Hash excepons take precedence over any addional verdict
analysis.
If the file is unknown in the local cache, the Cortex XDR agent queries Cortex XDR for the
verdict. If Cortex XDR receives a verdict request for a file that was already analyzed, Cortex XDR
immediately responds to the Cortex XDR agent with the verdict.
If Cortex XDR does not have a verdict for the file, it queries WildFire and oponally submits the
file for analysis. While the Cortex XDR agent aempts waits for an official WildFire verdict, it can
use File Analysis and Protecon Flow to evaluate the file. Aer Cortex XDR receives the verdict it
responds to the Cortex XDR agent that requested the verdict.
For informaon on file-examinaon sengs, see Add a New Malware Security Profile.
Cortex® XDR™ Pro Administrator’s Guide 162 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 163 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Field Descripon
Created Time Date and me at which the security profile was
created.
Modificaon Time Date and me at which the security profile was
modified.
Cortex® XDR™ Pro Administrator’s Guide 164 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 165 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Agent Profiles
Disk Space —
Customize the amount
of disk space the Cortex
XDR agent uses to store
logs and informaon
about events.
User Interface — —
Determine whether
and how end users can
access the Cortex XDR
console.
Traps Tampering — —
Protecon
Prevent users from
tampering with the
Cortex XDR agent
components by
restricng access.
Uninstall Password — —
Change the default
uninstall password to
prevent unauthorized
users from uninstalling
the Cortex XDR agent
soware.
Cortex® XDR™ Pro Administrator’s Guide 166 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Windows Security — — —
Center Configuraon
Configure your Windows
Security Center
preferences to allow
registraon with the
Microso Security
Center, to allow
registraon with
automated Windows
patch installaon, or to
disable registraon.
Forensics — — —
Change forensic data
collecon and upload
preferences.
Response Acons —
Manual response acons
that you can take on
the endpoint aer a
malicious file, process,
or behavior is detected.
For example, you can
terminate a malicious
process, isolate the
infected endpoint from
the network, quaranne
a malicious file, or
perform addional
Cortex® XDR™ Pro Administrator’s Guide 167 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Content Updates —
Configure how the
Cortex XDR agent
performs content
updates on the endpoint:
whether to download
the content directly from
Cortex XDR or from a
peer agent, whether to
perform immediate or
delayed updates, and
whether to perform
automac content
updates or connue
using the current content
version.
Global Uninstall —
Password
Cortex® XDR™ Pro Administrator’s Guide 168 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Content Bandwidth —
Management
Configure the total
bandwidth to allocate
for content update
distribuon within your
organizaon.
Advanced Analysis —
Enable Cortex XDR to
automacally upload
alert data for secondary
verdict verificaon and
security policy tuning.
Cortex® XDR™ Pro Administrator’s Guide 169 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 3 | (Windows, Mac, and Linux only) Configure the Disk Space to allot for Cortex XDR agent logs.
Specify a value in MB from 100 to 10,000 (default is 5,000).
STEP 4 | (Windows and Mac only) Configure User Interface opons for the Cortex XDR console.
By default, Cortex XDR uses the sengs specified in the default agent sengs profile and
displays the default configuraon in parenthesis. When you select a seng other than the
default, you override the default configuraon for the profile.
• Tray Icon—Choose whether you want the Cortex XDR agent icon to be Visible (default) or
Hidden in the noficaon area (system tray).
• XDR Agent Console Access—Enable this opon to allow access to the Cortex XDR console.
• XDR Agent User Noficaons—Enable this opon to operate display noficaons in the
noficaons area on the endpoint. When disabled, the Cortex XDR agent operates in silent
mode where the Cortex XDR agent does not display any noficaons in the noficaon
area. If you enable noficaons, you can use the default noficaon messages, or provide
custom text for each noficaon type. You can also customize a noficaon footer.
• Live Terminal User Noficaons—Choose whether to Nofy the end user and display a
pop-up on the endpoint when you iniate a Live Terminal session. For Cortex XDR agents
7.3 and later releases only, you can choose to Request end-user permission to start the
session. If the end user denies the request, you will not be able to iniate a Live Terminal
session on the endpoint.
• (Cortex XDR agent 7.3 and later releases only) Live Terminal Acve Session Indicaon—
Enable this opon to display a blinking light ( ) on the tray icon (or in the status bar for
Mac endpoints) for the duraon of the remote session to indicate to the end user that a live
terminal session is in progress.
Cortex® XDR™ Pro Administrator’s Guide 170 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 6 | (Windows and Mac only) Configure Agent Security opons that prevent unauthorized access
or tampering with the Cortex XDR agent components.
Use the default agent sengs or customize them for the profile. To customize agent security
capabilies:
1. Enable XDR Agent Tampering Protecon.
2. (Windows only) By default, the Cortex XDR agent protects all agent components,
however you can configure protecon more granularly for Cortex XDR agent services,
processes, files, and registry values. With Traps 5.0.6 and later releases, when protecon
is enabled, access will be read-only. In earlier Traps releases, enabling protecon disables
all access to services, processes, files, and registry values.
When you Enable the Cortex XDR agent to register to the Windows Security Center,
Windows shuts down Microso Defender on the endpoint automacally. If you
sll want to allow Microso Defender to run on the endpoint where Cortex XDR
is installed, you must Disable this opon. However, Palo Alto Networks does not
recommend running Windows Defender and the Cortex XDR agent on the same
endpoint since it might cause performance issues and incompability issues with
Global Protect and other applicaons.
Cortex® XDR™ Pro Administrator’s Guide 171 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 10 | (Requires a Cortex XDR Pro per Endpoint license and allocaon of log storage in Cortex Data
lake) Enable and configure Cortex XDR Pro Endpoint capabilies on the endpoint, including
enhanced data collecon, advanced responses, and available Pro add-ons.
1. Enable XDR Pro Endpoints Capabilies to configure which Pro capabilies to acvate on
the endpoint.
The Pro features are hidden unl you enable the capability. Enabling this capability
consumes a Cortex XDR Pro per Endpoint license.
2. (Supported on Cortex XDR agent 6.0 or a later for Windows endpoints and Cortex XDR
agent 6.1 or later for Mac and Linux endpoints) Enable Monitor and Collect Enhanced
Endpoint Data.
By default, the Cortex XDR agent collects informaon about events that occur on the
endpoint. If you enable Behavioral Threat Protecon in a Malware Security profile, the
Cortex XDR agent also collects informaon about all acve file, process, network, and
registry acvity on an endpoint (see Endpoint Data Collected by Cortex XDR). When
you enable the Cortex XDR agent to monitor and collect enhanced endpoint data, you
enable Cortex XDR to share the detailed endpoint informaon with other Cortex apps.
The informaon can help to provide the endpoint context when a security event occurs
so that you can gain insight on the overall event scope during invesgaon. The event
scope includes all acvies that took place during an aack, the endpoints that were
involved, and the damage caused. When disabled, the Cortex XDR agent will not share
endpoint acvity logs.
3. (Requires Host Insights add-on and Cortex XDR agent 7.1 or later releases) Enable Host
Insights Capabilies.
• Enable Endpoint Informaon Collecon to allow the Cortex XDR agent to collect
Host Inventory informaon such as users, groups, services, drivers, hardware, and
network shares, as well as informaon about applicaons installed on the endpoint,
including CVE and installed KBs for Vulnerability Assessment.
• (Supported on Cortex XDR agent 7.2 or a later for Windows endpoints and Cortex
XDR agent 7.3 or later for Mac endpoints) Enable File Search and Destroy Acon
Mode to allow the Cortex XDR agent to collect detailed informaon about files on the
Cortex® XDR™ Pro Administrator’s Guide 172 ©2021 Palo Alto Networks, Inc.
Endpoint Security
endpoint to create a files inventory database. The agent locally monitors any acons
performed on these files and updates the local files database in real-me.
With this opon you can also choose the File Search and Destroy Monitored File
Types where Cortex XDR monitors all file types or only common file types. If you
choose Common file types, Cortex XDR monitors the following file types:
• Windows—bat, bmp, c, cab, cmd, cpp, csv, db, dbf, doc, docb,
docm, docx, dotm, dotx, dwg, dxf, exif, gif, gz, jar, java,
jpeg, jpg, js, keynote, mdb, mdf, myd, pages, pdf, png, pot,
potm, ppam, pps, ppsm, ppsx, ppt, pptm, pptx, ps1, pub, py,
rar, rtf, sdf, sldm, sldx, sql, sqlite, sqlite3, svg, tar,
txt, url, vb, vbe, vbs, vbscript, vsd, vsdx, wsf, xla, xlb,
xlm, xls, xlsm, xlsx, xlt, xltm, xltx, xps, zip, and 7z.
• Mac—acm, apk, ax, bat, bin, bundle, csv, dll, dmg, doc,
docm, docx, dylib, efi, exe, hta, jar, js, jse, jsf, lua,
mpp, mppx, msi, mui, o, ocx, pdf, pkg, pl, plx, pps, ppsm,
ppsx, ppt, pptm, pptx, py, pyc, pyo, rb, rtf, scr, sh, vds,
vsd, wsf, xls, xlsm, xlsx, xsdx, and zip.
Addionally, you can exclude files that exist under a specific local path on the
endpoint from inclusion in the files database.
4. (Requires Forensics Add-on and Cortex XDR agent 7.4 or a later for Windows endpoints)
Enable Monitor and Collect Forensics Data allow the Cortex XDR agent to collect
detailed informaon about what happened on your endpoint to create a forensics
database. Define the following if to enable collecon and in what me intervals of the
following enty types:
• Process Execuon
• File Access
• Persistence
• Command History
• Network
• Remote Access
• Search Collecons
Data collected by the agent is displayed in the Forensic Data Analysis page.
5. (Supported on Cortex XDR agent 7.5 or a later for Windows endpoints and requires
to15) Enable Distributed Network Scan to allow the Cortex XDR agent to scan your
network using Ping to provide updated idenfiers of your unmanaged network assets,
such as IP addresses and OS plaorms. The result scans can be viewed in the Asset
Management table.
1. Enable the Acon Mode.
2. In Scan Mode, select Nmap or Ping.
3. Select is you want any Excluded IP Address Ranges. The IP address ranges are
populated from your Network Configuraons.
4. If you selected Nmap, enable or disable OS Fingerprinng.
Cortex® XDR™ Pro Administrator’s Guide 173 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 12 | (Supported on Cortex XDR agent 7.0 or a later for Windows endpoints and Cortex XDR
agent 7.3 or later for Mac and Linux endpoints) Specify the Content Configuraon for your
Cortex XDR agents.
• Content Auto-update—By default, the Cortex XDR agent always retrieves the most updated
content and deploys it on the endpoint so it is always protected with the latest security
measures. However, you can Disable the automac content download. Then, the agent
stops retrieving content updates from the Cortex XDR Server and keeps working with the
current content on the endpoint.
• If you disable content updates for a newly installed agent, the agent will retrieve
the content for the first me from Cortex XDR and then disable content updates
on the endpoint.
• When you add a Cortex XDR agent to an endpoints group with disabled content
auto-upgrades policy, then the policy is applied to the added agent as well.
• Content Rollout—The Cortex XDR agent can retrieve content updates Immediately as they
are available, or aer a pre-configured Delayed period. When you delay content updates,
the Cortex XDR agent will retrieve the content according to the configured delay. For
example, if you configure a delay period of two days, the agent will not use any content
released in the last 48 hours.
Cortex® XDR™ Pro Administrator’s Guide 174 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 13 | Enable Agent Auto Upgrade for your Cortex XDR agents.
To ensure your endpoints are always up-to-date with the latest Cortex XDR agent release,
enable automac agent upgrades. For increased flexibility, you can choose to apply automac
upgrades to major releases only, to maintenance releases only, or to both. It can take up to 15
minutes for new and updated auto-upgrade profile sengs to take effect on your endpoints. To
control the agent auto upgrade scheduler and number of parallel upgrades in your network, see
Configure Global Agent Sengs.
Automac upgrades are not supported with non-persistent VDI and temporary
sessions.
STEP 14 | (Supported on Cortex XDR agent 7.0 or a later for Windows endpoints and Cortex XDR
agent 7.3 or later for Mac and Linux endpoints) Specify the Download Source for agent and
content updates.
To reduce your external network bandwidth loads during updates, you can choose the
Download Source(s) from which the Cortex XDR agent retrieves agent release upgrades and
content updates: from a peer agent in the local network, from the Palo Alto Networks Broker
VM, or directly from the Cortex XDR server. If all opons are selected in your profile, then the
aempted download order is first using P2P, then from Broker VM, and lastly from the Cortex
Server.
• (Requires Cortex XDR agents 7.4 and later for P2P agent upgrade) P2P—Cortex XDR
deploys serverless peer-to-peer P2P distribuon to Cortex XDR agents in your LAN
network by default. Within the six hour randomizaon window during which the Cortex
XDR agent aempts to retrieve the new version, it will broadcast its peer agents on the
same subnet twice: once within the first hour, and once again during the following five
hours. If the agent did not retrieve the files from other agents in both queries, it will proceed
to the next download source defined in your profile.
To enable P2P, you must enable UDP and TCP over the defined PORT in Download Source.
By default, Cortex XDR uses port 33221. You can configure another port number.
• (Requires Cortex XDR agents 7.4 and later releases and Broker VM 12.0 and later) Broker
VM—If you have a Palo Alto Networks Broker VM in your network, you can leverage the
Local Agent Sengs applet to cache release upgrades and content updates. When enabled
and configured, the Broker retrieves from Cortex XDR the latest installers and content
every 15 minutes and stores them for a 30-days retenon period since an agent last asked
for them. If the files were not available on the Broker VM at the me of the ask, the agent
proceeds to download the files directly from the Cortex XDR server.
If you enable the Broker download opon, proceed to select one or more available brokers
from the list. Cortex XDR enables you to select only brokers that are connected and for
Cortex® XDR™ Pro Administrator’s Guide 175 ©2021 Palo Alto Networks, Inc.
Endpoint Security
which the caching is configured. When you select mulple brokers, the agent chooses
randomly which broker to use for each download request.
• Cortex Server—To ensure your agents remain protected, the Cortex Server download source
is always enabled to allow all Cortex XDR agents in your network to retrieve the content
directly from the Cortex XDR server on their following heartbeat.
STEP 15 | Enable Network Locaon Configuraon for your Cortex XDR agents.
(Requires Cortex XDR agents 7.1 and later releases) If you configure host firewall rules in your
network, you must enable Cortex XDR to determine the network locaon of your device, as
follows:
1. A domain controller (DC) connecvity test— When Enabled, the DC test checks whether
the device is connected to the internal network or not. If the device is connected to the
internal network, then it is in the organizaon. Otherwise, if the DC test failed or returned
an external domain, Cortex XDR proceeds to a DNS connecvity test.
2. A DNS test—In the DNS test, the Cortex XDR agent submits a DNS name that is known
only to the internal network. If the DNS returned the pre-configured internal IP, then the
device is within the organizaon. Otherwise, if the DNS IP cannot be resolved, then the
device is located elsewhere. Enter the IP Address and DNS Server Name for the test.
If the Cortex XDR agent detects a network change on the endpoint, the agent triggers the
device locaon test, and re-calculates the policy according to the new locaon.
Cortex® XDR™ Pro Administrator’s Guide 176 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 3 | Manage the content updates bandwidth and frequency in your network.
• Enable bandwidth control—Palo Alto Networks allows you to control your Cortex XDR
agent network consumpon by adjusng the bandwidth it is allocated. Based on the
number of agents you want to update with content and upgrade packages, acve or future
agents, the Cortex XDR calculator configures the recommended amount of Mbps (Megabits
per second) required for a connected agent to retrieve a content update over a 24 hour
period or a week. Cortex XDR supports between 20 - 10000 Mbps, you can enter one of
the recommended values or enter one of your own.For opmized performance and reduced
bandwidth consumpon, it is recommended that you install and update new agents with
Cortex XDR agents 7.3 and later that include the content package built in using SCCM.
• Enable minor content version updates—The Cortex XDR research team releases more
frequent content updates in-between major content versions to ensure your network is
constantly protected against the latest and newest threats in the wild. When you enable
minor content version updates, the Cortex XDR agent receives minor content updates,
starng with the next content releases. To learn more about the minor content numbering
format, refer to the About Content Updates topic.
STEP 5 | Configure the Cortex XDR agent auto upgrade scheduler and number of parallel upgrades.
If Agent Auto Upgrades are enabled for your Cortex XDR agents, you can control the
automac upgrade process in your network. To beer control the rollout of a new Cortex
XDR agent release in your organizaon, during the first week only a single batch of agents is
Cortex® XDR™ Pro Administrator’s Guide 177 ©2021 Palo Alto Networks, Inc.
Endpoint Security
upgraded. Aer that, auto-upgrades connue to be deployed across your network in parallel
batches as configured.
• Amount of agents per batch—Set the number of parallel agent upgrades, while the
maximum is 500 agents.
• Days in week—You can schedule the upgrade task for specific days of the week and a
specific me range. The minimum range is four hours.
STEP 6 | Configure automated Advanced Analysis of XDR Agent alerts raised by exploit protecon
modules.
Advanced Analysis is an addional verificaon method you can use to validate the verdict
issued by the Cortex XDR agent. In addion, Advanced Analysis also helps Palo Alto Networks
researchers tune exploit protecon modules for accuracy.
To iniate addional analysis you must retrieve data about the alert from the endpoint. You
can do this manually on an alert-by-alert basis or you can enable Cortex XDR to automacally
retrieve the files.
Aer Cortex XDR receives the data, it automacally analyzes the memory contents and
renders a verdict. When the analysis is complete, Cortex XDR displays the results in the
Advanced Analysis field of the Addional data view for the data retrieval acon on the Acon
Center. If the Advanced Analysis verdict is benign, you can avoid subsequent blocked files for
users that encounter the same behavior by enabling Cortex XDR to automacally create and
distribute excepons based on the Advanced Analysis results.
1. Configure the desired opons:
• Enable Cortex XDR to automacally upload defined alert data files for advanced
analysis. Advanced Analysis increases the Cortex XDR exploit protecon module
accuracy
• Automacally apply Advanced Analysis excepons to your Global Excepons
list. This will apply all Advanced Analysis excepons suggested by Cortex XDR,
regardless of the alert data file source
2. Save the Advanced Analysis configuraon.
Cortex® XDR™ Pro Administrator’s Guide 178 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 7 | Configure the Cortex XDR Agent license revocaon and deleon period.
This configuraon applies to standard endpoints only and does not impact the license status of
agents for VDIs or Temporary Sessions.
STEP 8 | Enable WildFire analysis scoring for files with Benign verdicts.
The WildFire analysis score for files with Benign verdict is used to indicate the level of
confidence WildFire has in the Benign verdict. For example, a file by a trusted signer or a file
that was tested manually gets a high confidence Benign score, whereas a file that did not
display any suspicious behavior at the me of tesng gets a lower confidence Benign score. To
add an addional verificaon method to such files, enable this seng. Then, when Cortex XDR
receives a Benign Low Confidence verdict, the agent enforces the Malware Security profile
sengs you currently have in place (Run local analysis to determine the file verdict, Allow, or
Block).
Disabling this capability takes immediate effect on new hashes, fresh agent
installaons, and exisng security policies. It could take up to a week to take effect on
exisng agents in your environment pending agent caching.
Cortex® XDR™ Pro Administrator’s Guide 179 ©2021 Palo Alto Networks, Inc.
Endpoint Security
update the sengs, new alerts will include the changes while already exisng alerts will remain
unaffected.
If you have any Cortex XDR filters, starring policies, exclusion policies, scoring rules,
log forwarding queries, or automaon rules configured for XSOAR/3rd party SIEM, we
advise you to update those to support the changes before acvang the feature. For
example, change the query to include the previous descripon that is sll available in
the new descripon, instead of searching for an exact match.
Field Descripon
Process Creaon Time Part of process unique ID per boot session (PID + creaon me)
Cortex® XDR™ Pro Administrator’s Guide 180 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 181 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 182 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• Connect • Session ID
User Presence (Traps 6.1 and User Detecon Detecon when a user is
later) present or idle per acve user
session on the computer.
Event Log See the Windows Event Logs table for the list of Windows
Event Logs that can be sent to the server.
In Traps 6.1.3 and later releases, Cortex XDR and Traps agents can send the following Windows
Event Logs to the server:
Cortex® XDR™ Pro Administrator’s Guide 183 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Applicaon EMET
Cortex® XDR™ Pro Administrator’s Guide 184 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 185 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 186 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 187 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 188 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 189 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 2 | Define a Policy Name and oponal Descripon that describes the purpose or intent of the
policy.
STEP 3 | Select the Plaorm for which you want to create a new policy.
STEP 4 | Select the desired Exploit, Malware, Restricons, and Agent Sengs profiles you want to
apply in this policy.
If you do not specify a profile, the Cortex XDR agent uses the default profile.
Cortex® XDR™ Pro Administrator’s Guide 190 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 6 | Use the filters to assign the policy to one or more endpoints or endpoint groups.
Cortex XDR automacally applies a filter for the plaorm you selected. To change the plaorm,
go Back to the general policy sengs.
STEP 8 | In the Policy Rules table, change the rule posion, if needed, to order the policy relave to
other policies.
The Cortex XDR agent evaluates policies from top to boom. When the Cortex XDR agent
finds the first match it applies that policy as the acve policy. To move the rule, select the
arrows and drag the policy to the desired locaon in the policy hierarchy.
Right-click to View Policy Details, Edit, Save as New, Disable, and Delete.
Cortex® XDR™ Pro Administrator’s Guide 191 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Behavioral Threat Protecon Rule Excepon An excepon disabling a specific BTP rule
across all processes.
Local File Threat Examinaon Excepon (Linux only) An excepon allowing specific
PHP files.
Example A
Cortex® XDR™ Pro Administrator’s Guide 192 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Example B
Cortex® XDR™ Pro Administrator’s Guide 193 ©2021 Palo Alto Networks, Inc.
Endpoint Security
for this profile. To apply the process excepon on all security modules, Select all. To
apply the process excepon on all exploit security modules, select Disable Injecon.
4. Click the adjacent arrow.
5. Aer you’ve added all processes, click Create.
You can return to the Process Excepon profile from the Endpoints Profile page at any
point and edit the sengs, for example if you want to add or remove more security
modules.
To configure a Support Excepon:
1. Import the json file you received from Palo Alto Networks support team by either
browsing for it in your files or by dragging and dropping the file on the page.
2. Click Create.
To configure module specific excepons relevant for the selected profile plaorm:
• Behavioral Threat Protecon Rule Excepon—When you view an alert for a Behavioral
Threat event which you want to allow in your network from now on, right-click the alert and
Create alert excepon. Cortex XDR displays the alert data (Plaorm and Rule name). Select
Excepon Scope: Profile and select the excepon profile name. Click Add.
• Digital Signer Excepon—When you view an alert for a Digital Signer Restricon which
you want to allow in your network from now on, right-click the alert and Create alert
excepon. Cortex XDR displays the alert data (Plaorm, Signer, and Generang Alert ID).
Select Excepon Scope: Profile and select the excepon profile name. Click Add.
• Java Deserializaon Excepon—When you idenfy a Suspicious Input Deserializaon
alert that you believe to be benign and want to suppress future alerts, right-click the
alert and Create alert excepon. Cortex XDR displays the alert data (Plaorm, Process,
Java executable, and Generang Alert ID). Select Excepon Scope: Profile and select the
excepon profile name. Click Add.
• Local File Threat Examinaon Excepon—When you view an alert for a PHP file which you
want to allow in your network from now on, right-click the alert and Create alert excepon.
Cortex XDR displays the alert data (Process, Path, and Hash). Select Excepon Scope:
Profile and select the excepon profile name. Click Add
• Gatekeeper Enhancement Excepon—When you view a Gatekeeper Enhancement security
alert for a bundle or specific source-child combinaon you want to allow in your network
from now on, right-click the alert and Create alert excepon. Cortex XDR displays the
alert data (Plaorm, Source Process, Target Process, and Alert ID). Select Excepon Scope:
Profile and select the excepon profile name. Click Add. This excepon allows Cortex
Cortex® XDR™ Pro Administrator’s Guide 194 ©2021 Palo Alto Networks, Inc.
Endpoint Security
XDR to connue enforcing the Gatekeeper Enhancement protecon module on the source
process running other child processes.
At any point, you can click the Generang Alert ID to return to the original alert from which
the excepon was originated. You cannot edit module specific excepons.
Cortex® XDR™ Pro Administrator’s Guide 195 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 196 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 2 | Review the alert data (plaorm and rule name) and then select from the following opons as
needed:
Cortex® XDR™ Pro Administrator’s Guide 197 ©2021 Palo Alto Networks, Inc.
Endpoint Security
You cannot edit global excepons generated from a BTP security event.
Cortex® XDR™ Pro Administrator’s Guide 198 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 2 | Review the alert data (plaorm and rule name) and select Excepon Scope: Global.
Cortex® XDR™ Pro Administrator’s Guide 199 ©2021 Palo Alto Networks, Inc.
Endpoint Security
By enabling Cortex XDR to automacally create and distribute global excepons you can minimize
disrupon for users when they subsequently encounter the same benign acvity. To enable the
automac creaon of Advanced Analysis Excepons, configure the Advanced Analysis opons in
your Configure Global Agent Sengs.
For each excepon, Cortex XDR displays the affected plaorm, excepon name, and the relevant
alert ID for which Cortex XDR determined acvity was benign. To drill down into the alert details,
click the Generang Alert ID.
Cortex® XDR™ Pro Administrator’s Guide 200 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 201 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 202 ©2021 Palo Alto Networks, Inc.
Endpoint Security
select it and click X. You cannot edit global excepons generated from a local file threat
examinaon excepon restricon security event.
Cortex® XDR™ Pro Administrator’s Guide 203 ©2021 Palo Alto Networks, Inc.
Endpoint Security
global excepon, select it and click X. You cannot edit global excepons generated from a
gatekeeper enhancement security event.
Cortex® XDR™ Pro Administrator’s Guide 204 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Hardened endpoint security capabilies are not supported for Android endpoints.
Device Control —
Protects endpoints from Cortex XDR agent Cortex XDR agent
loading malicious files from 7.0 and later 7.2 and later
USB-connected removable
For VDI, Cortex
devices (CD-ROM, disk
XDR agent 7.3 and
drives, floppy disks and
later
Windows portable devices
drives).
Host Firewall —
Protects endpoints from Cortex XDR agent Cortex XDR agent
aacks originang in 7.1 and later 7.2 and later
network communicaons
to and from the endpoint.
Disk Encrypon —
Provides visibility into Cortex XDR agent Cortex XDR agent
endpoints that encrypt 7.1 and later 7.2 and later
their hard drives using
BitLocker or FileVault.
Cortex® XDR™ Pro Administrator’s Guide 205 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Host Inventory
Provides full visibility Cortex XDR agent Cortex XDR agent Cortex XDR agent
into the business and IT 7.1 and later 7.1 and later 7.1 and later
operaonal data on all your
endpoints.
Vulnerability Assessment —
Idenfies and quanfies Cortex XDR agent Cortex XDR agent
the security vulnerabilies 7.1 and later 7.1 and later
(CVEs) that exist for
applicaons installed on
you endpoints.
Device Control
By default, all external USB devices are allowed to connect to your Cortex XDR endpoints. To
protect endpoints from connecng USB-connected removable devices—such as disk drives, CD-
ROM drives, floppy disk drives, and other portable devices—that can contain malicious files,
Cortex XDR provides device control.
For example, with device control, you can:
• Block all supported USB-connected devices for an endpoint group.
• Block a USB device type but add to your allow list a specific vendor from that list that will be
accessible from the endpoint.
• Temporarily block only some USB device types on an endpoint.
The following are prerequisites to enforce device control policy rules on your endpoints:
Cortex® XDR™ Pro Administrator’s Guide 206 ©2021 Palo Alto Networks, Inc.
Endpoint Security
If you are running Cortex XDR agents 7.3 or earlier releases, device control rules take
effect on your endpoint only aer the Cortex XDR agent deploys the policy. If you already
had a USB device connected to the endpoint, you have to disconnect it and connect it
again for the policy to take effect.
Profile Descripon
Cortex® XDR™ Pro Administrator’s Guide 207 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Device Configuraon and Device Excepons profiles are set for each operang system separately.
Aer you configure a device control profile, Apply Device Control Profiles to Your Endpoints.
Currently, the default is set to Use Default (Allow) however Palo Alto Networks may
change the default definion at any me.
To view in XQL Search connect and disconnect events of USB devices that are reported
by the agent, the Device Configuraon must be set to Block. Otherwise, the USB
events are not captured. The events are also captured when a group of device types are
blocked on the endpoints with a permanent or temporary excepon in place. For more
informaon, see Ingest Connect and Disconnect Events of USB Devices.
You cannot edit or delete the default profiles pre-defined in Cortex XDR.
STEP 5 | (Oponal) To define excepons to your Device Configuraon profile, Add a New Excepons
Profile.
Cortex® XDR™ Pro Administrator’s Guide 208 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 209 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 210 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 211 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 212 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 3 | Save.
The new device class is now available in Cortex XDR as all other device classes.
The Cortex XDR Query Language (XQL) supports the ingeson of connect and disconnect events
of USB devices that are reported by the agent. To view in XQL Search these USB device events,
you must set the Device Configuraon of the endpoint profile to Block. Otherwise, the USB
events are not captured. The events are also captured when a group of device types are blocked
Cortex® XDR™ Pro Administrator’s Guide 213 ©2021 Palo Alto Networks, Inc.
Endpoint Security
on the endpoints with a permanent or temporary excepon in place. For more informaon, see
Add a New Configuraon Profile.
You can use XQL Search to query for this data and build widgets based on the xdr_data dataset,
where the following use cases are supported:
• Displaying devices by Vendor ID, Vendor Name, Product ID, and Product Name.
• Displaying hosts that a specific device, based on serial number, is connected.
• Query for USB devices that are connected to specific hosts or groups of hosts.
Examples of XQL queries that query the USB device data.
• This query returns the action_device_usb_product_name field from all xdr_data
records, where the event_type is DEVICE and the event_sub_type is DEVICE_PLUG.
dataset = xdr_data
| filter event_type = DEVICE and event_sub_type = DEVICE_PLUG
| fields action_device_usb_product_name
preset = device_control
| filter event_type = DEVICE
| fields action_device_usb_vendor_name
Host Firewall
The Cortex XDR host firewall enables you to control communicaons on your endpoints. To
use the host firewall, you set rules that allow or block the traffic on the devices and apply them
to your endpoints using Cortex XDR host firewall policy rules. Addionally, you can configure
different sets of rules based on the current locaon of your endpoints - within or outside your
organizaon network. The Cortex XDR host firewall rules leverage the operang system firewall
APIs and enforce these rules on your endpoints, but not your Windows or Mac firewall sengs.
The following are prerequisites to apply Cortex XDR host firewall policy rules on your endpoints:
Cortex® XDR™ Pro Administrator’s Guide 214 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 215 ©2021 Palo Alto Networks, Inc.
Endpoint Security
As a result, all migrated rules are set not to report matching traffic by default and
enforcement events are not included in the Host Firewall Events table.
Cortex® XDR™ Pro Administrator’s Guide 216 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 217 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 218 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 219 ©2021 Palo Alto Networks, Inc.
Endpoint Security
For every group, you need to create its own list of rules. Each rule is assigned a unique ID and
can be associated with a single group only.
Cortex® XDR™ Pro Administrator’s Guide 220 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Once you select one of the available protocols or enter the protocol number, you will
be able to specify addional parameters per protocol as needed. For example, for
TCP(6) you can set local and remote ports, whereas for ICMPv4(1) you can add the
ICMP type and code.
When selecng ICMP protocol, you must enter a the ICMP Type and Code.
Without these values the ICMP protocol is ignored by the Windows and
macOS Cortex XDR agents.
• Direcon—Select the direcon of the communicaon this rule applies to: Inbound
communicaon to the endpoint, Outbound communicaon from the endpoint, or
Both.
• Acon—Select whether the rule acon is to Allow or Block the communicaon on the
endpoint.
• Local/Remote IP Address—Configure the rule for specific local or remote IP addresses
s and/or Ports. You can set a single IP address, mulple IP addresses separated by
a comma, range of IP addresses separated by a hyphen, or a combinaon of these
opons.
• Depending on the type of plaorm you selected, define the Applicaon, Service, and
Bundle IDs of the Windows Sengs and/or macOS Sengs—Configure the rule for
all applicaons/services or specific ones only by entering the full path and name. If
you use system variables in the path definion, you must re-enforce the policy on the
endpoint every me the directories and/or system variables on the endpoint change.
• Report Matched Traffic—When Enabled, enforcement events captured by this rule are
reported periodically to Cortex XDR and displayed in the Host Firewall Events table,
whether the rule is set to Allow or Block the traffic. When Disabled, the rule is applied
but enforcement events are not reported periodically.
2. Save rule.
Aer you fill-in all the details, you need to save the rule. If you know you need to create
a similar rule, click Create another to save this rule and leave the specified parameters
available for edit for the next rule. Otherwise, to save the rule and exit, click Create.
STEP 5 | Save.
When you are done, click Create. The new rules group is created and can be associated with a
host firewall profile.
Cortex® XDR™ Pro Administrator’s Guide 221 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• View group data—From the Host Firewall Rules Groups table you can view details about all the
exisng rules groups in your organizaon. The table lists high level informaon about the group
such as name, mode, and number of rules included. To view all rules within a group and all the
profiles the group is accosted with, click the expand icon.
Manage Rules
Aer you create a host firewall rule and assign it to a rules group, you can manage the rule
sengs and enforcement as follows:
• View/Edit—Right-click the rule to view it or edit its parameters.
• Change priority—Change the rule priority within the group by dragging its row up and down
the rules list.
Cortex® XDR™ Pro Administrator’s Guide 222 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• Delete/Disable—To stop enforcing the rule, you can right-click the rule and Delete/Disable it.
On the next heartbeat, the rule will be removed/disabled in all profiles where this rules group is
included.
Cortex® XDR™ Pro Administrator’s Guide 223 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 224 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 225 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Field Descripon
Creaon Time Date and me of when the rule was created.
Cortex® XDR™ Pro Administrator’s Guide 226 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Field Descripon
4. (Oponal) Select View Rules to view a list of all the rule details within the rules group.
The table is filtered according to the rules associated with the plaorm profile you are
creang.
5. Allow or Block the Default Acon for Inbound/Outbound Traffic in the profile if you
want to allow all network connecons that have not been matched to any other rule in
the profile.
Manage Profiles
Aer you create the host firewall extensions profile, you can perform addional acons. The
changes take effect on the next heartbeat. From Endpoints > Policy Management > Extension
Policies, you can:
• Edit profile—Right-click the profile and Edit. Change the profile sengs and Save. The change
takes effect in all policies enforcing this profile.
• Delete profile—Right-click the profile and Delete. The profile is deleted from all policies it was
associated with, while the rules groups are not deleted and are sll available in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 227 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• The data is aggregated and reported periodically every 60 minutes since the first me
the host firewall policy was enforced on the endpoint, not every round hour.
• The table lists enforcement events only for rules set to Report Matching Traffic.
Every enforcement event includes addional data such as the me of the first rule hit, the rule
acon, protocol, and more.
Cortex® XDR™ Pro Administrator’s Guide 228 ©2021 Palo Alto Networks, Inc.
Endpoint Security
In Cortex XDR 3.0, no change was made to the Host Firewall Configuraon or operaon
on macOS endpoints. All exisng policies configured in Cortex XDR 2.9 sll apply and will
connue to work as expected with Cortex XDR agent 7.2 or a later release. Enforcement
events triggered by macOS endpoints are not included in the Host Firewall Events table.
To configure the Cortex XDR host firewall in your network, follow this high-level workflow:
• Ensure you meet the host firewall requirements and prerequisites.
• Enable Network Locaon Configuraon
• Add a New Host Firewall Profile
• Apply Host Firewall Profiles to Your Endpoints
• Monitor the Host Firewall Acvity on your Endpoint
Cortex® XDR™ Pro Administrator’s Guide 229 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Rules created on macOS 10 and Cortex XDR agent 7.5 and prior are managed only in the Legacy
Host Firewall Rules and do not appear in the Rule Groups tables.
STEP 1 | Log in to Cortex XDR.
Go to Endpoints > Policy Management > Extensions Profiles > Profiles and select + New
Profile. Select the Plaorm and click Host Firewall > Next
Cortex® XDR™ Pro Administrator’s Guide 230 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Field Descripon
Creaon Time Date and me of when the rule was created.
Cortex® XDR™ Pro Administrator’s Guide 231 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Field Descripon
4. (Oponal) Select View Rules to view a list of all the rule details within the rules group.
The table is filtered according to the rules associated with the plaorm profile you are
creang.
Any type protocol and specific ports cannot be edited. If saved as a new rule, the specific
ports previously defined are removed from the cloned rule.
5. Allow or Block the Default Acon for Inbound/Outbound Traffic in the profile if you
want to allow all network connecons that have not been matched to any other rule in
the profile.
1. Enable Manage Host Firewall to allow Cortex XDR to manage the host firewall on your
Mac endpoints.
2. Configure the host firewall Internal and External sengs.
The host firewall sengs allow or block inbound communicaon on your Mac endpoints.
Enable or Disable the following acons:
• Stealth Mode—Hide your mac endpoint from all TCP and UDP networks by enabling
the Apple Stealth mode on your endpoint.
• Block All Incoming Connecons—Select where to block all incoming communicaons
on the endpoint or not.
• Applicaon Exclusions—Allow or block specific programs running on the endpoint
using a Bundle ID.
If the profile is locaon based, you can define both internal and external sengs.
Cortex® XDR™ Pro Administrator’s Guide 232 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 233 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Disk Encrypon
Cortex XDR provides full visibility into encrypted Windows and Mac endpoints that were
encrypted using BitLocker and FileVault, respecvely. Addionally, you can apply Cortex XDR
Disk Encrypon rule on the endpoints by creang disk encrypon rules and policies that leverage
BitLocker and FileVault capabilies.
Before you start applying disk encrypon policy rules, ensure you meet the following
requirements and refer to these known limitaons:
Disk Encrypon Scope You can enforce XDR disk • You can enforce XDR disk
encrypon policy rules only encrypon policy rules
on the Operang System only on the Operang
volume. System volume.
• The Cortex XDR Disk
Encrypon profile for
Mac can encrypt the
endpoint disk, however it
cannot decrypt it. Aer
you disable the Cortex
XDR policy rule on the
endpoint, you can decrypt
the endpoint manually.
Cortex® XDR™ Pro Administrator’s Guide 234 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Follow this high-level workflow to deploy the Cortex XDR disk encrypon in your network:
• Monitor the Endpoint Encrypon Status in Cortex XDR
• Configure a Disk Encrypon Profile
• Apply Disk Encrypon Profile to Your Endpoints
Cortex® XDR™ Pro Administrator’s Guide 235 ©2021 Palo Alto Networks, Inc.
Endpoint Security
The following table describes both the default and addional oponal fields that you can view in
the Disk Encrypon Visibility table per endpoint. The fields are in alphabecal order.
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 236 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Field Descripon
• Not Supported—Indicates that the
operang system running on the endpoint
is not supported by Cortex XDR.
• Unmanaged—Indicates that the endpoint
encrypon is not managed by Cortex XDR.
Last Reported Date and me of the last change in the agent’s
status. For more details, see View Details
About an Endpoint.
You can also monitor the endpoint Encrypon Status in your Endpoint Administraon table. If the
Encrypon Status is missing from the table, add it.
Cortex® XDR™ Pro Administrator’s Guide 237 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 238 ©2021 Palo Alto Networks, Inc.
Endpoint Security
STEP 5 | (Windows only) Specify the Encrypon methods per operang system.
For each operang system (Windows 7, Windows 8-10, Windows 10 (1511) and above), select
the encrypon method from the corresponding list.
You must select the same encrypon method configured by the Microso Windows
Group Policy in your organizaon for the target endpoints. Otherwise, if you select a
different encrypon method than the one already applied through the Windows Group
Policy, Cortex XDR will display errors.
Cortex® XDR™ Pro Administrator’s Guide 239 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Host Inventory
With Host inventory, you gain full visibility and inventory into the business and IT operaonal data
on all your endpoints. By reviewing inventory for all your hosts in a single place, you can quickly
idenfy IT and security issues that exist in your network, such as idenfying a suspicious service
or autorun that were added to an endpoint.
The Cortex XDR agent scans the endpoint every 24 hours for any updates and displays the data
found over the last 30 days. Alternavely, you can rescan the endpoint to retrieve the most
updated data. It can take Cortex XDR up to 6 hours to collect inial data from all endpoints in your
network.
The following are prerequisites to enable Host inventory for your Cortex XDR instance:
Requirement Descripon
Supported Plaorms • Windows, Mac, and Linux starng with Cortex XDR agent 7.1
Setup and • Ensure Host Inventory Data Collecon is enabled for your Cortex
Permissions XDR agent.
The Cortex XDR Host inventory includes the following enes and informaon, according to the
operang system running on the endpoint:
Accessibility — —
Applicaons
Autoruns
Daemons —
Disks
Cortex® XDR™ Pro Administrator’s Guide 240 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Drivers —
Extensions — —
Groups
Mounts —
Services — —
Shares
System Informaon
Users
Users to Groups
For each enty, Cortex XDR lists all the details about the enty, and the details about the
endpoint it applies to. For example, the default Services view lists a separate row for every service
on every endpoint:
Cortex® XDR™ Pro Administrator’s Guide 241 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Alternavely, to beer understand the overall presence of each enty on the total number of
endpoints, you can switch to aggregated view (click ) and group the data by the main enty.
You can also sort and filter according the number of affected endpoints. For example, in the
Services aggregated view, you can sort by the number of affected endpoints to idenfy the least
commonly deployed service in your network. To get a closer view on all endpoints, right-click and
select View affected endpoints:
Cortex® XDR™ Pro Administrator’s Guide 242 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Data Descripon
Accessibility Details about installed applicaons that require and were allowed
special permissions to enable a camera, microphone, accessibility
features, full disk access, or screen captures.
Autoruns Details about executables that start automacally when the user logs in
or boots the endpoint.
Cortex XDR displays informaon about autoruns that are configured in
the endpoint Registry, startup folders, scheduled tasks, services, drivers,
daemons, extensions, Crond tasks, login items, login and logout hooks.
Cortex® XDR™ Pro Administrator’s Guide 243 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Data Descripon
For each autorun, Cortex XDR lists the autorun type and configuraon,
such as startup method, CMD, user details, and image path.
Extensions Details about the system and kernel extensions currently running on
your Mac endpoints.
For each extension, Cortex XDR lists the following details:
• Extension type, name, path, and version.
• Extension state, indicang whether it is running, requires enabling, or
unloaded.
Mounts Details about all the drives, volumes, and disks that were mounted on
endpoints.
For each mount, Cortex XDR lists the mount point directory, file system
type, mount spec and GUID.
Cortex® XDR™ Pro Administrator’s Guide 244 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Data Descripon
• Informaon about the service, such as the service name, type, and
path.
• Lisng details about the service runme configuraon and status:
• Whether the service is currently running and what is the runme
state
• Whether you can stop, pause, or delay the service start me
• Whether the service requires interacon with the endpoint
desktop
• The name of the user who started the service and the start mode
Users to Groups A list mapping all the users, local and in your domain, to the exisng
user groups on an endpoint.
Cortex® XDR™ Pro Administrator’s Guide 245 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Data Descripon
• Cortex XDR includes only the first 10,000 results per
endpoint.
• Cortex XDR lists only users that belong to each group
directly, and does not include users who belong to a group
within the main group.
• If a local users group includes a domain user (whose
credenals are stored on the Domain Controller server
and not on the endpoint), Cortex XDR will include this
user in the user-to-group mapping, but will not include it
in the users insights view.
Vulnerability Assessment
Cortex XDR vulnerability assessment enables you to idenfy and quanfy the security
vulnerabilies on an endpoint in Cortex XDR. Relying on the informaon from Cortex XDR, you
can easily migate and patch these vulnerabilies on all endpoints in your organizaon.
To provide you with a comprehensive understanding of the vulnerability severity, Cortex XDR
retrieves the latest data for each CVE from the NIST Naonal Vulnerability Database, including
CVE severity and metrics. You can use Cortex XDR to evaluate the extent and severity of each
CVE in your network, gain full visibility in to the risks to which each endpoint is exposed, and
assess the vulnerability status of an installed applicaon in your network.
You can access the Vulnerability Assessment panel from: Add-ons > Host Insights > Vulnerability
Assessment.
Collecng the inial data from all endpoints in your network could take up to 6 hours. Aer that,
Cortex XDR iniates periodical recalculaons to rescan the endpoints and retrieve the updated
data. If at any point you want to force data recalculaon, click Recalculate.
The following are prerequisites for Cortex XDR to perform vulnerability assessment of your
endpoints:
Requirement Descripon
Cortex® XDR™ Pro Administrator’s Guide 246 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Requirement Descripon
Setup and • Ensure Host Inventory Data Collecon is enabled for your Cortex
Permissions XDR agent.
CVE Analysis
To evaluate the extent and severity of each CVE across your endpoints, you can drill down in to
each CVE in Cortex XDR and view all the endpoints and applicaons in your environment that are
impacted by the CVE. Cortex XDR retrieves the latest informaon from the NIST public database.
From Add-ons > Host Insights > Vulnerability Assessment, select CVEs on the upper-right bar. For
each vulnerability, Cortex XDR displays the following default and oponal values:
Value Descripon
Cortex® XDR™ Pro Administrator’s Guide 247 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Value Descripon
You can click each individual CVE
to view in-depth details about it
on a panel that appears on the
right.
You can perform the following acons from Cortex XDR as you analyze the exisng vulnerabilies:
• View CVE details—Le-click the CVE to view in-depth details about it on a panel that appears
on the right. Use the in-panel links as needed.
Cortex® XDR™ Pro Administrator’s Guide 248 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• View a complete list of all endpoints in your network that are impacted by a CVE—Right-click
the CVE and then select View affected endpoints.
• Learn more about the applicaons in your network that are impacted by a CVE—Right-click
the CVE and then select View applicaons.
• Exclude irrelevant CVEs from your endpoints and applicaons analysis—Right-click the CVE
and then select Exclude. You can add a comment if needed, as well as Report CVE as incorrect
for further analysis and invesgaon by Palo Alto Networks. The CVE is grayed out and labeled
Excluded and no longer appears on the Endpoints and Applicaons views in Vulnerability
Assessment, or in the Host Insights widgets. To restore the CVE, you can right-click the CVE
and Undo exclusion at any me.
The CVE will be removed/reinstated to all views, filters, and widgets aer the next
vulnerabilies recalculaon.
Endpoint Analysis
To help you assess the vulnerability status of an endpoint, Cortex XDR provides a full list of
all installed applicaons and exisng CVEs per endpoint and also assigns each endpoint a
vulnerability severity score that reflects the highest NIST vulnerability score detected on the
endpoint. This informaon helps you to determine the best course of acon for remediang each
endpoint. From Add-ons > Host Insights > Vulnerability Assessment, select Endpoints on the
upper-right bar. For each endpoint, Cortex XDR displays the following default and oponal values:
Value Descripon
Cortex® XDR™ Pro Administrator’s Guide 249 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Value Descripon
Last Reported Timestamp The date and me of the last me the Cortex
XDR agent started the process of reporng its
applicaon inventory to Cortex XDR.
You can perform the following acons from Cortex XDR as you invesgate and remediate your
endpoints:
• View endpoint details—Le-click the endpoint to view in-depth details about it on a panel that
appears on the right. Use the in-panel links as needed.
• View a complete list of all applicaons installed on an endpoint—Right-click the endpoint and
then select View installed applicaons. This list includes the applicaon name, version, and
installaon path on the endpoint. If an installed applicaon has known vulnerabilies, Cortex
XDR also displays the list of CVEs and the highest Severity.
Cortex® XDR™ Pro Administrator’s Guide 250 ©2021 Palo Alto Networks, Inc.
Endpoint Security
• (Windows only) Isolate an endpoint from your network—Right-click the endpoint and then
select Isolate the endpoint before or during your remediaon to allow the Cortex XDR agent to
communicate only with Cortex XDR.
• (Windows only) View a complete list of all KBs installed on an endpoint—Right-click the
endpoint and then select View installed KBs. This list includes all the Microso Windows
patches that were installed on the endpoint and a link to the Microso official Knowledge Base
(KB) support arcle.
• Retrieve an updated list of applicaons installed on an endpoint—Right-click the endpoint and
then select Rescan endpoint.
Applicaon Analysis
You can assess the vulnerability status of applicaons in your network using the Host inventory.
Cortex XDR compiles an applicaon inventory of all the applicaons installed in your network
by collecng from each Cortex XDR agent the list of installed applicaons. For each applicaon
on the list, you can see the exisng CVEs and the vulnerability severity score that reflects the
highest NIST vulnerability score detected for the applicaon. Any new applicaon installed on the
endpoint will appear in Cortex XDR with 24 hours. Alternavely, you can re-scan the endpoint to
retrieve the most updated list.
Starng with macOS 10.15, Mac built-in system applicaons are not reported by the
Cortex XDR agent and are not part of the Cortex XDR Applicaon Inventory.
From Add-ons > Host Insights > Host Inventory, select Applicaons.
• To view the details of all the endpoints in your network on which an applicaon is installed,
right-click the applicaon and select View endpoints.
• To view in-depth details about the applicaon, le-click the applicaon name.
Cortex® XDR™ Pro Administrator’s Guide 251 ©2021 Palo Alto Networks, Inc.
Endpoint Security
Cortex® XDR™ Pro Administrator’s Guide 252 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
> Cortex XDR Rules
> Search Queries
> Invesgate Incidents
> Invesgate Alerts
> Invesgate Endpoints
> Invesgate Files
> Forensic Data Analysis
> Response Acons
253
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 254 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
If you have Cortex XDR - Analycs enabled, Cortex XDR also provides a separate page from
which you can view Analycs BIOCs (ABIOCs). To access this page, use the link next to the refresh
icon at the top of the page.
Each page displays fields that are relevant for the specific rule type. For more informaon, see:
• BIOC Rules Fields
• Analycs BIOC Fields
BIOC Rules Fields
By default, the BIOC Rules page displays all enabled rules. To search for a specific rule, use the
filters above the results table to narrow the results. From the BIOC Rules page, you can also
manage exisng rules using the right-click pivot menu.
The following table describes the fields that are available for each BIOC rule in alphabecal order.
Field Descripon
BACKWARDS SCAN STATUS Status of the Cortex XDR search for the first 10,000
matches when the BIOC rule was created or edited.
Status can be:
• Done
• Failed
• Pending
Cortex® XDR™ Pro Administrator’s Guide 255 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
• Queued
BACKWARDS SCAN TIMESTAMP Timestamp of the Cortex XDR search for the first
10,000 matches in your Cortex XDR when the BIOC
rule was created or edited.
BACKWARDS SCAN RETRIES Number of mes Cortex XDR searched for the first
10,000 matches in your Cortex XDR when the BIOC
rule was created or edited.
INSERTION DATE Date and me when the BIOC rule was created.
MITRE ATT&CK TACTIC Displays the type of MITRE ATT&CK tacc the BIOC
rule is aempng to trigger on.
MITRE ATT&CK TECHNIQUE Displays the type of MITRE ATT&CK technique and
sub-technique the BIOC rule is aempng to trigger on.
MODIFICATION DATE Date and me when the BIOC was last modified.
NAME Unique name that describes the rule. Global BIOC rules
defined by Palo Alto Networks are indicated with a blue
dot and cannot be modified or deleted.
Cortex® XDR™ Pro Administrator’s Guide 256 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
• File Type Obfuscaon
• Infiltraon
• Lateral Movement
• Other
• Persistence
• Privilege Escalaon
• Reconnaissance
• Tampering
SEVERITY BIOC severity that was defined when the BIOC was
created.
SOURCE User who created this BIOC, the file name from which it
was created, or Palo Alto Networks if delivered through
content updates.
Field Descripon
INSERTION DATE Date and me when the BIOC rule was created.
MITRE ATT&CK TACTIC Displays the type of MITRE ATT&CK tacc the BIOC
rule is aempng to trigger on.
Cortex® XDR™ Pro Administrator’s Guide 257 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
MITRE ATT&CK TECHNIQUE Displays the type of MITRE ATT&CK technique and
sub-technique the BIOC rule is aempng to trigger on.
MODIFICATION DATE Date and me when the BIOC was last modified.
NAME Unique name that describes the rule. New rules are
idenfied with a blue badge icon.
Rules associated with the Identy Analycs are
displayed with an Identy Analycs tag.
SEVERITY BIOC severity that was defined when the BIOC rule was
created. Severity levels can be Low, Medium, High, and
Mulple.
Mulple severity BIOC rules can raise alerts with
different severity levels. Hover over the flag to see the
severies defined for the rule.
To ensure your BIOC rules raise alerts efficiently and do not overcrowd your Alerts table,
Cortex XDR automacally disables BIOC rules that reach 5000 or more hits over a 24
hour period.
Cortex® XDR™ Pro Administrator’s Guide 258 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
dataset = xdr_data
| filter event_type = PROCESS and
event_sub_type = PROCESS_START and
action_process_image_name ~= ".*?\.(?:pdf|docx)\.exe"
The following describes the event_type values for which you can create a BIOC rule.
• FILE—Events relang to file create, write, read, and rename according to the file name and
path.
• INJECTION—Events related to process injecons.
• LOAD_IMAGE—Events relang to module IDs of processes.
• NETWORK—Events relang to incoming and outgoing network, filed IP addresses, port, host
name, and protocol.
• PROCESS—Events relang to execuon and injecon of a process name, hash, path, and CMD.
• REGISTRY—Events relang to registry write, rename and delete according to registry path.
• STORY—Events relang to a combinaon of firewall and endpoint logs over the network.
• EVENT_LOG—Events relang to Windows event logs and Linux system authencaon logs.
To create a BIOC rule:
STEP 1 | From Cortex XDR, select Rules > BIOC.
Cortex® XDR™ Pro Administrator’s Guide 259 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Configure your BIOC criteria using one of the following methods.
• Build the rule query with XQL Search.
1. Click XQL Search.
2. The XQL query field is where you define the parameters of your query for the BIOC rule.
To help you create an effecve XQL query, the search field provides suggesons as you
type. The XQL query must at a minimum filter on the event_type field in order for
it to be a valid BIOC rule. In addion, you can create BIOC rules using the xdr_data
and cloud_audit_log datasets and presets for these datasets. Currently, you cannot
create a BIOC rule on customized datasets and only the filter stage, alter stage,
and funcons without any aggregaons are supported for XQL queries that define a
BIOC. For BIOC rules, the field values in XQL are evaluated as case insensive (config
case_sensitive = false). Aer configuring the XQL query for your BIOC rule and
Cortex® XDR™ Pro Administrator’s Guide 260 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
For the purpose of showing you the expected behavior of the rule before you
save it, Cortex XDR tests the BIOC on historical logs. Aer you save a BIOC rule,
it will operate on both historical logs (up to 10,000 hits) and new data received
from your log sensors.
4. (Oponal) Use the Schema tab to view schema informaon for every field found in
the result set. This informaon includes the field name, data type, descripve text (if
available), and the dataset that contains the field. In order for a field to appear in the
Schema tab, it must contain a non-NULL value at least once in the result set.
5. Add as BIOC the new query rule configured.
• Build the BIOC rule query through a specific enty in a similar way that you create a search
with Query Builder.
1. Select a parcular enty icon. Define any relevant acvity or characteriscs for the
enty type. Create a new BIOC rule in the same way that you create a search with Query
Builder. You use XQL to define the rule. The XQL query must filter on an event_type in
order for it to be a valid BIOC rule.
2. Test your BIOC rule. Rules that you do not refine enough can create thousands of alerts.
As a result, it is highly recommended that you test the behavior of a new or edited BIOC
rule before you save it. For example, if a rule will return thousands of hits because you
negated a single parameter, it is a good idea to test the rule before you save it and make
it acve.
When you test the rule, Cortex XDR immediately searches for rule matches across all
your Cortex Data Lake data. If there are surprises, now is the me to see them and adjust
the rule definion.
For the purpose of showing you the expected behavior of the rule before you
save it, Cortex XDR tests the BIOC on historical logs. Aer you save a BIOC rule,
it will operate on both historical logs (up to 10,000 hits) and new data received
from your log sensors.
3. Save your BIOC rule.
Cortex® XDR™ Pro Administrator’s Guide 261 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
1. Name—Specify a descripve Name to idenfy the BIOC rule or leave the default name
that is automacally populated using the format XQL-BIOC-<rule number>.
2. Type—Select a rule TYPE which describes the acvity.
3. Severity—Specify the Severity you want to associate with an alert generated based on
this rule.
4. (Oponal) Select the MITRE Technique and MITRE Tacc you want to associate with the
alert. You can select up to 3 MITRE Techniques/Sub-Techniques and MITRE Taccs.
5. (Oponal) Select the +<number> more global excepons to view the EXCEPTIONS
associated with this BIOC rule.
6. (Oponal) Comment—Specify any addional comments, such as why you created the
BIOC.
7. Click OK.
Cortex® XDR™ Pro Administrator’s Guide 262 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 263 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
You can only add to exisng profiles you created, Cortex XDR Default profiles will
not appear as an opon.
Auto-disable will turn off both the BIOC rule detecon and the BIOC
prevenon rule.
• Prevenon BIOC Rules table—Filter and maintain the BIOC rules applied to this
specific Restricon Profile. Right-click to Delete a rule or Go to BIOC Rules table.
5. Save your changes if necessary.
6. Invesgate the BIOC prevenon rules alerts.
• Select Sengs ( ) > Invesgaon > Incidents > Alerts Table.
• Filter the fields as follows:
• Alert Source: XDR Agent
• Acon: Prevention (<profile action mode>)
• Alert Name: Behavioral Threat
• In the Descripon field you can see the rule name that raised the prevenon alert.
Import Rules
You can use the import feature of Cortex XDR to import BIOCs from external feeds or that you
previously exported. The export/import capability is useful for rapid copying of BIOCs across
different Cortex XDR instances.
Cortex® XDR™ Pro Administrator’s Guide 264 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
You can only import files that were exported from Cortex XDR. You can not edit an
exported file.
STEP 3 | Drag and drop the file on the import rules dialog or browse to a file.
STEP 5 | Refresh the BIOC Rules page to view matches (# of Hits) in your historical data.
STEP 6 | To invesgate any matches, view the Alerts page and filter the Alert Name by the name of
the BIOC rule.
Cortex® XDR™ Pro Administrator’s Guide 265 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The content status displays the date when the content was last updated, either
automacally or manually by an administrator.
3. If the status displays Could not check update, click the status to check for updates
manually.
The last updated date changes when the download is successful.
Cortex® XDR™ Pro Administrator’s Guide 266 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 267 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The following table describes the fields that are available for each IOC rule in alphabecal order.
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 268 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
EXPIRATION DATE The date and me at which the IOC will be removed
automacally.
INDICATOR The indicator value itself. For example, if the indicator type is a
desnaon IP address, this could be an IP address such as 1.1.1.1.
INSERTION DATE Date and me when the IOC was created.
MODIFICATION DATE Date and me when the IOC was last modified.
SEVERITY IOC severity that was defined when the IOC was created.
SOURCE User who created this IOC, or the file name from which it was
created, or one of the following keywords:
• Public API—the indicator was uploaded using the Insert
Simple Indicators, CSV or Insert Simple Indicators, JSON REST
APIs.
• XSOAR TIM—the indicator was retrieved from XSOAR.
TYPE Type of indicator: Full path, File name, Host name, Desnaon IP,
MD5 hash.
VENDORS A list of threat intelligence vendors from which this IOC was
obtained.
Cortex® XDR™ Pro Administrator’s Guide 269 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
To ensure your IOC rules raise alerts efficiently and do not overcrowd your Alerts table,
Cortex XDR automacally:
• Disables any IOC rules that reach 5000 or more hits over a 24 hour period.
• Creates a Rule Excepon based on the PROCESS SHA256 field for IOC rules that hit
more than 100 endpoints over a 72 hour period.
Cortex® XDR™ Pro Administrator’s Guide 270 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
If aer invesgang a threat, you idenfy a malicious arfact, you can create an alert for the
Single IOC right away.
1. Configure the INDICATOR value on which you want to match.
2. Configure the IOC TYPE. Opons are Full Path, File Name, Domain, Desnaon IP, and
MD5 or SHA256 Hash.
3. Configure the SEVERITY you want to associate with an alert for the IOC: Informaonal,
Low, Medium, or High.
4. (Oponal) Enter a comment that describes the IOC.
5. (Oponal) Configure the IOC's REPUTATION.
6. (Oponal) Configure the IOC's RELIABILITY.
7. (Oponal) Enter an EXPIRATION for the IOC. Opons are Default, Specific Expiraon
Date, No Expiraon.
8. Click Create.
If you want to match on mulple indicators, you can upload the criteria in a CSV file.
1. Select Upload File.
2. Drag and drop the CSV file containing the IOC criteria in the drop area of the Upload File
dialog or browse to the file.
Cortex XDR supports a file with mulple IOCs in a pre-configured format. For help
determining the format syntax, Cortex XDR provides an example text file that you can
download.
3.
4. Configure the SEVERITY you want to associate with an alert for the IOCs: Informaonal,
Low, Medium, or High.
Cortex® XDR™ Pro Administrator’s Guide 271 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
5. Define the DATA FORMAT of the IOCs in the CSV file. Opons are Mixed, Full Path, File
Name, Domain, Desnaon IP, and MD5 or SHA256 Hash.
6. (Oponal) Configure the IOC's REPUTATION.
7. (Oponal) Configure the IOC's RELIABILITY.
8. (Oponal) Enter an EXPIRATION for the IOC. Opons are Default, Specific Expiraon
Date, No Expiraon.
9. Click Upload.
STEP 4 | (Oponal) Define any expiraon criteria for your IOC rules.
If desired, you can also configure addional expiraon criteria per IOC type to apply to all IOC
rules. In most cases, IOC types like Desnaon IP or Host Name are considered malicious only
for a short period of me since they are soon cleaned and then used by legimate services,
from which me they only cause false posives. For these types of IOCs, you can set a defined
expiraon period. The expiraon criteria you define for an IOC type will apply to all exisng
rules and addional rules that you create in the future. By default, Cortex XDR does not apply
an expiraon date set on IOCs.
1. Select Default Rule Expiraon.
2. Set the expiraon for any relevant IOC type. Opons are Never, 7 Days, 30 days, 90
days, or 180 days.
3. Click Save.
Correlaons Rules help you analyze correlaons of mul-events from mulple sources by using
the Cortex XDR XQL-based engine for creang scheduled rules called Correlaons Rules. Alerts
can then be triggered based on these Correlaons Rules with a defined meframe and set
schedule, including every X minutes, once a day, once a week, or a custom me.
Once you have configured your Correlaon Rules, you can manage the Correlaon Rules in the
Correlaon Rules page, view and analyze the alerts generated from the Correlaon Rules in the
Alerts and Incidents pages. In addion, these Correlaon Rules are factored into the number of
incidents displayed on the Cortex XDR Dashboard.
• Correlaon Rule Details
• Create a Correlaon Rule
Correlaons Rules requires a Cortex XDR Pro license. There may be future changes to the
Correlaon Rules offerings, which can impact your licensing agreements. You will receive
noficaon ahead of me before any changes are implemented.
Cortex® XDR™ Pro Administrator’s Guide 272 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
If you are assigned a role that enables Invesgaon > Rules privileges, you can view all user-
defined Correlaon Rules from Rules > Correlaons.
By default, the Correlaon Rules page displays all enabled rules. To search for a specific rule, use
the filters above the results table to narrow the results. From the Correlaon Rules page, you can
also manage exisng rules using the right-click pivot menu.
The following table describes the fields that are available for each Correlaon Rule in alphabecal
order.
Certain fields are exposed and hidden by default. An asterisk (*) is beside every field that is
exposed by default.
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 273 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
• Privilege Escalaon
• Reconnaissance
• Tampering
• Other
INSERTION DATE Date and me when the Correlaon Rule was created.
LAST EXECUTION* Date and me when the Correlaon Rule was last
executed.
Cortex® XDR™ Pro Administrator’s Guide 274 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
MITRE ATT&CK TACTIC* Displays the type of MITRE ATT&CK tacc the
Correlaon Rule is aempng to trigger on.
MITRE ATT&CK TECHNIQUE* Displays the type of MITRE ATT&CK technique and
sub-technique the Correlaon rule is aempng to
trigger on.
MODIFICATION DATE* Date and me when the Correlaon Rule was last
modified.
SUPPRESSION DURATION* The duraon me for how long to ignore other events
that match the alert suppression criteria that was
configured when the rule was created. This is required
to configure.
SUPPRESSION FIELDS* The fields that the alert suppression is based on, which
was configured when the rule was created. The fields
Cortex® XDR™ Pro Administrator’s Guide 275 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
listed are based on the XQL query result set for the rule.
This is oponal to configure.
TIME FRAME* Displays the me frame for running a query, which
can be up to 7 days as configured when the rule was
created.
TIMEZONE Displays the Timezone when the Time Schedule for the
frequency of running the XQL Search definion set for
the Correlaon Rule is set to run daily or using a cron
expression. Otherwise, this field is le empty.
XQL SEARCH Displays the XQL definion for the Correlaon Rule
that was configured in XQL Search when the rule was
created.
Correlaons Rules requires a Cortex XDR Pro license. There may be future changes to the
Correlaon Rules offerings, which can impact your licensing agreements. You will receive
noficaon ahead of me before any changes are implemented.
You can create a new Correlaon Rule from either the Correlaon Rules page or when building a
query in XQL Search.
When seng up Correlaon Rules, you have the following capabilies.
• Define the ming for when the Correlaon Rule should run.
• Define whether alerts generated by the Correlaon Rule are suppressed by a duraon me and
field.
• Set the resulng acon for the Correlaon Rule as either to generate an alert or save the data
to a dataset.
• When generang an alert, you can also define the alert sengs, which includes the Alerts
Field Mapping for incident enrichment, Alert Severity, MITRE Aack Taccs and Techniques,
and other alert sengs.
• When saving the data to a dataset, you can test and fine-tune new rules before iniang
alerts and applying correlaon of correlaon use-cases.
To create a Correlaon Rule in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 276 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 277 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 278 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Use XQL to define the Correlaon Rule in XQL Search field.
Define the Correlaon Rule in the XQL Search field. Aer wring at least one line in XQL, you
can Open full query mode to display the query in XQL Search. You can Test the XQL definion
for the rule whenever you want.
When you open the New Correlaons Rule editor from XQL Search, this XQL Search
field is already populated with the XQL query that you defined.
Once you are finished wring the XQL for the Correlaon Rule definion, select Connue
eding rule to bring you back to the New Correlaon Rule editor, and the complete query you
set is added to the XQL Search field.
The XQL features for transaction, call, and wildcards in datasets (dataset in
(<dataset prefix>_*)) are not currently supported in Correlaon Rules. If you
add them to the XQL definion, you will not be able to Create or Save the Correlaon
Rule.
Cortex® XDR™ Pro Administrator’s Guide 279 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Time Schedule—Select the Time Schedule for the frequency of running the XQL Search
definion set for the Correlaons Rule as one of the following.
• Every 10 Minutes—Runs every rounded 10 minutes at preset 10 minute intervals from
the beginning of the hour, such as 10:10 AM, 10:20 AM, and 10:30 AM.
• Every 20 Minutes—Runs every rounded 20 minutes at preset 20 minute intervals from
the beginning of the hour, such as 10:20 AM, 10:40 AM, and 11:00 AM.
• Every 30 Minutes—Runs every rounded 30 minutes at preset 30 minute intervals from
the beginning of the hour, such as 10:30 AM, 11:00 AM, and 11:30 AM.
• Hourly — Runs at the beginning of the hour, such as 1:00 AM or 2:00 AM.
• Daily— Runs at midnight, where you can set a parcular Timezone.
• Custom— Displays the Time Schedule as Cron Expression fields, where you can set the
cron expression in each me field to define the schedule frequency for running the XQL
Cortex® XDR™ Pro Administrator’s Guide 280 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Search. The minimum query frequency is every 10 minutes and is already configured. You
can also set a parcular Timezone.
• Timezone—(Oponal) You can only set the Timezone when the Time Schedule is set to
Daily or Custom. Otherwise, the opon is disabled.
• Query me frame—Set the me frame for running a query, which can be up to 7 days.
Specify a number in the field and in the other field select either Minute/s, Hour/s, or Day/s.
By default, the query is to run once an hour (1 Hour/s).
Cortex® XDR™ Pro Administrator’s Guide 281 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Define whether the alerts generated by the Correlaon Rule are suppressed by a duraon me,
field, or both.
• Enable alert suppression—Select this checkbox to Enable alert suppression. By default, this
checkbox is clear and the alerts of the Correlaon Rule are configured to not be suppressed.
• Duraon me—Set the Duraon me for how long to ignore other events that match the
alert suppression criteria, which are based on the Fields listed. Specify a number in the field
and in the other field select either Minute/s, Hour/s, or Day/s. By default, the generated
alerts are configured to be suppressed by 1 hour (1 Hour/s). The Duraon me can be
configured for a maximum of 1 day.
• Fields—(Oponal) Select the fields that the alert suppression is based on. The fields listed
are based on the XQL query result set. You can perform the following.
• Select mulple fields from the list.
• Select Select all to configure all the fields for suppression. This means that all the fields
must match for the alerts to be suppressed. This opon will generate mulple alerts
during the suppression period.
• Search for a parcular field, which narrows the available opons as you begin typing.
• Do not set any Fields by leaving the field empty only 1 alert is generated during the
suppression period.
Cortex® XDR™ Pro Administrator’s Guide 282 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
You can either create a new Target Dataset by specifying the name for the dataset
in the field or select a preexisng Target Dataset that was created for a different
Correlaon Rule. The list only displays the datasets configured when creang a
Correlaon Rule. Different Correlaon Rules can be saved to the same dataset and
Cortex® XDR™ Pro Administrator’s Guide 283 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex XDR will expand the dataset schema as needed. The dataset you configure for
the Correlaon Rule contains the following addional fields.
• _rule_id
• _rule_name
• _insert_time
When you are finished configuring the Target Dataset, you can now either Save for later
the Correlaon Rule or Create the Correlaon Rule.
2. Configure the Alert Sengs.
• Severity—Select the severity type whenever an alert is generated for this Correlaon
Rule as one of the following.
• Informaonal
• Low
• Medium
• High
Whenever the severity type is Medium or above for the alert generated, an
incident is automacally opened.
• Category—Select the type of alert that is generated, which can be any of the
following.
• Collecon
• Credenal Access
• Dropper
• Evasion
• Execuon
• Evasive
Cortex® XDR™ Pro Administrator’s Guide 284 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Exfiltraon
• File Privilege Manipulaon
• File Type Obfuscaon
• Infiltraon
• Lateral Movement
• Persistence
• Privilege Escalaon
• Reconnaissance
• Tampering
• Other
• Alert Descripon—(Oponal) Specify a descripon of the behavior that will raise the
alert. You can include dollar signs ($), which represent the fields names (i.e. output
columns) in XQL Search.
For example.
Output.
There is no validaon or auto complete for these parameters and the values
can be null or empty. In these scenarios, Cortex XDR does not display the null
or empty values, but adds the text NULL or EMPTY in the descripons.
• Drill-Down Query—(Oponal) You can configure a Drill-Down Query for addional
informaon about the alert for further invesgaon using XQL. This XQL query can
accept parameters from the alert output for the Correlaon Rule. Yet, keep in mind
that when you create the Correlaon Rule, Cortex XDR does not know in advance if
the parameters exist or contain the correct values. As a result, Cortex XDR enables
you to save the query, but the query can fail when you try and run it. You can also
refer to field names using dollar signs ($) as explained in the Alert Descripon.
Once configured any alert generated for the Correlaon Rule has a right-click
pivot menu Open Drilldown Query opon, an Open drilldown query link aer you
Invesgate Contribung Events, and a quick acon Open Drilldown Query icon ( )
that is accessible in the Alerts page, which opens a new browser tab in XQL Search
Cortex® XDR™ Pro Administrator’s Guide 285 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
to run this query. If you do not define a Drill-Down Query, no right-click pivot menu
opon, link, or icon is displayed.
• Drill-Down Query Time Frame—Select the me frame used to run the Drill-Down
Query from one of the following opons, which provides more informave details
about the alert generated by the Correlaon Rule.
• Generated Alert—Uses the me frame of the alert that is triggered, which is the
first event and last event mestamps for the alert (default opon). If there is only
one event, the event mestamp is the me frame used for the query.
• XQL Search—Uses the me frame from when the Correlaon Rule was run in XQL
Search.
• MITRE ATT&CK—(Oponal) Select the MITRE Taccs and MITRE Techniques you
want to associate with the alert using the MITRE ATT&CK matrix.
1. You can access the matrix by selecng the MITRE ATT&CK bar or Open complete
MITRE matrix link underneath the bar on the right.
2. Select the MITRE Taccs listed in the first row of the matrix and the applicable
MITRE techniques and Sub-Techniques, which are listed in the other rows in
the table. You can select either MITRE Taccs only, MITRE techniques and Sub-
Techniques only, or a combinaon of both.
3. Click Select and the matrix window closes and the MITRE ATT&CK secon in
the New Correlaon Rule editor lists the number of Taccs and Techniques
configured, which is also listed in the bar. For example, in the following image,
there are 3 Taccs and 4 Techniques configured. The three MITRE Taccs are
Cortex® XDR™ Pro Administrator’s Guide 286 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
You can map the alert fields, so that the mapped fields are displayed in the Alerts page
to provide important informaon in analyzing your alerts. In addion, mapping the fields
helps to improve incident grouping logic and enables Cortex XDR to list the arfacts
and assets based on the map fields in the incident. The opons available can change
depending on your Correlaon Rule definions in XQL Search. There are two ways to
map the alert fields.
• Use the Cortex XDR default incident enrichment—Select this opon if you want
Cortex XDR to automacally map the fields for you. This checkbox only displays when
your Correlaon Rule can be configured to use Cortex XDR incident enrichment and
then it is set as the default opon. We recommend using this opon whenever it is
available to you.
• Manually map the alert fields by selecng the fields that you want to map. When you
create the Correlaon Rule, Cortex XDR does not know whether the alert fields that
you mapped manually are valid. If the fields are invalid according to your mapping, null
values are assigned to those fields.
In a case where Use the Cortex XDR default incident enrichment is not
selected and you have not mapped any alert fields, the alert is dispatched
into a new incident.
Cortex® XDR™ Pro Administrator’s Guide 287 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
can edit or enable the rule at any me by right-clicking the rule and selecng Edit Rule or
Enable.
For Analycs BIOC rules, you can only disable and enable rules.
Cortex® XDR™ Pro Administrator’s Guide 288 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Edit a Rule
• Export a Rule (BIOC Only)
• Copy a Rule
• Disable or Remove a Rule
• Add a Rule Excepon
• Export a Rule Excepon
STEP 2 | Right-click anywhere in a rule, and then select View associated alerts.
Cortex XDR displays a filtered query of alerts associated with the Rule ID.
STEP 2 | Right-click anywhere in the rule, and then select Open in query builder.
Cortex XDR populates a query using the criteria of the BIOC rule.
Edit a Rule
Aer you create a rule, it may be necessary to tweak or change the rule sengs. You can open the
rule configuraon from the Rules page or from the pivot menu of an alert triggered by the rule. To
edit the rule from the Rules page:
STEP 1 | Select RULES and the type of rule (BIOC or IOC).
STEP 4 | Edit the rule sengs as needed, and then click OK.
If you make any changes, Test and then Save the rule.
Cortex® XDR™ Pro Administrator’s Guide 289 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Right click any of the rows, and select Export selected.
The exported file is not editable, however you can use it as a source to import rules at a later
date.
Copy a Rule
You can use an exisng rule as a template to create a new one. Global BIOC rules cannot be
deleted or altered, but you can copy a global rule and edit the copy. See Manage Global BIOC
Rules.
STEP 1 | Select RULES and the type of rule (BIOC or IOC).
STEP 3 | Right click anywhere in the rule row and then select Copy to create a duplicate rule.
STEP 3 | Right click anywhere in the rule row and then select Remove to permanently delete the rule,
or Disable to temporarily stop the rule. If you disable a rule you can later return to the rule
page to Enable it.
Cortex XDR only supports excepons with one aribute. See Add an Alert Exclusion
Policy to create advanced excepons based on your filtered criteria.
STEP 3 | Configure the indicators and condions for which you want to set the excepon.
STEP 4 | Choose the scope of the excepon, whether the excepon applies to IOCs, BIOCs, or both.
Cortex® XDR™ Pro Administrator’s Guide 290 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 2 | In the Excepons table, locate the excepon rule you want to export. You can select mulple
rules.
Cortex® XDR™ Pro Administrator’s Guide 291 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Search Queries
• Cortex® XDR™ Query Builder
• Cortex® XDR™ Query Center
• Cortex® XDR™ Scheduled Queries
• Quick Launcher
• Research a Known Threat
The Query Builder provides queries for the following types of enes:
Cortex® XDR™ Pro Administrator’s Guide 292 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Process—Search on process execuon and injecon by process name, hash, path, command-
line arguments, and more. See Create a Process Query.
• File—Search on file creaon and modificaon acvity by file name and path. See Create a File
Query.
• Network—Search network acvity by IP address, port, host name, protocol, and more. See
Create a Network Query.
• Registry—Search on registry creaon and modificaon acvity by key, key value, path, and
data. See Create a Registry Query.
• Event Log—Search Windows event logs and Linux system authencaon logs by username, log
event ID (Windows only), log level, and message. See Create an Event Log Query.
• Network Connecons—Search security event logs by firewall logs, endpoint raw data over your
network. See Create a Network Connecons Query.
• All Acons—Search across all network, registry, file, and process acvity by endpoint or
process. See Query Across All Enes.
The Query Builder also provides flexibility for both on-demand query generaon and scheduled
queries.
XQL Search
The XDR Query Language (XQL) enables you to query data ingested into Cortex XDR for rigorous
endpoint and network event analysis returning up to 1M results. XQL forms queries in stages.
Each stage performs a specific query operaon and is delimited by a pipe (|). Queries require a
dataset, or data source, to run against. Unless otherwise specified, the query will run against the
xdr_data dataset, which contains all log informaon that Cortex XDR collects. However, you can
also configure Cortex XDR to query addional datasets.
It is possible to create a dataset with uppercase characters in its name, but when creang a query,
the dataset name only uses lowercase characters.
To streamline your invesgaons, the XQL search provides the following aids to help you
construct and visualize your queries.
• XQL query—The XQL query field is where you define the parameters of your query. To help
you create an effecve XQL query, the search field provides suggesons and definions as you
type.
Cortex® XDR™ Pro Administrator’s Guide 293 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Query Results—Aer you create and run an XQL query, you can view, filter, and visualize your
Query Results.
• XQL Helper—Describes common stage commands and provides of examples that you can use
to build a query.
• Query Library—Contains common, predefined queries that you can use or modify to your liking.
In addion, a Personal Query Library for saving and managing your own queries that you can
also share with others, and queries shared with you.
• Schema—Contains schema informaon for every field found in the result set. This informaon
includes the field name, data type, descripve text (if available), and the dataset that contains
the field. In order for a field to appear in the Schema tab, it must contain a non-NULL value at
least once in the result set.
In the XQL, every user field included in the raw data, for network, authencaon, and login
events, has an equivalent normalized user field associated with it that displays the user
informaon in the following standardized format:
<company domain>\<username>
For example, the login_data field has the login_data_dst_normalized_user
field to display the content in the standardized format. We recommend that you use these
normalized_user fields when building your queries to ensure the most accurate results.
For further help construcng queries, use the Cortex XDR XQL Language Reference.
Create an XQL Query
Use XQL Search to analyze raw log data stored in Cortex XDR. The following example
demonstrates how to create a query that uses the coalesce funcon to derive a single
username by examining mulple field names.
The XQL Language Reference provides more informaon about valid commands, such as the ones
used in this example, and general XQL syntax.
STEP 1 | From Cortex XDR, select Invesgaon > Query Builder > XQL Search.
Cortex® XDR™ Pro Administrator’s Guide 294 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Language Reference for a list of the datasets that are available to you, depending on your
configuraon.
From the first leer that you type, the query field provides you with suggesons of commands
and their definions:
Aer selecng the operator, the query field presents available values:
STEP 3 | Hit the return key and enter a pipe (|) followed by the first stage of your query.
This stage uses the fields command to declare which fields are returned in the results. If you
use this stage, then following stages can only operate on the fields specified in it.
This stage uses the funcon coalesce to return the first value that is not NULL out of the
given fields and the alter stage command to assign that value to the field username.
STEP 5 | Specify the me period against which you want to run your query.
The opons are last 24H (hours), last 7D (days), last 1M (month), or select a Custom me
period.
Select the calendar icon to schedule a query to run on or before a specific date, Add as BIOC
to save the query as a BIOC rule (if compable), Run in background (that is, as resources are
available), or Run the query immediately.
Cortex® XDR™ Pro Administrator’s Guide 295 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 7 | (Oponal) Aer your query is complete, you can save the query as one of the following rules.
• BIOC Rule—Save as > BIOC Rule. The XQL query must at a minimum filter on the
event_type field in order for it to be a valid BIOC rule that you can save. For more
informaon, see Working with BIOCs.
• Correlaon Rule—Save as > Correlaon Rule. For more informaon, see Working with
Correlaon Rules.
Cortex® XDR™ Pro Administrator’s Guide 296 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Alternate between the following display opons to invesgate your query results:
• Table ( )—Displays results in rows and columns according to the enty fields.
From the menu, you can change the table layout. You can also change the raw log format
(displayed in the _Raw_Log field) to one of the following log formats:
• RAW—Raw format of the enty in the database.
• JSON—Condensed JSON format with key value disncons. Null values are not
displayed.
• TREE—Dynamic view of the JSON hierarchy with the opon to collapse and expand the
different hierarchies.
• Graph ( )—Use the Chart Editor to visualize the query results.
• Advanced ( )—Displays results in a table format aggregang the enty fields into one
column. Similar to the table display, you can change the layout and log format from the
menu.
Select Show more to pivot an Expanded View of the event results that include null values.
You can toggle between the JSON and Tree views, search, and Copy to clipboard.
Cortex® XDR™ Pro Administrator’s Guide 297 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
You can also perform the following addional acons on the results displayed.
• Export to File ( )—Exports the results to a TSV (Tab-separated values) file.
• Refresh ( )—Refreshes the query results.
• Free text search ( )—Searches the query results for text that you specify in the free text
search. Click the Free text search icon to reveal the text Type your search here.
• Filter ( )—Enables you to filter a parcular field in the interface that is displayed to specify
your filter criteria.
We recommend for Integer, Boolean, and mestamp, such as _Time, fields that you
use the Filter as opposed to the Free text search to retrieve the most accurate query
results.
For Table and Advanced displays, Cortex XDR provides a Fields menu on the le side of the
query results that you use to filter the results. To quickly set a filter, Cortex XDR displays the
top 10 results from which you can choose to build your filter. From within the Fields menu,
click on any field (excluding JSON and array fields) to see a histogram of all the values found in
the result set for that field. This histogram includes a count of the total number of mes a value
was found in the result set, the value's frequency as a percentage of the total number of values
found for the field, and a bar chart showing the value's frequency. In order for Cortex XDR to
provide a histogram for a field, the field must not contain an array or a JSON object.
You can also manage your queries, which includes viewing query results, from the Query
Center.
Cortex® XDR™ Pro Administrator’s Guide 298 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 11 | (Oponal) Add a file path to your exing Malware Profile allowed list.
Right-click a <path> fields, for example, target_process_path, file_path, or os_parent_path, and
select Add <path type> to malware profile allow list.
Cortex® XDR™ Pro Administrator’s Guide 299 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 300 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Your query that you added is now listed as the first entry in the Query Library. The query
editor is opened to the right of the query.
Cortex® XDR™ Pro Administrator’s Guide 301 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
creator, query text, and label. The Search query data and metadata field is available at the
top of your list of queries in the Query Library.
• Show—Filter the list of queries from the Show menu. You can filter by the Palo Alto
Networks queries provided with Cortex XDR, filter by the queries Created by Me, or filter
by the queries Created by Others. To view the enre list, Select all (default).
• Save as new—Duplicate the query and save it as a new query. This acon is available from
the query menu by selecng .
• Share with others—If your query is currently unshared, you can share with other users on
the same tenant your query, which will be available in their Query Library. This acon is only
available from the query menu by selecng when your query is unshared.
• Unshare—If your query is currently shared with other users, you can Unshare the query and
remove it from their Query Library. This acon is only available from the query menu by
selecng when your query is shared with others. You can only Unshare a query that you
created. If another user created the query, this opon is disabled in the query menu.
• Delete the query. You can only delete queries that you created. If another user created the
query, this opon is disabled in the query menu when selecng .
Cortex® XDR™ Pro Administrator’s Guide 302 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Main
• Graph Type—Type of visualizaon; Area, Bubble, Column, Funnel, Gauge, Line,
Map, Pie, Scaer, Single Value, or Word Cloud.
• Subtype and Layout—Depending on the selected type of graph, choose from the
available display opons.
• Header—Title your graph.
• Show Callouts—Display numeric values on graph.
• Data
• X-axis—Select a field with a string value.
Cortex® XDR™ Pro Administrator’s Guide 303 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 304 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 305 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Enter the search criteria for the file events query.
• File acvity—Select the type or types of file acvity you want to search: All, Create, Read,
Rename, Delete, or Write.
• File aributes—Define any addional process aributes for which you want to search.
Use a pipe (|) to separate mulple values (for example notepad.exe|chrome.exe). By
default, Cortex XDR will return the events that match the aribute you specify. To exclude
an aribute value, toggle the = opon to =!. Aributes are:
• NAME—File name.
• PATH—Path of the file.
• PREVIOUS NAME—Previous name of a file.
• PREVIOUS PATH—Previous path of the file.
• MD5—MD5 hash value of the file.
• SHA256—SHA256 hash value of the file.
• DEVICE TYPE—Type of device used to run the file: Unknown, Fixed, Removable Media,
CD-ROM.
• DEVICE SERIAL NUMBER—Serial number of the device type used to run the file.
To specify an addional excepon (match this value except), click the + to the right of the
value and specify the excepon value.
Select and specify one or more of the following aributes for the acng (parent)
process.
Use a pipe (|) to separate mulple values. Use an asterisk (*) to match any string of characters.
• NAME—Name of the parent process.
• PATH—Path to the parent process.
• CMD—Command-line used to iniate the parent process including any arguments, up to
128 characters.
• MD5—MD5 hash value of the parent process.
• SHA256—SHA256 hash value of the process.
• USER NAME—User who executed the process.
• SIGNATURE—Signing status of the parent process: Signed, Unsigned, N/A, Invalid
Signature, Weak Hash
• SIGNER—Enty that signed the cerficate of the parent process.
• PID—Process ID of the parent process.
• Run search on process, Causality and OS actors—The causality actor—also referred to as the
causality group owner (CGO)—is the parent process in the execuon chain that the Cortex
XDR agent idenfied as being responsible for iniang the process tree. The OS actor is
the parent process that creates an OS process on behalf of a different iniator. By default,
Cortex® XDR™ Pro Administrator’s Guide 306 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
this opon is enabled to apply the same search criteria to iniang processes. To configure
different aributes for the parent or iniang process, clear this opon.
STEP 6 | Specify the me period for which you want to search for events.
Opons are: Last 24H (hours), Last 7D (days), Last 1M (month), or select a Custom me period.
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 307 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
For example, you can create a process query to search for processes executed on a specific
endpoint.
To build a process query:
STEP 1 | From Cortex XDR, select INVESTIGATION > Query Builder.
Cortex® XDR™ Pro Administrator’s Guide 308 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 309 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Select and specify one or more of the following aributes for the acng (parent)
process.
Use a pipe (|) to separate mulple values. Use an asterisk (*) to match any string of characters.
• NAME—Name of the parent process.
• PATH—Path to the parent process.
• CMD—Command-line used to iniate the parent process including any arguments, up to
128 characters.
• MD5—MD5 hash value of the parent process.
• SHA256—SHA256 hash value of the process.
• USER NAME—User who executed the process.
• SIGNATURE—Signing status of the parent process: Signed, Unsigned, N/A, Invalid
Signature, Weak Hash
• SIGNER—Enty that signed the cerficate of the parent process.
• PID—Process ID of the parent process.
• Run search on process, Causality and OS actors—The causality actor—also referred to as the
causality group owner (CGO)—is the parent process in the execuon chain that the Cortex
XDR agent idenfied as being responsible for iniang the process tree. The OS actor is
the parent process that creates an OS process on behalf of a different iniator. By default,
this opon is enabled to apply the same search criteria to iniang processes. To configure
different aributes for the parent or iniang process, clear this opon.
STEP 6 | Specify the me period for which you want to search for events.
Opons are: Last 24H (hours), Last 7D (days), Last 1M (month), or select a Custom me period.
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 310 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 311 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Enter the search criteria for the network events query.
• Network traffic type—Select the type or types of network traffic alerts you want to search:
Incoming, Outgoing, or Failed.
• Network aributes—Define any addional process aributes for which you want to search.
Use a pipe (|) to separate mulple values (for example 80|8080). By default, Cortex XDR
will return the events that match the aribute you specify. To exclude an aribute value,
toggle the = opon to =!. Opons are:
• REMOTE COUNTRY—Country from which the remote IP address originated.
• REMOTE IP—Remote IP address related to the communicaon.
• REMOTE PORT—Remote port used to make the connecon.
• LOCAL IP—Local IP address related to the communicaon. Matches can return addional
data if a machine has more than one NIC.
• LOCAL PORT—Local port used to make the connecon.
• PROTOCOL—Network transport protocol over which the traffic was sent.
To specify an addional excepon (match this value except), click the + to the right of the
value and specify the excepon value.
Select and specify one or more of the following aributes for the acng (parent)
process.
Use a pipe (|) to separate mulple values. Use an asterisk (*) to match any string of characters.
• NAME—Name of the parent process.
• PATH—Path to the parent process.
• CMD—Command-line used to iniate the parent process including any arguments, up to
128 characters.
• MD5—MD5 hash value of the parent process.
• SHA256—SHA256 hash value of the process.
• USER NAME—User who executed the process.
• SIGNATURE—Signing status of the parent process: Signed, Unsigned, N/A, Invalid
Signature, Weak Hash
• SIGNER—Enty that signed the cerficate of the parent process.
• PID—Process ID of the parent process.
• Run search on process, Causality and OS actors—The causality actor—also referred to as the
causality group owner (CGO)—is the parent process in the execuon chain that the Cortex
Cortex® XDR™ Pro Administrator’s Guide 312 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
XDR agent idenfied as being responsible for iniang the process tree. The OS actor is
the parent process that creates an OS process on behalf of a different iniator. By default,
this opon is enabled to apply the same search criteria to iniang processes. To configure
different aributes for the parent or iniang process, clear this opon.
STEP 6 | Specify the me period for which you want to search for events.
Opons are: Last 24H (hours), Last 7D (days), Last 1M (month), or select a Custom me period.
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 313 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 314 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Enter the search criteria for the image load acvity query.
• Type of image acvity: All, Image Load, or Change Page Protecon.
• Idenfying informaon about the image module: Full Module Path, Module MD5, or
Module SHA256.
By default, Cortex XDR will return the acvity that matches all the criteria you specify. To
exclude a value, toggle the = opon to =!.
Select and specify one or more of the following aributes for the acng (parent)
process.
Use a pipe (|) to separate mulple values. Use an asterisk (*) to match any string of characters.
• NAME—Name of the parent process.
• PATH—Path to the parent process.
• CMD—Command-line used to iniate the parent process including any arguments, up to
128 characters.
• MD5—MD5 hash value of the parent process.
• SHA256—SHA256 hash value of the process.
• USER NAME—User who executed the process.
• SIGNATURE—Signing status of the parent process: Signed, Unsigned, N/A, Invalid
Signature, Weak Hash
• SIGNER—Enty that signed the cerficate of the parent process.
• PID—Process ID of the parent process.
• Run search on process, Causality and OS actors—The causality actor—also referred to as the
causality group owner (CGO)—is the parent process in the execuon chain that the Cortex
XDR agent idenfied as being responsible for iniang the process tree. The OS actor is
the parent process that creates an OS process on behalf of a different iniator. By default,
this opon is enabled to apply the same search criteria to iniang processes. To configure
different aributes for the parent or iniang process, clear this opon.
STEP 6 | Specify the me period for which you want to search for events.
Opons are: Last 24H (hours), Last 7D (days), Last 1M (month), or select a Custom me period.
Cortex® XDR™ Pro Administrator’s Guide 315 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 316 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 317 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Enter the search criteria for the registry events query.
• Registry acon—Select the type or types of registry acons you want to search: Key Create,
Key Delete, Key Rename, Value Set, or Value Delete.
• Registry aributes—Define any addional registry aributes for which you want to search.
By default, Cortex XDR will return the events that match the aribute you specify. To
exclude an aribute value, toggle the = opon to =!. Aributes are:
• KEY NAME—Registry key name.
• DATA—Registry key data value.
• REGISTRY FULL KEY—Full registry key path.
• KEY PREVIOUS NAME—Name of the registry key before modificaon.
• VALUE NAME—Registry value name.
To specify an addional excepon (match this value except), click the + to the right of the
value and specify the excepon value.
Select and specify one or more of the following aributes for the acng (parent)
process.
Use a pipe (|) to separate mulple values. Use an asterisk (*) to match any string of characters.
• NAME—Name of the parent process.
• PATH—Path to the parent process.
• CMD—Command-line used to iniate the parent process including any arguments, up to
128 characters.
• MD5—MD5 hash value of the parent process.
• SHA256—SHA256 hash value of the process.
• USER NAME—User who executed the process.
• SIGNATURE—Signing status of the parent process: Signed, Unsigned, N/A, Invalid
Signature, Weak Hash
• SIGNER—Enty that signed the cerficate of the parent process.
• PID—Process ID of the parent process.
• Run search on process, Causality and OS actors—The causality actor—also referred to as the
causality group owner (CGO)—is the parent process in the execuon chain that the Cortex
XDR agent idenfied as being responsible for iniang the process tree. The OS actor is
the parent process that creates an OS process on behalf of a different iniator. By default,
this opon is enabled to apply the same search criteria to iniang processes. To configure
different aributes for the parent or iniang process, clear this opon.
Cortex® XDR™ Pro Administrator’s Guide 318 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 6 | Specify the me period for which you want to search for events.
Opons are: Last 24H (hours), Last 7D (days), Last 1M (month), or select a Custom me period.
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 319 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 320 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Enter the search criteria for your Windows or Linux event log query.
Define any event aributes for which you want to search. By default, Cortex XDR will return
the events that match the aribute you specify. To exclude an aribute value, toggle the =
opon to =!. Aributes are:
• PROVIDER NAME—The provider of the event log.
• USERNAME—The username associated with the event.
• EVENT ID—The unique ID of the event.
• LEVEL—The event severity level.
• MESSAGE—The descripon of the event.
To specify an addional excepon (match this value except), click the + to the right of the value
and specify the excepon value.
STEP 5 | Specify the me period for which you want to search for events.
Opons are: Last 24H (hours), Last 7D (days), Last 1M (month), or select a Custom me period.
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
STEP 8 | Specify the me period for which you want to search for events.
Opons are: Last 24H (hours), Last 7D (days), Last 1M (month), or select a Custom me period.
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 321 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 322 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Enter the search criteria for the network events query.
• Network aributes—Define any addional process aributes for which you want to search.
Use a pipe (|) to separate mulple values (for example 80|8080). By default, Cortex XDR
will return the events that match the aribute you specify. To exclude an aribute value,
toggle the = opon to =!. Opons are:
• APP ID—App ID of the network.
• PROTOCOL—Network transport protocol over which the traffic was sent.
• SESSION STATUS
• FW DEVICE NAME—Firewall device name.
• FW RULE—Firewall rule.
• FW SERIAL ID—Firewall serial ID.
• PRODUCT
• VENDOR
To specify an addional excepon (match this value except), click the + to the right of the
value and specify the excepon value.
Cortex® XDR™ Pro Administrator’s Guide 323 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 4 | (Oponal) To limit the scope to a specific source, click the + to the right of the value and
specify the excepon value.
Specify one or more aributes for the source.
Use a pipe (|) to separate mulple values. Use an asterisk (*) to match any string of characters.
• HOST NAME—Name of the source.
• HOST IP—IP address of the source.
• HOST OS—Operang system of the source.
• PROCESS NAME—Name of the process.
• PROCESS PATH—Path to the process.
• CMD—Command-line used to iniate the process including any arguments, up to 128
characters.
• MD5—MD5 hash value of the process.
• SHA256—SHA256 hash value of the process.
• PROCESS USER NAME—User who executed the process.
• SIGNATURE—Signing status of the parent process: Signature Unavailable, Signed, Invalid
Signature, Unsigned, Revoked, Signature Fail.
• PID—Process ID of the parent process.
• IP—IP address of the process.
• PORT—Port number of the process.
• USER ID—ID of the user who executed the process.
• Run search for both the process and the Causality actor—The causality actor—also referred
to as the causality group owner (CGO)—is the parent process in the execuon chain that
XDR app idenfied as being responsible for iniang the process tree. Select this opon if
you want to apply the same search criteria to the causality actor. If you clear this opon,
you can then configure different aributes for the causality actor.
STEP 6 | Specify the me period for which you want to search for events.
Opons are: Last 24H (hours), Last 7D (days), Last 1M (month), or select a Custom me period.
Cortex® XDR™ Pro Administrator’s Guide 324 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 325 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 326 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Some examples of queries you can run across all enes include:
• All acvies on a host
• All acvies iniated by a process on a host.
To build a query:
STEP 1 | From Cortex XDR, select INVESTIGATION > Query Builder.
Cortex® XDR™ Pro Administrator’s Guide 327 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Select and specify one or more of the following aributes for the acng (parent)
process.
Use a pipe (|) to separate mulple values. Use an asterisk (*) to match any string of characters.
• NAME—Name of the parent process.
• PATH—Path to the parent process.
• CMD—Command-line used to iniate the parent process including any arguments, up to
128 characters.
• MD5—MD5 hash value of the parent process.
• SHA256—SHA256 hash value of the process.
• USER NAME—User who executed the process.
• SIGNATURE—Signing status of the parent process: Signed, Unsigned, N/A, Invalid
Signature, Weak Hash
• SIGNER—Enty that signed the cerficate of the parent process.
• PID—Process ID of the parent process.
• Run search on process, Causality and OS actors—The causality actor—also referred to as the
causality group owner (CGO)—is the parent process in the execuon chain that the Cortex
XDR agent idenfied as being responsible for iniang the process tree. The OS actor is
the parent process that creates an OS process on behalf of a different iniator. By default,
this opon is enabled to apply the same search criteria to iniang processes. To configure
different aributes for the parent or iniang process, clear this opon.
STEP 5 | Specify the me period for which you want to search for events.
Opons are: Last 24H (hours), Last 7D (days), Last 1M (month), or select a Custom me period.
Select the calendar icon to schedule a query to run on or before a specific date, Run in
background to run the query as resources are available, or Run to run the query immediately
and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 328 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The following table describes the fields that are available for each query in alphabecal order.
Field Descripon
BQL Displays whether the query was created by the nave search.
Nave search has been deprecated, this field allows you to view
data for queries performed prior.
Cortex® XDR™ Pro Administrator’s Guide 329 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
PUBLIC API Displayed whether the source execung the query was XQL
query API.
QUERY NAME For saved queries, the Query Name idenfies the query specified
by the administrator. For scheduled queries, the Query Name
idenfies the auto-generated name of the parent query.
Scheduled queries also display an icon to the le of the name to
indicate that the query is reoccurring.
XQL Displays whether the query was created by the an XQL search.
Cortex® XDR™ Pro Administrator’s Guide 330 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 2 | Locate the query for which you want to view the results.
If necessary, use the Filter to reduce the number of queries Cortex XDR displays.
Cortex® XDR™ Pro Administrator’s Guide 331 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Right-click anywhere in the query row, select Show results, and choose whether to open the
query in the same tab or a new tab.
STEP 4 | (Oponal) If you want to refine your results, you can Modify a query from the query results.
STEP 5 | (Oponal) If desired, Export to file to export the results to a tab-separated values (TSV) file.
Modify a Query
Aer you run a query you might find you need to change your search parameters such as to
narrow the search results or correct a search parameter. There are two ways you can modify a
query: You can edit it in the Query Center, or you can edit it from the results page. Both methods
populate the criteria you specified in the original query in a new query which you can modify and
save.
Select the calendar icon to schedule a query to run on or before a specific date, Run
in background to run the query as resources are available, or Run to run the query
immediately and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 332 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Select the calendar icon to schedule a query to run on or before a specific date, Run
in background to run the query as resources are available, or Run to run the query
immediately and view the results in the Query Center.
Select the calendar icon to schedule a query to run on or before a specific date, Run
in background to run the query and review the result at a later me, or Run to run the
query immediately and view the results in the Query Center.
Cortex® XDR™ Pro Administrator’s Guide 333 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Rename a Query
If needed, you can rename a query at any me. If you later rerun the query, the new query will run
using the new name. You can also edit the name of a query when you Modify a Query.
STEP 1 | Select Invesgaon > Query Center.
STEP 2 | Right click anywhere in the query and then select Rename.
Quick Launcher
The Quick Launcher provides a quick, in-context shortcut that you can use to search for
informaon, perform common invesgaon tasks, or iniate response acons from any place in
the Cortex XDR app. The tasks that you can perform with the Quick Launcher include:
Cortex® XDR™ Pro Administrator’s Guide 334 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Search for host, username, IP address, domain, filename, or filepath, mestamp to easily launch
the arfact and assets views.
For hosts, Cortex XDR displays results for exact matches but supports the use of
wildcard (*) which changes the search to return matches that contain the specified
text. For example a search of compy-7* will return any hosts beginning with
compy-7 such as compy-7000, compy-7abc and so forth.
• Begin Go To mode. Enter forward slash (/) followed by your search string to filter and navigate
to Cortex XDR pages. For example, / rules searches for all pages that include rules and
allows you to navigate to those pages. Select Esc to exit Go To mode.
• Add a processes by SHA256 hash to the allow list or block list
• Add domains or IP addresses to the EDL block list
• Create a new IOC for an IP address, domain, hash, filename, or filepath
• Isolate an endpoint
• Open a terminal to a given endpoint
• Iniate a malware scan on an endpoint
You can bring up the Quick Launcher either using the default keyboard shortcut— Ctrl-Shift
+X on Windows or CMD+Shift+X on macOS, by using the Quick Launcher icon located in the
top navigaon bar, or from the applicaon menus. To change the default keyboard shortcut, select
Sengs ( ) > Configuraons > General > Server Sengs > Keyboard Shortcuts. The shortcut
value must be a keyboard leer, A through Z, and cannot be the same as the Arfact and Asset
Views defined shortcut.
You can also prepopulate searches in Quick Launcher by selecng text in the app or selecng a
node in the Causality or Timeline Views.
By default, Cortex XDR opens the Quick Launcher in the center of the page. To change the default
posion, drag the Quick Launcher to another preferred locaon. The next me you open the
Quick Launcher, it opens in the previous locaon. To close the Quick Launcher, click Esc or click
out of the Quick Launcher dialog.
Cortex® XDR™ Pro Administrator’s Guide 335 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The following table describes the fields that are available for each query in alphabecal order.
Field Descripon
NEXT EXECUTION Next execuon me if the query is scheduled to run at a specific
frequency. If the query was only scheduled to run at a specific
me and date, this field will show None.
QUERY NAME For saved queries, the Query Name idenfies the query specified
by the administrator. For scheduled queries, the Query Name
idenfies the auto-generated name of the parent query.
Scheduled queries also display an icon to the le of the name to
indicate that the query is reoccurring.
SCHEDULE TIME Frequency or me at which the query was scheduled to run.
Cortex® XDR™ Pro Administrator’s Guide 336 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 2 | Locate the scheduled query for which you want to view previous execuons.
If necessary, use the Filter to reduce the number of queries Cortex XDR displays.
STEP 3 | Right-click anywhere in the query row, select Show executed queries, and choose whether to
open the query in the same tab or a new tab.
Cortex XDR filters the queries on the Query Center and displays the results in a new window.
STEP 3 | Right click anywhere in the query row and then select Edit.
STEP 4 | Adjust the schedule sengs as needed, and then click OK.
Cortex® XDR™ Pro Administrator’s Guide 337 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Right click anywhere in the query row and then select Remove to permanently remove the
scheduled query, or Disable to temporarily stop the query from running at the scheduled
me. If you disable a query you can later return to the Scheduled Queries page and Enable it.
STEP 3 | Right click anywhere in the query row and then select Rename.
STEP 4 | Edit the query name as desired, and then click OK.
STEP 2 | View the Results of a Queryand refine as needed to filter out noise.
See Modify a Query.
STEP 4 | Open the Timeline View to view the sequence of events over me.
STEP 5 | Inspect the informaon again, and idenfy any characteriscs you can use to Create a BIOC
Rule or Create a Correlaon Rule.
If you can create a BIOC or Correlaon Rule, test and tune it as needed.
Cortex® XDR™ Pro Administrator’s Guide 338 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Invesgate Incidents
The Incidents page displays all incidents in the Cortex XDR management console to help you
priorize, track, triage, invesgate and take remedial acon.
To begin invesgang your incidents:
• Learn about Cortex XDR Incidents
• Set up External Integraons
• Manage your Incident Starring
• Create an Incident Scoring Rule
• Triage your Incidents
• Manage your Incidents
Cortex® XDR™ Pro Administrator’s Guide 339 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The table view displays only the incident fields in a table format. Right-click an incident to view
the incident details, and invesgate the related assets, arfacts, and alerts. For more informaon
see Invesgate Incidents.
The following table describes both the default and addional oponal fields that you can view in
the Incidents table and lists the fields in alphabecal order.
Cortex® XDR™ Pro Administrator’s Guide 340 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Incidents created prior to Cortex XDR version 2.9 are updated as follows:
• MITRE Aack Taccs, MITRE Aack Techniques, and Alert Categories fields will remain
empty.
• WildFire Hits field will begin with an empty value, however when a new alert is added
to the incident the filed is updated.
• High Severity, Medium Severity, Low Severity, Alert Grouping Status fields are updated
with the corresponding value.
• If an incident is merged or moved with other incidents, Cortex XDR will recalculate and
update the fields.
Field Descripon
Alert Source Source of the alert, such as XDR Analycs BIOC, XDR
BIOC, and Correlaon.
Creaon Time Date and me when the incident was created.
High Severity Alerts Number of high severity alerts that are part of the
incident.
Incident Descripon The descripon is generated from the alert name from
the first alert added to the incident, the host and user
affected, or number of users and hosts affected.
Cortex® XDR™ Pro Administrator’s Guide 341 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Incident Sources List of sources that raised high and medium severity alerts
in the incident.
Last Updated The last me a user took an acon or an alert was added
to the incident.
Low Severity Alerts Number of low severity alerts that are part of the incident.
Medium Severity Number of medium severity alerts that are part of the
incident.
MITRE ATT&CK Tacc Displays the types of MITRE ATT&CK taccs triggered by
the alerts that are part of the incident.
MITRE ATT&CK Technique Displays the type of MITRE ATT&CK technique and sub-
technique triggered by the alerts that are part of the
incident.
Resolve Comment The user-added comment when the user changes the
incident status to a Resolved status.
Resolved Timestamp Displays the date and me when the incident was set with
a resolved status.
Status Incidents have the status set to New when they are
generated. To begin invesgang an incident, set the
status to Under Invesgaon. The Resolved status is
subdivided into resoluon reasons:
• Resolved - Threat Handled
• Resolved - Known Issue
• Resolved - Duplicate Incident
• Resolved - False Posive
Cortex® XDR™ Pro Administrator’s Guide 342 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
• Resolved - Auto Resolve - Auto-resolved by Cortex
XDR when all of the alerts contained in an incident
have been excluded.
External Integraons
To aid you with threat invesgaon, Cortex XDR displays the WildFire-issued verdict for each
Key Arfacn an incident. To provide addional verificaon sources, you can integrate external
threat intelligenceservice with Cortex XDR which can then be displayed for each Key Arfacn an
incident. Cortex® XDR™ supports the following integraons.
Integraon Descripon
Threat Intelligence
Cortex® XDR™ Pro Administrator’s Guide 343 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Integraon Descripon
block list, and user contribuons. The VirusTotal score
is represented as a fracon, where, for example, a score
of 34/52 means out of 52 queried services, 34 services
determined the arfact to be malicious.
To view VirusTotal threat intelligence in Cortex XDR
incidents, you must obtain the license key for the service
and add it to the Cortex XDR Configuraon. When you
add the service, the relevant VirusTotal (VT) score displays
in the incident details page under Key Arfacts.
Incident Management
Third-party ckeng systems To manage incidents from the applicaon of your choice,
you can use the Cortex XDR API Reference to send
alerts and alert details to an external receiver. Aer you
generate your API key and set up the API to query Cortex
XDR, external apps can receive incident updates, request
addional data about incidents, and make changes such
as to set the status and change the severity, or assign an
owner. To get started, see the Cortex XDR API Reference.
Cortex® XDR™ Pro Administrator’s Guide 344 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
You can then sort or filter the Incidents table for incidents containing starred alerts and similarly
filter the Alerts table for starred alerts. In addion, you can also choose whether to display all
incidents or only starred incidents on the Incidents Dashboard.
STEP 2 | From the Incident List, locate the incident you want to star.
STEP 4 | Enter a descripve Comment that idenfies the reason or purpose of the starring
configuraon.
STEP 5 | Use the alert filters to build the match criteria for the policy.
You can also right-click a specific value in the alert to add it as match criteria. The app refreshes
to show you which alerts in the incident would be included.
Cortex® XDR™ Pro Administrator’s Guide 345 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
A sub-rule score is only applied to an alert if the top-level rule was a match.
Within each incident, Cortex XDR aggregates the alert scores and assigns the incident a total
score. The incident score is displayed in the Incidents Table as filterable field, Score, allowing you
to priorize the Incident Table according to the incident score. You can also view the score while
invesgang in the Incident View.
To create an incident scoring rule:
Cortex® XDR™ Pro Administrator’s Guide 346 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 1 | In the Cortex XDR Management Console, navigate to Invesgaon > Incident Management
> Scoring Rules.
The Scoring Rules table displays the rules and, if applicable, the sub-rules currently in your
Cortex XDR tenant.
Cortex® XDR™ Pro Administrator’s Guide 347 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | In the Create New Scoring Rule dialog, define the following:
STEP 4 | Review the rule criteria and Create the incident rule.
You are automacally redirected to the Scoring Rules table.
Cortex® XDR™ Pro Administrator’s Guide 348 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 7 | (Oponal) Invesgate and manage incidents scoring rules from the Incident Table or View.
Triage Incidents
To help you triage and invesgate your incidents, Cortex XDR displays your incidents in a split-
pane view allowing you to easily invesgate the enre scope and cause of an event, view all
relevant assets, suspicious arfacts, and alerts within the incident details.
Navigate to Invesgaon > Incidents. The Incident split-pane view is divided into two main
secons:
• Incident List
• Details Pane
The Details Pane supports Advanced View for incidents created aer Cortex XDR 3.0.
Incidents created before Cortex XDR 3.0, are displayed in a Legacy view. To enable
flexibility, you can select to display incidents created aer Cortex XDR 3.0 Cortex using
either the Legacy view or Advanced view.
Cortex® XDR™ Pro Administrator’s Guide 349 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 350 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The Incident List enables you to filter and sort according to the incident fields, such as status,
score, severity, and mestamp. Each incident displays a summary of the incident severity,
assignee, status, creaon me, descripon, and assets. From the Incident List you can also review
addional informaon.
The Details pane displays the informaon of the selected incident in the Incident List. The pane is
made up of the following tabs that allow you to further invesgate and manage each incident.
• Overview
Made up of an Incident Header lisng the incident details, the MITRE taccs and techniques,
summarized meline, and widgets to visualize the number of alerts, type of sources, hosts, and
users associated with the incident. Select the pin icon next to the tab name to always display a
specific tab first when you invesgate incidents.
• Timeline
A chronological representaon of alerts and acons relang to the incident.
• Alerts & Insights
Displays a table of the alerts and insights associated with the incident.
• Key Assets & Arfacts
Displays the incident asset and arfact informaon of hosts, users, and key arfacts associated
with the incident.
• Execuons
Present the causality chains associated with the incident.
Manage Incidents
The Incident view allows you track incidents, invesgate incident details and take remedial acon.
Navigate to Invesgaon > Incidents and locate the incident you want to invesgate.
To begin managing your incidents:
• Review Incident List Details
• Update Incident Details
• Invesgate Incident Overview
• Invesgate Incident Timeline
• Invesgate Incident Alerts and Insights
• Invesgate Incident Key Assets and Arfacts
• Invesgate Incident Execuons
Cortex® XDR™ Pro Administrator’s Guide 351 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
View the incident severity, score, and assignee. Select whether to you want to Star the incident.
View the status of the incident and when it was last updated.
Cortex® XDR™ Pro Administrator’s Guide 352 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
contributed to the incident total score, including rules that have been deleted. Deleted scores
appear with a N/A.
Override the Rule based score by selecng Set score manually and Apply the change.
Assign an incident.
Select the assignee (or Unassigned) and begin typing the assignee’s email address for
automated suggesons. Users must have logged in to the app to appear in the auto-generated
list.
Cortex® XDR™ Pro Administrator’s Guide 353 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Merge incidents.
To merge incidents you think belong together, select the ellipsis icon, Merge Incidents and
enter the target incident ID you want to merge the incident with.
Incident scoring is managed as follows:
• Rule Based Score recalculates the incident score to include the merged incident scores.
• Manual Score allows to enter a score and override the rule-based score.
Incident assignees are managed as follows:
• If both incidents have been assigned—Merged incident takes the target incident assignee.
• If both incidents are unassigned—Merged incident remains unassigned.
• If the target incident is assigned and the source incident unassigned —Merged incident takes
the target assignee
• If the target incident is unassigned and the source incident is assigned—Merged incident
takes the exisng assignee
Create an exclusion.
Select the ellipsis icon, Create Exclusion and enter the Policy Name. Select the alerts to include
in the policy by filtering the Alert table and Create the exclusion.
Cortex® XDR™ Pro Administrator’s Guide 354 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The Overview tab supports Advanced View for incidents created aer Cortex XDR 3.0.
Incidents created before Cortex XDR 3.0, are displayed in a Legacy view. To enable
flexibility, you can select to display incidents created aer Cortex XDR 3.0 Cortex using
either the Legacy view or Advanced view.
In some cases the number of alerts associated with the techniques will not be aligned
with the number of the parent tacc because of missing tags or in case an alert belongs
to several techniques.
Cortex® XDR™ Pro Administrator’s Guide 355 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Invesgate informaon about the Alerts, Sources, Hosts, and Users associated with the
incident.
• In the Alerts widget:
• Select Show More to pivot to the Alerts & Insights table.
• Review the Total number of alerts and the pie chart separated according to the alert
severity. Select the severity tag to pivot to the Alerts & Insights table filtered according
to the selected severity.
• In the Sources widget:
• Select Show More to pivot to the Alerts & Insights table.
• Select each of the alert source types to pivot to the Alerts & Insights table filtered
according to the selected alert source.
• In the Hosts widget:
• Select Show More to pivot to the Key Assets and Arfacts tab.
• Select the host names to display the Details panel. The panel is only available for hosts
with Cortex XDR agent installed and displays the host name, whether it’s connected,
along with the Endpoint Details, Agent Details, Network, and Policy informaon. Use
the available acons listed in the top right-hand corner to take remedial acons.
• In the Users widget:
• Select Show More to pivot to the Key Assets and Arfacts tab.
• Review Users that are marked as Featured.
• If available, review the User Score allocated to each user.
Cortex® XDR™ Pro Administrator’s Guide 356 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
To begin invesgang:
Navigate to the Timeline tab and filter the acons according to following acon types:
• All acons
• Alerts
• Response Acons
• Incident Management Acons
• Automac Incident Updates
Cortex® XDR™ Pro Administrator’s Guide 357 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
arfact in an interacve link. Depending on the type of acon, you can select the entry, host
names, and arfacts to further invesgate the acon:
• Locate the acon you want to invesgate:
• Response and Management Acons ( )—Add and view comments relang to this
acon.
• Alert and Automac Updates ( )—Display the Details panel. In the panel, navigate to
the Alerts tab to view the Alerts table filtered according to the Alert ID, the Key Assets
to view a list of Hosts and Users associated to the alert, and an opon to add Comments.
• Select the Host name to display, if available, the endpoint data.
• Select the Arfact to display the following type of informaon:
• Hash Arfact—Displays the Verdict, File name, and Signature status of the hash value.
Select the hash value to view the Wildfire Analysis Report, Add to Block list, Add to
Allow list and Search file.
• Domain Arfact—Displays the IP address and VT score of the domain. Select the domain
name to Add to EDL.
• IP Address—Display whether the IP address is Internal or External, the Whois findings,
and the VT score. Expand Whois to view the findings and Add to EDL.
• In acon entries that involved more arfacts, expand Addional arfacts found to further
invesgate.
Cortex® XDR™ Pro Administrator’s Guide 358 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Filter the Alerts and Insights tables as you would in the dedicated Cortex XDR pages.
Select an alert or insight to display the corresponding Details panel. The panel displays the
following alert details, if available:
• Alert
• Alert name, severity, alert source, and rule name
• General
• MITRE ATT&CK
• Host
• Rule
• Network Connecons
• Insight
• Insight name, type, source, and descripon
• General
• MITRE ATT&CK
• Host
• Rule
• Process Execuon
Use the available acons listed in the top right-hand corner to take remedial acons.
Cortex® XDR™ Pro Administrator’s Guide 359 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 360 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Invesgate arfacts.
In the Arfacts secon, search for and review the arfacts associated with the incident. Each
arfact displays, if available, the following arfact informaon and available acons according
to the type of arfact; File, IP Address, and Domain.
File Arfact
• File Details
• File name
• SHA256 value
• Number of alerts in the incident that include the file
• Signature status and signer
• WildFire Report. Select to view the Wildfire Analysis Report.
• AutoFocus (AF) tags. Select the tag to display the Source, Tag Class, and Descripon.
• VirusTotal (VT) Score. You can select the score to pivot to the VirusTotal report.
• Number of alerts in the incident that include the file according to severity
• Ellipses File Acons
• Open in Quick Launcher
• Go to VirusTotal
• Go to AutoFocus
• Search File on all Endpoints
• Open Hash View
• View Related Alerts
• Add to Block List
• Add to Allow List
IP Address Arfact
• IP Address Details
• IP Address value and name
• Number of alerts in the incident that include the IP address
• Whether the IP address in External or Internal.
• Whois informaon. Hover to display the Net Range, Registered Date, Registered name,
Organizaon, Updated Date details.
• VirusTotal (VT) Score. You can select the score to pivot to the VirusTotal report.
• Number of alerts in the incident that include the IP address according to severity
• Ellipsis IP Address Acons
Cortex® XDR™ Pro Administrator’s Guide 361 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 362 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Invesgate hosts.
In the Hosts secon, search for and review the hosts associated with the incident. Each host
displays, if available, the following host informaon and available acons:
• Host Details
• Icons represenng whether a Cortex XDR Agent is installed on the host and the
operang system plaorm. A green icon indicates the host is connected.
• Host Name
• IP address associated with the host.
• Number of alerts that include the host according to severity.
• Ellipsis Host Acons
You can choose to perform an acon on mulple hosts by marking the entries you want to
include or Select All.
• Security Operaons > Isolate Endpoint, Iniate Malware Scan, Retrieve Endpoint Files,
Iniate Live Terminal
• Open in Quick Launcher
• Open Asset View
• View Related Alerts
To further invesgate the host:
Select the host name to display the Details panel. The panel is only available for hosts with
Cortex XDR agent installed and displays the host name, whether it’s connected, along with the
Endpoint Details, Agent Details, Network, and Policy informaon details. In addion, you can
perform the available acons listed in the top right-hand corner.
Cortex® XDR™ Pro Administrator’s Guide 363 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Invesgate users.
In the Users secon, search for and review the users associated with the incident. Each user
displays, if available, the following user informaon and available acons:
• User Details
• User Name
• Whether the user is Featured
• The User Score if available.
• Acve Directory and Organizaon Unit names. Hover to display the if the name is an
Acve Directory or OU.
• Workday icon. Hover to display the Workday informaon.
• Number of alerts that include the user according to severity.
• Ellipsis User Acons
• View Related Alerts
• Open User View
Cortex® XDR™ Pro Administrator’s Guide 364 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 365 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• CGO Name
• Alert Sources associated with the enre causality chain
• Execuon me of the causality chain
• Number of alerts that include the CGO according to severity.
Expand the causality chain to further invesgate and perform available Causality View acons.
Cortex® XDR™ Pro Administrator’s Guide 366 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Invesgate an IP Address
The IP Address View provides a powerful way to invesgate and take acon on IP addresses by
reducing the number of steps it takes to collect, research, and threat hunt related incidents. Cortex
XDR automacally aggregates and displays a summary of all the informaon Cortex XDR and
threat intelligence services have regarding a specific IP address over a defined 24-hour or 7-day
me frame.
To help you determine whether an IP address is malicious, the IP Address View displays an
interacve visual representaon of the collected acvity for a specific IP address.
Cortex® XDR™ Pro Administrator’s Guide 367 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 368 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
To invesgate an IP address:
STEP 1 | Open the IP View for an IP address.
You can access the view from an IP address in Cortex XDR console, where available, by
either right-click > Open IP View, selecng the IP address or using the default keyboard
shortcut Ctrl/CMD+Shift+E combinaon, or searching for a specific IP address in the Quick
Launcher.
To change the default keyboard shortcut, select Sengs ( ) > Configuraons > General >
Server Sengs > Keyboard Shortcuts. The shortcut value must be a keyboard leer, A through
Z, and cannot be the same as the Quick Launcher defined shortcut.
Cortex® XDR™ Pro Administrator’s Guide 369 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Requires a license key. Select Sengs ( ) > Configuraons > Integraons >
Threat Intelligence.
• Whois idenficaon data for the specific IP address.
• IOC Rule, if applicable, including the IOC Severity, Number of hits, and Source.
• EDL IP address if the IP address was added to an EDL.
6. Review any related incidents:
Related Incidents lists the most recent incidents that contain the specific IP address
as part of the incident Key Arfacts according to the Last Updated mestamp. If the
IP address belongs to an endpoint with a Cortex XDR agent installed, the incidents are
displayed according to the host name rather than the IP address. To dive deeper into
specific incidents, select the Incident ID. To view all the related incidents, select View All.
Cortex XDR displays Recently Updated Incidents which filters incidents for those that
contain the IP address.
Cortex® XDR™ Pro Administrator’s Guide 370 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Filter Descripon
Node Size The node size to display for the type of values.
• Number of Connecons
• Total Traffic
• Total Download
• Total Upload
Cortex® XDR™ Pro Administrator’s Guide 371 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Filter Descripon
• Top 3
• Boom 5
• Boom 3
Select to apply your selecons and update the informaon displayed in the visualizaon
pane. If necessary, Refresh to retrieve data.
STEP 5 | Aer reviewing the available informaon for the IP address, take acon if desired:
Depending on the current IOC and EDL status, select Acons to:
• Edit Rule
• Disable Rule
• Delete Rule
• Add to EDL
Invesgate an Asset
The Asset View provides a powerful way to invesgate assets by reducing the number of steps it
takes to collect and research hosts. Cortex XDR automacally aggregates informaon on hosts
and displays the host insights and a list of related incidents.
Cortex® XDR™ Pro Administrator’s Guide 372 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
To invesgate an asset:
STEP 1 | Open the Asset View for an asset.
You can access the view from:
• A host with Cortex XDR agent installed in Cortex XDR console by right-click > Open Asset
View.
• The IP View of an internal IP address with a Cortex XDR Agent by selecng Host Insights
from the navigaon bar.
• The Quick Launcher, by searching for a specific Host Name.
Cortex® XDR™ Pro Administrator’s Guide 373 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Filter Descripon
Select to apply your selecons and update the informaon displayed in the visualizaon
pane.
Cortex® XDR™ Pro Administrator’s Guide 374 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 375 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 376 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 377 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Filter Descripon
Cortex® XDR™ Pro Administrator’s Guide 378 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Filter Descripon
• 7 Days
Select to apply your selecons and update the informaon displayed in the visualizaon
pane. If necessary, Refresh to retrieve data.
STEP 4 | Review the selected data. For more informaon, select Recent Process Execuons to view
the most recent processes executed by the hash. Search all Process Execuons to run a
query on the hash.
STEP 5 | Aer reviewing the available informaon for the hash, take acon if desired:
• Select File Search to iniate a search for this hash across your network.
• Depending on the current hash status, select Acons to:
• Add the hash to a Allow List.
• Add the hash to a Block List.
• Create an IOC rule.
Invesgate a User
The User View provides a powerful way to invesgate user type assets by reducing the number of
steps it takes to collect and research a user. Cortex XDR, using Identy Analycs, automacally
aggregates informaon on a user and displays the user insights.
Cortex® XDR™ Pro Administrator’s Guide 379 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 380 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 2 | Select to view the User details over either the Last 7 Days, Last 14 Days, or Last 30 Days.
Cortex® XDR™ Pro Administrator’s Guide 381 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
( ). Hover over a User defined score to display the Rule name that contributed to the
User Score.
Select an incident and pivot to the Incident View. Incidents that no longer exist or have
been merged are grayed out.
• User Associated Insights
Displays all the insights associated with the user filtered.
• Top 5 Hosts Logged Into
Top 5 hosts the user logged into.
• Top 5 Authencaon Target Hosts
Top 5 host names which the user requested access.
• Top 5 Authencaon Source Hosts
Top 5 host names where the user started authencaon.
• Recent Login
Displays the recent user login details.
• Recent Authencaons
Displays the recent user authencaon.
Cortex® XDR™ Pro Administrator’s Guide 382 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Invesgate Alerts
• Cortex® XDR™ Alerts
• Triage Alerts
• Manage Alerts
• Alert Exclusions
• Causality View
• Network Causality View
• Cloud Causality View
• Timeline View
• Analycs Alert View
Cortex® XDR™ Pro Administrator’s Guide 383 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The Alerts page consolidates non-informaonal alerts from your detecon sources to enable you
to efficiently and effecvely triage the events you see each day. By analyzing the alert, you can
beer understand the cause of what happened and the full story with context to validate whether
an alert requires addional acon. Cortex XDR supports saving 2M alerts per 4000 agents or 20
terabytes, half of the alerts are allocated for informaonal alerts, and half for severity alerts.
To view detailed informaon for an alert, you can also view details in the Causality View and
Timeline View. From these views you can also view related informaonal alerts that are not
presented on the Alerts page.
By default, the Alerts page displays the alerts that it received over the last seven days (to modify
the me period, use the page filters). Every 12 hours, Cortex XDR enforces a cleanup policy to
remove the oldest alerts that exceed the maximum alerts limit.
Cortex XDR processes and displays the name of users in the following standardized format, also
termed “normalized user”.
<company domain>\<username>
Cortex® XDR™ Pro Administrator’s Guide 384 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
As a result, any alert triggered based on network, authencaon, or login events, displays the User
Name in the standardized format in the Alerts and Incidents pages. This impacts every alert for
Cortex XDR Analycs and Cortex XDR Analycs BIOC, including Correlaon, BIOC and IOC alerts
triggered on one of these event types.
The following table describes both the default fields and addional oponal fields that you can
add to the alerts table using the column manager and lists the fields in alphabecal order.
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 385 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
• Prevented (Connue)
• Prevented (Denied The Session)
• Prevented (Dropped All Packets)
• Prevented (Dropped The Session)
• Prevented (Dropped The Session And Sent a
TCP Reset)
• Prevented (Dropped The Packet)
• Prevented (Override)
• Prevented (Override-Lockout)
• Prevented (Post Detected)
• Prevented (Prompt Block)
• Prevented (Random-Drop)
• Prevented (Silently Dropped The Session With
An ICMP Unreachable Message To The Host
Or Applicaon)
• Prevented (Terminated The Session And
Sent a TCP Reset To Both Sides Of The
Connecon)
• Prevented (Terminated The Session And Sent
a TCP Reset To The Client)
• Prevented (Terminated The Session And Sent
a TCP Reset To The Server)
• N/A
AGENT OS SUB TYPE The operang system subtype of the agent from
which the alert was triggered.
ALERT NAME Module that triggered the alert. If the alert was
generated by Cortex XDR, the Alert Name will
be the specific Cortex XDR rule that created the
alert (BIOC, IOC, or Correlaon Rule name). If
from an external system, it will carry the name
assigned to it by Cortex XDR. Alerts that match
an alert starring policy also display a purple star.
Cortex® XDR™ Pro Administrator’s Guide 386 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Alerts that contain a Featured
Alert Field are displayed with
flag.
Alerts associated with the Identy Analycs are
displayed with an Identy Analycs tag.
CGO MD5 The MD5 value of the CGO that iniated the
alert.
Cortex® XDR™ Pro Administrator’s Guide 387 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
CGO SHA256 The SHA256 value of the CGO that iniated the
alert.
CLOUD PROVIDER The name of the cloud provider where the alert
occurred:
• AWS
• GCP
• Azure
Cortex® XDR™ Pro Administrator’s Guide 388 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
and Microsoft Compute are all mapped to
Compute.
CONTAINS FEATURED HOST Displays whether the alert includes a host name
that has been flagged as a Featured Alert Field.
CONTAINS FEATURED USER Displays whether the alert includes a user name
that has been flagged as a Featured Alert Field.
DNS Query Name The domain name queried in the DNS request.
Cortex® XDR™ Pro Administrator’s Guide 389 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
• Network Event
• Process Execuon
• Registry Event
FILE PATH When the alert triggered on a file (the Event Type
is File) this is the path to the file on the endpoint.
If not, then N/A.
FW RULE NAME The firewall rule name that matches the network
traffic that triggered the firewall alert.
FW SERIAL NUMBER The serial number of the firewall that raised the
firewall alert.
Cortex® XDR™ Pro Administrator’s Guide 390 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
INITIATOR MD5 The MD5 value of the process which iniated the
alert.
Cortex® XDR™ Pro Administrator’s Guide 391 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
NGFW VSYS NAME Name of the virtual system for the Palo Alto
Networks firewall that triggered an alert.
OS PARENT USER NAME Name of the user associated with the parent
operang system.
PROCESS EXECUTION SIGNATURE Signature status of the process that triggered the
alert:
• Unsigned
• Signed
Cortex® XDR™ Pro Administrator’s Guide 392 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
• Invalid Signature
• Unknown
PROCESS EXECUTION SIGNER Signer of the process that triggered the alert.
SOURCE ZONE NAME The source zone name of the connecon for
firewall alerts.
TARGET FILE SHA256 The SHA256 hash vale of an external DLL file
that triggered the alert.
Cortex® XDR™ Pro Administrator’s Guide 393 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
TARGET PROCESS SHA256 The SHA256 value of the process whose creaon
triggered the alert.
TIMESTAMP The date and me when the alert was triggered.
Right-click to Show rows 30 days prior or 30
days aer the selected mestamp field value.
USER NAME The name of the user that iniated the behavior
that triggered the alert. If the user is a domain
user account, this field also idenfies the domain.
Any alert triggered based on network,
authencaon, or login events, displays the User
Name in the follow standardized format in the
Alerts and Incidents pages.
<company domain>\<username>
From the Alerts page, you can also perform addional acons to manage alerts and pivot on
specific alerts for deeper understanding of the cause of the event.
• Manage Alerts
• Causality View
• Timeline View
• Analycs Alert View
Triage Alerts
When the Cortex XDR management console displays a new alert on the Alerts page, use the
following steps to invesgate and triage the alert:
STEP 1 | Review the data shown in the alert such as the command-line arguments (CMD), process info,
etc.
For more informaon about the alert fields, see Cortex® XDR™ Alerts.
Cortex® XDR™ Pro Administrator’s Guide 394 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
View. If the alert has a gray dot, the alert is not eligible for analysis in the Causality View.
This can occur when there is no data collected for an event, or the app has not yet finished
processing the EDR data. To view the reason analysis is not available, hover over the gray dot.
STEP 3 | Review the Timeline View of review the sequence of events over me.
The meline is available for alerts that have been stched with endpoint data.
STEP 4 | If deemed malicious, consider responding by isolang the endpoint from the network.
STEP 5 | Remediate the endpoint and return the endpoint from isolaon.
STEP 6 | Inspect the informaon again to idenfy any behavioral details that you can use to Create a
BIOC Rule and Create a Correlaon Rule.
If you can create a BIOC or Correlaon rule, test and tune the logic for the rule, and then save
it.
Manage Alerts
From the Alerts page, you can manage the alerts you see and the informaon Cortex XDR displays
about each alert.
The opons available can change depending on the Alert Source.
• Copy Alerts
• Analyze an Alert
• Pivot to Views
• Create Profile Excepons
• Add File Path to Malware Profile Allow List
• Create a Featured Alert Field
• View Generang BIOC or IOC Rule
• Retrieve Addional Alert Details
• Export Alert Details to a File
Cortex® XDR™ Pro Administrator’s Guide 395 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Copy Alerts
You can copy an alert into memory as follows:
• Copy the URL of the alert record
• Copy the value for an alert field
• Copy the enre row of alert record
With either opon, you can paste the contents of memory into an email to send. This is helpful if
you need to share or discuss a specific alert with someone. If you copy a field value, you can also
easily paste it into a search or begin a query.
Analyze an Alert
To help you understand the full context of an alert, Cortex XDR provides a powerful analysis view
that empowers you to make a thorough analysis very quickly.
The Causality View is available for XDR agent alerts that are based on endpoint data and for alerts
raised on network traffic logs that have been stched with endpoint data.
To view the analysis:
STEP 1 | From the Alerts page, locate the alert you want to analyze.
STEP 2 | Right-click anywhere in the alert, and select Invesgate Causality Chain.
STEP 3 | Choose whether to open the Causality View card for an alert in a new tab or the same tab.
You can also view the causality chain over me using the Timeline view.
Cortex® XDR™ Pro Administrator’s Guide 396 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 4 | Review the chain of execuon and available data for the process and, if available, navigate
through the processes tree.
Pivot to Views
From any listed alert you can pivot to the following alert-related views:
• Open Asset View—Open the Asset View panel and view informaon related to the alert there.
• View full endpoint details—View the full details of the endpoint to which the alert relates.
• View related incident—View informaon about an incident related to the alert.
• View Observed Behaviors—View informaon about observed behaviors that are related to the
alert.
To pivot to any of these views:
STEP 1 | Right-click a listed alert.
STEP 2 | From the pop-up menu, select the view to which you want to pivot.
Cortex® XDR™ Pro Administrator’s Guide 397 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 2 | Right-click and select Add <path type> to malware profile allow list.
STEP 3 | In the Add <path type> to malware profile allow list dialog, select from your exisng Profiles
and Modules to which you want to add the file path to the allow list.
Cortex® XDR™ Pro Administrator’s Guide 398 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 2 | In the field type table, Add featured <field-type> to define a list of alert fields you want
flagged in the Alerts Table. You can either Create New featured alert field from scratch or
Upload from File.
• To create a new alert field:
1. Enter one or more field-type values of the and Add to the list.
2. (Oponal) Add a comment.
3. Add the featured alert field.
• To import fields:
1. Browse or Drag and Drop your CSV file of field values. Download example file to ensure
you using the correct format.
2. Import your file.
Featured Acve Directory values are displayed in the User and Host fields
accordingly.
• (Oponal) Create an incident scoring rule using the Alert table Contains Featured Field
Name fields to further highlight and priorize alerts containing the Host, User, and IP
address aributes.
STEP 2 | Right-click the row, and select Manage Alert > View generang rule.
Cortex XDR opens the BIOC rule that generated the alert in the BIOC Rules page. If the rule
has been deleted, an empty table is displayed.
Cortex® XDR™ Pro Administrator’s Guide 399 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 2 | Right-click anywhere in the alert, and select one of the following opons:
• Retrieve alert data—Cortex XDR can provide addional analysis of the memory contents
when an exploit protecon module raises an XDR Alert. To perform the analysis you
must first retrieve alert data consisng of the memory contents at the me the alert was
raised. This can be done manually for a specific alert, or you can enable Cortex XDR to
automacally retrieve alert data for every relevant XDR Alert. Aer Cortex XDR receives
the data and performs the analysis, it issues a verdict for the alert. You can monitor the
retrieval and analysis progress from the Acon Center (pivot to view Addional data). When
analysis is complete, Cortex XDR displays the verdict in the Advanced Analysis field.
• Retrieve related files—To further examine files that are involved in an alert, you can request
the Cortex XDR agent send them to the Cortex XDR management console. If mulple files
are involved, Cortex XDR supports up to 20 files and 200MB in total size. The agent collects
all requested files into one archive and includes a log in JSON format containing addional
status informaon. When the files are successfully uploaded, you can download them from
the Acon Center for up to one week.
• For PAN NGFW source type alerts, Download triggering packet—Download the session
PCAP containing the first 100 bytes of the triggering packet directly from Cortex XDR. To
access the PCAP, you can download the file from the Alerts table, Incident, or Causality
view.
Cortex® XDR™ Pro Administrator’s Guide 400 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
If you require assistance from Palo Alto Networks Support to invesgate the alert,
ensure to provide the downloaded ZIP file.
STEP 2 | When you are sasfied with the results, click the download icon ( ).
The icon is grayed out when there are no results.
Cortex XDR exports the filtered result set to the TSV file.
Exclude Alert
To exclude an alert.
STEP 1 | From the Alerts page, locate the alert you want to exclude.
Cortex® XDR™ Pro Administrator’s Guide 401 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 2 | Right-click the row, and select Manage Alert > Exclude Alert.
A noficaon displays indicang the exclusion is in progress.
STEP 2 | Right-click the row, and select Manage Alert > Invesgate Contribung Events.
Cortex® XDR™ Pro Administrator’s Guide 402 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
mestamps of the events for the alert. If there is only one event, the event mestamp is the
me frame used for the query.
1. Select the Open drilldown query link.
A new browser in XQL Search is opened where you can run the query and any other
operaons related to XQL Search.
2. Select Run.
Cortex® XDR™ Pro Administrator’s Guide 403 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Alert Exclusions
The Invesgaon > Incident Management > Exclusions page displays all alert exclusion policies in
Cortex XDR.
An alert exclusion is a policy that contains a set of alert match criteria that you want to suppress
from Cortex XDR. You can Add an Alert Exclusion Policy from scratch or you can base the
exclusion off of alerts that you invesgate in an incident. Aer you create an exclusion policy,
Cortex XDR hides any future alerts that match the criteria from incidents and search query results.
If you choose to apply the policy to historic results as well as future alerts, the app idenfies any
historic alerts as grayed out.
The following table describes both the default fields and addional oponal fields that you can
add to the alert exclusions table and lists the fields in alphabecal order.
Field Descripon
Check box to select one or more alert exclusions on which you want to
perform acons.
Cortex® XDR™ Pro Administrator’s Guide 404 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
BACKWARD SCAN Exclusion policy status for historic data, either enabled if you want to
STATUS apply the policy to previous alerts or disabled if you don’t want to apply
the policy to previous alerts.
DESCRIPTION Text summary of the policy that displays the match criteria.
MODIFICATION Date and me when the exclusion policy was created or modified.
DATE
If an incident contains only alerts with exclusions, Cortex XDR changes the incident status
to Resolved - False Positive and sends an email noficaon to the incident
assignee (if set).
There are two ways to create an exclusion policy. You can define the exclusion criteria when you
invesgate an incident or you can create an alert exclusion from scratch.
• Build an Alert Exclusion Policy from Alerts in an Incident
• Build an Alert Exclusion Policy from Scratch
Build an Alert Exclusion Policy from Alerts in an Incident
If aer reviewing the incident details, if you want to suppress one or more alerts from appearing
in the future, create an exclusion policy based on the alerts in the incident. When you create an
incident from the incident view, you can define the criteria based on the alerts in the incident. If
desired, you can also Create Alert Exclusions from scratch.
STEP 1 | From the Incident view in Cortex XDR, select Acons > Create Exclusion.
Cortex® XDR™ Pro Administrator’s Guide 405 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Enter a descripve COMMENT that idenfies the reason or purpose of the alert exclusion
policy.
STEP 4 | Use the alert filters to add any the match criteria for the alert exclusion policy.
You can also right-click a specific value in the alert to add it as match criteria. The app refreshes
to show you which alerts in the incident would be excluded. To see all matching alerts including
those not related to the incident, clear the opon to Show only alerts in the named incident.
STEP 4 | Enter any comments to explain the purpose or intent behind the policy.
This acon is irreversible: All historic excluded alerts will remain excluded if you disable
or delete the policy.
Cortex® XDR™ Pro Administrator’s Guide 406 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 7 | Create and then select Yes to confirm the alert excepon policy.
Causality View
The Causality View provides a powerful way to analyze and respond to alerts. The scope of
the Causality View is the Causality Instance (CI) to which this alert pertains. The Causality View
presents the alert (generated by Cortex XDR or sent to Cortex XDR from a supported alert source
such as the Cortex XDR agent) and includes the enre process execuon chain that led up to the
alert. On each node in the CI chain, Cortex XDR provides informaon to help you understand
what happened around the alert.
Cortex® XDR™ Pro Administrator’s Guide 407 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Context
Summarizes informaon about the alert you are analyzing, including the host name, the process
name on which the alert was raised, and the host IP and MAC address . For alerts raised on
Cortex® XDR™ Pro Administrator’s Guide 408 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
endpoint data or acvity, this secon also displays the endpoint connecvity status and operang
system.
Cortex® XDR™ Pro Administrator’s Guide 409 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Enty Data
Provides addional informaon about the enty that you selected. The data varies by the type of
enty but typically idenfies informaon about the enty related to the cause of the alert and the
circumstances under which the alert occurred.
Cortex® XDR™ Pro Administrator’s Guide 410 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Response Acons
You can choose to isolate the host, on which the alert was triggered, from the network or iniate a
live terminal session to the host to connue invesgaon and remediaon.
Events Table
Displays up to 100,000 related events for the process node which matches the alert criteria that
were not triggered in the alert table but are informaonal.
To connue invesgaon, you can perform the following acons from the right-click pivot menu:
• View in XQL to populate the event in an XQL search query that you can further refine, if
needed.
• Add <path type> to malware profile allow list from the Process and File table <path> fields. For
example, target_process_path, src_process_path, file_path, or os_parent_path.
• For the behavioral threat protecon results, you can take acon on the iniator to add it to an
allow list or block list, terminate it, or quaranne it.
• Revise the event results to see possible related events near the me of an event using an
updated mestamp value to Show rows 30 days prior or 30 days aer.
To view stascs for files on VirusTotal, you can pivot from the Iniator MD5 or SHA256
value of the file on the Files tab.
Cortex® XDR™ Pro Administrator’s Guide 411 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The CI chain visualizes the firewall logs, endpoint files, and network connecons that triggered
alerts connected to a security event.
The network causality view displays only the informaon it collects from the detectors. It is
possible that the CI may not show some of the firewall or agent processes.
Secon Descripon
Host Isolaon You can choose to isolate the host, on which the
alert was triggered, from the network or iniate
a live terminal session to the host to connue
invesgaon and remediaon.
Cortex® XDR™ Pro Administrator’s Guide 412 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Secon Descripon
The Causality View presents a CI chain for each of
the processes and the network connecon. The
CI chain is built from processes nodes, events, and
alerts. The chain presents the process execuon
and might also include events that these processes
caused and alerts that were triggered on the events
or processes. The Causality Group Owner (CGO)
is displayed on the le side of the chain. The CGO
is the process that is responsible for all the other
processes, events and alerts in the chain. You need
the enre CI to fully understand why the alert
occurred.
The Causality View provides an interacve
way to view the CI chain for an alert. You can
move it, extend it, and modify it. To adjust the
appearance of the CI chain, you can enlarge/
shrink the chain for easy viewing using the size
controls on the right. You can also move the chain
around by selecng and dragging it. To return
the chain to its original posion and size, click
Cortex® XDR™ Pro Administrator’s Guide 413 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Secon Descripon
The color of a process node also correlates to the
WildFire verdict.
• Blue—Benign.
• Yellow—Grayware.
• Red—Malware.
• Light gray—Unknown verdict.
• Dark gray—The verdict is inconclusive.
To view and download the WildFire
report, in the Enty Data secon, click
.
Events Table Displays all related events for the process node
which matches the alert criteria that were not
triggered in the alert table but are informaonal.
You can also export the table results to a tab-
separated values (TSV) file.
For the Behavioral Threat Protecon table, right-
click to add to allow list or block list, terminate, and
quaranne a process.
Cortex® XDR™ Pro Administrator’s Guide 414 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 415 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Context
Summarizes informaon about the alert you are analyzing, including the type of Cloud Provider,
Project, and Region on which the event occurred. Select View Raw Log to view the raw log as
provided by the Cloud Provider in JSON format.
Cortex® XDR™ Pro Administrator’s Guide 416 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Enty Data
Provides addional informaon about the enty that you selected. The data varies by the type of
enty but typically idenfies informaon about the enty related to the cause of the alert and the
circumstances under which the alert occurred.
Events Table
Displays up to 100,000 related events and up to 1,000 related alerts.
To connue invesgaon, in the Alerts table, you can perform the following acons from the
right-click pivot menu:
• Invesgate Causality Chain of the associated alert.
• Open in XQL to populate the event in an XQL search query that you can further refine, if
needed.
• Manage Alert to perform available acons.
• Pivot to views to view related incident.
In the All Events table, Cortex XDR displays detailed informaon about each of the related events.
To simplify your invesgaon, Cortex XDR scans your Cortex XDR data aggregang the events
that have the same Identy or Resource and displays the entry with an aggregated icon. Right-
click and select Show Grouped Events to view the aggregated entries.
Entries highlighted in red indicate that the specific event triggered an alert. To connue
invesgaon, right-click to View in XQL.
Timeline View
The Timeline provides a forensic meline of the sequence of events, alerts, and informaonal
BIOCs and Correlaon Rules involved in an aack. While the Causality View of an alert surfaces
related events and processes that Cortex XDR idenfies as important or interesng, the Timeline
displays all related events, alerts, and informaonal BIOCs and Correlaon Rules over me.
Cortex® XDR™ Pro Administrator’s Guide 417 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Secon Descripon
CGO (and process Cortex XDR displays the Causality Group Owner (CGO) and the
instances that are part of host on which the CGO ran in the top le of the meline. The
the CGO) CGO is the parent process in the execuon chain that Cortex XDR
idenfied as being responsible for iniang the process tree. In
the example above, wscript.exe is the CGO and the host it
ran on was HOST488497. You can also click the blue corner of
the CGO to view and filter related processes from the Timeline.
This will add or remove the process and related events or alerts
associated with the process from the Timeline.
Cortex® XDR™ Pro Administrator’s Guide 418 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Secon Descripon
Timespan By default, Cortex XDR displays a 24-hour period from the start
of the invesgaon and displays the start and end me of the
CGO at either end of the mescale. You can move the slide bar
to the le or right to focus on any me-gap within the mescale.
You can also use the me filters above the table to focus on set
me periods.
Related events, alerts, and Cortex XDR displays up to 100,000 alerts, BIOCs and Correlaon
informaonal BIOCs Rules (triggered and informaonal), and events. Click on a node in
the acvity area of the Timeline to filter the results you see here.
Similar to other pages in Cortex XDR, you can create filters to
search for specific events.
Cortex® XDR™ Pro Administrator’s Guide 419 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
When enabling the Identy Analycs, alerts associated with suspicious user acvity such as stolen
or misused credenals, lateral movement, credenal harvesng, or brute-force data are displayed
with a User node.
Secon Descripon
1. Context For Analycs alerts, the analycs view indicates the endpoint for
which the alert was raised.
For Analycs BIOC alerts, the Analycs view summarizes informaon
about the alert, including the source host name, IP address, the process
name on which the alert was raised, and the corresponding process ID.
2. Alert summary (Analycs alerts only) Describes the behavior that triggered the alert
and acvity impact.
3. Graphic summary Similar to the Causality View, the analycs view provides a graphic
representaon of the acvity that triggered the alert and an interacve
way to view the chain of behavior for an Analycs alert. You can move
the graphic, extend it, and modify it. To adjust the appearance, you
can enlarge/shrink the chain for easy viewing using the size controls
on the right. You can also move the chain around by selecng and
Cortex® XDR™ Pro Administrator’s Guide 420 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Secon Descripon
dragging it. To return the chain to its original posion and size, click
User node— Hover over to display the User Informaon and user
Analycs Profile data.
4. Alert descripon The alert descripon provides details and stascs related to the
acvity. Beneath the descripon, you can also view the alert name,
severity assigned to the alert, me of the acvity, alert tacc (category)
and type, and links to the MITRE summary of the aack tacc.
When selecng a User node, Identy User Details, such as Acve
Directory Group, Organizaonal Unit, and Role associated with the
user are displayed. If available, Login Details also appear.
Cortex® XDR™ Pro Administrator’s Guide 421 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Secon Descripon
Mul-Event—Displays the events associated with the alert according to
the type event type. Right-click to View in XQL and further Invesgate
with XQL the event details.
6. Response acons Acons you can take in response to an Analycs alert. These acons
can include isolang a host from the network, iniang a live terminal
session, and adding an IP address or domain name to an external
dynamic list (EDL) that is enforceable in your Palo Alto Networks
firewall security policy.
Cortex® XDR™ Pro Administrator’s Guide 422 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Invesgate Endpoints
Endpoint invesgaon requires either a Cortex XDR Prevent or a Cortex XDR Pro per
Endpoint license.
• Acon Center
• View Details About an Endpoint
• Retrieve Files from an Endpoint
• Retrieve Support Logs from an Endpoint
• Scan an Endpoint for Malware
Acon Center
The Acon Center provides a central locaon from which you can track the progress of all
invesgaon, response, and maintenance acons performed on your Cortex XDR-protected
endpoints. The main All Acons tab of the Acon Center displays the most recent acons iniated
in your deployment. To narrow down the results, click Filter on the top right.
You can also jump to filtered Acon Center views for the following acons:
• Quaranne—View details about quaranned files on your endpoints. You can also switch to an
Aggregated by SHA256 view that collapses results per file and lists the affected endpoints in
the Scope field.
• Block List/Allow List—View files that are permied and blocked from running on your
endpoints regardless of file verdict.
Blocking files on endpoints is enforced by the endpoint malware profile. To block a hash
value, ensure the hash value is configured in the Malware Security Profile.
• Scripts Library—View Palo Alto Networks and administrator-uploaded scripts that you can run
on your endpoints.
• Isolaon—View the endpoints in your organizaon that have been isolated from the network.
For more informaon, refer to Isolate an Endpoint.
• External Dynamic List—View the list of IP addresses and domain names in your EDL. For more
informaon, refer to Manage External Dynamic Lists
• Endpoint Blocked IP Addresses—View remote IP addresses that the Cortex XDR agent
has automacally blocked from communicang with endpoints in your network. For more
informaon, refer to Add a New Malware Security Profile.
For acons that can take a while to complete, the Acon Center tracks the acon progress and
displays the acon status and current progress descripon for each stage. For example, aer
iniang an agent upgrade acon, Cortex XDR monitors all stages from the Pending request
unl the acon status is Completed. Throughout the acon lifeme, you can view the number of
endpoints on which the acon was successful and the number of endpoints on which the acon
failed. Aer a period of 90 days since the acon creaon, the acon is removed from Cortex XDR
and is no longer displayed in the Acon Center. You cannot delete acons manually from the
Acon Center.
Cortex® XDR™ Pro Administrator’s Guide 423 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The following table describes both the default and addional oponal fields that you can view
from the All Acons tab of the Acon Center and lists the fields in alphabecal order.
Field Descripon
Expiraon Date Time the acon will expire. To set an expiraon the
acon must apply to one or more endpoints.
By default, Cortex XDR assigns a 30-day expiraon
limit expiraon limit to the following acons:
• Agent Uninstall
• Agent Upgrade
• Files Retrieval
• Isolate
• Cancel Endpoint Isolaon
Cortex® XDR™ Pro Administrator’s Guide 424 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Addional acons such as malware scans,
quaranne, and endpoint data retrieval are assigned
a 4-day expiraon limit.
Aer the expiraon limit, the status for any
remaining Pending acons on endpoints change to
Expired and these endpoints will not perform the
acon.
Addional data—If addional details are available for an acon or for specific endpoints, you
can pivot (right-click) to the Addional data view. You can also export the addional data to a
TSV file. The page can include details in the following fields but varies depending on the type of
acon.
Cortex® XDR™ Pro Administrator’s Guide 425 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Acon Last Update Time at which the last status update occurred for the
acon.
Acon Parameters Summary of the Acon including the alert name and
alert ID.
Addional Data | Malicious Files Addional data, if any is available, for the acon.
For malware scans, this field is tled Malicious Files
and indicates the number of malicious files idenfied
during the scan.
Cortex® XDR™ Pro Administrator’s Guide 426 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 2 | Select the acon you want to iniate and follow the required steps and parameters you need
to define for each acon.
Cortex XDR displays only the endpoints eligible for the acon you want to perform.
Cortex® XDR™ Pro Administrator’s Guide 427 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 428 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The following table describes the list of acons you can perform on your endpoints.
Field Acon
Cortex® XDR™ Pro Administrator’s Guide 429 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Acon
The following table describes both the default and addional oponal fields that you can view in
the Endpoints table and lists. The table lists the fields in alphabecal order.
Field Descripon
Acve Directory Lists all Acve Directory Groups and Organizaonal Units to which the
user belongs.
Auto Upgrade Status When Agent Auto Upgrades are enabled, indicates the acon status is
either:
• In progress—Indicates that the Cortex XDR agent upgrade is in
progress on the endpoint.
• Up to date—Indicates that the current Cortex XDR agent version on
the endpoint is up to date.
• Failure—Indicates that the Cortex XDR agent upgrade failed aer
three retries.
• Not configured—Indicates that automac agent upgrades are not
configured for this endpoint.
• Pending—Indicates that the Cortex XDR agent version running
on the endpoint is not up to date, and the agent is waing for the
upgrade message from Cortex XDR.
• Not supported—Indicates this endpoint type does not support
automac agent upgrades. Relevant for VDI, TS, or Android
endpoints.
Cortex® XDR™ Pro Administrator’s Guide 430 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
To include or exclude one or more endpoints from auto upgrade, right-
click and select Endpoint Control > <Exclude/Include> endpoints from
auto upgrade
Content Auto Update Indicates whether automac content updates are Enabled or Disabled
for the endpoint. See Agent Sengs profile.
Content Release Displays the me and date of when the current content version was
Timestamp released.
Content Rollout If you configured delayed content rollout, the number of days for delay
Delay (days) is displayed here. See Agent Sengs profile.
Content Version Content update version used with the Cortex XDR agent.
Disabled Capabilies A list of the capabilies that were disabled on the endpoint. To disable
one or more capabilies, right-click the endpoint name and select
Endpoint Control > Disable Capabilies. Opons are:
• Live Terminal
• Script Execuon
• File Retrieval
You can disable these capabilies during the Cortex XDR agent
installaon on the endpoint or through Endpoint Administraon.
Disabling any of these acons is irreversible, so if you later want to
enable the acon on the endpoint, you must uninstall the Cortex XDR
agent and install a new package on the endpoint.
Endpoint Alias If you assigned an alias to represent the endpoint in Cortex XDR, the
alias is displayed here. To set an endpoint alias, right-click the endpoint
name, and select Change endpoint alias. The alias can contain any of
the following characters: a-Z, 0-9, !@#$%^&()-'{}~_.
Cortex® XDR™ Pro Administrator’s Guide 431 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Endpoint Name Hostname of the endpoint. If the agent enables Pro features, this field
also includes a PRO badge. For Anrdoid endpoints, the hostname
comprises the <firstname>—<lastname> of the registered user,
with a separang dash.
Endpoint Status Registraon status of the Cortex XDR agent on the endpoint:
• Connected—The Cortex XDR agent has checked in within 10
minutes for standard endpoints, and within 3 hours for mobile
endpoints.
• Connecon Lost—The Cortex XDR agent has not checked in within
30 to 180 days for standard endpoints, and between 90 minutes
and 6 hours for VDI and temporary sessions.
• Disconnected—The Cortex XDR agent has checked in within the
defined inacvity window: between 10 minutes and 30 days for
standard and mobile endpoints, and between 10 minutes and 90
minutes for VDI and temporary sessions.
• VDI Pending Log-on—(Windows only) Indicates a non-persistent
VDI endpoint is waing for user logon, aer which the Cortex XDR
agent consumes a license and starts enforcing protecon.
• Uninstalled—The Cortex XDR agent has been uninstalled from the
endpoint.
Endpoint Version Versions of the Cortex XDR agent that runs on the endpoint.
First Seen Date and me the Cortex XDR agent first checked in (registered) with
Cortex XDR.
Golden Image ID For endpoints with a System Type of Golden Image, the image ID is a
unique idenfier for the golden image.
Cortex® XDR™ Pro Administrator’s Guide 432 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Group Names Endpoint Groups to which the endpoint is a member, if applicable. See
Define Endpoint Groups.
Isolaon Date Date and me of when the endpoint was Isolated. Displayed only for
endpoints in Isolated or Pending Isolaon Cancellaon status.
Install Date Date and me at which the agent was first installed on the endpoint.
Installaon Package Installaon package name used to install the Cortex XDR agent.
Last Content Update Displays the me and date when the agent last deployed a content
Time update.
Last Origin IP Represents the last IP address from which the Cortex XDR Agent
connected.
Last Scan Date and me of the last malware scan on endpoint.
Last Seen Date and me of the last change in an agent's status. This can occur
when Cortex XDR receives a periodic status report from the agent
(once an hour), a user performed a manual Check In, or a security event
occurred.
Cortex® XDR™ Pro Administrator’s Guide 433 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Last Used Proxy The IP address and port number of proxy that was last used for
communicaon between the agent and Cortex XDR.
Network Locaon (Cortex XDR agent 7.1 and later for Windows and Cortex XDR agent
7.2 and later for macOS and Linux) Endpoint locaon is reported by
the Cortex XDR agent when you enable this capability in the Agent
Sengs profile:
• Internal
• External
• Not Supported—The Cortex XDR agent is running a prior agent
version that does not support network locaon reporng.
• Disabled—The Cortex XDR agent was unable to idenfy the
network locaon.
Cortex® XDR™ Pro Administrator’s Guide 434 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
• Pending Cancellaon—Scan was aborted, waing for acon to
reach endpoint.
• Canceled—Scan canceled.
• Error—Scan failed to run.
Users User that was last logged into the endpoint. On Android endpoints,
the Cortex XDR app idenfies the user from the email prefix specified
during app acvaon.
Cortex® XDR™ Pro Administrator’s Guide 435 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | Select the operang system and enter the paths for the files you want to retrieve, pressing
ADD aer each completed path.
You cannot define a path using environment variables on Mac and Linux endpoints.
STEP 5 | Select the target endpoints (up to 10) from which you want to retrieve files.
If needed, Filter the list of endpoints. For more informaon, refer to Filter Page
Results.
STEP 7 | Review the acon summary and click Done when finished.
To track the status of a files retrieval acon, return to the Acon Center. Cortex XDR retains
retrieved files for up to 30 days.
If at any me you need to cancel the acon, you can right-click it and select Cancel for pending
endpoint. You can cancel the retrieval acon only if the endpoint is sll in Pending status and
no files have been retrieved from it yet. The cancellaon does not affect endpoints that are
already in the process of retrieving files.
STEP 8 | To view addional data and download the retrieved files, right-click the acon and select
Addional data.
This view displays all endpoints from which files are being retrieved, including their IP Address,
Status, and Addional Data such as error messages of names of files that were not retrieved.
Cortex® XDR™ Pro Administrator’s Guide 436 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 9 | When the acon status is Completed Successfully, you can right-click the acon and
download the retrieved files logs.
Cortex XDR retains retrieved files for up to 30 days.
Disabling File Retrieval does not take effect on file retrieval acons that are in progress.
STEP 3 | Select the target endpoints (up to 10) from which you want to retrieve logs.
If needed, Filter the list of endpoints. For more informaon, refer to Filter Page
Results.
STEP 5 | Review the acon summary and click Done when finished.
In the next heart beat, the agent will retrieve the request to package and send all logs to Cortex
XDR.
STEP 6 | To track the status of a support log retrieval acon, return to the Acon Center.
When the status is Completed Successfully, you can right-click the acon, select
Addional data, and download the support logs. Cortex XDR retains retrieved files for up to 30
days.
If at any me you need to cancel the acon, you can right-click it and select Cancel for pending
endpoint. You can cancel the retrieval acon only if the endpoint is sll in Pending status and
no files have been retrieved from it yet. The cancellaon does not affect endpoints that are
already in the process of retrieving files.
Cortex® XDR™ Pro Administrator’s Guide 437 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 7 | To view addional data and download the support logs, right-click the acon and select
Addional data.
You will see all endpoints from which files are being retrieved, including their IP Address,
Status, and Addional Data.
STEP 8 | When the acon status is Completed Successfully, you can right-click the acon and
download the retrieved logs.
Cortex XDR retains retrieved files for up to 30 days.
Cortex® XDR™ Pro Administrator’s Guide 438 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 4 | Select the target endpoints (up to 100) on which you want to scan for malware.
Scanning is available on Windows and Mac endpoints only. Cortex XDR automacally filters
out any endpoints for which scanning is not supported. Scanning is also not available for
inacve endpoints.
STEP 6 | Review the acon summary and click Done when finished.
Cortex XDR iniates the acon at the next heart beat and sends the request to the agent to
iniate a malware scan.
Cortex® XDR™ Pro Administrator’s Guide 439 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Invesgate Files
• Manage File Execuon
• Manage Quaranned Files
• Review WildFire® Analysis Details
• Invesgate Hash View
Linux ELF
STEP 6 | You are automacally redirected to the Block List or Allow List that corresponds to the
acon in the Acon Center.
Cortex® XDR™ Pro Administrator’s Guide 440 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 7 | To manage the file hashes on the Block List or the Allow List, right-click the file and select
one of the following:
• Disable—The file hash remains on the list but will not be applied on your Cortex XDR
agents.
• Move to Block List or Move to Allow List—Removes this file hash from the current list and
adds it to the opposite one.
• Edit Incident ID—Select to either Link to exisng incident or Remove incident link.
• Edit Comment—Enter a comment.
• Delete—Delete the file hash from the list altogether, meaning this file hash will no longer be
applied to your endpoints.
• Open in VirusTotal—Directs you to the VirusTotal analysis of this hash.
• (Cortex XDR Pro License only) Open Hash View—Pivot the hash view of the hash.
• Open in Quick Launcher—Open the quick launcher search results for the hash.
Cortex® XDR™ Pro Administrator’s Guide 441 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
%\Cyvera\Quarantine) where it isolates the file. This prevents the file from aempng to run
again from the same path or causing any harm to your endpoints.
To evaluate whether an executable file is considered malicious, the Cortex XDR agent calculates a
verdict using informaon from the following sources in order of priority:
• Hash excepon policy
• WildFire threat intelligence
• Local analysis
Quaranning a file in Cortex XDR can be done in one of two ways:
• You can enable the Cortex XDR agent to automacally quaranne malicious executables by
configuring quaranne sengs in the Malware security profile.
• You can quaranne a specific file from the causality card.
Cortex® XDR™ Pro Administrator’s Guide 442 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
This will restore all files with the same hash on all of your endpoints.
Cortex® XDR™ Pro Administrator’s Guide 443 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex XDR displays the preview of WildFire reports that were generated within
the last couple of years only. To view a report that was generated more than two
years ago, you can Download the WildFire report.
2. Analyze the WildFire report.
On the le side of the report you can see all the environments in which the Wildfire
service tested the sample. If a file is low risk and WildFire can easily determine that it
is safe, only stac analysis is performed on the file. Select the tesng environment on
the le, for example Windows 7 x64 SP1, to review the summary and addional details
for that tesng environment. To learn more about the behavior summary, see WildFire
Analysis Reports—Close Up.
3. (Oponal) Download the WildFire report.
If you want to download the WildFire report as it was generated by the WildFire service,
click ( ). The report is downloaded in PDF format.
Cortex® XDR™ Pro Administrator’s Guide 444 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 445 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
If necessary, resolve any conflicts encountered during the upload and retry.
Cortex® XDR™ Pro Administrator’s Guide 446 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Requirement Descripon
Supported Plaorms • Cortex XDR agent 7.4 or later for Windows endpoints.
Setup and • Ensure Monitor and Collect Forensics Data is enabled for your
Permissions Cortex XDR agent.
The Cortex XDR Forensics page displays the following enes where you can perform a deep dive
into a single endpoint or search for arfacts across all your endpoints. For advanced detecve
work, you can use the XQL Search feature to query across all data, including endpoint, network,
cloud, and identy data, using the applicable dataset. Datasets and Presets contains a list of all
datasets included with the Forensics add-on.
Enty Descripon
Cortex® XDR™ Pro Administrator’s Guide 447 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Enty Descripon
stores stascs pertaining to resource
usage by running applicaons.
• Background Acvity Monitor—Per-user
registry keys created by Background
Acvity Monitor (BAM) service to store
the full paths of executable files and a
mestamp, indicang when they were last
executed.
• CidSizeMRU—A registry key containing a
list of recently launched applicaons.
• LastVisitedPidMRU—A registry key
containing a list of the applicaons
and folder paths associated with
recently opened files found in the user’s
OpenSavePidMRU key.
• Prefetch—A type of file created to opmize
applicaon startup in Windows. These files
contains a run count for each applicaon,
between one and eight mestamps of the
most recent execuons, and a record of all
of the files opened for a set duraon aer
the applicaon was started.
• Recentfilecache—A cache created by the
Applicaon Compability Infrastructure to
store the details of executed or installed
programs (Windows 7 only).
• Shimcache—A registry key used by the
Applicaon Compability Infrastructure to
cache details about local executables.
• UserAssist—A registry value that records
a count for each applicaon that a user
launches via the Windows UI.
• Windows Acvies—A database containing
user acvity for a parcular Microso
user account, potenally across mulple
devices. This is also called the Windows
Timeline.
Cortex® XDR™ Pro Administrator’s Guide 448 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Enty Descripon
• Recent Files—Contents of the shortcut
(.lnk) files found in a user's Recent folder.
These files represent files recently accessed
for a user account.
• Jumplist—A feature of the Windows Task
bar that provides shortcuts to users for
recently accessed files or applicaons.
• OpenSavePidiMRU—A registry key
containing a list of recently opened and
saved files for a user’s account.
• Recycle Bin—Folder used by Windows as
temporary storage for deleted files prior to
permanent deleon.
• ShellBags—Registry keys that record user
layout preferences for each folder with
which the user interacts.
• TypedPaths—A registry key containing a
list of paths that the user typed into the
Windows Explorer path bar.
• WinRARArcHistory—A registry key
containing a list of archive files accessed
using WinRAR.
• WordWheelQuery—Registry key containing
a list of terms that a user searched for in
Windows Explorer.
Cortex® XDR™ Pro Administrator’s Guide 449 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Enty Descripon
to inject malicious code into legimate
processes and maintain persistence on an
endpoint.
• Startup Folder—Contents of the shortcut
.lnk files found in the StartUp folder for
both the system and users. The folders are
used to automacally launch applicaons
during system startup or user logon
processes.
• WMI—List of WMI EventConsumers and
any EventFilters that are bound to them
using a FilterToConsumerBinding. WMI
EventConsumers can be used as a method
of fileless malware persistence.
Cortex® XDR™ Pro Administrator’s Guide 450 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Enty Descripon
stores stascs pertaining to network data
usage for running applicaons. Includes
applicaon path, network interface, bytes
sent, and bytes received.
Cortex® XDR™ Pro Administrator’s Guide 451 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 452 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Field Descripon
STEP 1 | In the Search Collecons page, select Add Collecon to Create New Search Collecon.
1. Enter the Collecon Name and oponal Descripon.
2. In the Search table, select the searches you want to include in the search collecon.
Filter the table according to the table fields to narrow your rules.
3. Aer you have selected the rules you want to include in your collecon, Create Search
Collecon.
Review the search collecons you created.
Cortex® XDR™ Pro Administrator’s Guide 453 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 454 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 455 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
1. Navigate to Process Execuon Arfacts and select one the following tables to view
addional informaon:
• Amcache—A registry hive used by the Applicaon Compability Infrastructure to
cache the details of executed or installed programs.
• Applicaon Resource Usage —A table in the System Resource Usage database that
stores stascs pertaining to resource usage by running applicaons.
• Background Acvity Monitor—Per-user registry keys created by Background Acvity
Monitor (BAM) service to store the full paths of executable files and a mestamp,
indicang when they were last executed.
• CidSizeMRU—A registry key containing a list of recently launched applicaons.
• LastVisitedPidMRU—A registry key containing a list of the applicaons and folder
paths associated with recently opened files found in the user’s OpenSavePidMRU key.
• Prefetch—A type of file created to opmize applicaon startup in Windows. These
files contains a run count for each applicaon, between one and eight mestamps of
the most recent execuons, and a record of all of the files opened for a set duraon
aer the applicaon was started.
• Recentfilecache—A cache created by the Applicaon Compability Infrastructure to
store the details of executed or installed programs (Windows 7 only).
• Shimcache—A registry key used by the Applicaon Compability Infrastructure to
cache details about local executables.
• UserAssist—A registry value that records a count for each applicaon that a user
launches via the Windows UI.
• Windows Acvies—A database containing user acvity for a parcular Microso
user account, potenally across mulple devices. This is also called the Windows
Timeline.
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 456 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
STEP 2 | To triage an endpoint, locate the process execuon, right-click and select Triage endpoint.
Review Persistence
The Persistence table displays a normalized table containing an overview of all of the applicaon
persistence arfacts collected from the endpoints. Invesgate the following detailed fields:
You must have Host Insights add-on acvated in order to view the data.
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 457 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Invesgate persistence.
Drill down to further invesgate the types of persistence arfacts Cortex XDR collected.
1. Navigate to Persistence Arfacts and select one the following tables to view addional
informaon:
• Drivers—Windows device drivers installed on each endpoint.
• Registry—A collecon of registry keys that can be used for malware persistence.
• Scheduled Tasks—Scheduled tasks used to execute Windows programs or scripts at
specified intervals.
• Services—Windows applicaons that run in the background and do not require user
interacon.
• Shim Databases—Databases used by the Applicaon Compability Infrastructure
to apply shims to executables for backwards compability. These databases can be
Cortex® XDR™ Pro Administrator’s Guide 458 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
used to inject malicious code into legimate processes and maintain persistence on an
endpoint.
• Startup Folder—Contents of the shortcut (.lnk) files found in the StartUp folder for
both the system and users. The folders are used to automacally launch applicaons
during system startup or user logon processes.
• WMI—List of WMI EventConsumers and any EventFilters that are bound to them
using a FilterToConsumerBinding. WMI EventConsumers can be used as a method of
fileless malware persistence.
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 459 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Review Network
The Network table displays an overview of the different types of network arfacts collected on
the endpoints. Invesgate the following detailed fields:
Field Descripon
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 460 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Review Triage
The triage funconality in the Forensics add-on collects detailed system informaon, including a
full file lisng for all of the connected drives, full event logs, and registry hives, to provide you with
a complete, holisc picture of an endpoint.
The Triage tables displays an overview of the different types of triage collecons that were
executed on an endpoint.
Drill down to further invesgate the following types of collecons:
• All—List of all files collected via Forensic Triage and their current status.
• File—Full file lisngs for $MFT files collected during Forensic Triage.
• Registry—Full registry lisngs for registry hives collected during Forensic Triage.
Cortex® XDR™ Pro Administrator’s Guide 461 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Event Logs—Full lisng of the events found in the Windows event log (*.evtx) files.
• Browser History—Browser history from Chrome, Edge, Firefox, and Internet Explorer.
• Volale—Volale forensic arfacts including: ARP Cache, DNS Cache, Handles, Net Sessions,
Port Lisng, and Process Lisng.
• Configuraon—Custom Forensics Triage configuraons created and saved for use in online or
offline triage collecons.
Cortex® XDR™ Pro Administrator’s Guide 462 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Response Acons
Aer or during the invesgaon of malicious acvity in your network, Cortex XDR offers various
response acons that enable you invesgate the endpoint and take immediate acon to remediate
it. For example, when you detect a compromised endpoint, you can isolate it from your network to
prevent it from communicang with any other internal or external device and thereby reducing an
aacker’s mobility on your network. The available response acons in Cortex XDR are:
• Iniate a Live Terminal Session
• Isolate an Endpoint
• Run Scripts on an Endpoint
• Remediate Changes from Malicious Acvity
• Search and Destroy Malicious Files
• Manage External Dynamic Lists
For response acons that rely on a Cortex XDR agent, the following table describes the supported
plaorms and minimal agent version. A dash (—) indicates the seng is not supported.
Isolate an Endpoint —
Halts all network access Cortex XDR agent Cortex XDR agent
on the endpoint except 6.0 and later 7.3 and later on
for traffic to Cortex macOS 10.15.4 and
XDR to prevent a later
compromised endpoint
from communicang
with any other internal or
external device.
Cortex® XDR™ Pro Administrator’s Guide 463 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 464 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
If the endpoint supports the necessary requirements, you can iniate a Live Terminal session from
the Endpoints page. You can also iniate a Live Terminal as a response acon from a security
event. If the endpoint is inacve or does not meet the requirements, the opon is disabled.
Aer you terminate the Live Terminal session, you also have the opon to save a log of the
session acvity. All logged acons from the Live Terminal session are available for download as a
text file report when you close the live terminal session.
You can fine tune the Live Terminal session visibility on the endpoint by adjusng the User
Interface opons in your Agent Sengs Profile.
STEP 1 | Start the session.
From a security event or endpoint details, select Response > Live Terminal. It can take the
Cortex XDR agent a few minutes to facilitate the connecon.
STEP 2 | Use the Live Terminal to invesgate and take acon on the endpoint.
• Manage Processes
• Manage Files
• Run Operang System Commands
• Run Python Commands and Scripts
Cortex® XDR™ Pro Administrator’s Guide 465 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | When you are done, Disconnect the Live Terminal session.
You can oponally save a session report containing all acvity you performed during the
session.
The following example displays a sample session report:
Jun 27th 2019 13:56:13 Live Terminal session has started [success]
Jun 27th 2019 14:00:45 Kill process calc.exe (4920) [success]
Jun 27th 2019 14:11:46 Live Terminal session end request [success]
Jun 27th 2019 14:11:47 Live Terminal session has ended [success]
Manage Processes
From the Live Terminal you can monitor processes running on the endpoint. The Task Manager
displays the task aributes, owner, and resources used. If you discover an anomalous process
while invesgang the cause of a security event, you can take immediate acon to terminate the
process or the whole process tree, and block processes from running.
STEP 1 | From the Live Terminal session, open the Task Manager to navigate the acve processes on
the endpoint.
You can toggle between a sorted list of processes and the default process tree view ( ). You
can also export the list of processes and process details to a comma-separated values file.
If the process is known malware, the row displays a red indicator and idenfies the file using a
malware aribute.
Cortex® XDR™ Pro Administrator’s Guide 466 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Manage Files
The File Explorer enables you to navigate the file system on the remote endpoint and take
remedial acon to:
• Create, manage (move or delete), and download files, folders, and drives, including connected
external drives and devices such as USB drives and CD-ROM.
• View file aributes, creaon and last modified dates, and the file owner.
• Invesgate files for malicious content.
To navigate and manage files on a remote endpoint:
STEP 1 | From the Live Terminal session, open the File Explorer to navigate the file system on the
endpoint.
STEP 2 | Navigate the file directory on the endpoint and manage files.
To locate a specific file, you can:
• Search for any filename rows on the screen from the search bar.
• Double click a folder to explore its contents.
Cortex® XDR™ Pro Administrator’s Guide 467 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
On Windows endpoints, you cannot run GUI-based cmd commands like winver or
appwiz.cpl
Cortex® XDR™ Pro Administrator’s Guide 468 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 3 | When you are done, Disconnect the Live Terminal session.
Choose whether to save the live terminal session report including files and tasks marked as
interesng. Administrator acons are not saved to the endpoint.
STEP 3 | When you are done, Disconnect the Live Terminal session.
Choose whether to save the live terminal session report including files and tasks marked as
interesng. Administrator acons are not saved to the endpoint.
Cortex® XDR™ Pro Administrator’s Guide 469 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Disabling Live Terminal does not take effect on sessions that are in progress.
Isolate an Endpoint
When you isolate an endpoint, you halt all network access on the endpoint except for traffic to
Cortex XDR. This can prevent a compromised endpoint from communicang with other endpoints
thereby reducing an aacker’s mobility on your network. Aer the Cortex XDR agent receives
the instrucon to isolate the endpoint and carries out the acon, the Cortex XDR console shows
an Isolated check-in status. To ensure an endpoint remains in isolaon, agent upgrades are not
available for isolated endpoints.
Network isolaon is supported for endpoints that meet the following requirements:
STEP 3 | Enter a Comment to provide addional background or other informaon that explains why
you isolated the endpoint.
Aer you isolate an endpoint, Cortex XDR will display the Isolaon Comment on the Acon
Center > Isolaon. If needed, you can edit the comment from the right-click pivot menu.
Cortex® XDR™ Pro Administrator’s Guide 470 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 5 | Select the target endpoint that you want to isolate from your network.
If needed, Filter the list of endpoints. To learn how to use the Cortex XDR filters, refer
to Filter Page Results.
STEP 7 | Review the acon summary and click Done when finished.
In the next heart beat, the agent will receive the isolaon request from Cortex XDR.
STEP 8 | To track the status of an isolaon acon, select Response > Acon Center > Isolaon.
If aer iniang an isolaon acon, you want to cancel, right-click the acon and select
Cancel for pending endpoint. You can cancel the isolaon acon only if the endpoint is sll in
Pending status and has not been isolated yet.
STEP 9 | Aer you remediate the endpoint, cancel endpoint isolaon to resume normal
communicaon.
You can cancel isolaon from the Acons Center (Isolaon page) or from Endpoints > Endpoint
Management > Endpoint Administraon. From either place right-click the endpoint and select
Endpoint Control > Cancel Endpoint Isolaon.
Cortex® XDR™ Pro Administrator’s Guide 471 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Endpoints that are part of the incident view and do not meet the required criteria
are excluded from the remediaon analysis.
• In the Causality View, either:
• Right-click any process node involved in the causality chain and select Remediaon
Suggeson.
• Navigate to Acons > Remediaon Suggesons.
Analysis can take a few minutes. If desired, you can minimize the analysis pop-up while
navigang to other Cortex XDR pages.
Field Descripon
ORIGINAL EVENT Summary of the inial event that triggered the malicious causality
DESCRIPTION chain.
ORIGINAL EVENT Timestamp of the inial event that triggered the malicious causality
TIMESTAMP chain.
Cortex® XDR™ Pro Administrator’s Guide 472 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
REMEDIATION Displays the mestamp of when all of the endpoint arfacts were
DATE remediated. If missing a successful remediaon, field will not display
mestamp.
STEP 3 | Select one or more Original Event Descripons and right-click to Remediate.
Cortex® XDR™ Pro Administrator’s Guide 473 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Running snippets requires both Run High-risk scripts and Script configuraon
permissions. Addionally, all scripts are executed as System User on the endpoint.
Use the following work flow to start running scripts on your endpoints:
• Manage All Scripts in the Scripts Library
• Upload Your Scripts
• Run a Script on Your Endpoints
• Track Script Execuon and View Results
• Troubleshoot Script Execuon
• Disable Script Execuon
Cortex® XDR™ Pro Administrator’s Guide 474 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
Created By Name of the user who created the script. For pre-canned
scripts, the user name is Palo Alto Networks.
Modificaon Date Last date and me in which the script or its aributes
were edited in Cortex XDR.
From the Scripts Library, you can perform the following addional acons:
• Download script—To see exactly what the script does, right-click and Download the Python
code file locally.
• View / Download definions file—To view or download the script meta-data, right-click the
script and select the relevant opon.
• Run—To run the selected script, right-click and select Run. Cortex XDR redirects you to the
Acon Center with the details of this script already populang the new acon fields.
• Edit—To edit the script code or meta-data, right-click and Edit. This opon is not available for
pre-canned scripts provided by Palo Alto Networks.
By default, Palo Alto Networks provides you with a variety of pre-canned scripts that you can use
out-of-the-box. You can view the script, download the script code and meta-data, and duplicate
the script, however you cannot edit the code or definions of pre-canned scripts.
The following table lists the pre-canned scripts provided by Palo Alto Networks, in alphabecal
order. New pre-canned scripts are connuously uploaded into Cortex XDR though content
updates, and are labeled New for a period of three days.
Cortex® XDR™ Pro Administrator’s Guide 475 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
get_process_list List CPU and memory for all processes running on the
endpoint.
process_kill_cpu Set a minimum CPU value and kill all process on the
endpoint that are using higher CPU.
process_kill_mem Set a minimum RAM usage in bytes and kill all process on
the endpoint that are using higher private memory.
*Since all scripts are running under System context, you cannot perform any Registry
operaons on user-specific hives (HKEY_CURRENT_USER of a specific user).
Cortex® XDR™ Pro Administrator’s Guide 476 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 1 | From Acon Center > Scripts Library select +New Script.
Drag and drop your script file, or browse and select it. During the upload, Cortex XDR parses
your script to ensure you are using only Python modules supported by Cortex XDR. Click
Supported Modules if you want to view the supported modules list. If your script is using
unsupported Python modules, or if your script is not using proper indentaon, Cortex XDR will
require that you fix it. You can use the editor to update your script directly in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 477 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Input—Set the starng execuon point of your script code. To execute the script line by
line, select Just run. Alternavely, to set a specific funcon in the code as the entry point,
Cortex® XDR™ Pro Administrator’s Guide 478 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
select Run by entry point. Select the funcon from the list, and specify for each funcon
parameter its type.
• Output—If your script returns an output, Cortex XDR displays that informaon in the script
results table.
• Single parameter—If the script returns a single parameter, select the Output type from
the list and the output will be displayed as is. To detect the type automacally, select
Auto Detect.
• Diconary—If the script returns more than a single value, select Diconary from the
Output type list. By default, Cortex XDR displays in the script results table the diconary
value as is. To improve the script results table display and be able to filter according to
the returned value, you can assign a user friendly name and type to some or all of your
diconary keys, and Cortex XDR will use that in the results table instead.
To retrieve files from the endpoint, add to the diconary the files_to_get key to include
an array of paths from which files on the endpoint will be retrieved from the endpoint.
Cortex® XDR™ Pro Administrator’s Guide 479 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
For the purpose of this example, we are showing each parameter in a new line. However,
when you create your file, you must remove any \n or \t characters.
{
"name":"script name",
"description":"script description",
"outcome":"High Risk|Standard",
"platform":"Windows,macOS,Linux",
"timeout":600,
"entry_point":"entry_point_name",
"entry_point_definition":{
"input_params":[
{"name":"registry_hkey","type":"string"},
{"name":"registry_key_path","type":"number"},
{"name":"registry_value","type":"number"}],
"output_params":{"type":"JSON","value":[
{"name":"output_auto_detect","friendly_name":"name1","type":"auto_detect"},
{"name":"output_boolean","friendly_name":"name2","type":"boolean"},
{"name":"output_number","friendly_name":"name3","type":"number},
{"name":"output_string","friendly_name":"name4","type":"string"},
{"name":"output_ip","friendly_name":"name5","type":"ip"}]
}
}
Cortex® XDR™ Pro Administrator’s Guide 480 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
{
"name":"scrpit name",
"description":"script description",
"outcome":"High Risk|Standard",
"platform":"Windows,macOS,Linux",
"timeout":600,
"entry_point":"",
"entry_point_definition":{}
}
Cortex® XDR™ Pro Administrator’s Guide 481 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Cortex® XDR™ Pro Administrator’s Guide 482 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
In Interacve Mode, Cortex XDR displays general informaon that includes the scope of target
endpoints and a list of all the scripts that are being executed in this session. For each script on the
executed scripts list, you can view the following:
• The script name, date and me the script execuon acon was iniated, and a list of input
parameters.
• A progress bar that indicates in real-me the number of endpoints for which the script
execuon is In Progress, Failed, or Completed. When you hover over the progress bar, you
can drill-down for more informaon about the different sub-statuses included in each group.
Cortex® XDR™ Pro Administrator’s Guide 483 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Similarly, you can also view this informaon on the scripts list to the le in the form of a pie
chart that is dynamically updated per script as it is being executed.
Cortex XDR does not include disconnected endpoints in the visualizaon of the script
execuon progress bar or pie chart. If a disconnected endpoint later gets connected,
Cortex XDR will execute the script on that endpoint and the graphic indicators will
change accordingly to reflect the addional run and its status.
• Dynamic script results that are connuously updated throughout the script execuon progress.
Cortex XDR lists the results, and graphically aggregates results only if they have a small variety
of values. When both views are available, you can switch between them.
While in Interacve Mode, you can connuously execute more scripts and add code snippets that
will be immediately executed on the target endpoints scope. Cortex XDR logs all the scripts and
code snippets you execute in Interacve Mode, and you can later view them in the Acon Center.
To add another script, select the script from the Cortex XDR scripts library, or start typing a
Code Snippet. Set the script meout and input parameters as necessary, and Run when you
are done. The script is added to the executed scripts list and its runme data is immediately
displayed on screen.
Cortex® XDR™ Pro Administrator’s Guide 484 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Status Descripon
Completed Successfully The script was executed successfully on the endpoint with
no excepons.
Pending The Cortex XDR agent has not yet pulled the script
execuon request from the Cortex XDR server.
Pending Abort The Cortex XDR agent is in the process of execung the
script, and has not pulled the abort request from the
Cortex XDR server yet.
Cortex® XDR™ Pro Administrator’s Guide 485 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Status Descripon
Cortex® XDR™ Pro Administrator’s Guide 486 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
You can filter the results to adjust the endpoints considered in the aggregaon. You can also
generate a PDF report of the aggregated results view.
Cortex® XDR™ Pro Administrator’s Guide 487 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
• Main results view—A detailed table lisng all target endpoints and their details.
In addion the endpoint details (name, IP, domain, etc), the following table describes both
the default and addional oponal fields that you can view per endpoint. The fields are in
alphabecal order.
Field Descripon
*Returned values If your script returned values, the values are also listed in
the addional data table according to your script output
definions.
Execuon mestamp The date and me the Cortex XDR agent started the
script execuon on the endpoint. If the execuon has not
started yet, this field is empty.
Failed files The number of files the Cortex XDR agent failed to
retrieve from the endpoint.
Retenon date The date aer which the retrieved file will no longer be
available for download in Cortex XDR. The value is 90
days from the execuon date.
Retrieved files The number of files the Cortex XDR successfully retrieved
from the endpoint.
Cortex® XDR™ Pro Administrator’s Guide 488 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Field Descripon
For each endpoint, you can right-click and download the script stdout, download retrieved
files if there are any, and view returned excepons if there are any. You can also Export to file
to download the detailed results table in TSV format.
Open Script Interactive Mode
In Interacve Mode, Cortex XDR enables you to dynamically track the script execuon progress
on all target endpoints and view the results as they are being received in real-me. Addionally,
you can start execung more scripts on the same scope of target endpoints.
To iniate Interacve Mode for an already running script:
From the Acon Center, right-click the execuon acon of the relevant script and select Open
in interacve mode.
Rerun a Script
Cortex XDR allows you to select a script execuon acon and rerun it. When you rerun a script,
Cortex XDR uses the same parameters values, target endpoints, and defined meout that were
defined for the previous run. However, if the target endpoints in the original run were defined
using a filter, then that filter will be recalculated when you rerun the script. Cortex XDR will use
the current version of the script. If since the previous run the script has been deleted, or the
supported operang system definion has been modified, you will not be able to rerun the script.
To rerun a script:
STEP 1 | From the Acon Center, right-click the script you want to rerun and select Rerun.
You are redirected to the final summary stage of the script execuon acon.
Cortex® XDR™ Pro Administrator’s Guide 489 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
to idenfy whether it failed due to an error in Cortex XDR or due to an error in the script.
To idenfy the error source, execute the script without the Cortex XDR agent on the same
endpoint with regular Python 3.7 installaon. If the script execuon is unsuccessful, you should
fix your script. Otherwise, if the script was executed successfully with no errors, please contact
Palo Alto Networks support.
Disabling Script Execuon does not take effect on scripts that are in progress.
The Cortex XDR agent does not include the following informaon in the local files
inventory:
• Informaon about files that existed on the endpoint and were deleted before the Cortex
XDR agent was installed.
• Informaon about files where the file size exceeds the maximum file size for hash
calculaons that is preconfigured in Cortex XDR.
• If the Agent Sengs Profile on the endpoint is configured to monitor common file
types only, then the local files inventory includes informaon about these file types
only. You cannot search or destroy file types that are not included in the list of common
file types.
Cortex® XDR™ Pro Administrator’s Guide 490 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
The following are prerequisites to enable Cortex XDR to search and destroy files on your
endpoints:
Requirement Descripon
Licenses and Add-ons • Provision an acve Cortex XDR Pro per Endpoint
license.
• Ensure the Host Insights Add-on is enabled on your
tenant.
Setup and Permissions • Ensure File Search and Destroy is enabled for your
Cortex XDR agent.
• Ensure your Cortex XDR role in the hub has File
search and Destroy files permissions.
Search a File
You can search for files on the endpoint by file hash or file path. The search returns all instances of
this file on the endpoint. You can then immediately proceed to destroy all the file instances on the
endpoint, or upload the file to Cortex XDR for further invesgaon.
You can search for a file using the Query Builder or XQL Search or use the Acon Center wizard as
described in the following workflow:
STEP 1 | From the Acon Center select +New Acon > File Search.
Cortex® XDR™ Pro Administrator’s Guide 491 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
folder names with wildcards, by using a wildcard for each folder in the hierarchy. For
example, c:\*\*\file.exe.
Click Next.
If not all endpoints in the query scope are connected or the search has not completed, the
search acon remains in Pending status in the Acon Center.
Cortex® XDR™ Pro Administrator’s Guide 492 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Destroy a File
When you know a file is malicious, you can destroy all its instances on your endpoints directly
from Cortex XDR. You can destroy a file immediately from the File search acon result, or iniate
a new acon from the Acon Center. When you destroy a file, the Cortex XDR agent deletes all
the file instances on the endpoint.
• To destroy a file from the file search results, refer to Step 6 above.
• To destroy a file from the Acon Center wizard:
STEP 1 | From the Acon Center select +New Acon > Destroy File.
STEP 2 | To destroy by hash, provide the SHA25 of the file. To destroy by path, specify the exact file
path and file name. Click Next.
Cortex® XDR™ Pro Administrator’s Guide 493 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
2. Enable External Dynamic List and enter the Username and Password that the Palo Alto
Networks firewall should use to access the Cortex XDR EDL.
STEP 2 | Record the IP Addresses EDL URL and the Domains EDL URL. You will need these URLs in
the coming steps to point the firewall to these lists.
Cortex® XDR™ Pro Administrator’s Guide 494 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
3. Select Device > Cerficate Management > Cerficate Profile and Add a new cerficate
profile.
4. Give the profile a descripve name and Add the cerficate to the profile.
Cortex® XDR™ Pro Administrator’s Guide 495 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 5 | Set the Cortex XDR EDL as the source for a firewall EDL.
For more detailed informaon about how Palo Alto Networks firewall EDLs work, how you can
use EDLs, and how to configure them, review how to Use an External Dynamic List in Policy.
1. On the firewall, select Objects > External Dynamic Lists and Add a new list.
2. Define the list Type as either IP List or Domain List.
3. Enter the IP Addresses Block List URL or the Domains Block List URL that you recorded
in the last step as the list Source.
4. Select the Cerficate Profile that you created in the last step.
5. Select Client Authencaon and enter the username and password that the firewall
must use to access the Cortex XDR EDL.
6. Use the Repeat field to define how frequently the firewall retrieves the latest list from
Cortex XDR.
STEP 6 | Select Policies > Security and Add or edit a security policy rule to add the Cortex XDR EDL
as match criteria to a security policy rule.
Review the different ways you can Enforce Policy on an External Dynamic List; this topic
describes the complete workflow to add an EDL as match criteria to a security policy rule.
1. Select Policies > Security and Add or edit a security policy rule.
2. In the Desnaon tab, select Desnaon Zone and select the external dynamic list as
the Desnaon Address.
3. Click OK to save the security policy rule and Commit your changes.
You do not need to perform addional commit or make any subsequent configuraon
changes for the firewall to enforce the EDL as part of your security policy; even as you
update the Cortex XDR EDL, the firewall will enforce the list most recently retrieved
from Cortex XDR.
You can also use the Cortex XDR domain list as part of a URL Filtering profile
or as an object in a custom An-Spyware profile; when aached to a security
policy rule, a URL Filtering profile allows you to granularly control user access to
the domains on the list.
Cortex® XDR™ Pro Administrator’s Guide 496 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
Make sure EDL sizes don’t exceed your firewall model limit.
To add an IP address or Domain from the Acon Center, Iniate an Endpoint Acon to Add to
EDL. You can choose to enter the IP address or Domain you want to add Manually or choose
to Upload File.
During invesgaon, you can also Add to EDL from the Acons menu that is available from
invesgaon pages such as the Incidents View, Causality View, IP View, or Quick Launcher.
Cortex® XDR™ Pro Administrator’s Guide 497 ©2021 Palo Alto Networks, Inc.
Invesgaon and Response
STEP 8 | At any me, you can view and make changes to the IP addresses and domain names lists.
1. Navigate to Response > Acon Center > EDL.
Cortex® XDR™ Pro Administrator’s Guide 498 ©2021 Palo Alto Networks, Inc.
Broker VM
499
Broker VM
Broker VM Overview
The Palo Alto Networks Broker is a secured virtual machine (VM), integrated with Cortex XDR,
that bridges your network and Cortex XDR. By seng up the broker, you establish a secure
connecon in which you can route your endpoints, and collect and forward logs and files for
analysis.
The Broker can be leveraged for running different services separately on the VM using the same
Palo Alto Networks authencaon. Once installed, the broker automacally receives updates and
enhancements from Cortex XDR, providing you with new capabilies without having to install a
new VM.
Cortex® XDR™ Pro Administrator’s Guide 500 ©2021 Palo Alto Networks, Inc.
Broker VM
Per your Cortex XDR license, the following figure illustrates the different Broker VM features that
could be available on your organizaon side.
Cortex® XDR™ Pro Administrator’s Guide 501 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex® XDR™ Pro Administrator’s Guide 502 ©2021 Palo Alto Networks, Inc.
Broker VM
Set up Broker VM
The Palo Alto Networks Broker VM is a secured virtual machine (VM), integrated with Cortex
XDR, that bridges your network and the Cortex XDR app. By seng up the broker VM, you
establish a secure connecon in which you can route your endpoints, collect logs, and forward
logs and files for analysis.
Cortex XDR can leverage the broker VM to run different services separately using the same Palo
Alto Networks authencaon. Aer you complete the inial setup, the broker VM automacally
receives updates and enhancements from Cortex XDR, providing you with new capabilies
without having to install a new VM or manually update the exisng VM.
• Configure the Broker VM
• Acvate the Local Agent Sengs
• Acvate the Syslog Collector
• Acvate the CSV Collector
• Acvate the Database Collector
• Acvate the Files and Folders Collector
• Acvate the FTP Collector
• Acvate the NetFlow Collector
• Acvate the Network Mapper
• Acvate Pathfinder
• Acvate the Windows Event Collector
The broker VM comes with a 512GB disk. Therefore, deploy the broker VM with
thin provisioning, meaning the hard disk can grow up to 512GB but will do so only if
needed.
Bandwidth is higher than 10mbit/s.
Cortex® XDR™ Pro Administrator’s Guide 503 ©2021 Palo Alto Networks, Inc.
Broker VM
VM compable with:
Enable communicaon between the Broker Service, and other Palo Alto Networks services and
apps.
Cortex® XDR™ Pro Administrator’s Guide 504 ©2021 Palo Alto Networks, Inc.
Broker VM
Enable Access to Cortex® XDR™ from the broker VM to allow communicaon between agents
and the Cortex XDR app.
You must also add the Broker Service FQDNs to the SSL Decrypon Exclusion list on
your Palo Alto Networks firewalls. If you are using self-signed cerficate authority,
make sure configure cert_ssl-decrypt.crt on the broker.
Configure your broker VM as follows:
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM.
STEP 2 | Download and install the broker VM images for your corresponding infrastructure:
• Amazon Web Services (AWS)—Use the VMDK to Create a Broker VM Amazon Machine
Image (AMI).
• Google Cloud Plaorm—Use the VMDK image to Set up the Broker VM on Google Cloud
Plaorm (GCP).
• Microso Hyper-V—Use the VHD image.
• Microso Azure—Use the VHD (Azure) image to Create a Broker VM Azure Image.
• VMware ESXi—Use the OVA image.
The token is valid only for 24 hours. A new token is generated each me you select
Generate Token.
Cortex® XDR™ Pro Administrator’s Guide 505 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 5 | Log in with the default password !nitialPassw0rd and then define your own unique
password.
The password must contain a minimum of eight characters, contain leers and
numbers, and at least one capital leer and one special character.
Cortex® XDR™ Pro Administrator’s Guide 506 ©2021 Palo Alto Networks, Inc.
Broker VM
1. In the Network Interface secon, review the pre-configured Name, IP address, and MAC
Address, select the Address Allocaon: DHCP (default) or Stac, and select to either to
Disable or set as Admin the network address as the broker VM web interface.
• If you choose Stac, define the following and Save your configuraons:
• Stac IP address
• Netmask
• Default Gateway
• DNS Server
Cortex® XDR™ Pro Administrator’s Guide 507 ©2021 Palo Alto Networks, Inc.
Broker VM
4. (Oponal) (Requires Broker VM 8.0 and later) Configure your NTP servers.
Enter the required server addresses using the FQDN or IP address of the server.
5. (Requires Broker VM 8.0 and later) (Oponal) In the SSH Access secon, Enable or
Disable SSH connecons to the broker VM. SSH access is authencated using a public
key, provided by the user. Using a public key grants remote access to colleagues and
Cortex® XDR™ Pro Administrator’s Guide 508 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex XDR support who the private key. You must have Instance Administrator role
permissions to configure SSH access.
To enable connecon, generate an RSA Key Pair, enter the public key in the SSH Public
Key secon. Once one SSH public key is added, you can +Add Another. When you are
finished, Save your configuraon.
When using PuTTYgen to create your public and private key pairs, you need to copy
the public key generated in the Public key for pasng into OpenSSH authorized_keys
file box, and paste it in the broker VM SSH Public Key secon as explained above. This
public key is only available when the PuTTYgen console is open aer the public key is
generated. If you close the PuTTYgen console before pasng the public key, you will need
to generate a new public key.
6. (Requires Broker VM 10.1.9 and later) (Oponal) In the SSL Cerficates secon, upload
your signed server cerficate and key to establish a validated secure SSL connecon
Cortex® XDR™ Pro Administrator’s Guide 509 ©2021 Palo Alto Networks, Inc.
Broker VM
between your endpoints and the broker VM. Cortex XDR validates that the cerficate
and key match, but does not validate the Cerficate Authority (CA).
The Palo Alto Networks Broker supports only strong cipher SHA256-based
cerficates. MD5/SHA1-based cerficates are not supported.
7. In the Trusted CA Cerficate secon, upload your signed Cerficate Authority (CA)
cerficate or Cerficate Authority chain file in a PEM format. Configuring a trusted CA
cerficate is useful when the Broker VM communicaon with Cortex XDR is inspected
by an SSL decrypng device. For example, when configuring Palo Alto Networks NGFW
to decrypt SSL using a self-signed cerficate. To ensure the broker can validate a self-
signed CA, configure cert_ssl-decrypt.crt on the broker vm.
8. (Requires Broker VM 8.0 and later) (Oponal) Collect and Download Logs. Your XDR logs
will download automacally aer approximately 30 seconds.
Cortex® XDR™ Pro Administrator’s Guide 510 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 7 | Register and enter your unique Token, created in Cortex XDR console.
You are directed in Cortex XDR to Sengs ( ) > Configuraons > Broker VM. The Broker
VMs page displays your broker VM details and allows you to edit the defined configuraons.
curl "https://s3.amazonaws.com/aws-cli/awscli-bundle.zip" -o
"awscli-bundle.zip"unzip awscli-bundle.zipsudo /usr/local/bin/
python3.7 awscli-bundle/install -i /usr/local/aws -b /usr/local/
bin/aws
aws configure
STEP 2 | In the AWS Console, navigate to Services > Storage > S3 > Buckets.
STEP 3 | In the S3 buckets page, + Create bucket to upload your broker image to.
Cortex® XDR™ Pro Administrator’s Guide 511 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 4 | Upload the Broker VM VMDK you downloaded from Cortex XDR to the AWS S3 bucket.
Run
[ { "Description":"<Broker VM Version>",
"Format":"vmdk", "UserBucket":{
"S3Bucket":"<your_bucket>", "S3Key":"<broker-vm-
version.vmdk>" } }]
To track the progress, use the task id value from the output and run:
.
Completed status output example:
{ "ImportImageTasks":[ { "...",
"SnapshotDetails":[ {
"Description":"Broker VM version", "DeviceName":"/
dev/<name>", "DiskImageSize":2976817664.0,
"Format":"VMDK", "SnapshotId":"snap-1234567890",
"Status":"completed", "UserBucket":
{ "S3Bucket":"broker-vm",
"S3Key":"broker-vm-<version>.vmdk" } }
], "Status":"completed", "..." } ]}
STEP 7 | (Oponal) Aer the AMI image has been created, you can define a new name for the image.
Navigate to Services > EC2 > IMAGES > AMIs and locate your AMI image using the task ID.
Select the pencil icon to enter a new name.
Launch an Instance
STEP 1 | Navigate to Services > EC2 > Instances.
Cortex® XDR™ Pro Administrator’s Guide 512 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | Search for your AMI image and Launch the file.
STEP 3 | In the Launch Instance Wizard define the instance according to your company requirements
and Launch.
STEP 4 | (Oponal) In the Instances page, locate your instance and use the pencil icon to rename the
instance Name.
Cortex® XDR™ Pro Administrator’s Guide 513 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | Create a new storage blob on your Azure account by uploading the VHD file. You can use to
upload either from Microso Windows or Ubuntu.
Uploading from Microso Windows.
1. Verify you have:
• Windows PowerShell version 5.1 or later.
• .NET Framework 4.7.2 or later.
2. Open PowerShell and execute Set-ExecutionPolicy unrestricted.
• [Net.ServicePointManager]::SecurityProtocol =
[Net.SecurityProtocolType]::Tls12
• Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201-
Force
3. Install azure cmdlets.
Install-Module -Name Az -AllowClobber
4. Connect to your Azure account.
Connect-AzAccount
5. Start the upload.
az storage blob upload -f <vhd to upload> -n <vhd name> -c
<container name> --account-name <account name>.
STEP 3 | In the Azure home page, navigate to Azure services > Disks and +Add a new disk.
Cortex® XDR™ Pro Administrator’s Guide 514 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 4 | In the Create a managed disk > Basics page define the following informaon:
Project details
• Resource group—Select your resource group.
Disk details
• Disk name—Enter a name for the disk object.
• Region—Select your preferred region.
• Source type—Select Storage Blob. Addional field are displayed, define as follows:
• Source blob—Select Browse. You are directed to the Storage accounts page. From the
navigaon panel, select the bucket and then container to which you uploaded the Cortex
XDR VHD image.
In the Container page, Select your VHD image.
• OS type—Select Linux
• VM generaon—Select Gen 1
Review + create to check you sengs.
Creang the VM can take up to 15 minutes. The broker VM Web UI is not accessible
during this me.
Cortex® XDR™ Pro Administrator’s Guide 515 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | From G Cloud, create a Google Cloud Storage bucket to store the broker VM image.
1. Create a project in GCP and enable Google Cloud Storage, for example: brokers-project.
Make sure you have defined a Default Network.
2. Create a bucket to store the image, for example: broker-vms
Cortex® XDR™ Pro Administrator’s Guide 516 ©2021 Palo Alto Networks, Inc.
Broker VM
The import tool uses Cloud Build API, which must be enabled in your project. For
image import to work, Cloud Build service account must have compute.admin and
iam.serviceAccountUser roles. When using the Google Cloud console to import
the image, you will be prompted to add these permissions automacally.
• gcloud CLI
The following command uses the minimum required parameters. For more informaon on
permissions and available parameters, refer to the Google Cloud SDK.
Open a command prompt and run:
Cortex® XDR™ Pro Administrator’s Guide 517 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 6 | When the Google Compute completes the image creaon, create a new instance.
1. From the Google Cloud Plaorm, select Compute Engine > VM instances.
2. Create instance.
3. In Boot disk opon, choose Custom images and select the image you created.
4. In the Firewall secon, Allow HTTPS traffic.
5. Set up the instance according to your needs.
If you are using the broker VM to facilitate only Agent Proxy, use e2-startdard-2. If you
are using the broker VM for mulple applets, use e2-standard-4.
Cortex® XDR™ Pro Administrator’s Guide 518 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex® XDR™ Pro Administrator’s Guide 519 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | Upload the image file to Alibaba Cloud using the ulity file you downloaded.
The command is dependent on the operang system and architecture you are using. Below
are a few examples of the commands to use based on the different operang systems and
architectures, which you may need to modify based on your system requirements.
• Linux (using CLI)
• Format
• Example
• Example
D:\ossutil>ossutil64.exe cp Downloads\QCOW2_broker-
vm-14.0.1.qcow2 oss://kvm-images-qcow2/XDR-broker-
vm-14.0.1.qcow2
For Linux and Windows uploads, you can use Alibaba Cloud’s graphical management
tool called ossbrowser.
Cortex® XDR™ Pro Administrator’s Guide 520 ©2021 Palo Alto Networks, Inc.
Broker VM
example, in the step above the <directory name> used in the examples provided is kvm-
images-qcow2.
The Object Storage Service must be created in the same Region as the image of
the virtual machine.
3. From the list of images displayed, find the row for the Broker VM QCOW2 image that
you uploaded, and click View Details.
4. In the URL field of the View Details right-pane displayed, copy the internal link for
the image in Alibaba cloud. The URL that you copy ends with .com and you should not
include any of the text displayed aer this.
5. Select Hamburger menu > Elasc Compute Service > Instances & Images > Images.
6. In the Import Images area on the Images page, click Import Images.
7. In the Import Images window, set the following parameters.
• OSS Object Address—This field is a combinaon of the internal link that you copied
for the Broker VM image and the <file name for uploaded image> using this format
<internal link>/<file name for uploaded image>. Paste the internal link for the Broker
VM QCOW2 image in Alibaba Cloud that you copied, and add the following text aer
the .com: /<file name for uploaded image>.
• Image Name—Specify a name for the image.
• Operang System/Plaorm—Leave Linux configured and change CentOS to Ubuntu.
• System Architecture—Leave the default x86_64 selected.
• Leave the rest of the fields as defined by the default or change them according to your
system requirements.
8. Click OK.
A noficaon is displayed indicang that image was imported successfully. Once the
Status for the imported image in the Images page changes to Available, you will know
the process is complete. This can take a few minutes.
Cortex® XDR™ Pro Administrator’s Guide 521 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex® XDR™ Pro Administrator’s Guide 522 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 5 | Reboot the Broker VM before logging in for the first me.
Saving the image to Nutanix hypervisor can take me as it’s a large file.
Cortex® XDR™ Pro Administrator’s Guide 523 ©2021 Palo Alto Networks, Inc.
Broker VM
Creang the VM can take up to 15 minutes. The broker VM Web user interface is
not accessible during this me.
Cortex® XDR™ Pro Administrator’s Guide 524 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | Click the New VM icon ( ) to open the Create a new virtual machine wizard.
STEP 3 | In the Step 1 screen of the wizard, select Import exisng disk image, and click Forward.
STEP 8 | In the Step 4 screen of the wizard, set a Name for your new VM.
Cortex® XDR™ Pro Administrator’s Guide 525 ©2021 Palo Alto Networks, Inc.
Broker VM
download the files directly from the Cortex XDR server. If asked by an agent, the Broker VM
can also cache a specific installer that is not on the list of latest installers.
The following are prerequisites and limitaons for the Local Agent Sengs applet:
Requirement Descripon
Agent Proxy • Supported with Traps agent version 5.0.9 and Traps
agent version 6.1.2 and later releases.
Agent Installer and Content Caching • Supported with Cortex XDR agent version 7.4 and
later releases and Broker VM 12.0 and later.
• Requires a Broker VM with an 8-core processor to
support caching for 10K endpoints.
• Requires the Broker to have an FQDN record in
your local DNS server.
• Requires you upload a strong cipher SHA256-based
SSL cerficates when you setup the Broker VM.
• Requires adding the Broker as a download source in
your Agent Sengs Profile.
Aer you configured and registered your Palo Alto Networks Broker VM, proceed to setup you
Local Agent Sengs applet.
STEP 1 | In Cortex XDR, sengs Cortex XDR > Sengs ( ) > Configuraons > Broker VM and
locate your broker VM.
When you install your Cortex XDR agents, you must configure the IP address of
the broker VM and a port number during the installaon. You can use the default
8888 port or set a custom port. You are not permied to configure port numbers
between 0-1024 and 63000-65000, or port numbers 4369, 5671, 5672, 5986,
6379, 8000, 9100, 15672, 25672. Addionally, you are not permied to reuse
port numbers you already assigned to the Syslog Collector applet.
Cortex® XDR™ Pro Administrator’s Guide 526 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 4 | Aer a successful acvaon, the Apps field displays Local Agent Sengs - Acve. Hover
over it to view the applet status and resource usage.
STEP 5 | Manage the local agent sengs. Aer the local agent sengs have been acvated, right-click
you broker VM:
• To change your sengs, click Local Agent Sengs > Configure.
• To disable the local agent sengs altogether, click Local Agent Sengs > Deacvate.
To receive Syslog data from an external source, you must first set up the Syslog Collector applet
on a Broker VM within your network. The Syslog Collector supports a log ingeson rate of 90,000
logs per second (lps) with the recommended Broker VM setup.
To increase the log ingeson rate, you can add addional CPUs to the broker VM. The Syslog
Collector listens for logs on specific ports and from any or specific IP addresses.
STEP 1 | If you haven’t already done so, Configure the Broker VM.
STEP 2 | In Cortex XDR, navigate to Sengs ( ) > Configuraons > Broker VM and locate your
broker VM.
STEP 3 | Right-click the broker VM and select Syslog Collector > Acvate.
Cortex® XDR™ Pro Administrator’s Guide 527 ©2021 Palo Alto Networks, Inc.
Broker VM
Once configured, you cannot change the Port/PROTOCOL. If you don’t want to use
a data source, ensure to remove the data source from the list as explained in Step 7.
• Add a new Syslog Collector data source. See Step 6.
Cortex® XDR™ Pro Administrator’s Guide 528 ©2021 Palo Alto Networks, Inc.
Broker VM
• The Vendor and Product defaults to Auto-Detect when the Log Format is
set to CEF or LEEF.
• For a Log Format set to CEF, LEEF, Cisco, or Corelight, Cortex XDR reads
events row by row to look for the Vendor and Product configured in the
logs. When the values are populated in the event log row, Cortex XDR uses
these values even if you specified a value in the Vendor and Product fields
in the Syslog Collector sengs. Yet, when the values are blank in the event
log row, Cortex XDR uses the Vendor and Product that you specified in
the Vendor and Product fields in the Syslog Collector sengs. If you did
not specify a Vendor or Product in the Syslog Collector sengs, and the
values are blank in the event log row, the values for both fields are set to
unknown.
• Vendor—Specify a parcular vendor for the Syslog format defined or leave the default
Auto-Detect seng.
• Product—Specify a parcular product for the Syslog format defined or leave the
default Auto-Detect seng.
• Source Network—Specify the IP address or Classless Inter-Domain Roung (CIDR). If
you leave this blank, Cortex XDR will allow receipt of logs from any source IP address
or CIDR that transmits over the specified protocol and port. When you specify
overlapping addresses in the Source Network field in mulple rows, such as 10.0.0.10
in the first row and 10.0.0.0/24 in the second row, the order of the addresses maer.
In this example, the IP address 10.0.0.10 is only captured from the first row definion.
For more informaon on priorizing the order of the syslog formats, see Step #7.
Aer each configuraon, select to save the changes and then Done to update the
Syslog Collector with your sengs.
Cortex® XDR™ Pro Administrator’s Guide 529 ©2021 Palo Alto Networks, Inc.
Broker VM
Because some port numbers are reserved by Cortex XDR, you must choose a
port number that is not:
-In the range of 0-1024 (except for 514)
-In the range of 63000-65000
-Values of 4369, 5671, 5672, 5986, 6379, 8000, 8888, 9100, 15672, or
28672
• When configuring the Protocol as Secure TCP, these addional General Sengs are
available:
Cortex® XDR™ Pro Administrator’s Guide 530 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex XDR will nofy you when your cerficates are about to expire.
STEP 7 | Make addional changes to the Syslog Collector data sources configured:
• To remove a Syslog Collector data source, right-click the row aer the Port/Protocol entry,
and select Remove.
• To priorize the order of the Syslog formats listed for the protocols and ports configured,
drag and drop the rows to the order you require.
Cortex® XDR™ Pro Administrator’s Guide 531 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 9 | (Oponal) To view metrics about the Syslog Collector, hover over the Syslog Collector link in
the Apps field:
Cortex XDR displays the following informaon:
• Connecvity Status—Whether the applet is connected to Cortex XDR.
• Logs Received and Logs Sent—Number of logs received and sent by the applet per second
over the last 24 hours. If the number of incoming logs received is larger than the number of
logs sent, it could indicate a connecvity issue.
• Resources—Displays the amount of CPU, Memory, and Disk space the applet is using.
The broker VM provides a CSV Collector applet that enables you to monitor and collect CSV
(comma-separated values) log files from a shared Windows directory directly to your log
repository for query and visualizaon purposes. Aer you acvate the CSV Collector applet on
a broker VM in your network, you can ingest CSV files as datasets by defining the list of folders
mounted to the broker VM and seng the list of CSV files to monitor and upload to Cortex XDR
using a username and password.
Be sure you do the following tasks before you begin seng up the CSV Collector applet.
• Configure the Broker VM.
• Ensure that you share the applicable CSV files.
• Know the complete file path for the Windows directory.
Acvate the CSV Collector.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM and locate your broker
VM.
STEP 2 | Right-click the broker VM and select CSV Collector > Acvate.
Cortex® XDR™ Pro Administrator’s Guide 532 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 3 | Configure your CSV Collector by defining the list of folders mounted to the broker VM and
specifying the list of CSV files to monitor and upload to Cortex XDR. You must also specify a
username and password.
1. Mounted Folders
• FOLDER PATH—Specify the complete file path to the Windows directory containing
the shared CSV files using the format: //host/<folder_path>. For example, //
testenv1pc10/CSVFiles.
• USERNAME—Specify the username for accessing the Windows directory.
• PASSWORD—Specify the password for accessing the Windows directory.
Aer you configure the mounted folder details, Add ( ) details to the applet.
2. Monitored CSV Files
• FOLDER PATH+NAME—Select the monitored Windows directory and specify the name
of the CSV file. Use a wildcard file search using these characters in the name of the
directory, CSV file name, and Path Exclusion.
- ?—Matches a single char, such as 202?-report.csv.
- *—Matches either mulple characters, such as 2021-report*.csv, or all CSV files
with *.csv.
-**—Searches all directories and subdirectories
For example, if you want to include all the CSV files in the directory and any
subdirectories, use the syntax //host/<folder_path>/**/*.csv.
When you implement a wildcard file search, ensure that the CSV files share the
same columns and header rows as all other logs that are collected from the CSV
files to create a single dataset.
• PATH EXCLUSION—(Oponal) Specify the complete file path for any files from the
Windows directory that you do not want included. The same wildcard file search
characters are allowed in this field as explained above for the FOLDER PATH+NAME
field. For example, if you want to exclude any CSV file prefixed with 'exclude_' in
Cortex® XDR™ Pro Administrator’s Guide 533 ©2021 Palo Alto Networks, Inc.
Broker VM
The CSV Collector checks for new CSV files every 10 minutes.
STEP 5 | (Oponal) To view metrics about the CSV Collector, hover over the CSV Collector link in the
Apps field.
Cortex XDR displays Resources, including the amount of CPU, Memory, and Disk space the
applet is using.
The broker VM provides a Database Collector applet that enables you to collect data from a client
relaonal database directly to your log repository for query and visualizaon purposes. Aer you
acvate the Database Collector applet on a broker VM in your network, you can collect records as
datasets (<Vendor>_<Product>_raw) by defining the following.
• Database connecon details, where the connecon type can be MySQL, PostgreSQL, MSSQL,
and Oracle. Cortex XDR uses Open Database Connecvity (ODBC) to access the databases.
• Sengs related to the query details for collecng the data from the database to monitor and
upload to Cortex XDR.
Complete the following task before you begin seng up the FTP Collector applet.
• Configure the Broker VM
Acvate the Database Collector.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM and locate your broker
VM.
Cortex® XDR™ Pro Administrator’s Guide 534 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | Right-click the broker VM and select Database Collector > Acvate.
Cortex® XDR™ Pro Administrator’s Guide 535 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex® XDR™ Pro Administrator’s Guide 536 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 4 | (oponal) Add Connecon to define another database connecon to collect data from
another client relaonal database.
Cortex® XDR™ Pro Administrator’s Guide 537 ©2021 Palo Alto Networks, Inc.
Broker VM
connecon when you have more than one connecon configured. Otherwise, this icon is
not displayed.
• Delete a query by hovering over the top area of the query secon, on the opposite side of
the query name, and selecng the delete icon. You can only delete a query when you have
more than one query configured. Otherwise, this icon is not displayed.
STEP 7 | (Oponal) To view metrics about the Database Collector, hover over the Database Collector
link in the Apps field.
Cortex XDR displays Resources, including the amount of CPU, Memory, and Disk space the
applet is using.
The broker VM provides a Files and Folders Collector applet that enables you to monitor and
collect logs from files and folders in a network share for a Windows or Linux directory, directly
to your log repository for query and visualizaon purposes. A maximum file size of 500 MB
is supported. Aer you acvate the Files and Folders Collector applet, you can collect files as
datasets (<Vendor>_<Product>_raw) by defining the following.
• Details of the folder path on the network share containing the files that you want to monitor
and upload to Cortex XDR.
• Sengs related to the list of files to monitor and upload to Cortex XDR, where the log format is
either JSON, CSV, or Raw (default).
Complete the following task before you begin seng up the Files and Folders Collector applet.
• Configure the Broker VM
• Know the complete path to the files and folders that you want Cortex XDR to monitor.
• Ensure that the user permissions for the network share include the ability to rename and delete
files in the folder that you want to configure collecon.
Acvate the Files and Folders Collector.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM and locate your broker
VM.
Cortex® XDR™ Pro Administrator’s Guide 538 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | Right-click the broker VM and select Files and Folder Collector > Acvate.
Cortex® XDR™ Pro Administrator’s Guide 539 ©2021 Palo Alto Networks, Inc.
Broker VM
When using the Linux share with nfs, a Username and Password is not
required, so these fields will be grayed out in the screen.
• Recursive—Select this checkbox to configure the Files and Folders Collector applet to
recursively examine any subfolders for new files as long as the folders are readable.
This is not configured by default.
• Username—Specify the username to access the shared resource using a User Principal
Name (UPN) format.
• Password—Specify the password to access the shared resource.
• Test Connecon—Select to validate the connecon and permissions.
2. Configure the File and Folder Sengs.
• Collect Every—Specify the execuon frequency of collecon by designang a number
and then selecng the unit as either Minutes, Hours, or Days.
Cortex® XDR™ Pro Administrator’s Guide 540 ©2021 Palo Alto Networks, Inc.
Broker VM
• Aer Files Uploaded—Select what to do with the files aer they are uploaded to the
Cortex XDR server. You can either select Rename files with a suffix (default) and then
you must specify the Suffix or Delete files. When adding a suffix, the suffix is added at
the end of the original file name using the format <file name>.<suffix>, which
becomes the new name of the file.
• Include—Specify the files and folders that must match to be monitored by Cortex
XDR. Mulple values are allowed with commas separang the values.
Allowed wildcard:
• '?' matches a single alphabet character in a specific posion.
• '*' matches any character or set of characters, including no character.
Example: log*.json includes any JSON file starng with 'log'.
• Exclude—(oponal) Specify the files and folders that must match to not be monitored
by Cortex XDR. Mulple values are allowed with commas separang the values.
Allowed wildcard:
• '?' matches a single alphabet character in a specific posion.
• '*' matches any character or set of characters, including no character.
Example: *.backup excludes any file ending with '.backup'.
• Log Format—Select the Log Format from the list as either Raw (default), JSON, or
CSV. This seng defines the parser used to pars all the processed files as defined
in the Include and Exclude fields, regardless of the file names and extension. For
example, if the Include field is set * and the Log Format is JSON, all files (even those
named file.log) in the specified folder are processed by the Files and Folders
Collector as JSON, and any entry that does not comply with the JSON format are
dropped.
When uploading JSON files, Cortex XDR only parses the first level of nesng
and only supports single line JSON format, such that every new line means a
separate entry.
• # of Lines to Skip—(oponal) Specify the number of lines to skip at the beginning of
the file. This is set to 0 by default.
3. Configure Data Source Mapping sengs.
Vendor and Product—Specify the Vendor and Product for the type of data being
collected. The vendor and product are used to define the name of your XQL dataset
(<Vendor>_<Product>_raw).
4. Generate Preview.
Select Generate Preview to display up to 10 rows from the first file and Preview the
results. The Preview works based on the Files and Folders Collector sengs, which
means that if all the files that were configured to be monitored were already processed,
then the Preview returns no records.
STEP 4 | (oponal) Add Connecon to define another Files and Folders connecon for collecng logs
from files and folders in a shared resource.
Cortex® XDR™ Pro Administrator’s Guide 541 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 7 | (Oponal) To view metrics about the Files and Folders, hover over the Files and Folders
Collector link in the Apps field.
Cortex XDR displays Resources, including the amount of CPU, Memory, and Disk space the
applet is using.
The broker VM provides a FTP Collector applet that enables you to monitor and collect
logs from files and folders via FTP, FTPS, and SFTP directly to your log repository for query
and visualizaon purposes. A maximum file size of 500 MB is supported. Aer you acvate
the FTP Collector applet on a broker VM in your network, you can collect files as datasets
(<Vendor>_<Product>_raw) by defining the following.
• FTP, FTPS, or SFTP (default) connecon details with the path to the folder containing the files
that you want to monitor and upload to Cortex XDR.
• Sengs related to the list of files to monitor and upload to Cortex XDR, where the log format is
either JSON, CSV, or Raw. Once the files are uploaded to Cortex XDR, you can define whether
in the source directory the files are renamed or deleted.
Cortex® XDR™ Pro Administrator’s Guide 542 ©2021 Palo Alto Networks, Inc.
Broker VM
Complete the following tasks before you begin seng up the FTP Collector applet.
• Configure the Broker VM
• Ensure that the user permissions for the FTP, SFTP, or FTPS include the ability to rename and
delete files in the folder that you want to configure collecon.
• When seng up an FTPS Collector with a server using a Self-signed cerficate, you must
upload the cerficate first to the broker VM as a Trusted CA cerficate.
Acvate the FTP Collector.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM and locate your broker
VM.
STEP 2 | Right-click the broker VM and select FTP Collector > Acvate.
Cortex® XDR™ Pro Administrator’s Guide 543 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex® XDR™ Pro Administrator’s Guide 544 ©2021 Palo Alto Networks, Inc.
Broker VM
to a Private Key. When this connecon is established with a server using a Self-signed
cerficate, you must upload it first to the broker VM as a Trusted CA Cerficate.
When configuring an SFTP connecon, Cortex XDR expects the private key to
be in the RSA format that is included in the -----BEGIN RSA PRIVATE
KEY----- tag. Cortex XDR does not support providing the private key
in the OpenSSH format from the -----BEGIN OPENSSH PRIVATE
KEY----- tag.
When using ssh-keygen using a Mac, you get the OpenSSH format by
default. The command for geng the RSA format is:
• Folder Path—Specify the path to the folder on the FTP site where the files are located
that you want to collect.
• Recursive—Select this checkbox to configure the FTP Collector applet to recursively
examine any subfolders for new files as long as the folders are readable. This is not
configured by default.
• Test Connecon—Select to validate the FTP connecon.
2. Configure the FTP Sengs.
• Collect Every—Specify the execuon frequency of collecon by designang a number
and then selecng the unit as either Minutes, Hours, or Days.
• Aer Files Uploaded—Select what to do with the files aer they are uploaded to the
Cortex XDR server. You can either select Rename files with a suffix (default) and then
you must specify the Suffix or Delete files. When adding a suffix, the suffix is added at
the end of the original file name using the format <file name>.<suffix>, which
becomes the new name of the file.
• Include—Specify the files and folders that must match to be monitored by Cortex
XDR. Mulple values are allowed with commas separang the values.
Allowed wildcard:
• '?' matches a single alphabet character in a specific posion.
• '*' matches any character or set of characters, including no character.
Example: log*.json includes any JSON file starng with 'log'.
• Exclude—(Oponal) Specify the files and folders that must match to not be monitored
by Cortex XDR. Mulple values are allowed with commas separang the values.
Allowed wildcard:
• '?' matches a single alphabet character in a specific posion.
• '*' matches any character or set of characters, including no character.
Example: *.backup excludes any file ending with '.backup'.
• Log Format—Select the Log Format from the list as either Raw (default), JSON,
CSV, TSV, or PSV, which indicates to Cortex XDR how to parse the data in the file.
This seng defines the parser used to pars all the processed files as defined in the
Include and Exclude fields, regardless of the file names and extension. For example,
Cortex® XDR™ Pro Administrator’s Guide 545 ©2021 Palo Alto Networks, Inc.
Broker VM
if the Include field is set * and the Log Format is JSON, all files (even those named
file.log) in the specified folder are processed by the FTP Collector as JSON, and
any entry that does not comply with the JSON format are dropped.
When uploading JSON files, Cortex XDR only parses the first level of nesng
and only supports single line JSON format, such that every new line means a
separate entry.
• # of Lines to Skip—(Oponal) Specify the number of lines to skip at the beginning of
the file. This is set to 0 by default.
3. Configure the Data Source Mapping.
Vendor and Product—Specify the Vendor and Product for the type of data being
collected. The vendor and product are used to define the name of your XQL dataset
(<Vendor>_<Product>_raw).
4. Generate Preview.
Select Generate Preview to display up to 10 rows from the first file and Preview the
results. The Preview works based on the FTP Collector sengs, which means that if all
the files that were configured to be monitored were already processed, then the Preview
returns no records.
STEP 4 | (Oponal) Add Connecon to define another FTP connecon for collecng logs from files
and folders via FTP, FTPS, or SFTP.
STEP 7 | (Oponal) To view metrics about the FTP Collector, hover over the FTP Collector link in the
Apps field.
Cortex XDR displays Resources, including the amount of CPU, Memory, and Disk space the
applet is using.
Cortex® XDR™ Pro Administrator’s Guide 546 ©2021 Palo Alto Networks, Inc.
Broker VM
To receive NetFlow flow records from an external source, you must first set up the NetFlow
Collector applet on a broker VM within your network. NetFlow versions 5, 9, and IPFIX are
supported.
To increase the log ingeson rate, you can add addional CPUs to the broker VM. The NetFlow
Collector listens for flow records on specific ports either from any, or from specific, IP addresses.
Aer the NetFlow Collector is acvated, the NetFlow Exporter sends flow records to the NetFlow
Collector, which receives, stores, and pre-processes that data for later analysis.
The following setups are required to meet your performance needs.
• 4 CPUs for up to 50K flows per second (FPS).
• 8 CPUs for up to 100K FPS.
Since mulple network devices can send data to a single NetFlow Collector, we
recommend that you configure a maximum of 50 NetFlow Collectors per broker VM
applet, with a maximum aggregated rate of approximately 50K flows per second (FPS) to
maintain system performance.
Complete the following task before seng up the NetFlow Collector applet.
• Configure the Broker VM.
Acvate the NetFlow Collector.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM and locate your broker
VM.
Cortex® XDR™ Pro Administrator’s Guide 547 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | Right-click the broker VM and select NetFlow Collector > Acvate.
Cortex® XDR™ Pro Administrator’s Guide 548 ©2021 Palo Alto Networks, Inc.
Broker VM
Since Cortex XDR reserves some port numbers, it is best to select a port
number that is not in the range of 0-1024 (except for 514), in the range of
63000-65000 or has one of the following values: 4369, 5671, 5672, 5986,
6379, 8000, 8888, 9100, 15672, or 28672.
2. Define Custom Sengs.
• Source Network—Specify the IP address or a Classless Inter-Domain Roung (CIDR)
of the source network device that sends the flow records to Cortex XDR. Leave the
field empty to receive data from any device on the specified port (default). If you do
not specify an IP address or a CIDR, Cortex XDR can receive data from any source
IP address or CIDR that transmits via the specified port. If IP addresses overlap in
mulple rows in the Source Network field, such as 10.0.0.10 in the first row and
10.0.0.0/24 in the second row, the NetFlow Collector captures the IP address in the
first row.
• Vendor and Product—Specify a parcular vendor and product to be associated with
each dataset entry or leave the default IP Flow seng.
The Vendor and Product values are used to define the name of your XQL
dataset <Vendor>_<Product>_raw. If you do not define a vendor or product,
Cortex XDR uses the default values, with the resulng dataset name being
ip_flow_ip_flow_raw. Consider changing the default values in order to uniquely
idenfy the source network device.
Aer each configuraon, select to save your changes and then select Done to
update the NetFlow Collector with your sengs.
Cortex® XDR™ Pro Administrator’s Guide 549 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 5 | (Oponal) Make addional changes to the NetFlow Collector data sources.
• You can make addional changes to the Port by right-clicking the applicable UDP port and
selecng the following.
• Edit—To change the UDP Port, Source Network, Vendor, or Product defined.
• Remove—To delete a Port.
• You can make addional changes to the Source Network by right-clicking on the Source
Network value.
The opons available change, according to the set Source Network value.
• Edit—To change the UDP Port, Source Network, Vendor, or Product defined.
• Remove—To delete a Port.
• Copy enre row—To copy the Source Network, Product, and Vendor informaon.
• Open IP View—To view network operaons and to view any open incidents on this IP
within a defined period. This opon is only available when the Source Network value is a
specific IP address or CIDR.
• Open in Quick Launcher—To search for informaon using the Quick Launcher shortcut.
This opon is only available when the Source Network value is a specific IP address or
CIDR.
• To priorize the order of the NetFlow formats listed for the configured data source, drag
and drop the rows to change their order.
Cortex® XDR™ Pro Administrator’s Guide 550 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 7 | (Oponal) To view NetFlow Collector metrics, hover over the NetFlow Collector link in the
Apps field.
Cortex XDR displays the following informaon:
Cortex® XDR™ Pro Administrator’s Guide 551 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 3 | In the Acvate Network Mapper window, define the following parameters:
• Scan Method—Select the either ICMP echo or TCP SYN scan method to idenfy your
network hosts. When selecng TCP SYN you can enter single ports and ranges together, for
example 80-83, 443.
• Scan Requests per Second—Define the maximum number of scan requests you want to
send on your network per second. By default, the number of scan requests are defined as
1000.
Each IP address range can receive mulple scan requests based on it's availability.
• Scanning Scheduler—Define when you want to run the network mapper scan. You can
select either daily, weekly, or monthly at a specific me.
• Scanned Ranges—Select from the list of exing IP address ranges to scan. Make sure to
aer each selecon.
IP address ranges are displayed according to what you defined as your Network
Paramaters.
Cortex® XDR™ Pro Administrator’s Guide 552 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 5 | In the Apps field, select Network Mapper to view the following scan and applet metrics:
• Scan Details
• Connecvity Status—Whether the applet is connected to Cortex XDR.
• Scan Status—State of the scan.
• Scan Start Time—Timestamp of when the scan started.
• Scan Duraon—Period of me in minutes and seconds the scan is running.
• Scan Progress—How much of the scan has been completed in percentage and IP address
rao.
• Detected Hosts—Number of hosts idenfied from within the IP address ranges.
• Scan Rate—Number of IP addresses scanned per second.
• Applet Metrics
• Resources—Displays the amount of CPU, Memory, and Disk space the applet is using.
Acvate Pathfinder™
Aer you have configured and registered your broker VM, acvate the Pathfinder applicaon.
To acvate Pathfinder, you must have a Cortex XDR Pro per Endpoint or Cortex XDR Pro per TB
license.
Pathfinder™ is a highly recommended, but oponal, component integrated with the Broker VM
that deploys a non-persistent data collector on network hosts, servers, and workstaons that
are not managed by a Cortex XDR agent. The collector is automacally triggered by Analycs
type alerts with a severity of High and Medium as described in the Cortex XDR Analycs Alert
Reference, providing insights into assets that you would previously be unable to scan.
When an alert is triggered, the data collector is able to run for up to 2 weeks gathering EDR data
from unmanaged hosts. You can track and manage the collector directly from the Cortex XDR
console, and invesgate the EDR data by running a query from the Query Center.
Cortex XDR supports acvang Pathfinder on Windows operang systems with PowerShell
version 3 and above, excluding Vanilla Windows 7.
Cortex® XDR™ Pro Administrator’s Guide 553 ©2021 Palo Alto Networks, Inc.
Broker VM
Acvate the Pathfinder app to deploy and query the data collector.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM and locate your broker
VM.
Cortex® XDR™ Pro Administrator’s Guide 554 ©2021 Palo Alto Networks, Inc.
Broker VM
as of broker VM version 9.0 and later, you can define Pathfinder to access target hosts
using credenals stored in your CyberArk vault.
When selecng Kerberos, the Broker has access to domain controllers over
port 88 and is able to acquire the authencaon cket. It is recommended to
use Kerberos for beer security.
• Define the access credenals using either Domain Credenals or your CyberArk AAM
parameters.
To define the access credenals, enter:
• User Name—User name used by Pathfinder to access your target host.
• Password—Password used by Pathfinder to access your target host.
Cortex® XDR™ Pro Administrator’s Guide 555 ©2021 Palo Alto Networks, Inc.
Broker VM
To allow Pathfinder to use credenals stored in your CyberArk vault, enter the
following parameters. Make sure you are following the CyberArk guidelines.
• URL—Your CyberArk AAM URL address.
• Port—Your CyberArk AAM port number.
• App ID—The applicaon ID configured in your CyberArk AAM. The ID allows you
to access the path to where credenals are stored in the CyberArk vault.
• Query—Define the CyberArk AAM path to the credenals required by Pathfinder
to access the host. Make sure you are following the CyberArk formang
guidelines.
• Browse for your Client Cerficate, Client Key, and CA Cerficate you use to
idenfy. Cortex XDR will nofy you when your cerficates are about to expire.
Credenals are not stored on the broker VM, Pathfinder queries CyberArk
each me according to the defined parameters.
• Test the credenals and pathfinder permissions to ensure the broker VM can
successfully collect data from your defined hosts.
Tesng may take a few minutes to complete but ensures that pathfinder can
indeed deploy a data collector.
Select Next.
2. Define the data collector sengs.
• Select on which Targets to deploy the data collector. Target types are detected
according to your operang system.
• All—Deploy on all assets within your network.
• Servers—Deploy only on servers.
Cortex® XDR™ Pro Administrator’s Guide 556 ©2021 Palo Alto Networks, Inc.
Broker VM
The Pathfinder configuraon must contain at least one IP address range to run.
To avoid collision, IP address ranges can only be associated with one pathfinder
applet.
Cortex® XDR™ Pro Administrator’s Guide 557 ©2021 Palo Alto Networks, Inc.
Broker VM
Aer a successful acvaon, the Apps field displays the Pathfinder - Active,
Connected.
STEP 4 | In the Apps filed, select Pathfinder to view the following applet metrics:
• Connecvity Status—Whether the applet is connected to Cortex XDR.
• Handled Tasks—How many collectors are in progress, pending, or successfully running out
of the number of collectors that need to be setup.
• Failed Tasks—How many collectors have failed
• Resources—Displays the amount of CPU, Memory, and Disk space the applet is using.
Cortex® XDR™ Pro Administrator’s Guide 558 ©2021 Palo Alto Networks, Inc.
Broker VM
The data collector is only deployed on unmanaged hosts, if you want to install the
Cortex XDR agent on an unmanaged host you must first remove the collector.
The Pathfinder Collecon Center table displays the following fields about each of the
deployed collectors:
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 559 ©2021 Palo Alto Networks, Inc.
Broker VM
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 560 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex® XDR™ Pro Administrator’s Guide 561 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 3 | In the Windows Event Collecon Configuraon window, define the following:
Define the events collected by the applet. This lists event sources from which you want to
collect events:
• Source—Select from the pre-populated list with the most common event sources on
Windows Servers. The event source is the name of the soware that logs the events.
A source provider can only appear once in your list. When selecng event sources,
depending on the type event you want to forward, ensure the event source is enabled, for
example auding security events. If the source is not enabled, the source configuraon in
the given row will fail.
• Min. Event Level—Minimum severity level of events that are collected.
• Event IDs Group—Whether to Include, Exclude, or collect All event ID groups.
• Event IDs—(Oponal) Define specific event IDs or event ID ranges you want to collect.
Make sure to select aer each entry.
• Minimal TLS Version—Select either 1.0 or 1.2 (default) as the minimum TLS version allowed.
Ensure that you verify that all Windows event forwarders are supporng the minimal
defined TLS version.
For example, to forward all the Windows Event Collector events to the broker VM, define as
follows:
• Source—ForwardedEvents
• Min. Event Level—Verbose
• Event IDs Group—All
By default, Cortex XDR collects Palo Alto Networks predefined Security events that are
used by the Cortex XDR detectors. Removing the Security collector interferes with the
Cortex XDR detecon funconality. Restore to Default to reinstate the Security event
collecon.
Cortex® XDR™ Pro Administrator’s Guide 562 ©2021 Palo Alto Networks, Inc.
Broker VM
1. (copy) the Subscripon Manage URL. This will be used when you configure the
subscripon manager in the GPO (Global Policy Object) on your domain controller.
2. Define Client Cerficate Export Password used to secure the downloaded WEF
cerficate used to establish the connecon between your DC/WEF and the WEC. You
will need this password when the cerficate is imported to the events forwarder.
3. Download the WEF cerficate in a PFX format to your local machine.
To view your Windows Event Forwarding configuraon details at any me, select your
Broker VM, right-click and navigate to Windows Event Collector > Configure Forwarder.
Cortex XDR monitors the cerficate and triggers an Cerficate Expiraon noficaon 30 days
prior to the expiraon date. The noficaon is sent daily specifying the number of days le on
the cerficate, or if the cerficate has already expired.
Cortex® XDR™ Pro Administrator’s Guide 563 ©2021 Palo Alto Networks, Inc.
Broker VM
You must install the WEF cerficate on every Windows Server, whether DC or not, for
the WEFs that are supposed to forward logs to the Windows Event Collector applet on
the broker VM.
1. Locate the PFX file you downloaded from the Cortex XDR console and double-click to
open the Cerficate Import Wizard.
2. In the Cerficate Import Wizard:
1. Select Local Machine followed by Next.
2. Verify the File name field displays the PFX cerficate file you downloaded and select
Next.
3. In the Passwords field, enter the Client Cerficate Export Password you defined in the
Cortex XDR console followed by Next.
4. Select Automacally select the cerficate store based on the type of cerficate
followed by Next and Finish.
3. From a command prompt, run certlm.msc.
4. In the file explorer, navigate to Cerficates and verify the following for each of the
folders:
• In the Personal > Cerficates folder, ensure the cerficate
forwarder.wec.paloaltonetworks.com appears.
• In the Trusted Root Cerficaon Authories > Cerficates folder, ensure the CA
ca.wec.paloaltonetworks.com appears.
5. Navigate to Cerficates > Personal > Cerficates.
6. Right-click the cerficate and navigate to All tasks > Manage Private Keys.
7. In the Permissions window, select Add and in the Enter the object name secon, enter
NETWORK SERVICE followed by Check Names to verify the object name. The object
name is displayed with an underline when valid. and then OK.
Cortex® XDR™ Pro Administrator’s Guide 564 ©2021 Palo Alto Networks, Inc.
Broker VM
8. Select OK, verify the Group or user names appear, and then Apply Permissions for privet
keys.
STEP 7 | Add the Network Service account to the domain controller Event Log Readers group.
You must install the WEF cerficate on every Windows Server, whether DC or not, for
the WEFs that are supposed to forward logs to the Windows Event Collector applet on
the broker VM.
1. To enable events forwarders to forward events, the Network Service account must be
a member of the Acve Directory Event Log Readers group. In PowerShell, execute the
following command on the domain controller that is acng as the event forwarder:
Cortex® XDR™ Pro Administrator’s Guide 565 ©2021 Palo Alto Networks, Inc.
Broker VM
fileMax: 1
Make sure you grant access on each of your domain controller hosts.
STEP 8 | Create a WEF Group Policy that applies to every Windows server you want to configure as a
WEF.
1. In a command prompt, open gpmc.msc.
2. In the Group Policy Management window, navigate to Domains > your domain name >
Group Policy Object, right-click and select New.
3. In the New GPO window, enter your group policy Name: Windows Event
Forwarding followed by OK.
4. Navigate to Domains > your domain name > Group Policy Objects > Windows Event
Forwarding, right-click and select Edit.
Cortex® XDR™ Pro Administrator’s Guide 566 ©2021 Palo Alto Networks, Inc.
Broker VM
configured on your domain controller. In addion, you should ensure that all relevant
audit events that you want collected, such as the success and failure of account logins
for Windows Event ID 4625, are properly configured, parcularly for those that you
want Cortex XDR to apply grouping and analycs inspecon.
Cortex® XDR™ Pro Administrator’s Guide 567 ©2021 Palo Alto Networks, Inc.
Broker VM
the following audit events:, select to Success and Failure followed by Apply and
OK.
Repeat for Audit Kerberos Service Ticket Operaons.
6. Configure the subscripon manager.
Navigate to Computer Configuraon > Policies > Administrave Templates: Policy
definions > Windows Components > Event Forwarding, right-click Configure target
Subscripon Manager and select Edit.
Cortex® XDR™ Pro Administrator’s Guide 568 ©2021 Palo Alto Networks, Inc.
Broker VM
You must type out the name, do not select the name from the browse buon.
• Select Apply and OK to save your changes, and close the Group Policy Management
Editor window.
8. Configure the Windows Firewall.
If Windows Firewall is enabled on your event forwarders, you will have to define
an outbound rule to enable the WEF to reach port 5986 on the WEC.
Cortex® XDR™ Pro Administrator’s Guide 569 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 12 | (Oponal) In the Apps field, select Windows Event Collector to view the following applet
metrics:
• Connecvity Status—Whether the applet is connected to Cortex XDR.
• Logs Received and Logs Sent—Number of logs received and sent by the applet per second
over the last 24 hours. If the number of incoming logs received is larger than the number of
logs sent, it could indicate a connecvity issue.
• Resources—Displays the amount of CPU, Memory, and Disk space the applet is using.
Cortex® XDR™ Pro Administrator’s Guide 570 ©2021 Palo Alto Networks, Inc.
Broker VM
Aer you receive a noficaon for renewing your WEC CA cerficate, we recommend
that you do not add any new WEF clients unl the WEC cerficaon renewal process is
complete. Events from these WEF clients that are added aerwards will not be collected
by the server unl the WEC cerficates are renewed.
• In the Broker VMs page, the health status of the Windows Event Collector applet is yellow.
When your mouse hovers over the health status, a warning message is displayed indicang that
Your Windows Event Collector server cerficate expires in X days.
• Unl you renew your broker VM WEC server cerficate, a warning message is displayed in the
Windows Event Forwarder Configuraons window.
• A new noficaon entled WEC Cerficate Authority Expiraon is displayed in the
noficaon area unl the cerficates are renewed.
In addion, Cortex XDR manages the renewal of your WEC cerficates by implemenng the
following me limits.
• The WEC CA cerficate is increased for an extended period of me for a maximum of 20 years.
• The broker VM applet includes an automac renewal mechanism for a WEC server cerficate,
which has a lifespan of 12 months.
• The WEC client cerficate aer the renewal is issued with a lifespan of 5 years.
To renew your WEC cerficates.
Cortex® XDR™ Pro Administrator’s Guide 571 ©2021 Palo Alto Networks, Inc.
Broker VM
You must install the WEF cerficate on every Windows Server, whether DC
or not, for the WEFs that are supposed to forward logs to the Windows Event
Collector applet on the broker VM.
1. Locate the PFX file you downloaded from the Cortex XDR console and double-click to
open the Cerficate Import Wizard.
2. In the Cerficate Import Wizard:
1. Select Local Machine followed by Next.
2. Verify the File name field displays the PFX cerficate file you downloaded and
select Next.
3. In the Passwords field, enter the Client Cerficate Export Password you defined in
the Cortex XDR console followed by Next.
4. Select Automacally select the cerficate store based on the type of cerficate
followed by Next and Finish.
3. From a command prompt, run certlm.msc.
4. In the file explorer, navigate to Cerficates and verify the following for each of the
folders:
Cortex® XDR™ Pro Administrator’s Guide 572 ©2021 Palo Alto Networks, Inc.
Broker VM
8. Select OK, verify the Group or user names appear, and then Apply Permissions for
privet keys.
Cortex® XDR™ Pro Administrator’s Guide 573 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex® XDR™ Pro Administrator’s Guide 574 ©2021 Palo Alto Networks, Inc.
Broker VM
You should only perform this step under the following condions.
• You have completed the WEF cerficaon renewal process for ALL clients in your
environment. Otherwise, events from the WEFs that you did not install the new
client cerficate will not be collected by the WEC.
• You are approaching the WEC server CA cerficate expiraon date, which is 2 years
aer the Windows Event Collector applet acvaon, and receive a noficaon in
the Cortex XDR console.
1. In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM, and locate your
broker VM.
2. Right-click and select Windows Event Collector > Renew WEC Server Cerficate.
3. Click Renew.
Once Cortex XDR renews the WEC server cerficate, the status of the Windows Event
Collector on the Broker VMs machine is Acve, Connected indicang the applet is
running. In addion, the health status of the Windows Event Collector applet is now
green instead of yellow and the warning message that appeared when you hovered over
the health status no longer appears. Your WEC server cerficate is issued with a lifespan
of 12 months.
We also suggest that in XQL Search that you run the following query to verify that your
event logs are being captured.
dataset = xdr_data
| filter _product = "Windows"
| fields
_vendor,_product,action_evtlog_level,action_evtlog_event_id
| sort desc _time | limit 20
If this query does not display results with a mestamp from aer the renewal
process, it could indicate that the renewal process is not complete, so wait a few
minutes before running another query. If you are sll having a problem, contact
Technical Support.
Cortex® XDR™ Pro Administrator’s Guide 575 ©2021 Palo Alto Networks, Inc.
Broker VM
The following table describes both the default fields and addional oponal fields that you can
add to the alerts table using the column manager and lists the fields in alphabecal order.
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 576 ©2021 Palo Alto Networks, Inc.
Broker VM
Field Descripon
• VERSION—Whether the broker VM is running
the latest version.
• APPS—Whether the available applicaons are
connected to Cortex XDR.
Colors depict the following statuses:
• Black—Disconnected to Cortex XDR
• Red - Disconnected from Cortex X
• Orange—Past Version
• Green—Connected, Current Version
Cortex® XDR™ Pro Administrator’s Guide 577 ©2021 Palo Alto Networks, Inc.
Broker VM
Field Descripon
nofies of an expired broker. To reconnect,
generate a new token and re-register your broker
as described in steps 1 through 7of Configure the
Broker VM. Once registered, all previous broker
configuraons are reinstated.
Cortex® XDR™ Pro Administrator’s Guide 578 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 1 | In the Broker VMs table, locate your broker VM, right-click and select Broker Management >
Configure.
If the broker VM is disconnected, you can only View the configuraons.
• Auto Upgrade
Enable or Disable automac upgrade of the broker VM. By default, auto upgrade is
enabled at Any me for all 7 days of the week, but you can also set the Days in Week and
Cortex® XDR™ Pro Administrator’s Guide 579 ©2021 Palo Alto Networks, Inc.
Broker VM
Specific me for the automac upgrades. If you disable auto-upgrade, new features and
improvements will require manual upgrade.
• Monitoring
Enable or Disable of local monitoring of the broker VM usage stascs in Prometheus
metrics format, allowing you to tap in and export data by navigang to http://
Cortex® XDR™ Pro Administrator’s Guide 580 ©2021 Palo Alto Networks, Inc.
Broker VM
• (For Broker VM 7.4.5 and earlier) Enable/Disable ssh Palo Alto Networks support team
SSH access by using a Cortex XDR token.
Enabling allows Palo Alto Networks support team to connect to the broker VM remotely,
not the customer, with the generated password. Ensure the broker can validate a self-
signed CA configuring cert_ssl-decrypt.crton the broker VM.
Cortex® XDR™ Pro Administrator’s Guide 581 ©2021 Palo Alto Networks, Inc.
Broker VM
Make sure you save the password before closing the window. The only way to re-
generate a password is to disable ssh and re-enable.
• (Requires Broker VM 14.0.42 and later) Customize the login banner displayed, when
logging into SSH sessions on the broker VM in the Welcome Message field by
overwring the default welcome message with a new one added in the field. When the
field is empty, the default message is used.
• Broker UI Password
Reset your current Broker VM Web UI password. Define and Confirm your new password.
Password must be at least 8 characters.
STEP 2 | Locate your broker VM, right-click and select Broker Management > Download Latest Logs.
Logs are generated automacally aer approximately 30 seconds and are available for 24 hours
aer the logs have been downloaded.
Reboot a Broker VM
Cortex XDR allows you reboot your broker VM directly from the Cortex XDR management
console.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM > Broker VMs table.
STEP 2 | Locate your broker VM, right-click and select Broker Management > Reboot VM.
Shutdown a Broker VM
Cortex® XDR™ enables you to gracefully shutdown the broker VM directly from the Cortex XDR
Broker VMs table.
STEP 1 | Select Sengs ( ) > Configuraons > Broker VM.
STEP 2 | Locate your broker VM in the Broker VMs table, right-click, and select Broker Management >
Shutdown VM.
Upgrade a Broker VM
You can upgrade any broker VM directly from the Cortex XDR management console.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM > Broker VMs table.
Cortex® XDR™ Pro Administrator’s Guide 582 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | Locate your broker VM, right-click and select Broker Management > Upgrade Broker
version.
Upgrading your broker VM takes approximately 5 minutes.
Cortex® XDR™ Pro Administrator’s Guide 583 ©2021 Palo Alto Networks, Inc.
Broker VM
STEP 2 | Locate the broker VM you want to connect to, right-click and select Open Remote Terminal.
Cortex XDR opens a CLI window where you can perform the following commands:
• Logs
Broker VM logs located are located in /data/logs/ folder and contain the applet
name in file name. For example, folder /data/logs/[applet name], containing
container_ctrl_[applet name].log
• Ubuntu Commands
Cortex XDR Broker VM supports all Ubuntu commands. For example, telnet 10.0.0.10
80 or ifconfig -a.
• Sudo Commands
Broker VM supports the command listed in the following table. All the commands are
located in the /home/admin/sbin folder.
Cortex XDR requires you use the following values when running commands:
Applet Names
• Agent Proxy—tms_proxy
• Syslog Collector—anubis
• WEC—wec
• Network Mapper—network_mapper
• Pathfinder—odysseus
Services
• Upgrade—zenith_upgrade
• Frontend service—webui
• Sync with Cortex XDR—cloud_sync
• Internal messaging service (RabbitMQ)—rabbitmq-server
• Uploads metrics to the Cortex XDR—metrics_uploader
• Prometheus node exporter—node_exporter
• Backend service—backend
The following table displays the available commands in alphabecal order.
Cortex® XDR™ Pro Administrator’s Guide 584 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex® XDR™ Pro Administrator’s Guide 585 ©2021 Palo Alto Networks, Inc.
Broker VM
Remove a Broker VM
Cortex XDR allows you to remove a broker VM directly from the Cortex XDR management
console.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Broker VM > Broker VMs table.
STEP 2 | Locate your broker VM, right-click and select Broker Management > Remove Broker.
Cortex® XDR™ Pro Administrator’s Guide 586 ©2021 Palo Alto Networks, Inc.
Broker VM
Broker VM Noficaons
To help you monitor your broker VM version and connecvity effecvely, Cortex XDR sends
noficaons to your Cortex XDR console Noficaon Center.
Cortex XDR sends the following noficaons:
• New Broker VM Version—Nofies when a new broker VM version has been released.
• If the broker VM Auto Upgrade is disabled, the noficaon includes a link to the latest
release informaon. It is recommend you upgrade to the latest version.
• If the broker VM Auto Upgrade is enabled, 12 hours aer the release you are nofied of the
latest upgrade, or your are nofied that the upgrade failed. In such a case, open a Palo Alto
Networks Support Ticket.
• Broker VM Connecvity—Nofies when the broker VM has lost connecvity to Cortex XDR.
• Broker VM Disk Usage—Nofies when the broker VM is ulizing over 90% of the allocated disk
space.
Cortex® XDR™ Pro Administrator’s Guide 587 ©2021 Palo Alto Networks, Inc.
Broker VM
Cortex® XDR™ Pro Administrator’s Guide 588 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Cortex® XDR™ provides a XDR Collectors configuraon that is dedicated for on-
premise data collecon on Windows and Linux machines. The collector includes a
dedicated installer, a collector upgrade configuraon, content updates, and policy
management.
589
Cortex® XDR™ Collectors
Ubuntu Server 12
Ubuntu Server 14
Ubuntu Server 16
Ubuntu Server 18
Ubuntu Server 20
Cortex® XDR™ Pro Administrator’s Guide 590 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
• Amount of Parallel Upgrades—Specify the number of parallel upgrades, where the maximum
number is 500 (default).
• Days in Week—Select the specific days in the week that you want the upgrade to occur,
where the default is configured as every day in the week.
• Schedule—Select whether you want the upgrade to be at Any me (default) or at a Specific
me. When seng a specific me, you can set the From and To mes.
Cortex® XDR™ Pro Administrator’s Guide 591 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
To move exisng XDR Collectors between Cortex XDR managing servers, you need to
first Uninstall the XDR Collector from the collector machine and then for the new XDR
Collector create a new installaon package.
Cortex® XDR™ Pro Administrator’s Guide 592 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 3 | Enter a unique Name and an oponal Descripon to idenfy the installaon package.
The package Name must be no more than 100 characters and can contain leers, numbers,
hyphens, underscores, commas, and spaces.
STEP 4 | Select the Plaorm for which you want to create the installaon package as either Windows
or Linux.
Cortex® XDR™ Pro Administrator’s Guide 593 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Since Cortex XDR relies on the installaon package ID to approve XDR Collector
registraon during install, it is not recommended to delete the installaon package
for any acve on-premise collector machines. Hiding the installaon package will
remove it from the default list of available installaon packages, and can be useful
to eliminate confusion in the XDR Collectors console main view. These hidden
installaon can be viewed by removing the default filter.
• Copy text to clipboard to copy the text from a specific field in the row of an installaon
package.
• Hide installaon packages. Using the Hide opon provides a quick method to filter out
results based on a specific value in the table. You can also use the filters at the top of the
page to build a filter from scratch. To create a persistent filter, save ( ) it.
When the package is executed using the MSI, an installaon log is generated in %TEMP%
\MSI<Random characters>.log by default.
Cortex® XDR™ Pro Administrator’s Guide 594 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 1 | With Administrator level privileges, run the MSI file that you downloaded in Cortex XDR on
the collector machine.
The installer displays a welcome dialog.
Cortex® XDR™ Pro Administrator’s Guide 595 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 3 | Select I accept the terms in the License Agreement and click Next.
STEP 6 | Aer you complete the installaon, verify the Cortex XDR Collector can establish a
connecon.
If the Cortex XDR Collector does not connect to Cortex XDR, verify your Internet
connecon on the collector machine. If the XDR Collector sll does not connect, verify
the installaon package has not been removed from the Cortex XDR management
console.
Cortex® XDR™ Pro Administrator’s Guide 596 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 2 | Run the msiexec command followed by one or more supported opons and properes.
For example:
msiexec /i XDRCollector-Win_x64.msi DATA_PATH=c:\data
PROXY_LIST=2.2.2.2:8888,1.1.1.1:8080 /quiet /l*v c:\installlog.txt
Cortex® XDR™ Pro Administrator’s Guide 597 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Before compleng this task, ensure that you create and download a XDR Collector installaon
package in Cortex XDR.
To install the XDR Collector installaon package for Linux.
STEP 1 | Log on to the Linux server.
For example:
user@local ~
$
ssh [email protected]
Welcome to Ubuntu 16.04.3 LTS (GNU/Linux 4.4.0-1041-aws
x86_64)
* Documentation: https://help.ubuntu.com
* Management: https://landscape.canonical.com
* Support: https://ubuntu.com/advantage
Cortex® XDR™ Pro Administrator’s Guide 598 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Addional opons are available to help you customize your installaon if needed. The
following table describes common opons and parameters.
If you are using rpm or deb installers, you must also add these parameters to the /etc/
panw/collector.conf file prior to installaon.
Opon Descripon
Cortex® XDR™ Pro Administrator’s Guide 599 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Opon Descripon
Use commas to separate mulple addresses. For
example:
--proxy-list "My.Network.Name:808
, 10.196.20.244:8080"
--data–path=/tmp/xdrLog
If the Cortex XDR Collector does not connect to Cortex XDR, verify your Internet
connecon on the collector machine. If the XDR Collector sll does not connect,
verify the installaon package has not been removed from the Cortex XDR
management console.
Cortex® XDR™ Pro Administrator’s Guide 600 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Cortex® XDR™ Pro Administrator’s Guide 601 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
3. You can assign up to ten different proxies per XDR Collector. For each proxy, specify the
IP address and port number. Aer each Proxy Address and Port added, select to add
the values to a list underneath these fields.
4. Set when you’re done.
5. If necessary, you can later Disable Collector Proxy from the right-click menu.
When you disable the proxy configuraon, all proxies associated with that XDR Collector
are removed. The XDR Collector resumes communicaon with the Cortex XDR sever
through the wide-system proxy if defined, otherwise if a wide-system is not defined the
XDR Collector resumes communicang directly with the Cortex XDR server. If neither a
wide-system proxy nor direct communicaon exist and you disable the proxy, the XDR
Collector disconnects from Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 602 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
machine. You need to create a new installaon packages and push the Cortex XDR Collector
package to up to 500 collector machines from Cortex XDR.
Upgrades are supported using acons which you can iniate from the Acon Center or XDR
Collectors Administraon page as described in this workflow.
STEP 1 | Create a XDR Collector Installaon Package for each operang system version that you want
to upgrade the Cortex XDR Collector.
Note the installaon package names.
The Cortex XDR Collector keeps the name of the original installaon package aer
every upgrade.
STEP 5 | Upgrade.
Cortex XDR distributes the installaon package to the selected collector machine at the next
heartbeat communicaon with the XDR Collector. To monitor the status of the upgrades, go to
Response > Acon Center. From the Acon Center you can also view addional informaon
about the upgrade (right-click the acon and select Addional data) or cancel the upgrade
(right-click the acon and select Cancel Collector Upgrade).
Cortex® XDR™ Pro Administrator’s Guide 603 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 4 | To proceed, select I agree to confirm that you understand this acon uninstalls the XDR
Collector on all selected collector machines.
Cortex® XDR™ Pro Administrator’s Guide 604 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 3 | Right-click anywhere in the collector machine rows, and select Change Collector Alias.
STEP 5 | Use the Quick Launcher to search the collector machines by alias across the Cortex XDR
Collectors console.
Cortex® XDR™ Pro Administrator’s Guide 605 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 3 | Specify a Group Name and oponal Descripon to idenfy the collector machine group. The
name you assign to the group will be visible when you assign endpoint security profiles to
endpoints.
STEP 4 | Determine the collector machine properes for creang a collector machine group:
• Dynamic—Use the filters to define the criteria you want to use to dynamically populate a
collector machine group. Dynamic groups support mulple criteria selecons and can use
AND or OR operators. For collector machine names and aliases, and domains, you can use
Cortex® XDR™ Pro Administrator’s Guide 606 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
* to match any string of characters. As you apply filters, Cortex XDR displays any registered
collector machine matches to help you validate your filter criteria.
• Stac—Select specific registered collector machines that you want to include in the collector
machine group. Use the filters, as needed, to reduce the number of results.
When you create a stac collector machine group from a file, the IP address, hostname, or
alias of the collector machine must match an exisng XDR Collector that has registered with
Cortex XDR.
Disconnecng Directory Sync in your Cortex XDR deployment can affect exisng
collector machine groups and policy rules based on Acve Directory properes.
Cortex® XDR™ Pro Administrator’s Guide 607 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Cortex® XDR™ Pro Administrator’s Guide 608 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Cortex® XDR™ Pro Administrator’s Guide 609 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
This enrichment is also available when configuring a Windows DHCP Collector for a
cloud data collecon integraon.
The XDR Collector profile is also where you can configure whether to implement an automac
upgrade for the Cortex XDR Collector release. Once you have added an XDR Collector profile, you
need to associate the profile to a parcular policy for a collector machine.
For more informaon on Elascsearch Filebeat, see the Elascsearch Filebeat Overview
Documentaon.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > XDR Collectors > Profiles.
Cortex® XDR™ Pro Administrator’s Guide 610 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 2 | Select the plaorm for the collector machine that you want to create a profile for.
• For Windows—Select +New Profile > Windows Profile.
• For Linux—Select +New Profile > Linux Profile.
The configuraon sengs are the same for both Windows and Linux.
Cortex® XDR™ Pro Administrator’s Guide 611 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
3. You can configure the scope of the automac upgrade to whenever a new XDR Collector
release is available including maintenance releases and new features.
• To ensure the latest XDR Collector release is used, leave the Use Default (Latest
collector release) checkbox selected.
• To configure only a parcular scope, perform the following steps.
1. Clear the Use Default (Latest collector release) checkbox.
2. For the Auto Upgrade Scope, select one of the following opons.
-Latest collector release—Configures the scope of the automac upgrade to
whenever a new XDR Collector release is available including maintenance releases
and new features.
-Only maintenance release—Configures the scope of the automac upgrade to
whenever a new XDR Collector maintenance release is available.
Only maintenance releases in a specific version—Configures the scope of the
automac upgrade to whenever a new XDR Collector maintenance release is
available for a specific version. When this opon is selected, you can select the
specific Release Version.
Cortex® XDR™ Pro Administrator’s Guide 612 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
- add_tags:
tags: [windows_dhcp]
target: "xdr_log_type"
• Cortex XDR collects all logs in either a JSON or text format that are uncompressed.
Compressed files, such as in a gzip format, are unsupported
.
• Cortex XDR only supports logs in single line format as mulline logs are
unsupported. For more informaon on handling messages that span mulple lines of
text in Elascsearch Filebeat, see Manage Mulline Messages.
Cortex® XDR™ Pro Administrator’s Guide 613 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 6 | Create your new profile, which is listed under the applicable plaorm in the XDR Collectors
Profiles page.
Elascsearch is a trademark of Elascsearch B.V., registered in the U.S. and in other countries.
Cortex® XDR™ Pro Administrator’s Guide 614 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
STEP 4 | Set the Target sengs in the XDR Collectors Endpoints screen.
Use the filters to assign the policy to one or more collector machines (endpoints) or collector
machine (endpoint) groups.
Cortex XDR automacally applies a filter for the plaorm you selected. To change the plaorm,
go Back to the general policy sengs.
Cortex® XDR™ Pro Administrator’s Guide 615 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
If everything looks fine, click Done. Otherwise, click Back to make your changes.
STEP 7 | In the XDR Collectors Policies table, change the policy posion, if needed, to order the policy
relave to other policies.
The Cortex XDR Collector evaluates policies from top to boom. When the Cortex XDR
Collector finds the first match it applies that policy as the acve policy. To move the policy
order, select the arrows and drag the policy to the desired locaon in the policy hierarchy.
Cortex® XDR™ Pro Administrator’s Guide 616 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Cortex® XDR™ Pro Administrator’s Guide 617 ©2021 Palo Alto Networks, Inc.
Cortex® XDR™ Collectors
Cortex® XDR™ Pro Administrator’s Guide 618 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
> External Data Ingeson Vendor Support
> Visibility of Logs and Alerts from External Sources in Cortex XDR
> Ingest Network Connecon Logs
> Ingest Authencaon Logs and Data
> Ingest Operaon and System Logs from Cloud Providers
> Addional Log Ingeson Methods for Cortex® XDR™
> Ingest External Alerts
619
External Data Ingeson
To provide you with a more complete and detailed picture of the acvity involved in an incident,
you can ingest data from a variety of external, third-party sources in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 620 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex XDR can receive logs or both logs and alerts from the source. Depending on the data
source, Cortex XDR can provide visibility into your external data in the form of:
• Log stching with other logs such as to create network or authencaon stories.
• Raw data in queries from XQL Search.
• Alerts reported by the vendor throughout Cortex XDR such as in the Alerts table, incidents, and
views.
• Alerts raised by Cortex XDR on log data such as Analycs alerts
For more informaon, see Visibility of Logs and Alerts from External Sources in Cortex XDR.
To ingest data, you must set up the Syslog Collector applet on a Broker VM within your network.
Cortex® XDR™ Pro Administrator’s Guide 621 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 622 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
Network
Amazon S3 (flow —
logs)
Raw data is Opon to Cortex XDR can
searchable in ingest network raise Cortex
XQL Search. flow logs as XDR alerts
XDR network (Analycs,
connecon IOC, BIOC, and
stories that are Correlaon Rule)
searchable in the when relevant
Query Builder from logs.
and in XQL
Search. Analycs
Alerts
are
only
raised
on
normalized
logs.
Azure Network —
Watcher (flow
logs) Opon to Cortex XDR can
ingest network raise Cortex
flow logs as XDR alerts
Cortex® XDR™ Pro Administrator’s Guide 623 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
Raw data is XDR network (Analycs,
searchable in connecon IOC, BIOC, and
XQL Search. stories that are Correlaon Rule)
searchable in the when relevant
Query Builder from logs.
and in XQL
Search. Analycs
Alerts
are
only
raised
on
normalized
logs.
Check Point
FW1/VPN1
Raw data is Network Cortex XDR can Alerts from
searchable in stories that raise Cortex Check Point
XQL Search. include Check XDR alerts firewalls
Point network (Analycs, are raised
Logs connecon logs IOC, BIOC, and throughout
with are searchable Correlaon Rule) Cortex XDR
sessionid in the Query when relevant when relevant.
= Builder and in from logs.
0 XQL Search.
are
dropped. Logs
with
sessionid
=
0
are
dropped.
Corelight Zeek —
Cortex® XDR™ Pro Administrator’s Guide 624 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
Cisco ASA —
Fornet
Forgate
Raw data is Network stories Cortex XDR can Alerts from
searchable in that include raise Cortex Fornet firewalls
XQL Search. Fornet network XDR alerts are raised
connecon logs (Analycs, throughout
are searchable IOC, BIOC, and Cortex XDR
in the Query Correlaon Rule) when relevant.
Builder and in when relevant
XQL Search. from logs.
Google Cloud —
Plaorm (flow
logs) Raw data is Opon to Cortex XDR can
searchable in ingest network raise Cortex
XQL Search. flow logs as XDR alerts
XDR network (Analycs,
connecon IOC, BIOC, and
stories that are Correlaon Rule)
searchable in the when relevant
Query Builder from logs.
and in XQL
Search. Analycs
Alerts
are
only
raised
on
normalized
logs.
Cortex® XDR™ Pro Administrator’s Guide 625 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
Raw data is Rule only) when
searchable in relevant from
XQL Search. logs.
Windows DHCP — —
via Elascsearch
Filebeat Raw data is Cortex XDR
searchable in uses Windows
XQL Search. DHCP logs to
enrich your
network logs
with hostnames
and MAC
addresses that
are searchable in
XQL Search.
Zscaler Cloud —
Firewall
Raw data is Network stories Cortex XDR can
searchable in that include raise Cortex
XQL Search. Zscaler Cloud XDR alerts
Firewall network (Analycs,
connecon and IOC, BIOC, and
firewall logs Correlaon Rule)
are searchable when relevant
in the Query from logs.
Builder and in
XQL Search.
Amazon S3 —
(audit logs)
Logs and stories Opon to stch Cortex XDR can
are searchable in audit logs with raise Cortex
XQL Search authencaon XDR alerts
stories that are (IOC, BIOC,
searchable in the and Correlaon
Query Builder Rule only) when
and XQL Search. relevant from
logs.
Azure AD —
Cortex® XDR™ Pro Administrator’s Guide 626 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
Logs and stories stories are (IOC, BIOC,
are searchable in searchable in the and Correlaon
XQL Search Query Builder. Rule only) when
relevant from
logs.
Google Cloud —
Plaorm (audit
logs) Raw data is Opon to stch Cortex XDR can
searchable in audit logs with raise Cortex
XQL Search. authencaon XDR alerts
stories that are (Analycs,
searchable in the IOC, BIOC, and
Query Builder Correlaon Rule)
and XQL Search. when relevant
from logs.
Okta —
PingFederate —
Cortex® XDR™ Pro Administrator’s Guide 627 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
relevant from
logs.
PingOne for —
Enterprise
Logs and stories Logs Cortex XDR can
are searchable in stched with raise Cortex
XQL Search authencaon XDR alerts
stories are (IOC, BIOC,
searchable in the and Correlaon
Query Builder. Rule only) when
relevant from
logs.
Amazon S3 — —
(generic logs)
Raw data is Cortex XDR can
searchable in raise Cortex
XQL Search. XDR alerts
(IOC, BIOC,
and Correlaon
Rule only) when
relevant from
logs.
AWS CloudTrail — —
and Amazon
CloudWatch Raw data is Cortex XDR can
(generic logs) searchable in raise Cortex
XQL Search. XDR alerts
(IOC, BIOC,
and Correlaon
Rule only) when
relevant from
logs.
Cortex® XDR™ Pro Administrator’s Guide 628 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
relevant from
logs.
Google Cloud — —
Plaorm
Raw data is Cortex XDR can
searchable in raise Cortex
XQL Search. XDR alerts
(IOC, BIOC,
and Correlaon
Rule only) when
relevant from
logs.
Google — —
Kubernetes
Engine Raw data is Cortex XDR can
searchable in raise Cortex
XQL Search. XDR alerts
(IOC, BIOC,
and Correlaon
Rule only) when
relevant from
logs.
Prisma Cloud
(alerts)
Raw data is Prisma Cloud Cortex XDR can Alerts from
searchable in alerts are raise Cortex Prisma Cloud
XQL Search. stched with XDR alerts are raised
Cloud Provider (Correlaon throughout
logs when Rule only) when Cortex XDR
relevant. relevant from when relevant.
logs.
Prisma Cloud —
Compute (alerts)
Cortex XDR can Alerts from
raise Cortex Prisma Cloud
Cortex® XDR™ Pro Administrator’s Guide 629 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
Raw data is XDR alerts Compute
searchable in (Correlaon are raised
XQL Search. Rule only) when throughout
relevant from Cortex XDR
logs. when relevant.
Endpoint Logs
Windows Event —
Collector
Windows event Windows event Cortex XDR can
logs are available logs are stched raise Cortex
with agent EDR with agent EDR XDR alerts
data and are data and are (IOC, BIOC,
searchable in searchable in the and Correlaon
XQL Search. Query Builder. Rule only) when
relevant from
logs.
Cloud Assets
Any Vendor —
Sending CEF or To enable Cortex
LEEF formaed Raw data is Cortex XDR can
XDR to display
Syslog searchable in raise Cortex
alerts from other
XQL Search. XDR alerts
vendors, you
(IOC, BIOC,
must map your
and Correlaon
alert fields to
Rule only) when
the Cortex XDR
relevant from
field format (see
logs.
Ingest External
Alerts).
Any vendor — —
CSV files on a
shared Windows Raw data is Cortex XDR can
directory searchable in raise Cortex
XQL Search. XDR alerts
(IOC, BIOC,
Cortex® XDR™ Pro Administrator’s Guide 630 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
and Correlaon
Rule only) when
relevant from
logs.
Any vendor — —
logs stored in a
database Raw data is Cortex XDR can
searchable in raise Cortex
XQL Search. XDR alerts
(Correlaon
Rule only) when
relevant from
logs.
Any vendor —
sending NetFlow
flow records Raw data is NetFlow events Cortex XDR can
searchable in are stched raise Cortex
XQL Search. with the Agent’s XDR alerts
EDR data and (IOC, BIOC,
other Network and Correlaon
products to Rule only) when
a Session relevant from
Story, and are logs.
searchable in the
Cortex® XDR™ Pro Administrator’s Guide 631 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
Query Builder
and in XQL.
Any vendor —
sending logs To enable Cortex
over HTTP Raw data is Cortex XDR can
XDR to display
searchable in raise Cortex
alerts from other
XQL Search. XDR alerts
vendors, you
(IOC, BIOC,
must map your
and Correlaon
alert fields to
Rule only) when
the Cortex XDR
relevant from
field format (see
logs.
Ingest External
Alerts).
BeyondTrust — —
Privilege
Management Raw data is Cortex XDR can
Cloud searchable in raise Cortex
XQL Search. XDR alerts
(Correlaon
Rule only) when
relevant from
logs.
Elascsearch — —
Filebeat
Raw data is Cortex XDR can
searchable in raise Cortex
XQL Search. XDR alerts
(IOC, BIOC,
and Correlaon
Rule only) when
relevant from
logs.
Forcepoint DLP — —
Cortex® XDR™ Pro Administrator’s Guide 632 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Vendor and Raw Data Normalized Log Cortex XDR Alert Vendor Alert
Device Type Visibility Visibility Visibility Visibility
Proofpoint — —
Targeted Aack
Protecon Raw data is Cortex XDR can
searchable in raise Cortex
XQL Search. XDR alerts
(Correlaon
Rule only) when
relevant from
logs.
ServiceNow — —
CMDB
Raw data is Cortex XDR can
searchable in raise Cortex
XQL Search. XDR alerts
(Correlaon
Rule only) when
relevant from
logs.
Workday — —
Any vendor — — —
sending alerts Alerts are
surfaced
throughout
Cortex XDR
when relevant.
To enable Cortex
XDR to display
your alerts, you
must map your
alert fields to
the Cortex XDR
field format (see
Ingest External
Alerts).
Cortex® XDR™ Pro Administrator’s Guide 633 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
When ingesng data from an external source, Cortex XDR creates a dataset that you can query
using XQL. Datasets created in this way use the following naming convenon:
<vendor_name>_<product_name>_raw
Cortex® XDR™ Pro Administrator’s Guide 634 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
You can forward network flow logs for the relave service to Cortex XDR from Amazon Simple
Storage Service (Amazon S3).
To receive network flow logs from Amazon S3, you must first configure data collecon from
Amazon S3. You can then configure the Collecon Integraons sengs in Cortex XDR for Amazon
S3. Aer you set up collecon integraon, Cortex XDR begins receiving new logs and data from
the source.
You can either configure Amazon S3 with SQS noficaon manually on your own or use the AWS
CloudFormaon Script that we have created for you to make the process easier. The instrucons
below explain how to configure Cortex XDR to receive network flow logs from Amazon S3 using
SQS. To perform these steps manually, see Configure Data Collecon from Amazon S3 Manually.
For more informaon on configuring data collecon from Amazon S3, see the Amazon S3
Documentaon.
As soon as Cortex XDR begins receiving logs, the app automacally creates an Amazon S3 XQL
dataset (aws_s3_raw). This enables you to search the logs with XQL Search using the dataset.
For example queries, refer to the in-app XQL Library. You can also configure Cortex XDR to ingest
network flow logs as XDR network connecon stories, which you can query with XQL Search
using the xdr_dataset dataset with the preset called network_story. Cortex XDR can also
raise Cortex XDR alerts (Analycs, Correlaon Rules, IOC, and BIOC only) when relevant from
Amazon S3 logs. Analycs alerts are only raised on normalized logs.
Be sure you do the following tasks before you begin configuring data collecon from Amazon S3
using the AWS CloudFormaon Script.
Cortex® XDR™ Pro Administrator’s Guide 635 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
• Ensure that you have the proper permissions to run AWS CloudFormaon with the script
provided in Cortex XDR. You need at a minimum the following permissions in AWS for an
Amazon S3 bucket and Amazon Simple Queue Service (SQS):
• Amazon S3 bucket—GetObject
• SQS—ChangeMessageVisibility, ReceiveMessage, and DeleteMessage.
• Ensure that you can access your Amazon Virtual Private Cloud (VPC) and have the necessary
permissions to create flow logs.
• Determine how you want to provide access to Cortex XDR to your logs and to perform API
operaons. You have the following opons:
• Designate an AWS IAM user, where you will need to know the Account ID for the user and
have the relevant permissions to create an access key/id for the relevant IAM user. This is
the default opon as explained in configure the Amazon S3 collecon in Cortex XDR by
selecng Access Key.
• Create an assumed role in AWS to delegate permissions to a Cortex XDR AWS service. This
role grants Cortex XDR access to your flow logs. For more informaon, see Creang a role
to delegate permissions to an AWS service. This is the Assumed Role opon as described in
the configure the Amazon S3 collecon in Cortex XDR. For more informaon on creang an
assumed role for Cortex XDR, see Create an Assumed Role for Cortex XDR.
Configure Cortex XDR to receive network flow logs from Amazon S3 using the CloudFormaon
Script.
STEP 1 | Download the CloudFormaon Script in Cortex XDR.
1. Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
2. In the Amazon S3 configuraon, click the here link to begin a new configuraon.
3. To provide access to Cortex XDR to your logs and to perform API operaons using a
designated AWS IAM user, leave the Access Key opon selected. Otherwise, select
Cortex® XDR™ Pro Administrator’s Guide 636 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Assumed Role, and ensure that you Create an Assumed Role for Cortex XDR before
connuing with these instrucons.
4. For the Log Type, select Flow Logs to configure your log collecon to receive network
flow logs from Amazon S3, and the following text is displayed under the field Download
CloudFormaon Script. See instrucons here.
5. Click the Download CloudFormaon Script. link to download the script to your
computer.
STEP 2 | Create a new Stack in the CloudFormaon Console with the script you downloaded from
Cortex XDR.
For more informaon on creang a Stack, see Creang a stack on the AWS CloudFormaon
console.
Cortex® XDR™ Pro Administrator’s Guide 637 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
an Amazon S3 bucket, Amazon Simple Queue Service (SQS) queue, and Queue Policy.
Configure the following sengs in the Specify template page.
• Prerequisite - Prepare template > Prepare template—Select Template is ready.
• Specify Template
• Template source—Select Upload a template file.
• Upload a template file—Choose file, and select the cortex-xdr-create-s3-
with-sqs-flow-logs.json file that you downloaded from Cortex XDR.
5. Click Next.
6. In the Specify stack details page, configure the following stack details.
• Stack name—Specify a descripve name for your stack.
• Parameters > Cortex XDR Flow Logs Integraon
• Bucket Name—Specify the name of the S3 bucket to create, where you can leave
the default populated name as xdr-flow-logs or create a new one. The name must
be unique.
• Publisher Account ID—Specify the AWS IAM user account ID with whom you are
sharing access.
• Queue Name—Specify the name for your Amazon SQS queue to create, where you
can leave the default populated name as xdr-flow or create a new one. The name
must be unique.
Cortex® XDR™ Pro Administrator’s Guide 638 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
7. Click Next.
8. In the Configure stack opons page, there is nothing to configure, so click Next.
9. In the Review page, look over the stack configuraons sengs that you have configured
and if they are correct, click Create stack. If you need to make a change, click Edit beside
the parcular step that you want to update.
The stack is created and is opened with the Events tab displayed. It can take a few
minutes for the new Amazon S3 bucket, SQS queue, and Queue Policy to be created.
Click Refresh to get updates. Once everything is created, leave the stack opened in
the current browser as you will need to access informaon in the stack for other steps
detailed below.
Cortex® XDR™ Pro Administrator’s Guide 639 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | Configure your Amazon Virtual Private Cloud (VPC) with flow logs:
1. Open the Amazon VPC Console, and in the Resources by Region listed, select VPCs to view
the VPCs configured for the current region selected. To select another VPC from another
region, select See all regions, and select one of them.
To create a new VPC, click Launch VPC Wizard. For more informaon, see AWS
VPC Flow Logs.
2. From the list of Your VPCs, select the checkbox beside the VPC that you want to configure
to create flow logs, and then select Acons > Create flow log.
Cortex® XDR™ Pro Administrator’s Guide 640 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Buckets secon, select the bucket that you created for collecng the Amazon S3 flow
logs when you created your stack, click Copy ARN, and paste the ARN in this field.
• Log record format—Specify the fields to include in the flow log record, where we
recommend leaving the default AWS default format selected.
4. Click Create flow log.
Once the flow log is created, a message indicang that the flow log was successfully created
is displayed at the top of the Your VPCs page.
In addion, if you open your Amazon S3 bucket configuraons, by selecng the bucket from
the Amazon S3 console, the Objects tab contains a folder called AWSLogs/ to collect the
flow logs.
STEP 4 | Configure access keys for the AWS IAM user that Cortex XDR uses for API operaons.
1. Open the AWS IAM Console, and in the navigaon pane, select Access management >
Users.
2. Select the User name of the AWS IAM user.
3. Select the Security credenals tab, and scroll down to the Access keys secon, and click
Create access key.
4. Click the copy icon next to the Access key ID and Secret access key keys, where you must
click Show secret access key to see the secret key, and record them somewhere safe before
closing the window. You will need to provide these keys when you edit the Access policy of
the SQS queue and when seng the AWS Client ID and AWS Client Secret in Cortex XDR.
If you forget to record the keys and close the window, you will need to generate new keys
and repeat this process.
For more informaon, see Managing access keys for IAM users.
Cortex® XDR™ Pro Administrator’s Guide 641 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 5 | When you create an Assumed Role for Cortex XDR, ensure that you edit the policy that
defines the permissions for the Cortex XDR role with the S3 Bucket ARN and SQS ARN,
which is taken from the Stack you created.
Skip this step if you are using an Access Key to provide access to Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 642 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
3. Set these parameters, where the parameters change depending on whether you
configured an Access Key or Assumed Role.
• SQS URL—Specify the SQS URL, which is taken from the Stack you created. In the
browser you le open aer creang the stack, open the Outputs tab, and copy the
Value of the QueueURL and paste it in this field.
• Name—Specify a descripve name for your log collecon configuraon.
• When seng an Access Key, set these parameters.
• AWS Client ID—Specify the Access key ID, which you received when you created
access keys for the AWS IAM user in AWS.
• AWS Client Secret—Specify the Secret access key you received when you created
access keys for the AWS IAM user in AWS.
• When seng an Assumed Role, set these parameters.
• Role ARN—Specify the Role ARN for the Assumed Role you created for Cortex
XDR in AWS.
• External Id—Specify the External Id for the Assumed Role you created for Cortex
XDR in AWS.
• Log Type—Select Flow Logs to configure your log collecon to receive network flow
logs from Amazon S3. When configuring network flow log collecon, the following
addional field is displayed for the Configuraon.
Cortex® XDR™ Pro Administrator’s Guide 643 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
You can Normalize and enrich flow logs by selecng the checkbox. If selected, Cortex
XDR ingests the network flow logs as XDR network connecon stories, which you
can query using XQL Search from the xdr_dataset dataset using the preset called
network_story.
4. Click Test to validate access, and then click Enable.
Once events start to come in, a green check mark appears underneath the Amazon S3
configuraon with the number of logs received.
Cortex® XDR™ Pro Administrator’s Guide 644 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 1 | Log in to the AWS Management Console to create a role for Cortex XDR.
Refer to the AWS instrucons for guidance.
1. Create the role in the same region as your AWS account, and use the following values
and opons when creang the role.
• Type of Trusted > Another AWS Account, and specify the Account ID as
006742885340.
• Select Opons for the Require external ID, which is a unique alphanumeric string, and
generate a secure UUIDv4 using an Online UUID Generator. Copy the External ID as
you will use this when configuring the Amazon S3 Collector in Cortex XDR.
2. Click Next and add the AWS Managed Policy for Security Audit.
Cortex® XDR™ Pro Administrator’s Guide 645 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Then, add a role name and create the role. In this workflow, later, you will create the
granular policies and edit the role to aach the addional policies.
STEP 2 | Create the policy that defines the permissions for the Cortex XDR role.
1. Select IAM on the AWS Management Console.
2. In the navigaon pane on the le, select Access Management > Policies > Create Policy.
3. Select the JSON tab.
Copy the following JSON policy and paste it within editor window.
The <s3-arn> and <sqs-arn> placeholders. These will be filled out later
depending on which Amazon S3 logs you are configuring, including network
flow logs, audit logs, or generic logs.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "s3:GetObject",
"Resource": "<s3-arn>/*"
},
{
"Effect": "Allow",
"Action": [
"sqs:ReceiveMessage",
Cortex® XDR™ Pro Administrator’s Guide 646 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
"sqs:DeleteMessage",
"sqs:ChangeMessageVisibility"
],
"Resource": "<sqs-arn>"
}
]
}
STEP 3 | Edit the role you created in Step 1 and aach the policy to the role.
STEP 5 | Connue with the task for the applicable Amazon S3 logs you want to configure.
The following type of logs are available.
• Ingest Network Flow Logs from Amazon S3.
• Ingest Audit Logs from AWS Cloud Trail.
• Ingest Generic Logs from Amazon S3.
Ingesng logs and data requires a Cortex XDR Pro per TB license.
Cortex® XDR™ Pro Administrator’s Guide 647 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
There are various reasons why you may need to configure data collecon from Amazon S3
manually, as opposed to using the CloudFormaon Script provided in Cortex XDR. For example,
if your organizaon does not use CloudFormaon scripts, you will need to follow the instrucons
below, which explain at a high-level how to perform these steps manually with a link to the
relevant topic in the Amazon S3 documentaon with the detailed steps to follow.
As soon as Cortex XDR begins receiving logs, the app automacally creates an Amazon S3 XQL
dataset (aws_s3_raw). This enables you to search the logs with XQL Search using the dataset.
For example queries, refer to the in-app XQL Library. You can also configure Cortex XDR to ingest
network flow logs as XDR network connecon stories, which you can query with XQL Search
using the xdr_dataset dataset with the preset called network_story. Cortex XDR can also
raise Cortex XDR alerts (Correlaons, IOC, and BIOC only) when relevant from Amazon S3 logs.
Be sure you do the following tasks before you begin configuring data collecon manually from
Amazon CloudWatch to Amazon S3.
If you already have an Amazon S3 bucket configured with VPC flow logs that you want to
use for this configuraon, you do not need to perform the prerequisite steps detailed in the
first two bullets.
• Ensure that you have at a minimum the following permissions in AWS for an Amazon S3 bucket
and Amazon Simple Queue Service (SQS):
• Amazon S3 bucket—GetObject
• SQS—ChangeMessageVisibility, ReceiveMessage, and DeleteMessage.
• Create a dedicated Amazon S3 bucket for collecng network flow logs with the default
sengs. For more informaon, see Creang a bucket using the Amazon S3 Console.
Cortex® XDR™ Pro Administrator’s Guide 648 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 2 | From the menu bar, ensure that you have selected the correct region for your configuraon.
STEP 3 | Configure your Amazon Virtual Private Cloud (VPC) with flow logs. For more informaon, see
AWS VPC Flow Logs.
If you already have an Amazon S3 bucket configured with VPC flow logs, skip this step
and go to Configure an Amazon Simple Queue Service (SQS).
STEP 4 | Configure an Amazon Simple Queue Service (SQS). For more informaon, see Configuring
Amazon SQS queues (console).
Ensure that you create your Amazon S3 bucket and Amazon SQS queue in the same
region.
STEP 5 | Configure an event noficaon to your Amazon SQS whenever a file is wrien to your
Amazon S3 bucket. For more informaon, see Amazon S3 Event Noficaons.
STEP 6 | Configure access keys for the AWS IAM user that Cortex XDR uses for API operaons. For
more informaon, see Managing access keys for IAM users.
STEP 7 | Update the Access Policy of your SQS queue and grant the required permissions menoned
above to the relevant IAM user. For more informaon, see Granng permissions to publish
event noficaon messages to a desnaon.
Skip this step if you are using an Assumed Role for Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 649 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
3. Set these parameters, where the parameters change depending on whether you
configured an Access Key or Assumed Role.
• To provide access to Cortex XDR to your logs and perform API operaons using a
designated AWS IAM user, leave the Access Key opon selected. Otherwise, select
Assumed Role, and ensure that you Create an Assumed Role for Cortex XDR before
connuing with these instrucons. In addion, when you create an Assumed Role
for Cortex XDR, ensure that you edit the policy that defines the permissions for the
Cortex XDR role with the Amazon S3 Bucket ARN and SQS ARN.
• SQS URL—Specify the SQS URL, which is the ARN of the Amazon SQS that you
configured in the AWS Management Console. For more informaon on how to
retrieve your Amazon SQS ARN, see the Specify SQS queue field when you Configure
Cortex® XDR™ Pro Administrator’s Guide 650 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
an event noficaon to your Amazon SQS whenever a file is wrien to your Amazon
S3 bucket.
• Name—Specify a descripve name for your log collecon configuraon.
• When seng an Access Key, set these parameters.
• AWS Client ID—Specify the Access key ID, which you received when you created
access keys for the AWS IAM user in AWS.
• AWS Client Secret—Specify the Secret access key you received when you created
access keys for the AWS IAM user in AWS.
• When seng an Assumed Role, set these parameters.
• Role ARN—Specify the Role ARN for the Assumed Role for Cortex XDR in AWS.
• External Id—Specify the External Id for the Assumed Role for Cortex XDR in AWS.
• Log Type—Select Flow Logs to configure your log collecon to receive network flow
logs from Amazon S3. When configuring network flow log collecon, the following
addional field is displayed for the Configuraon.
You can Normalize and enrich flow logs by selecng the checkbox. If selected, Cortex
XDR ingests the network flow logs as XDR network connecon stories, which you
Cortex® XDR™ Pro Administrator’s Guide 651 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
can query using XQL Search from the xdr_dataset dataset using the preset called
network_story.
4. Click Test to validate access, and then click Enable.
Once events start to come in, a green check mark appears underneath the Amazon S3
configuraon with the number of logs received.
If you use Check Point FW1/VPN1 firewalls, you can sll take advantage of Cortex XDR
invesgaon and detecon capabilies by forwarding your Check Point firewall logs to Cortex
XDR. Check Point firewall logs can be used as the sole data source, however, you can also use
Check Point firewall logs in conjuncon with Palo Alto Networks firewall logs and addional data
sources.
Cortex XDR can stch data from Check Point firewalls with other logs to make up network stories
searchable in the Query Builder and in XQL queries. Cortex XDR can also return raw data from
Check Point firewalls in XQL queries.
In terms of alerts, Cortex XDR can both surface nave Check Point firewall alerts and raise its
own alerts on network acvity. Alerts are displayed throughout Cortex XDR alert, incident, and
invesgaon views.
To integrate your logs, you first need to set up an applet in a broker VM within your network to
act as a Syslog Collector. You then configure your Check Point firewall policy to log all traffic and
set up the Log Exporter on your Check Point Log Server to forward logs to the Syslog Collector in
a CEF format.
As soon as Cortex XDR starts to receive logs, the app can begin stching network connecon logs
with other logs to form network stories. Cortex XDR can also analyze your logs to raise Analycs
alerts and can apply IOC, BIOC, and Correlaon Rule matching. You can also use queries to search
your network connecon logs.
STEP 1 | Ensure that your Check Point firewalls meet the following requirements:
Check Point soware version—R77.30, R80.10, R80.20, R80.30, or R80.40
Cortex® XDR™ Pro Administrator’s Guide 652 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 4 | Configure the Check Point firewall to forward syslog events in CEF format to the Syslog
Collector.
Configure your firewall policy to log all traffic and set up the Log Exporter to forward logs to
the Syslog Collector. For more informaon on seng up Log Exporter, see the Check Point
documentaon.
If you use Cisco ASA firewalls, you can sll take advantage of Cortex XDR invesgaon and
detecon capabilies by forwarding your firewall logs to Cortex XDR. This enables Cortex XDR
to examine your network traffic to detect anomalous behavior. Cortex XDR can use Cisco ASA
firewall logs as the sole data source, but can also use Cisco ASA firewall logs in conjuncon with
Palo Alto Networks firewall logs. For addional endpoint context, you can also use Cortex XDR to
collect and alert on endpoint data.
As soon as Cortex XDR starts to receive logs, the app can begin stching network connecon logs
with other logs to form network stories. Cortex XDR can also analyze your logs to raise Analycs
alerts and can apply IOC, BIOC, and Correlaon Rule matching. You can also use queries to search
your network connecon logs.
To integrate your logs, you first need to set up an applet in a broker VM within your network to
act as a Syslog Collector. You then configure forwarding on your log devices to send logs to the
Syslog Collector in a CEF format.
STEP 1 | Verify that your Cisco ASA firewall meets the following requirements:
• Syslog in Cisco-ASA format
• Must include mestamps
• Only supports messages: 302013, 302014, 302015, 302016
Cortex® XDR™ Pro Administrator’s Guide 653 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 4 | Configure the Cisco ASA firewall or the log device forwarding logs from it to log to the Syslog
Collector in a CEF format.
Configure your firewall policy to log all traffic and forward the traffic logs to the Syslog
Collector in a CEF format. By logging all traffic, you enable Cortex XDR to detect anomalous
behavior from Cisco ASA firewall logs. For more informaon on seng up Log Forwarding on
Cisco ASA firewalls, see the Cisco ASA Series documentaon.
If you use Corelight Zeek sensors for network monitoring, you can sll take advantage of Cortex
XDR invesgaon and detecon capabilies by forwarding your network connecon logs to
Cortex XDR. This enables Cortex XDR to examine your network traffic to detect anomalous
behavior. Cortex XDR can use Corelight Zeek logs as the sole data source, but can also use logs in
conjuncon with Palo Alto Networks or third-party firewall logs. For addional endpoint context,
you can also use Cortex XDR to collect and alert on endpoint data.
As soon as Cortex XDR starts to receive logs, the app can begin stching network connecon logs
with other logs to form network stories. Cortex XDR can also analyze your logs to raise Analycs
alerts and can apply IOC BIOC, and Correlaon Rule matching. You can also use queries to search
your network connecon logs.
To integrate your logs, you first need to set up an applet in a broker VM within your network to
act as a Syslog Collector. You then configure forwarding on your Corelight Zeek sensors (using the
default Syslog export opon of RFC5424 over TCP) to send logs to the Syslog Collector.
STEP 1 | Acvate the Syslog Collector.
During acvaon, you define the Listening Port over which you want the Syslog Collector
to receive logs. You must also set TCP as the transport Protocol and Corelight as the Syslog
Format.
Cortex® XDR™ Pro Administrator’s Guide 654 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
If you use Fornet Forgate firewalls, you can sll take advantage of Cortex XDR invesgaon
and detecon capabilies by forwarding your firewall logs to Cortex XDR. This enables Cortex
XDR to examine your network traffic to detect anomalous behavior. Cortex XDR can use Fornet
Forgate firewall logs as the sole data source, but can also use Fornet Forgate firewall logs in
conjuncon with Palo Alto Networks firewall logs. For addional endpoint context, you can also
use Cortex XDR to collect and alert on endpoint data.
As soon as Cortex XDR starts to receive logs, the app can begin stching network connecon logs
with other logs to form network stories. Cortex XDR can also analyze your logs to raise Analycs
alerts and can apply IOC, BIOC, and Correlaon Rule matching. You can also use queries to search
your network connecon logs.
To integrate your logs, you first need to set up an applet in a broker VM within your network to
act as a syslog collector. You then configure forwarding on your log devices to send logs to the
syslog collector in a CEF format.
STEP 1 | Verify that your Fornet Forgate firewalls meet the following requirements:
• Must use ForOS 6.2.1 or a later release
• mestamp must be in nanoseconds
STEP 4 | Configure the log device that receives Fornet Forgate firewall logs to forward syslog
events to the syslog collector in a CEF format.
Configure your firewall policy to log all traffic and forward the traffic logs to the syslog collector
in a CEF format. By logging all traffic, you enable Cortex XDR to detect anomalous behavior
from Fornet Forgate firewall logs. For more informaon on seng up Log Forwarding on
Fornet Forgate firewalls, see the Fornet ForOS documentaon.
If you use the Pub/Sub messaging service from Global Cloud Plaorm (GCP), you can send logs
and data from your GCP instance to Cortex XDR. Data from GCP is then searchable in Cortex
XDR to provide addional informaon and context to your invesgaons using the GCP XQL
dataset (google_cloud_logging_raw). For example queries, refer to the in-app XQL Library.
You can also configure Cortex XDR to normalize GCP audit logs, which you can query with XQL
Search using the cloud_audit_logs dataset. In addion, you can configure Cortex XDR to
ingest network flow logs as XDR network connecon stories, which you can query with XQL
Search using the xdr_dataset dataset with the preset called network_story. Cortex XDR can
also raise Cortex XDR alerts (Analycs, IOC, BIOC, and Correlaon Rule only) when relevant from
GCP logs. Analycs alerts are only raised on normalized logs.
Cortex® XDR™ Pro Administrator’s Guide 655 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
When collecng flow logs, we recommend that you include GKE annotaons in your logs,
which enable you to view the names of the containers that communicated with each
other. GKE annotaons are only included in logs if appended manually using the custom
metadata configuraon in GCP. For more informaon, see VPC Flow Logs Overview. In
addion, to customize metadata fields, you must use the gcloud command-line interface or
the API. For more informaon, see Using VPC Flow Logs.
To receive logs and data from GCP, you must first set up log forwarding using a Pub/Sub topic
in GCP. You can configure GCP sengs using either the GCP web interface or a GCP cloud shell
terminal. Aer you set up your service account in GCP, you configure the Data Collecon sengs
in Cortex XDR. The setup process requires the subscripon name and authencaon key from
your GCP instance.
Aer you set up log collecon, Cortex XDR immediately begins receiving new logs and data from
GCP.
• Set up Log Forwarding Using the GCP Web Interface
• Set up Log Forwarding Using the GCP Cloud Shell Terminal
Cortex® XDR™ Pro Administrator’s Guide 656 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 657 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
GCP audit logs, which you can query with XQL Search using the cloud_audit_logs
dataset.
6. Test the provided sengs and, if successful, proceed to Enable log collecon.
STEP 6 | Aer Cortex XDR begins receiving informaon from the GCP Pub/Sub service, you can use
the XQL Query language to search for specific data.
Cortex® XDR™ Pro Administrator’s Guide 658 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Note the subscripon name you define in this step as you will need it to set up log ingeson
from Cortex XDR.
If setup is successful, the console displays a summary of your log sink sengs:
Created [https://logging.googleapis.com/v2/projects/
PROJECT_ID/sinks/SINK_NAME]. Please remember to grant
`serviceAccount:LOGS_SINK_SERVICE_ACCOUNT` \ the Pub/Sub Publisher
role on the topic. More information about sinks can be found at /
logging/docs/export/configure_export
STEP 6 | Grant log sink service account to publish to the new topic
Note the serviceAccount name from the previous step and use it to define the service for
which you want to grant publish access.
Cortex® XDR™ Pro Administrator’s Guide 659 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 11 | Aer Cortex XDR begins receiving informaon from the GCP Pub/Sub service, you can use
the XQL Query language to search for specific data.
Cortex® XDR™ Pro Administrator’s Guide 660 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
To receive logs from Azure Event Hub, you must configure the Collecon Integraons sengs
in Cortex XDR based on your Microso Azure Event Hub configuraon. Aer you set up data
collecon, Cortex XDR begins receiving new logs and data from the source.
When Cortex XDR begins receiving logs, the app creates a new dataset (MSFT_Azure_raw) that
you can use to iniate XQL Search queries. For example queries, refer to the in-app XQL Library.
You can also configure Cortex XDR to normalize Azure Event Hub audit logs with other Cortex
XDR authencaon stories across all cloud providers using the same format, which you can query
with XQL Search using the cloud_audit_logs or xdr_data datasets. For logs that you do not
configure Cortex XDR to normalize, you can change the default dataset. Cortex XDR can also raise
Cortex XDR alerts (IOC, BIOC, and Correlaon Rule only) when relevant from Azure Event Hub
logs.
Cortex XDR can also ingest Azure sign-in logs when you configure an Azure Event Hub data
collector to collect audit logs. This is also dependent on seng the applicable Diagnosc sengs
in Azure Acve Directory with the selected sign-in log categories. These logs are added in Cortex
XDR to the MSFT_Azure_raw dataset. In addion, Cortex XDR can normalize and enrich these
authencaon logs. Cortex XDR can normalize these Acve Directory sign-in logs with other
Cortex XDR authencaon stories across all cloud providers using the same format. You can query
these logs in XQL Search using the cloud_audit_logs and xdr_data datasets.
Be sure you do the following tasks before you begin configuring data collecon from Azure Event
Hub.
• Create an Azure Event Hub. For more informaon, see Quickstart: Create an event hub using
Azure portal.
• Ensure the format for the logs you want collected from the Azure Event Hub is either JSON or
raw.
Configure the Azure Event Hub collecon in Cortex XDR.
STEP 1 | In the Microso Azure Console, open the Event Hubs page, and select the Azure Event Hub
that you created for collecon in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 661 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 2 | Record the following parameters from your configured event hub, which you will need when
configuring data collecon in Cortex XDR.
• Your event hub’s consumer group.
1. Select Enes > Event Hubs, and select your event hub.
2. Select Enes > Consumer groups, and select your event hub.
3. In the Consumer group table, copy the applicable value listed in the Name column for
your Cortex XDR data collecon configuraon.
• Your event hub’s connecon string for the designated policy.
1. Select Sengs > Shared access policies.
2. In the Shared access policies table, select the applicable policy.
3. Copy the Connecon string-primary key.
• Storage account for the connecon string.
1. Open the Storage accounts page, and select the storage account that contains the
connecon string for the event hub you have configured for data collecon by Cortex
XDR.
2. Select Security + networking > Access keys, and click Show keys.
3. Copy the applicable Connecon string.
Cortex® XDR™ Pro Administrator’s Guide 662 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | (Oponal) Configure your Microso Azure Event Hub to collect Azure sign-in logs.
1. In the Microso Azure Console, search for Azure Acve Directory, and select Services >
Azure Acve Directory.
2. Select Monitoring > Diagnosc sengs, and +Add diagnosc seng.
3. Set the following parameters.
Cortex® XDR™ Pro Administrator’s Guide 663 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
• Event hub namespace—Select the applicable Subscripon for the Azure Event
Hub.
• (Oponal) Event hub name—Specify the name of your Azure Event Hub.
• Event hub policy—Select the applicable Event hub policy for your Azure Event
Hub.
4. Save your sengs.
Cortex® XDR™ Pro Administrator’s Guide 664 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
When you Normalize and enrich audit logs, the log format is automacally
configured. As a result, this opon is removed and no longer available to
configure.
• Vendor and Product—Specify the Vendor and Product for the type of logs you are
ingesng.
The Vendor and Product are used to define the name of your XQL dataset
(<vendor>_<product>_raw). If you do not define a Vendor or Product, Cortex
Cortex® XDR™ Pro Administrator’s Guide 665 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
XDR uses the default values of MSFT and Azure with the resulng dataset name as
MSFT_Azure_raw. To uniquely idenfy the log source, consider changing the values.
When you Normalize and enrich audit logs, the Vendor and Product fields
are automacally configured. Therefore, these fields are removed as available
opons.
• Normalize and enrich audit logs—(Oponal) You can Normalize and enrich audit logs
by selecng the checkbox. If selected, Cortex XDR normalizes and enriches Azure
Event Hub audit logs, including any Azure sign-in logs configured for collecon, with
other Cortex XDR authencaon stories across all cloud providers using the same
format, which you can query with XQL Search using the cloud_audit_logs and
xdr_data datasets.
4. Click Test to validate access, and then click Enable.
Once events start to come in, a green check mark appears underneath the Azure Event
Hub configuraon with the amount of data received.
To receive network security group (NSG) flow logs from Azure Network Watcher, you must
configure data collecon from Microso Azure Network Watcher using an Azure Funcon
provided by Cortex XDR. This Azure Funcon requires a token that is generated when you
configure your Azure Network Watcher Collector in the Collecon Integraon sengs in Cortex
XDR. Aer you set up data collecon, Cortex XDR begins receiving new logs and data from the
source.
When Cortex XDR begins receiving logs, the app creates a new dataset (MSFT_Azure_raw) that
you can use to iniate XQL Search queries. For example queries, refer to the in-app XQL Library.
You can also configure Cortex XDR to ingest network flow logs as XDR network connecon
stories, which you can query with XQL Search using the xdr_dataset dataset with the preset
called network_story. Cortex XDR can also raise Cortex XDR alerts (Analycs, Correlaon Rule,
IOC and BIOC only) when relevant from Azure Network Watcher logs. Analycs alerts are only
raised on normalized logs.
Be sure you do the following tasks before you begin configuring data collecon from Azure
Network Watcher.
• Ensure that your NSG flow logs in Azure Network Watcher, conform to the requirements
as outlined in the Microso documentaon. For more informaon, see Introducon to flow
logging for network security groups.
• Enable NSG flow logs in the Microso Azure Portal.
Cortex® XDR™ Pro Administrator’s Guide 666 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 667 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
you forget to record the key and close the window, you will need to generate a new key
and repeat this process. When you are finished, click Done to close the window.
5. In the Integraons page for the Azure Network Watch Collector that you created, select
Copy api url and record it somewhere safe. you will need to provide this URL when you
configure the Azure Funcon and set the XDR Host value.
Cortex® XDR™ Pro Administrator’s Guide 668 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 669 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
To receive logs and data from Okta, you must configure the Collecon Integraons sengs in
Cortex XDR. Aer you set up data collecon, Cortex XDR immediately begins receiving new logs
and data from the source. The informaon from Okta is then searchable in XQL Search using the
okta_sso_raw dataset.
You can collect all types of events from Okta. When seng up the Okta data collector in Cortex
XDR, a field called Okta Filter is available to configure collecon for events of your choosing. All
events are collected by default unless you define an Okta API Filter expression for collecng the
data, such as filter=eventType eq “user.session.start”.\n. For Okta informaon
to be weaved into authencaon stories, “user.authentication.sso” events must be
collected.
Cortex® XDR™ Pro Administrator’s Guide 670 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
Cortex® XDR™ Pro Administrator’s Guide 671 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
1. Specify the OKTA DOMAIN (Org URL) that you idenfied on your Okta console.
2. Specify the TOKEN used to authencate with Okta.
3. Specify the Okta Filter to configure collecon for events of your choosing. All events
are collected by default unless you define an Okta API Filter expression for collecng
the data, such as filter=eventType eq “user.session.start”.\n. For Okta
informaon to be weaved into authencaon stories, “user.authentication.sso”
events must be collected.
4. Test the connecon sengs.
5. If successful, Enable Okta log collecon.
Once events start to come in, a green check mark appears underneath the Okta
configuraon with the amount of data received.
STEP 5 | Aer Cortex XDR begins receiving informaon from the service, you can Create an XQL
Query to search for specific data. When including authencaon events, you can also Create
an Authencaon Query to search for specific authencaon data.
To receive Windows DHCP logs, you must configure data collecon from Windows DHCP via
Elascsearch Filebeat. This is configured by seng up a Windows DHCP Collector in Cortex XDR
and installing and configuring an Elascsearch* Filebeat agent on your Windows DHCP Server.
Certain sengs in the Elascsearch Filebeat default configuraon file called filebeat.yml
must be populated with values provided when you configure the Collecon Integraons sengs
in Cortex XDR for the Windows DHCP Collector. To help you configure the filebeat.yml
Cortex® XDR™ Pro Administrator’s Guide 672 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
correctly, Cortex XDR provides an example file that you can download and customize. Aer you
set up collecon integraon, Cortex XDR begins receiving new logs and data from the source.
For more informaon on configuring the filebeat.yml file, see the Elasc Filebeat
Documentaon.
Windows DHCP logs are stored as CSV (comma-separated values) log files. The logs rotate by
days (DhcpSrvLog-<day>.log), and each file contains two secons - Event ID Meaning and
the events list.
As soon as Cortex XDR begins receiving logs, the app automacally creates a Windows DHCP
XQL dataset (windows_dhcp_raw). Cortex XDR uses Windows DHCP logs to enrich your
network logs with hostnames and MAC addresses that are searchable in XQL Search using the
Windows DHCP XQL dataset.
Configure Cortex XDR to receive logs from Windows DHCP via Elascsearch Filebeat.
STEP 1 | Configure the Windows DHCP Collector in Cortex XDR.
1. Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
2. In the Windows DHCP Collector configuraon, click the here link to begin a new
configuraon.
Cortex® XDR™ Pro Administrator’s Guide 673 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
the filebeat.yml file as explained in Step #2. If you forget to record the key and close
the window you will need to generate a new key and repeat this process.
• Filebeat inputs—Define the paths to crawl and fetch. The code below provides an
example of how to configure the Filebeat inputs secon in the filebeat.yml file
with these paths configured.
Cortex® XDR™ Pro Administrator’s Guide 674 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
enabled: true
# Paths that should be crawled and fetched. Glob based
paths.
paths:
- c:\Windows\System32\dhcp\DhcpSrvLog*.log
• Elascsearch Output—Set the hosts and api_key, where both of these values
are obtained when you configured the Windows DHCP Collector in Cortex XDR as
explained in Step #1. The code below provides an example of how to configure the
Elascsearch Output secon in the filebeat.yml file and indicates which sengs
need to be obtained from Cortex XDR.
# ================================= Processors
=================================
processors:
Cortex® XDR™ Pro Administrator’s Guide 675 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
- add_host_metadata:
when.not.contains.tags: forwarded
- drop_event.when.not.regexp.message: "^[0-9]+,.*"
- dissect:
tokenizer: "%{id},%{date},%{time},%{description},
%{ipAddress},%{hostName},%{macAddress},%{userName},
%{transactionID},%{qResult},%{probationTime},
%{correlationID},%{dhcid},%{vendorClassHex},
%{vendorClassASCII},%{userClassHex},%{userClassASCII},
%{relayAgentInformation},%{dnsRegError}"
- drop_fields:
fields: ["message"]
- add_locale: ~
- rename:
fields:
- from: "event.timezone"
to: "dissect.timezone"
ignore_missing: true
fail_on_error: false
- add_cloud_metadata: ~
- add_docker_metadata: ~
- add_kubernetes_metadata: ~
You can also configure Filebeat for DHCP using the embedded Microso module
configuraon file called input.yml, where the same Processors secon as
configured above is included. For more informaon, see the Filebeat Microso
DHCP module documentaon.
STEP 4 | Aer Cortex XDR begins receiving logs from Windows DHCP via Elascsearch Filebeat, you
can use the XQL Search to search for logs in the new dataset (windows_dhcp_raw).
Elascsearch is a trademark of Elascsearch B.V., registered in the U.S. and in other countries.
If you use Zscaler Cloud Firewall in your network, you can forward your firewall and network
logs to Cortex XDR for analysis. This enables you to take advantage of Cortex XDR anomalous
behavior detecon and invesgaon capabilies. Cortex XDR can use the firewall and network
logs from Zscaler Cloud Firewall as the sole data source, and can also use these firewall and
network logs from Zscaler Cloud Firewall in conjuncon with Palo Alto Networks firewall and
Cortex® XDR™ Pro Administrator’s Guide 676 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
network logs. For addional endpoint context, you can also use Cortex XDR to collect and alert on
endpoint data.
As soon as Cortex XDR starts to receive logs, the app performs these acons:
• Begins stching network connecon and firewall logs with other logs to form network stories.
Cortex XDR can also analyze your logs to raise Analycs alerts and can apply IOC, BIOC, and
Correlaon Rule matching. You can also use queries to search your network connecon logs.
• Creates a Zscaler XQL dataset (<Vendor>_<Product>_raw) based on the <Vendor> and
<Product> fields defined on the Zscaler Cloud Firewall syslog configuraon. This enables you
to search the logs using XQL Search.
To integrate your logs, you first need to set up an applet in a broker VM within your network to
act as a Syslog Collector. You then configure forwarding on your log devices to send logs to the
syslog collector. To provide seamless log ingeson, Cortex XDR automacally maps the fields in
your traffic logs to the Cortex XDR log format.
To ingest logs from Zscaler Cloud Firewall:
STEP 1 | Acvate the Syslog Collector.
STEP 2 | Increase log storage for Zscaler Cloud Firewall logs. For more informaon, see Allocate Log
Storage for Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 677 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | Configure NSS log forwarding in Zscaler Cloud Firewall to the Syslog Collector:
1. In the Zscaler Cloud Firewall applicaon, go to Administraon > Nanolog Streaming
Service.
2. In the NSS Feeds tab, Add NSS Feed.
3. In the Add NSS Feed screen, configure the fields for the Cortex XDR Syslog Collector.
The following image displays the fields required to add an NSS feed.
For more informaon on configuring the other configuraons on the screen, see
the Zscaler Cloud Firewall documentaon for Adding NSS Feeds for Firewall
Logs.
• SIEM TCP Port—Specify the port that you set when acvang the Syslog Collector in
Cortex XDR. See Step 1.
• SIEM IP Address—Specify the IP that you set when acvang the Syslog Collector in
Cortex XDR. See Step 1.
Cortex® XDR™ Pro Administrator’s Guide 678 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
4. Click Save.
5. Click Save and acvate the change according to the Zscaler Cloud Firewall
documentaon.
Cortex® XDR™ Pro Administrator’s Guide 679 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
When you ingest authencaon logs and data from an external source, Cortex XDR can weave
that informaon into authencaon stories. An authencaon story unites logs and data
regardless of the informaon source (for example, from an on-premise KDC or from a cloud-based
authencaon service) into a uniform schema. To search authencaon stories, you can use the
Query Builder or XQL Search.
Cortex XDR can ingest authencaon logs and data from the following authencaon services:
• AWS CloudTrail
• Microso Azure AD
• Microso Azure Event Hub
• GCP Pub/Sub
• Okta
• PingFederate
• PingOne
You can forward audit logs for the relave service to Cortex XDR from AWS CloudTrail.
To receive audit logs from Amazon Simple Storage Service (Amazon S3) via AWS CloudTrail,
you must first configure data collecon from Amazon S3. You can then configure the Collecon
Integraons sengs in Cortex XDR for Amazon S3. Aer you set up collecon integraon, Cortex
XDR begins receiving new logs and data from the source.
For more informaon on configuring data collecon from Amazon S3 using AWS
CloudTrail, see the AWS CloudTrail Documentaon.
As soon as Cortex XDR begins receiving logs, the app automacally creates an Amazon S3 XQL
dataset (aws_s3_raw). This enables you to search the logs with XQL Search using the dataset.
For example queries, refer to the in-app XQL Library. You can also configure Cortex XDR to stch
Amazon S3 audit logs with other Cortex XDR authencaon stories across all cloud providers
using the same format, which you can query with XQL Search using the cloud_audit_logs
dataset. Cortex XDR can also raise Cortex XDR alerts (IOC, BIOC, and Correlaon Rule only) when
relevant from Amazon S3 logs.
Be sure you do the following tasks before you begin configuring data collecon from Amazon S3
via AWS CloudTrail.
Cortex® XDR™ Pro Administrator’s Guide 680 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
• Ensure that you have the proper permissions to access AWS CloudTrail and have the necessary
permissions to create audit logs. You need at a minimum the following permissions in AWS for
an Amazon S3 bucket and Amazon Simple Queue Service (SQS):
• Amazon S3 bucket—GetObject
• SQS—ChangeMessageVisibility, ReceiveMessage, and DeleteMessage.
• Determine how you want to provide access to Cortex XDR to your logs and to perform API
operaons. You have the following opons:
• Designate an AWS IAM user, where you will need to know the Account ID for the user and
have the relevant permissions to create an access key/id for the relevant IAM user. This is
the default opon as explained in configure the Amazon S3 collecon in Cortex XDR by
selecng Access Key.
• Create an assumed role in AWS to delegate permissions to a Cortex XDR AWS service. This
role grants Cortex XDR access to your flow logs. For more informaon, see Creang a role
to delegate permissions to an AWS service. This is the Assumed Role opon as described in
the configure the Amazon S3 collecon in Cortex XDR. For more informaon on creang an
assumed role for Cortex XDR, see Create an Assumed Role for Cortex XDR.
Configure Cortex XDR to receive audit logs from Amazon S3 via AWS Cloudtrail.
STEP 1 | Log in to the AWS Management Console.
STEP 2 | From the menu bar, ensure that you have selected the correct region for your configuraon.
For more informaon on creang an AWS CloudTrail trail, see Create a trail.
If you already have an Amazon S3 bucket configured with AWS CloudTrail audit logs,
skip this step and go to Configure an Amazon Simple Queue Service (SQS).
Cortex® XDR™ Pro Administrator’s Guide 681 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
write to it. For informaon about manually eding the bucket policy, see Amazon S3
Bucket Policy for CloudTrail.
The CloudWatch Logs - oponal sengs are not supported and should be le
disabled.
3. Click Next, and configure the following Choose log events sengs.
• Event type—Leave the default Management events checkbox selected to capture
audit logs. Depending on your system requirements, you can also select Data events
to log the resource operaons performed on or within a resource, or Insights events
to idenfy unusual acvity, errors, or user behavior in your account. Based on your
selecon, addional fields are displayed on the screen to configure under secon
headings with the same name as the event type.
• Management events secon—Configure the following sengs:
-API acvity—For Management events, select the API acvies you want to log. By
default, the Read and Write acvies are logged.
-Exclude AWS KMS events—(Oponal) If you want to filter AWS Key Management
Service (AWS KMS) events out of your trail, select the checkbox. By default, all AWS
KMS events are included.
• Data events secon—(Oponal) This secon is displayed when you configure the
Event type to include Data events, which relate to resource operaons performed on
or within a resource, such as reading and wring to a S3 bucket.. For more informaon
on configuring these oponal sengs in AWS CloudTrail, see Creang a trail.
• Insights events secon—(Oponal) This secon is displayed when you configure the
Event type to include Insight events, which relate to unusual acvies, errors, or
Cortex® XDR™ Pro Administrator’s Guide 682 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
user behavior on your account. For more informaon on configuring these oponal
sengs in AWS CloudTrail, see Creang a trail.
4. Click Next.
5. In the Review and create page, look over the trail configuraons sengs that you have
configured and if they are correct, click Create trail. If you need to make a change, click
Edit beside the parcular step that you want to update.
The new trail is listed in the Trails page, which lists the trails in your account from all
Regions. It can take up to 15 minutes for CloudTrail to begin publishing log files. You can
see the log files in the S3 bucket that you specified. For more informaon, see Creang a
trail.
Ensure that you create your Amazon S3 bucket and Amazon SQS queue in the same
region.
Cortex® XDR™ Pro Administrator’s Guide 683 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
messages to your SQS queue. Use this sample code as a guide for defining the
“Statement” with the following definions:
-“Resource”—Leave the automacally generated ARN for the SQS queue that is
set in the code, which uses the format “arn:sns:Region:account-id:topic-
name”.
-“Resource”—Leave the automacally generated ARN for the SQS queue that is
set in the code, which uses the format “arn:sns:Region:account-id:topic-
name”.
You can retrieve your bucket’s ARN by opening the Amazon S3 Console in a browser
window. In the Buckets secon, select the bucket that you created for collecng the
Amazon S3 flow logs, click Copy ARN, and paste the ARN in the field.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "s3.amazonaws.com"
},
"Action": "SQS:SendMessage",
"Resource": "[Leave automatically generated ARN for
the SQS queue defined by AWS]",
"Condition": {
"ArnLike": {
"aws:SourceArn": "[ARN of your Amazon S3 bucket]"
}
}
},
]
}
• Dead-leer queue secon—We recommend that you configure a queue for sending
undeliverable messages by selecng Enabled, and then in the Choose queue field
selecng the queue to send the messages. You may need to create a new queue for
Cortex® XDR™ Pro Administrator’s Guide 684 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
this, if you do not already have one set up. For more informaon, see Amazon SQS
dead-leer queues.
3. Click Create queue.
Once the SQS is created, a message indicang that the queue was successfully
configured is displayed at the top of the page.
STEP 5 | Configure an event noficaon to your Amazon SQS whenever a file is wrien to your
Amazon S3 bucket.
1. Open the Amazon S3 Console and in the Properes tab of your Amazon S3 bucket, scroll
down to the Event noficaons secon, and click Create event noficaon.
2. Configure the following sengs:
• Event name—Specify a descripve name for your event noficaon containing up to
255 characters.
• Prefix—Do not set a prefix as the Amazon S3 bucket is meant to be a dedicated
bucket for collecng only network flow logs.
• Event types—Select All object create events for the type of event noficaons that
you want to receive.
• Desnaon—Select SQS queue to send noficaons to an SQS queue to be read by a
server.
• Specify SQS queue—You can either select Choose from your SQS queues and then
select the SQS queue, or select Enter SQS queue ARN and specify the ARN in the
SQS queue field.
You can retrieve your SQS queue ARN by opening another instance of the AWS
Management Console in a browser window, and opening the Amazon SQS Console,
Cortex® XDR™ Pro Administrator’s Guide 685 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
and selecng the Amazon SQS that you created. In the Details secon, under ARN,
click the copy icon ( )), and paste the ARN in the field.
If your receive an error when trying to save your changes, you should ensure that
the permissions are set up correctly.
STEP 6 | Configure access keys for the AWS IAM user that Cortex XDR uses for API operaons.
1. Open the AWS IAM Console, and in the navigaon pane, select Access management >
Users.
2. Select the User name of the AWS IAM user.
3. Select the Security credenals tab, and scroll down to the Access keys secon, and click
Create access key.
4. Click the copy icon next to the Access key ID and Secret access key keys, where you
must click Show secret access key to see the secret key, and record them somewhere
safe before closing the window. You will need to provide these keys when you edit the
Access policy of the SQS queue and when seng the AWS Client ID and AWS Client
Secret in Cortex XDR. If you forget to record the keys and close the window, you will
need to generate new keys and repeat this process.
For more informaon, see Managing access keys for IAM users.
Cortex® XDR™ Pro Administrator’s Guide 686 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Skip this step if you are using an Assumed Role for Cortex XDR.
1. In the Amazon SQS Console, select the SQS queue that you created in Configure an
Amazon Simple Queue Service (SQS).
2. Select the Access policy tab, and Edit the Access policy code in the editor
window to enable the IAM user to perform operaons on the Amazon SQS with
permissions to SQS:ChangeMessageVisibility, SQS:DeleteMessage, and
SQS:ReceiveMessage. Use this sample code as a guide for defining the “Sid”:
“__receiver_statement” with the following definions.
• “aws:SourceArn”—Specify the ARN of the AWS IAM user. You can retrieve the
User ARN from the Security credenals tab, which you accessed when configuring
access keys for the AWS API user.
• “Resource”—Leave the automacally generated ARN for the SQS queue that is
set in the code, which uses the format “arn:sns:Region:account-id:topic-
name”.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "s3.amazonaws.com"
},
"Action": "SQS:SendMessage",
"Resource": "[Leave automatically generated ARN for
the SQS queue defined by AWS]",
"Condition": {
"ArnLike": {
"aws:SourceArn": "[ARN of your Amazon S3 bucket]"
}
}
},
{
"Sid": "__receiver_statement",
"Effect": "Allow",
"Principal": {
"AWS": "[Add the ARN for the AWS IAM user]"
},
"Action": [
"SQS:ChangeMessageVisibility",
"SQS:DeleteMessage",
"SQS:ReceiveMessage"
],
Cortex® XDR™ Pro Administrator’s Guide 687 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
3. Set these parameters, where the parameters change depending on whether you
configured an Access Key or Assumed Role.
• To provide access to Cortex XDR to your logs and perform API operaons using a
designated AWS IAM user, leave the Access Key opon selected. Otherwise, select
Assumed Role, and ensure that you Create an Assumed Role for Cortex XDR before
connuing with these instrucons. In addion, when you create an Assumed Role
Cortex® XDR™ Pro Administrator’s Guide 688 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
for Cortex XDR, ensure that youedit the policy that defines the permissions for the
Cortex XDR role with the Amazon S3 Bucket ARN and SQS ARN.
• SQS URL—Specify the SQS URL, which is the ARN of the Amazon SQS that you
configured in the AWS Management Console. For more informaon on how to
retrieve your Amazon SQS ARN, see Specify SQS queue.
• Name—Specify a descripve name for your log collecon configuraon.
• When seng an Access Key, set these parameters.
• AWS Client ID—Specify the Access key ID, which you received when you
configured access keys for the AWS IAM user in AWS.
• AWS Client Secret—Specify the Secret access key you received when you
configured access keys for the AWS IAM user in AWS.
• When seng an Assumed Role, set these parameters.
• Role ARN—Specify the Role ARN for the Assumed Role you created for Cortex
XDR in AWS.
• External Id—Specify the External Id for the Assumed Role you created for Cortex
XDR in AWS.
• Log Type—Select Audit Logs to configure your log collecon to receive audit logs from
Amazon S3 via AWS CloudTrail. When configuring audit log collecon, the following
addional field is displayed for the Configuraon.
You can Normalize and enrich audit logs by selecng the checkbox. If selected, Cortex
XDR stches Amazon S3 audit logs with other Cortex XDR authencaon stories
Cortex® XDR™ Pro Administrator’s Guide 689 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
across all cloud providers using the same format, which you can query with XQL
Search using the cloud_audit_logs dataset.
4. Click Test to validate access, and then click Enable.
Once events start to come in, a green check mark appears underneath the Amazon S3
configuraon with the number of logs received.
To receive authencaon and audit logs from Azure AD, you must first configure the Data
Collecon sengs in Cortex XDR. Aer you set up data collecon, Cortex XDR begins receiving
new logs and data from the source.
To address Azure reporng latency, there is a 10-minute latency period for Cortex XDR
to receive Azure AD logs.
When Cortex XDR begins receiving logs, the app creates a new dataset (MSFT_Azure_AD_raw
for authencaon logs or MSFT_Azure_AD_Audit_raw for audit logs) that you can use to
iniate XQL Search queries. For example queries, refer to the in-app XQL Library. When relevant,
Cortex XDR stches Azure AD authencaon logs with authencaon stories. Cortex XDR can
also raise Cortex XDR alerts (IOC, BIOC, and Correlaon Rule only) when relevant from Azure AD
logs.
STEP 1 | From the Microso Azure Console, create an app for Cortex XDR with the following API
permissions: AuditLog.ReadAll and Directory.ReadAll. For more informaon on
Microso Azure, see the following instrucons on the Microso documentaon portal:
• Register an app: hps://docs.microso.com/en-us/azure/acve-directory/develop/
quickstart-register-app
• Add API permissions for Directory.Read.All and AuditLog.Read.All with type Applicaon:
hps://docs.microso.com/en-us/azure/acve-directory/develop/quickstart-configure-app-
access-web-apis#add-permissions-to-access-web-apis
• Create an applicaon secret: hps://docs.microso.com/en-us/azure/acve-directory/
develop/howto-create-service-principal-portal#create-a-new-applicaon-secret
STEP 2 | Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
Cortex® XDR™ Pro Administrator’s Guide 690 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | Integrate the Microso Azure AD authencaon service with Cortex XDR.
1. Enter the Tenant Domain of your Microso Azure AD tenant.
2. Obtain the Applicaon Client ID and Secret for your Azure AD service from the
Microso Azure Console and enter the values in Cortex XDR.
These values enable Cortex XDR to authencate with your Azure AD service.
3. Select the types of logs that you want to receive from your Azure AD service.
Opons are Authencaon Logs and Audit Logs. By default, both opons are enabled.
4. Test the connecon sengs.
To test the connecon, you must select one or both log types. Cortex XDR then tests the
connecon sengs for the selected log types.
5. If successful, Enable Azure AD log collecon.
STEP 4 | Aer Cortex XDR begins receiving logs, you can return to the Integraons page to view the
log collecon status.
If you set up Cortex XDR to receive both authencaon and audit logs, the events total
includes both log types.
STEP 5 | As part of your invesgaon flows, create queries when needed to search for specific Azure
AD logs.
See Create an Authencaon Query (authencaon logs only) or Create an XQL Query.
To receive logs from Azure Event Hub, you must configure the Collecon Integraons sengs
in Cortex XDR based on your Microso Azure Event Hub configuraon. Aer you set up data
collecon, Cortex XDR begins receiving new logs and data from the source.
When Cortex XDR begins receiving logs, the app creates a new dataset (MSFT_Azure_raw) that
you can use to iniate XQL Search queries. For example queries, refer to the in-app XQL Library.
You can also configure Cortex XDR to normalize Azure Event Hub audit logs with other Cortex
XDR authencaon stories across all cloud providers using the same format, which you can query
with XQL Search using the cloud_audit_logs or xdr_data datasets. For logs that you do not
configure Cortex XDR to normalize, you can change the default dataset. Cortex XDR can also raise
Cortex XDR alerts (IOC, BIOC, and Correlaon Rule only) when relevant from Azure Event Hub
logs.
Cortex XDR can also ingest Azure sign-in logs when you configure an Azure Event Hub data
collector to collect audit logs. This is also dependent on seng the applicable Diagnosc sengs
in Azure Acve Directory with the selected sign-in log categories. These logs are added in Cortex
XDR to the MSFT_Azure_raw dataset. In addion, Cortex XDR can normalize and enrich these
authencaon logs. Cortex XDR can normalize these Acve Directory sign-in logs with other
Cortex XDR authencaon stories across all cloud providers using the same format. You can query
these logs in XQL Search using the cloud_audit_logs and xdr_data datasets.
Cortex® XDR™ Pro Administrator’s Guide 691 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Be sure you do the following tasks before you begin configuring data collecon from Azure Event
Hub.
• Create an Azure Event Hub. For more informaon, see Quickstart: Create an event hub using
Azure portal.
• Ensure the format for the logs you want collected from the Azure Event Hub is either JSON or
raw.
Configure the Azure Event Hub collecon in Cortex XDR.
STEP 1 | In the Microso Azure Console, open the Event Hubs page, and select the Azure Event Hub
that you created for collecon in Cortex XDR.
STEP 2 | Record the following parameters from your configured event hub, which you will need when
configuring data collecon in Cortex XDR.
• Your event hub’s consumer group.
1. Select Enes > Event Hubs, and select your event hub.
2. Select Enes > Consumer groups, and select your event hub.
3. In the Consumer group table, copy the applicable value listed in the Name column for
your Cortex XDR data collecon configuraon.
• Your event hub’s connecon string for the designated policy.
1. Select Sengs > Shared access policies.
2. In the Shared access policies table, select the applicable policy.
3. Copy the Connecon string-primary key.
• Storage account for the connecon string.
1. Open the Storage accounts page, and select the storage account that contains the
connecon string for the event hub you have configured for data collecon by Cortex
XDR.
2. Select Security + networking > Access keys, and click Show keys.
3. Copy the applicable Connecon string.
Cortex® XDR™ Pro Administrator’s Guide 692 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | (Oponal) Configure your Microso Azure Event Hub to collect Azure sign-in logs.
1. In the Microso Azure Console, search for Azure Acve Directory, and select Services >
Azure Acve Directory.
2. Select Monitoring > Diagnosc sengs, and +Add diagnosc seng.
3. Set the following parameters.
Cortex® XDR™ Pro Administrator’s Guide 693 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
• Event hub namespace—Select the applicable Subscripon for the Azure Event
Hub.
• (Oponal) Event hub name—Specify the name of your Azure Event Hub.
• Event hub policy—Select the applicable Event hub policy for your Azure Event
Hub.
4. Save your sengs.
Cortex® XDR™ Pro Administrator’s Guide 694 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
When you Normalize and enrich audit logs, the log format is automacally
configured. As a result, this opon is removed and no longer available to
configure.
• Vendor and Product—Specify the Vendor and Product for the type of logs you are
ingesng.
The Vendor and Product are used to define the name of your XQL dataset
(<vendor>_<product>_raw). If you do not define a Vendor or Product, Cortex
Cortex® XDR™ Pro Administrator’s Guide 695 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
XDR uses the default values of MSFT and Azure with the resulng dataset name as
MSFT_Azure_raw. To uniquely idenfy the log source, consider changing the values.
When you Normalize and enrich audit logs, the Vendor and Product fields
are automacally configured. Therefore, these fields are removed as available
opons.
• Normalize and enrich audit logs—(Oponal) You can Normalize and enrich audit logs
by selecng the checkbox. If selected, Cortex XDR normalizes and enriches Azure
Event Hub audit logs, including any Azure sign-in logs configured for collecon, with
other Cortex XDR authencaon stories across all cloud providers using the same
format, which you can query with XQL Search using the cloud_audit_logs and
xdr_data datasets.
4. Click Test to validate access, and then click Enable.
Once events start to come in, a green check mark appears underneath the Azure Event
Hub configuraon with the amount of data received.
If you use the Pub/Sub messaging service from Global Cloud Plaorm (GCP), you can send logs
and data from your GCP instance to Cortex XDR. Data from GCP is then searchable in Cortex
XDR to provide addional informaon and context to your invesgaons using the GCP XQL
dataset (google_cloud_logging_raw). For example queries, refer to the in-app XQL Library.
You can also configure Cortex XDR to normalize GCP audit logs, which you can query with XQL
Search using the cloud_audit_logs dataset. In addion, you can configure Cortex XDR to
ingest network flow logs as XDR network connecon stories, which you can query with XQL
Search using the xdr_dataset dataset with the preset called network_story. Cortex XDR can
also raise Cortex XDR alerts (Analycs, IOC, BIOC, and Correlaon Rule only) when relevant from
GCP logs. Analycs alerts are only raised on normalized logs.
When collecng flow logs, we recommend that you include GKE annotaons in your logs,
which enable you to view the names of the containers that communicated with each
other. GKE annotaons are only included in logs if appended manually using the custom
metadata configuraon in GCP. For more informaon, see VPC Flow Logs Overview. In
addion, to customize metadata fields, you must use the gcloud command-line interface or
the API. For more informaon, see Using VPC Flow Logs.
To receive logs and data from GCP, you must first set up log forwarding using a Pub/Sub topic
in GCP. You can configure GCP sengs using either the GCP web interface or a GCP cloud shell
terminal. Aer you set up your service account in GCP, you configure the Data Collecon sengs
Cortex® XDR™ Pro Administrator’s Guide 696 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
in Cortex XDR. The setup process requires the subscripon name and authencaon key from
your GCP instance.
Aer you set up log collecon, Cortex XDR immediately begins receiving new logs and data from
GCP.
• Set up Log Forwarding Using the GCP Web Interface
• Set up Log Forwarding Using the GCP Cloud Shell Terminal
Cortex® XDR™ Pro Administrator’s Guide 697 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 698 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
GCP audit logs, which you can query with XQL Search using the cloud_audit_logs
dataset.
6. Test the provided sengs and, if successful, proceed to Enable log collecon.
STEP 6 | Aer Cortex XDR begins receiving informaon from the GCP Pub/Sub service, you can use
the XQL Query language to search for specific data.
Cortex® XDR™ Pro Administrator’s Guide 699 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Note the subscripon name you define in this step as you will need it to set up log ingeson
from Cortex XDR.
If setup is successful, the console displays a summary of your log sink sengs:
Created [https://logging.googleapis.com/v2/projects/
PROJECT_ID/sinks/SINK_NAME]. Please remember to grant
`serviceAccount:LOGS_SINK_SERVICE_ACCOUNT` \ the Pub/Sub Publisher
role on the topic. More information about sinks can be found at /
logging/docs/export/configure_export
STEP 6 | Grant log sink service account to publish to the new topic
Note the serviceAccount name from the previous step and use it to define the service for
which you want to grant publish access.
Cortex® XDR™ Pro Administrator’s Guide 700 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 11 | Aer Cortex XDR begins receiving informaon from the GCP Pub/Sub service, you can use
the XQL Query language to search for specific data.
Cortex® XDR™ Pro Administrator’s Guide 701 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
To receive logs and data from Okta, you must configure the Collecon Integraons sengs in
Cortex XDR. Aer you set up data collecon, Cortex XDR immediately begins receiving new logs
and data from the source. The informaon from Okta is then searchable in XQL Search using the
okta_sso_raw dataset.
You can collect all types of events from Okta. When seng up the Okta data collector in Cortex
XDR, a field called Okta Filter is available to configure collecon for events of your choosing. All
events are collected by default unless you define an Okta API Filter expression for collecng the
data, such as filter=eventType eq “user.session.start”.\n. For Okta informaon
to be weaved into authencaon stories, “user.authentication.sso” events must be
collected.
Cortex® XDR™ Pro Administrator’s Guide 702 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
Cortex® XDR™ Pro Administrator’s Guide 703 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
1. Specify the OKTA DOMAIN (Org URL) that you idenfied on your Okta console.
2. Specify the TOKEN used to authencate with Okta.
3. Specify the Okta Filter to configure collecon for events of your choosing. All events
are collected by default unless you define an Okta API Filter expression for collecng
the data, such as filter=eventType eq “user.session.start”.\n. For Okta
informaon to be weaved into authencaon stories, “user.authentication.sso”
events must be collected.
4. Test the connecon sengs.
5. If successful, Enable Okta log collecon.
Once events start to come in, a green check mark appears underneath the Okta
configuraon with the amount of data received.
STEP 5 | Aer Cortex XDR begins receiving informaon from the service, you can Create an XQL
Query to search for specific data. When including authencaon events, you can also Create
an Authencaon Query to search for specific authencaon data.
To receive authencaon logs from PingFederate, you must first write Audit and Provisioner Audit
Logs to CEF in PingFederate and then set up a Syslog Collector in Cortex XDR to receive the logs.
Aer you set up log collecon, Cortex XDR immediately begins receiving new authencaon logs
from the source. Cortex XDR creates a dataset named ping_identity_pingfederate_raw.
Logs from PingFederate are searchable in XQL queries using the dataset and surfaced, when
relevant, in authencaon stories.
STEP 1 | Acvate the Syslog Collector.
Cortex® XDR™ Pro Administrator’s Guide 704 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | To search for specific authencaon logs or data, you can Create an Authencaon Query or
use the XQL Search.
To receive authencaon logs and data from PingOne for Enterprise, you must first set up a Poll
subscripon in PingOne and then configure the Data Collecon sengs in Cortex XDR. Aer you
set up data collecon, Cortex XDR immediately begins receiving new authencaon logs and data
from the source. These logs and data are then searchable in Cortex XDR.
STEP 1 | Set up PingOne for Enterprise to send logs and data.
To set up integraon, you must have an account for the PingOne management dashboard and
access to create a subscripon for SSO logs.
From the PingOne Dashboard:
1. Set up a Poll subscripon.
1. Select Reporng > Subscripons > Add Subscripon.
2. Enter a NAME for the subscripon.
3. Select Poll as the subscripon type.
4. Leave the remaining defaults and select Done.
2. Idenfy your account ID and subscripon ID.
1. Select the subscripon you just set up and note the part of the poll URL between /
reports/ and /poll-subscripons. This is your PingOne account ID.
For example:
https://admin-api.pingone.com/v3/
reports/1234567890asdfghjk-123456-zxcvbn/poll-subscriptions/
***-0912348765-4567-98012***/events
In this URL, the account ID is 1234567890asdfghjk-123456-zxcvbn.
2. Next, note the part of the poll URL between /poll-subscripons/ and /events. This is
your subscripon ID.
In the example above, the subscripon ID is ***-0912348765-4567-98012***.
STEP 2 | Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
Cortex® XDR™ Pro Administrator’s Guide 705 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | Connect Cortex XDR to your PingOne for Enterprise authencaon service.
1. Enter your PingOne ACCOUNT ID.
2. Enter your PingOne SUBSCRIPTION ID.
3. Enter your PingOne USER NAME.
4. Enter your PingOne PASSWORD.
5. Test the connecon sengs.
6. If successful, Enable PingOne authencaon log collecon.
Aer configuraon is complete, Cortex XDR begins receiving informaon from the
authencaon service. From the Integraons page, you can view the log collecon summary.
STEP 4 | To search for specific authencaon logs or data, you can Create an Authencaon Query or
Create an XQL Query.
Cortex® XDR™ Pro Administrator’s Guide 706 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
To receive alerts from Prisma Cloud, first configure the Collecon Integraons sengs in Cortex
XDR. Aer you set up collecon integraon, Cortex XDR begins to receive alerts from Prisma
Cloud every 30 seconds.
Cortex XDR then groups these alerts into incidents and adds them to the Alerts table. When
Cortex XDR begins receiving the alerts, it creates a new XQL dataset (prisma_cloud_raw),
which you can use to iniate XQL Search queries and create Correlaon Rules. The in-app XQL
Library contains sample search queries.
You can also configure Cortex XDR to collect data directly from other cloud providers using an
applicable collector. For more informaon on the cloud collectors, see External Data Ingeson
Vendor Support. The Prisma Cloud alerts are stched to this data.
Complete the following tasks before you begin configuring Cortex XDR to receive alerts from
Prisma Cloud.
• Create an Access Key and Secret Key as explained in the Create and Manage Access Keys
secon of the Prisma Cloud Administrator’s Guide
• Copy or download the Access Key ID and Secret Key as you will need them when configuring
the Prisma Cloud Collector in Cortex XDR.
Configure Cortex XDR to receive alerts from Prisma Cloud.
STEP 1 | Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
Cortex® XDR™ Pro Administrator’s Guide 707 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 2 | In the Prisma Cloud Collector configuraon, click the here link to begin a new configuraon.
You can find your default Prisma Cloud domain in the Prisma Cloud API URL table.
• Specify the Prisma Cloud Access Key Id that you received when you created an Access Key.
• Specify the Prisma Cloud Secret Key that you received when you created an Access Key.
STEP 4 | Click Test to validate the connecon, and then click Enable.
In Cortex XDR, once alerts start to come in, a green check mark appears underneath the Prisma
Cloud Collector configuraon with the amount of data received.
Cortex® XDR™ Pro Administrator’s Guide 708 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 6 | Aer Cortex XDR begins receiving data from Prisma Cloud, you can use XQL Search to
search for specific data, using the prisma_cloud_raw dataset and to view alerts in the
Cortex XDR Alerts table. In the Cortex XDR Alerts table, the Prisma Cloud alerts are listed as
Prisma Cloud in the ALERT SOURCE column.
To receive alerts from Prisma Cloud Compute, first configure the Collecon Integraons sengs
in Cortex XDR. In Prisma Cloud, you then must create a webhook, which provides the mechanism
to interface Prisma Cloud’s alert system with Cortex XDR. Aer you set up your webhook, Cortex
XDR begins receiving alerts from Prisma Cloud Compute.
Cortex XDR then groups these alerts into incidents and adds them to the Alerts
table. When Cortex XDR begins receiving the alerts, it creates a new XQL dataset
(prisma_cloud_compute_raw), which you can use to iniate XQL Search queries and to create
Correlaon Rules. The in-app XQL Library contain sample search queries.
Configure Cortex XDR to receive alerts from Prisma Cloud Compute.
STEP 1 | Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons
STEP 2 | In the Prisma Cloud Compute Collector configuraon, click the Here link to begin a new
alerts integraon.
STEP 3 | Specify the Name for the Prisma Cloud Compute Collector displayed in Cortex XDR.
STEP 4 | Save & Generate Token. The token is displayed in a blue box, which is blurred in the image
below.
Click the Copy icon next to the Username and Password, and record them in a safe place,
as you will need to provide them when you configure the Prisma Cloud Compute Collector
for alerts integraon. If you forget to record the key and close the window, you will need to
Cortex® XDR™ Pro Administrator’s Guide 709 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
generate a new key and repeat this process. When you are finished, click Done to close the
window.
STEP 6 | Create a webhook as explained in the Webhook Alerts secon of the Prisma Cloud
Administrator’s Guide (Compute).
1. Use the Webhook opon to configure the webhook.
2. In Incoming Webhook URL, paste the API URL that you copied and recorded from Copy
api url..
3. In Credenal Opons, select Basic Authencaon, and use the Username and Password
that you saved when you generated the token in Cortex XDR.
4. Select Container Runme.
5. Click Save.
In Cortex XDR, once alerts start to come in, a green check mark appears underneath the
Prisma Cloud Compute Collector configuraon with the amount of data received.
Cortex® XDR™ Pro Administrator’s Guide 710 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 8 | Aer Cortex XDR begins receiving data from Prisma Cloud Compute, you can use XQL
Search to search for specific data using the prisma_cloud_compute_raw dataset and
view alerts in the Cortex XDR Alerts table. In the Cortex XDR Alerts table, the Prisma Cloud
Compute alerts are listed as Prisma Cloud Compute in the ALERT SOURCE column and are
classified as Medium in the SEVERITY column.
You can forward generic logs for the relave service to Cortex XDR from Amazon S3.
To receive generic data from Amazon Simple Storage Service (Amazon S3), you must first configure
data collecon from Amazon S3. You can then configure the Collecon Integraons sengs in
Cortex XDR for Amazon S3. Aer you set up collecon integraon, Cortex XDR begins receiving
new logs and data from the source.
For more informaon on configuring data collecon from Amazon S3, see the Amazon S3
Documentaon.
As soon as Cortex XDR begins receiving logs, the app automacally creates an Amazon S3 XQL
dataset (<Vendor>_<Product>_raw). This enables you to search the logs using XQL Search
with the dataset. For example queries, refer to the in-app XQL Library. Cortex XDR can also raise
Cortex XDR alerts (IOC, BIOC, and Correlaon Rule only) when relevant from Amazon S3 logs.
You need to set up an Amazon S3 data collector to receive generic logs when collecng
logs from BeyondTrust Privilege Management Cloud. For more informaon, see Ingest
Logs from BeyondTrust Privilege Management Cloud.
Be sure you do the following tasks before you begin configuring data collecon from Amazon S3.
• Create a dedicated Amazon S3 bucket, which collects the generic logs that you want captured.
For more informaon, see Creang a bucket using the Amazon S3 Console.
Cortex® XDR™ Pro Administrator’s Guide 711 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
• The logs collected by your dedicated Amazon S3 bucket must adhere to the following guideline:
• Each log file must use the 1 log per line format as mul-line format is not supported.
• The log format must be compressed as gzip or uncompressed.
• For best performance, we recommend liming each file size to up to 50 MB (compressed).
• Ensure that you have at a minimum the following permissions in AWS for an Amazon S3 bucket
and Amazon Simple Queue Service (SQS):
• Amazon S3 bucket—GetObject
• SQS—ChangeMessageVisibility, ReceiveMessage, and DeleteMessage.
• Determine how you want to provide access to Cortex XDR to your logs and to perform API
operaons. You have the following opons:
• Designate an AWS IAM user, where you will need to know the Account ID for the user and
have the relevant permissions to create an access key/id for the relevant IAM user. This is
the default opon as explained in configure the Amazon S3 collecon in Cortex XDR by
selecng Access Key.
• Create an assumed role in AWS to delegate permissions to a Cortex XDR AWS service. This
role grants Cortex XDR access to your flow logs. For more informaon, see Creang a role
to delegate permissions to an AWS service. This is the Assumed Role opon as described in
the configure the Amazon S3 collecon in Cortex XDR. For more informaon on creang an
assumed role for Cortex XDR, see Create an Assumed Role for Cortex XDR.
Configure Cortex XDR to receive generic logs from Amazon S3.
STEP 1 | Log in to the AWS Management Console.
STEP 2 | From the menu bar, ensure that you have selected the correct region for your configuraon.
Ensure that you create your Amazon S3 bucket and Amazon SQS queue in the same
region.
Cortex® XDR™ Pro Administrator’s Guide 712 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
messages to your SQS queue. Use this sample code as a guide for defining the
“Statement” with the following definions:
-“Resource”—Leave the automacally generated ARN for the SQS queue that is
set in the code, which uses the format “arn:sns:Region:account-id:topic-
name”.
-“Resource”—Leave the automacally generated ARN for the SQS queue that is
set in the code, which uses the format “arn:sns:Region:account-id:topic-
name”.
You can retrieve your bucket’s ARN by opening the Amazon S3 Console in a browser
window. In the Buckets secon, select the bucket that you created for collecng the
Amazon S3 flow logs, click Copy ARN, and paste the ARN in the field.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "s3.amazonaws.com"
},
"Action": "SQS:SendMessage",
"Resource": "[Leave automatically generated ARN for
the SQS queue defined by AWS]",
"Condition": {
"ArnLike": {
"aws:SourceArn": "[ARN of your Amazon S3 bucket]"
}
}
},
]
}
• Dead-leer queue secon—We recommend that you configure a queue for sending
undeliverable messages by selecng Enabled, and then in the Choose queue field
selecng the queue to send the messages. You may need to create a new queue for
Cortex® XDR™ Pro Administrator’s Guide 713 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
this, if you do not already have one set up. For more informaon, see Amazon SQS
dead-leer queues.
3. Click Create queue.
Once the SQS is created, a message indicang that the queue was successfully
configured is displayed at the top of the page.
STEP 4 | Configure an event noficaon to your Amazon SQS whenever a file is wrien to your
Amazon S3 bucket.
1. Open the Amazon S3 Console and in the Properes tab of your Amazon S3 bucket, scroll
down to the Event noficaons secon, and click Create event noficaon.
2. Configure the following sengs:
• Event name—Specify a descripve name for your event noficaon containing up to
255 characters.
• Prefix—Do not set a prefix as the Amazon S3 bucket is meant to be a dedicated
bucket for collecng only network flow logs.
• Event types—Select All object create events for the type of event noficaons that
you want to receive.
• Desnaon—Select SQS queue to send noficaons to an SQS queue to be read by a
server.
• Specify SQS queue—You can either select Choose from your SQS queues and then
select the SQS queue, or select Enter SQS queue ARN and specify the ARN in the
SQS queue field.
You can retrieve your SQS queue ARN by opening another instance of the AWS
Management Console in a browser window, and opening the Amazon SQS Console,
Cortex® XDR™ Pro Administrator’s Guide 714 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
and selecng the Amazon SQS that you created. In the Details secon, under ARN,
click the copy icon ( )), and paste the ARN in the field.
If your receive an error when trying to save your changes, you should ensure that
the permissions are set up correctly.
1. Open the AWS IAM Console, and in the navigaon pane, select Access management >
Users.
2. Select the User name of the AWS IAM user.
3. Select the Security credenals tab, and scroll down to the Access keys secon, and click
Create access key.
4. Click the copy icon () next to the Access key ID and Secret access key keys, where you
must click Show secret access key to see the secret key, and record them somewhere
safe before closing the window. You will need to provide these keys when you edit the
Access policy of the SQS queue and when seng the AWS Client ID and AWS Client
Secret in Cortex XDR. If you forget to record the keys and close the window, you will
need to generate new keys and repeat this process.
For more informaon, see Managing access keys for IAM users.
Cortex® XDR™ Pro Administrator’s Guide 715 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Skip this step if you are using an Assumed Role for Cortex XDR.
1. In the Amazon SQS Console, select the SQS queue that you created in Configure an
Amazon Simple Queue Service (SQS).
2. Select the Access policy tab, and Edit the Access policy code in the editor
window to enable the IAM user to perform operaons on the Amazon SQS with
permissions to SQS:ChangeMessageVisibility, SQS:DeleteMessage, and
SQS:ReceiveMessage. Use this sample code as a guide for defining the “Sid”:
“__receiver_statement” with the following definions.
• “aws:SourceArn”—Specify the ARN of the AWS IAM user. You can retrieve the
User ARN from the Security credenals tab, which you accessed when configuring
access keyps for the AWS API user.
• “Resource”—Leave the automacally generated ARN for the SQS queue that is
set in the code, which uses the format “arn:sns:Region:account-id:topic-
name”.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "s3.amazonaws.com"
},
"Action": "SQS:SendMessage",
"Resource": "[Leave automatically generated ARN for
the SQS queue defined by AWS]",
"Condition": {
"ArnLike": {
"aws:SourceArn": "[ARN of your Amazon S3 bucket]"
}
}
},
{
"Sid": "__receiver_statement",
"Effect": "Allow",
"Principal": {
"AWS": "[Add the ARN for the AWS IAM user]"
},
"Action": [
"SQS:ChangeMessageVisibility",
"SQS:DeleteMessage",
"SQS:ReceiveMessage"
],
Cortex® XDR™ Pro Administrator’s Guide 716 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
3. Set these parameters, where the parameters change depending on whether you
configured an Access Key or Assumed Role.
• To provide access to Cortex XDR to your logs and perform API operaons using a
designated AWS IAM user, leave the Access Key opon selected. Otherwise, select
Assumed Role, and ensure that you Create an Assumed Role for Cortex XDR before
connuing with these instrucons. In addion, when you create an Assumed Role
Cortex® XDR™ Pro Administrator’s Guide 717 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
for Cortex XDR, ensure that youedit the policy that defines the permissions for the
Cortex XDR role with the Amazon S3 Bucket ARN and SQS ARN.
• SQS URL—Specify the SQS URL, which is the ARN of the Amazon SQS that you
configured in the AWS Management Console. For more informaon on how to
retrieve your Amazon SQS ARN, see Specify SQS queue.
• Name—Specify a descripve name for your log collecon configuraon.
• When seng an Access Key, set these parameters.
• AWS Client ID—Specify the Access key ID, which you received when you
configured access keys for the AWS IAM user in AWS.
• AWS Client Secret—Specify the Secret access key you received when you
configured access keys for the AWS IAM user in AWS.
• When seng an Assumed Role, set these parameters.
• Role ARN—Specify the Role ARN for the Assumed Role you created for Cortex
XDR in AWS.
• External Id—Specify the External Id for the Assumed Role you created for Cortex
XDR in AWS.
• Log Type—Select Generic to configure your log collecon to receive generic logs
from Amazon S3, which can include different types of data, such as file and metadata.
When selecng this opon, the following addional fields are displayed.
• Log Format—Select the log format type as Raw, JSON, CEF, LEEF, Cisco, Corelight,
or Beyondtrust Cloud ECS.
Cortex® XDR™ Pro Administrator’s Guide 718 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
-The Vendor and Product defaults to Auto-Detect when the Log Format is
set to CEF or LEEF.
-For a Log Format set to CEF, LEEF, Cisco, or Corelight, Cortex XDR reads
events row by row to look for the Vendor and Product configured in the
logs. When the values are populated in the event log row, Cortex XDR uses
these values even if you specified a value in the Vendor and Product fields
in the Amazon S3 data collector sengs. Yet, when the values are blank
in the event log row, Cortex XDR uses the Vendor and Product that you
specified in the Vendor and Product fields in the Amazon S3 data collector
sengs. If you did not specify a Vendor or Product in the Amazon S3 data
collector sengs, and the values are blank in the event log row, the values
for both fields are set to unknown.
-For a Log Format set to Beyondtrust Cloud ECS, the following fields are
automacally set and not configurable.
-Vendor—Beyondtrust
-Product—Privilege Management
-Compression—Uncompressed
For more informaon, see Ingest Logs from BeyondTrust Privilege
Management Cloud.
• Vendor—(Oponal) Specify a parcular vendor name for the Amazon
S3 generic data collecon, which is used in the Amazon S3 XQL dataset
<Vendor>_<Product>_raw that Cortex XDR creates as soon as it begins
receiving logs.
• Product—(Oponal) Specify a parcular product name for the Amazon S3
generic data collecon, which is used in the Amazon S3 XQL dataset name
<Vendor>_<Product>_raw that Cortex XDR creates as soon as it begins
receiving logs.
• Compression—Select whether the logs are compressed into a gzip file or are
uncompressed.
4. Click Test to validate access, and then click Enable.
Once events start to come in, a green check mark appears underneath the Amazon S3
configuraon with the number of logs received.
Cortex® XDR™ Pro Administrator’s Guide 719 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
You can forward generic logs for the relave service to Cortex XDR from AWS CloudTrail or
Amazon CloudWatch.
You can ingest generic logs of the raw data from Amazon Kinesis Firehose. To enable log
forwarding, you set up Amazon Kinesis Firehose and then add that to your AWS CloudTrail
or Amazon CloudWatch configuraon. Aer you complete the set up process, logs from the
respecve service are then searchable in Cortex XDR to provide addional informaon and
context to your invesgaons.
To set up AWS integraon, you require certain permissions in AWS. You need a role that enables
access to configuring Amazon Kinesis Firehose.
STEP 1 | Set up the AWS integraon in Cortex XDR.
1. Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
2. In the AWS configuraon, click the here link to begin a new configuraon.
Cortex® XDR™ Pro Administrator’s Guide 720 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
to record the key and close the window you will need to generate a new key and repeat
this process.
Cortex® XDR™ Pro Administrator’s Guide 721 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 2 | Create a Kinesis Data Firehose delivery stream to your chosen desnaon.
1. Log in to the AWS Management Console, and open the Kinesis console at hps://
console.aws.amazon.com/kinesis.
2. Select Data Firehose > Create delivery stream.
Cortex® XDR™ Pro Administrator’s Guide 722 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
> Custom Collectors > Copy API URL. The URL will include your tenant name
(https://api-<tenant external URL>/logs/v1/aws).
• Access key—Paste in the token key you recorded earlier during the configuraon of
your Cortex XDR log collecon sengs.
• Content encoding—Select GZIP. Disabling content encoding may result in high egress
costs.
• Retry duraon—Enter 300 seconds.
• S3 bucket—Set the S3 backup mode as Failed data only. For the S3 bucket, we
recommend that you create a dedicated bucket for Cortex XDR integraon.
Click Next to proceed to the sengs configuraon.
6. Configure addional sengs.
• HTTP endpoint buffer condions—Set the Buffer size as 1 MiB and the Buffer interval
as 60 seconds.
• S3 buffer condions—Use the default sengs for Buffer size as 5 MiB and Buffer
interval as 300 seconds unless you have alternave sizing preferences.
• S3 compression and encrypon—Choose your desired compression and encrypon
sengs.
• Error logging—Select Enabled.
• Permissions—Create or update IAM role. opon
Select Next.
7. Review your configuraon and Create delivery stream.
When your delivery stream is ready, the status changes from Creang to Acve.
STEP 3 | To begin forwarding logs, add the Kinesis Firehose instance to your AWS CloudTrail or
Amazon CloudWatch configuraon.
To do this, you add a subscripon filter for Amazon Kinesis Firehose. See hps://
docs.aws.amazon.com/AmazonCloudWatch/latest/logs/SubscriponFilters.html.
STEP 5 | Aer Cortex XDR begins receiving logs from your Amazon services, you can use the XQL
Search to search for logs in the new dataset.
Cortex® XDR™ Pro Administrator’s Guide 723 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
If you use the Pub/Sub messaging service from Global Cloud Plaorm (GCP), you can send logs
and data from your GCP instance to Cortex XDR. Data from GCP is then searchable in Cortex
XDR to provide addional informaon and context to your invesgaons using the GCP XQL
dataset (google_cloud_logging_raw). For example queries, refer to the in-app XQL Library.
You can also configure Cortex XDR to normalize GCP audit logs, which you can query with XQL
Search using the cloud_audit_logs dataset. In addion, you can configure Cortex XDR to
ingest network flow logs as XDR network connecon stories, which you can query with XQL
Search using the xdr_dataset dataset with the preset called network_story. Cortex XDR can
also raise Cortex XDR alerts (Analycs, IOC, BIOC, and Correlaon Rule only) when relevant from
GCP logs. Analycs alerts are only raised on normalized logs.
When collecng flow logs, we recommend that you include GKE annotaons in your logs,
which enable you to view the names of the containers that communicated with each
other. GKE annotaons are only included in logs if appended manually using the custom
metadata configuraon in GCP. For more informaon, see VPC Flow Logs Overview. In
addion, to customize metadata fields, you must use the gcloud command-line interface or
the API. For more informaon, see Using VPC Flow Logs.
To receive logs and data from GCP, you must first set up log forwarding using a Pub/Sub topic
in GCP. You can configure GCP sengs using either the GCP web interface or a GCP cloud shell
terminal. Aer you set up your service account in GCP, you configure the Data Collecon sengs
in Cortex XDR. The setup process requires the subscripon name and authencaon key from
your GCP instance.
Aer you set up log collecon, Cortex XDR immediately begins receiving new logs and data from
GCP.
• Set up Log Forwarding Using the GCP Web Interface
• Set up Log Forwarding Using the GCP Cloud Shell Terminal
Cortex® XDR™ Pro Administrator’s Guide 724 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 725 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 6 | Aer Cortex XDR begins receiving informaon from the GCP Pub/Sub service, you can use
the XQL Query language to search for specific data.
Cortex® XDR™ Pro Administrator’s Guide 726 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Note the subscripon name you define in this step as you will need it to set up log ingeson
from Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 727 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
If setup is successful, the console displays a summary of your log sink sengs:
Created [https://logging.googleapis.com/v2/projects/
PROJECT_ID/sinks/SINK_NAME]. Please remember to grant
`serviceAccount:LOGS_SINK_SERVICE_ACCOUNT` \ the Pub/Sub Publisher
role on the topic. More information about sinks can be found at /
logging/docs/export/configure_export
STEP 6 | Grant log sink service account to publish to the new topic
Note the serviceAccount name from the previous step and use it to define the service for
which you want to grant publish access.
Cortex® XDR™ Pro Administrator’s Guide 728 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 11 | Aer Cortex XDR begins receiving informaon from the GCP Pub/Sub service, you can use
the XQL Query language to search for specific data.
Instead of forwarding Google Kubernetes Engine (GKE) logs directly to Google StackDrive, Cortex
XDR can ingest container logs from GKE using Elascsearch* Filebeat. To receive logs, you must
install Filebeat on your containers and enable Data Collecon sengs for Filebeat.
Aer Cortex XDR begins receiving logs, the app automacally creates an XQL dataset using the
vendor and product name that you specify during Filebeat setup. It is recommended to specify
Cortex® XDR™ Pro Administrator’s Guide 729 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
a descripve name. For example, if you specify google as the vendor and kubernetes as the
product, the dataset name will be google_kubernetes_raw. If you leave the product and
vendor blank, Cortex XDR assigns the dataset a name of container_container_raw.
Aer Cortex XDR creates the dataset, you can search your GKE logs using XQL Search.
STEP 1 | Install Filebeat on your containers.
For more informaon, see hps://www.elasc.co/guide/en/beats/filebeat/current/running-on-
kubernetes.html.
Cortex® XDR™ Pro Administrator’s Guide 730 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
curl -L -O https://raw.githubusercontent.com/elastic/
beats/7.10/deploy/kubernetes/filebeat-kubernetes.yaml
Cortex® XDR™ Pro Administrator’s Guide 731 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 732 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 733 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
> Custom Collectors > Copy API URL. The URL will include your tenant name
(https://api-<tenant external URL>:443/logs/v1/filebeat)
• ELASTICSEARCH_API_KEY—Enter the token key you recorded earlier during the
configuraon of your Filebeat Collector instance.
Aer you configure these sengs your configuraon should look like the following
image.
Cortex® XDR™ Pro Administrator’s Guide 734 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 735 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 4 | If you use RedHat OpenShi, you must also specify addional sengs.
See hps://www.elasc.co/guide/en/beats/filebeat/7.10/running-on-kubernetes.html.
This will deploy Filebeat in the kube-system namespace. If you want to deploy the Filebeat
configuraon in other namespaces, change the namespace values in the YAML file (in any
YAML inside this file) and add -n <your_namespace>.
Aer you deploy your configuraon, the Filebeat DameonSet will run throughout your
containers to forward logs to Cortex XDR. You can review the configuraon from the
Kubernetes Engine console: Workloads > Filebeat > YAML.
Cortex XDR only supports logs in single line format as mulline logs are unsupported.
For more informaon on handling messages that span mulple lines of text in
Elascsearch Filebeat, see Manage Mulline Messages.
STEP 6 | Aer Cortex XDR begins receiving logs from GKE, you can use the XQL Search to search for
logs in the new dataset.
Elascsearch is a trademark of Elascsearch B.V., registered in the U.S. and in other countries.
To receive logs from Azure Event Hub, you must configure the Collecon Integraons sengs
in Cortex XDR based on your Microso Azure Event Hub configuraon. Aer you set up data
collecon, Cortex XDR begins receiving new logs and data from the source.
When Cortex XDR begins receiving logs, the app creates a new dataset (MSFT_Azure_raw) that
you can use to iniate XQL Search queries. For example queries, refer to the in-app XQL Library.
You can also configure Cortex XDR to normalize Azure Event Hub audit logs with other Cortex
XDR authencaon stories across all cloud providers using the same format, which you can query
with XQL Search using the cloud_audit_logs or xdr_data datasets. For logs that you do not
configure Cortex XDR to normalize, you can change the default dataset. Cortex XDR can also raise
Cortex XDR alerts (IOC, BIOC, and Correlaon Rule only) when relevant from Azure Event Hub
logs.
Cortex XDR can also ingest Azure sign-in logs when you configure an Azure Event Hub data
collector to collect audit logs. This is also dependent on seng the applicable Diagnosc sengs
in Azure Acve Directory with the selected sign-in log categories. These logs are added in Cortex
XDR to the MSFT_Azure_raw dataset. In addion, Cortex XDR can normalize and enrich these
authencaon logs. Cortex XDR can normalize these Acve Directory sign-in logs with other
Cortex XDR authencaon stories across all cloud providers using the same format. You can query
these logs in XQL Search using the cloud_audit_logs and xdr_data datasets.
Cortex® XDR™ Pro Administrator’s Guide 736 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Be sure you do the following tasks before you begin configuring data collecon from Azure Event
Hub.
• Create an Azure Event Hub. For more informaon, see Quickstart: Create an event hub using
Azure portal.
• Ensure the format for the logs you want collected from the Azure Event Hub is either JSON or
raw.
Configure the Azure Event Hub collecon in Cortex XDR.
STEP 1 | In the Microso Azure Console, open the Event Hubs page, and select the Azure Event Hub
that you created for collecon in Cortex XDR.
STEP 2 | Record the following parameters from your configured event hub, which you will need when
configuring data collecon in Cortex XDR.
• Your event hub’s consumer group.
1. Select Enes > Event Hubs, and select your event hub.
2. Select Enes > Consumer groups, and select your event hub.
3. In the Consumer group table, copy the applicable value listed in the Name column for
your Cortex XDR data collecon configuraon.
• Your event hub’s connecon string for the designated policy.
1. Select Sengs > Shared access policies.
2. In the Shared access policies table, select the applicable policy.
3. Copy the Connecon string-primary key.
• Storage account for the connecon string.
1. Open the Storage accounts page, and select the storage account that contains the
connecon string for the event hub you have configured for data collecon by Cortex
XDR.
2. Select Security + networking > Access keys, and click Show keys.
3. Copy the applicable Connecon string.
Cortex® XDR™ Pro Administrator’s Guide 737 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | (Oponal) Configure your Microso Azure Event Hub to collect Azure sign-in logs.
1. In the Microso Azure Console, search for Azure Acve Directory, and select Services >
Azure Acve Directory.
2. Select Monitoring > Diagnosc sengs, and +Add diagnosc seng.
3. Set the following parameters.
Cortex® XDR™ Pro Administrator’s Guide 738 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
• Event hub namespace—Select the applicable Subscripon for the Azure Event
Hub.
• (Oponal) Event hub name—Specify the name of your Azure Event Hub.
• Event hub policy—Select the applicable Event hub policy for your Azure Event
Hub.
4. Save your sengs.
Cortex® XDR™ Pro Administrator’s Guide 739 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
When you Normalize and enrich audit logs, the log format is automacally
configured. As a result, this opon is removed and no longer available to
configure.
• Vendor and Product—Specify the Vendor and Product for the type of logs you are
ingesng.
The Vendor and Product are used to define the name of your XQL dataset
(<vendor>_<product>_raw). If you do not define a Vendor or Product, Cortex
Cortex® XDR™ Pro Administrator’s Guide 740 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
XDR uses the default values of MSFT and Azure with the resulng dataset name as
MSFT_Azure_raw. To uniquely idenfy the log source, consider changing the values.
When you Normalize and enrich audit logs, the Vendor and Product fields
are automacally configured. Therefore, these fields are removed as available
opons.
• Normalize and enrich audit logs—(Oponal) You can Normalize and enrich audit logs
by selecng the checkbox. If selected, Cortex XDR normalizes and enriches Azure
Event Hub audit logs, including any Azure sign-in logs configured for collecon, with
other Cortex XDR authencaon stories across all cloud providers using the same
format, which you can query with XQL Search using the cloud_audit_logs and
xdr_data datasets.
4. Click Test to validate access, and then click Enable.
Once events start to come in, a green check mark appears underneath the Azure Event
Hub configuraon with the amount of data received.
To receive logs and data from Okta, you must configure the Collecon Integraons sengs in
Cortex XDR. Aer you set up data collecon, Cortex XDR immediately begins receiving new logs
and data from the source. The informaon from Okta is then searchable in XQL Search using the
okta_sso_raw dataset.
You can collect all types of events from Okta. When seng up the Okta data collector in Cortex
XDR, a field called Okta Filter is available to configure collecon for events of your choosing. All
events are collected by default unless you define an Okta API Filter expression for collecng the
data, such as filter=eventType eq “user.session.start”.\n. For Okta informaon
to be weaved into authencaon stories, “user.authentication.sso” events must be
collected.
Cortex® XDR™ Pro Administrator’s Guide 741 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
Cortex® XDR™ Pro Administrator’s Guide 742 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
1. Specify the OKTA DOMAIN (Org URL) that you idenfied on your Okta console.
2. Specify the TOKEN used to authencate with Okta.
3. Specify the Okta Filter to configure collecon for events of your choosing. All events
are collected by default unless you define an Okta API Filter expression for collecng
the data, such as filter=eventType eq “user.session.start”.\n. For Okta
informaon to be weaved into authencaon stories, “user.authentication.sso”
events must be collected.
4. Test the connecon sengs.
5. If successful, Enable Okta log collecon.
Once events start to come in, a green check mark appears underneath the Okta
configuraon with the amount of data received.
STEP 5 | Aer Cortex XDR begins receiving informaon from the service, you can Create an XQL
Query to search for specific data. When including authencaon events, you can also Create
an Authencaon Query to search for specific authencaon data.
Cortex® XDR™ Pro Administrator’s Guide 743 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex XDR provides a unified, normalized asset inventory for cloud assets in AWS. This capability
provides deeper visibility to all the assets and superior context for incident invesgaon.
To receive cloud assets from AWS, you must configure the Collecon Integraons sengs in
Cortex XDR using the Cloud Inventory data collector to configure the AWS wizard. The AWS
wizard includes instrucons to be completed both in AWS and the AWS wizard screens. Aer you
set up data collecon, Cortex XDR begins receiving new data from the source.
As soon as Cortex XDR begins receiving cloud assets, you can view the data in Assets > Cloud
Inventory, where All Assets and Specific Cloud Assets pages display the data in a table format.
To configure the AWS cloud assets collecon in Cortex XDR.
STEP 1 | Open the AWS wizard in Cortex XDR.
1. Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
2. In the Cloud Inventory configuraon, click the here link to begin a new configuraon.
3. Click AWS.
Cortex® XDR™ Pro Administrator’s Guide 744 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
3. Create a stack called XDRCloudApp using the preset Cortex XDR template in AWS.
Cortex® XDR™ Pro Administrator’s Guide 745 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
The following details are automacally filled in for you in the AWS CloudFormaon stack
template.
• Stack Name—The default name for the stack is XDRCloudApp.
• CortexXDRRoleName—The name of the role that will be used by Cortex XDR to
authencate and access the resources in your AWS account.
• External ID—The Cortex XDR Cloud ID, a randomly generated UUID that is used to
enable the trust relaonship in the role's trust policy.
To create the stack, accept the IAM acknowledgment for resource creaon by selecng
the I acknowledge that AWS CloudFormaon might create IAM resources with custom
names checkbox, and click Create Stack.
4. Wait for the Status to update to CREATE_COMPLETE in the Stacks page that is
displayed, and select the XDRCloudAPP stack under the Stack name column in the table.
Cortex® XDR™ Pro Administrator’s Guide 746 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
5. Select the Outputs tab and copy the Value of the Role ARN.
6. Paste the Role ARN value in one of the following fields in the Account Details screen in
Cortex XDR. The field name is dependent on the Organizaon Level that you selected.
• Account—Paste the value in the Account Role ARN field.
• Organizaon—Paste the value in the Master Role ARN field.
Cortex® XDR™ Pro Administrator’s Guide 747 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
1. On the main menu of the AWS Console, select <your username> > My Organizaon.
Cortex® XDR™ Pro Administrator’s Guide 748 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
2. Copy the Root ID displayed under the Root directory and paste it in the Root ID field
in the Account Details screen in Cortex XDR.
8. Set the Organizaon Unit ID in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 749 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
1. On the main menu of the AWS Console, select <your username> > My Organizaon.
3. Copy the ID and paste it in the Organizaon Unit ID field in the Account Details
screen in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 750 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
9. Define the following remaining connecon parameters in the Account Details screen in
Cortex XDR.
• Account Role External ID / Master External ID—The name of this field is dependent
on the Organizaon Level configured. This field is automacally populated with a
value. You can either leave this value or replace it with another value.
• Cortex XDR Collecon Name—Specify a name for your Cortex XDR collecon that is
displayed underneath the Cloud Inventory configuraon for this AWS collecon.
10. Click Next.
This wizard screen is only displayed if you’ve configured the Organizaon Level as
Organizaon or Organizaon Unit in the Account Details screen in Cortex XDR.
Otherwise, you can skip this step when the Organizaon Level is set to Account.
Configuring member accounts is dependent on creang a stack set and configuring stack
instances in AWS, which can be performed using either the Amazon Command Line Interface
Cortex® XDR™ Pro Administrator’s Guide 751 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
(CLI) or Cloud Formaon template via the AWS Console. Both of these methods are explained
in the instrucons below.
For more informaon on how to set up the AWS CLI tool, see the AWS
Command Line Interface Documentaon.
3. Run the following command to create a stack set, which you can copy from the Configure
Member Accounts screen by selecng the copy icon ( ), and paste in the Amazon CLI.
This command includes the Role Name and External ID field values configured from the
wizard screen.
4. Run the following command to add stack instances to your stack set, which you can
copy from the Configure Member Accounts screen by selecng the copy icon ( ),
and paste in the Amazon CLI. For the --deployment-targets parameter, specify
the organizaon root ID to deploy to all accounts in your organizaon, or specify
Organizaon Unit IDs to deploy to all accounts in these Organizaon Units. In this
Cortex® XDR™ Pro Administrator’s Guide 752 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
In this example, the Organizaon Units are populated with ou-rcuk-1x5j1lwo and
ou-rcuk-slr5lh0a IDs.
Cortex® XDR™ Pro Administrator’s Guide 753 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
OrganizationalUnitIds='["ou-rcuk-1x5j1lwo", "ou-rcuk-
slr5lh0a"]' --regions '["eu-west-1"]'
Once completed, in the AWS Console, select Services > CloudFormaon > StackSets,
and you can see the StackSet is now listed in the table.
• Define the account credenals using AWS CloudFormaon.
1. Select the Cloud Formaon tab.
2. Download the CloudFormaon template. The name of the file downloaded is called
cortex-xdr-aws-master-ro-1.0.0.template.
3. Sign in to your AWS Master Account using the AWS console, select Services >
CloudFormaon > StackSets, and click Create StackSet.
Cortex® XDR™ Pro Administrator’s Guide 754 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 755 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 756 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 757 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
11.To create the StackSet, accept the IAM acknowledgment for resource creaon by
selecng the I acknowledge that AWS CloudFormaon might create IAM resources with
custom names checkbox, and click Submit.
When the process completes, the Status of the StackSet is SUCCEEDED in the StackSet
details page.
Cortex® XDR™ Pro Administrator’s Guide 758 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Whenever the Cloud Inventory data collector integraons are modified by using the
Edit, Disable, or Delete opons, it can take up to 10 minutes for these changes to be
reflected in Cortex XDR.
STEP 6 | Aer Cortex XDR begins receiving AWS cloud assets, you can view the data in Assets >
Cloud Inventory, where All Assets and Specific Cloud Assets pages display the data in a table
format. For more informaon, see Cloud Inventory Assets.
Cortex® XDR™ Pro Administrator’s Guide 759 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex XDR provides a unified, normalized asset inventory for cloud assets in Google Cloud
Plaorm (GCP). This capability provides deeper visibility to all the assets and superior context for
incident invesgaon.
To receive cloud assets from GCP, you must configure the Collecon Integraons sengs in
Cortex XDR using the Cloud Inventory data collector to configure the GCP wizard. The GCP
wizard includes instrucons to be completed both in GCP and the GCP wizard screens. Aer you
set up data collecon, Cortex XDR begins receiving new data from the source.
As soon as Cortex XDR begins receiving cloud assets, you can view the data in Assets > Cloud
Inventory, where All Assets and Specific Cloud Assets pages display the data in a table format.
To configure the GCP cloud assets collecon in Cortex XDR.
STEP 1 | Open the GCP wizard in Cortex XDR.
1. Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
2. In the Cloud Inventory configuraon, click the here link to begin a new configuraon.
Cortex® XDR™ Pro Administrator’s Guide 760 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
1. Select the Organizaon Level as either Project (default), Folder, or Organizaon. The
Organizaon Level that you select changes the instrucons.
2. Register your applicaon for Cloud Asset API in Google Cloud Plaorm, Select a project
where your applicaon will be registered, and click Connue.
Cortex® XDR™ Pro Administrator’s Guide 761 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
1. From the Select from menu, select the organizaon that you want.
2. The next steps to perform in Google Cloud Plaorm are dependent on the
Organizaon Level you selected in Cortex XDR - Project, Folder, or Organizaon.
• Project or Folder Organizaon Level—In the table, copy one of the following IDs
that you want to configure and paste it in the designated field in the Configure
Account screen in Cortex XDR. The field in Cortex XDR is dependent on the
Organizaon Level you selected.
-Project—Contains a project icon ( ) beside it, and the ID should be pasted in the
Project ID field in Cortex XDR.
-Folder—Contains a folder icon ( ) beside it, and the ID should be pasted in the
Folder ID field in Cortex XDR.
When you are finished, click CANCEL to close the window.
• Organizaon is the Organizaon Level—Select the ellipsis icon ( ) > Sengs. In
the Sengs page, copy the Organizaon ID for the applicable organizaon that
Cortex® XDR™ Pro Administrator’s Guide 762 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
you want to configure and paste it in the Organizaon Id field in the Configure
Account screen in Cortex XDR.
6. Select the Hamburger menu > Storage > Cloud Storage > Browser.
7. You can either use an exisng bucket from the list or create a new bucket. Copy the
Name of the bucket and paste it in the Bucket Name field in the Configure Account
screen in Cortex XDR.
8. Define the following remaining connecon parameters in the Configure Account screen
in Cortex XDR.
• Bucket Directory Name—You can either leave the default directory as Exported-
Assets or define a new directory name that will be created for the exported assets
collected for the bucket configured in GCP.
• Cortex XDR Collecon Name—Specify a name for your Cortex XDR collecon that is
displayed underneath the Cloud Inventory configuraon for this GCP collecon.
9. Click Next.
Cortex® XDR™ Pro Administrator’s Guide 763 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
1. Download the Terraform script. The name of the file downloaded is dependent on the
Organizaon Level that you configured in the Configure Account screen of the wizard.
• Folder—cortex-xdr-gcp-folder-ro.tf
• Project—cortex-xdr-gcp-project-ro.tf
• Organizaon—cortex-xdr-gcp-organization-ro.tf
2. Login to the Google Cloud Shell.
Cortex® XDR™ Pro Administrator’s Guide 764 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
4. Select File > Open, and Open the Terraform script that you downloaded from Cortex
XDR.
5. Use the following commands to upload the Terraform script, which you can copy from
the Account Details screen in Cortex XDR using the copy icon ( ).
1. teraform init—Inializes the Terraform script. You need to wait unl the
inializaon is complete before running the next command as indicated in the image
below.
Cortex® XDR™ Pro Administrator’s Guide 765 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
2. terraform apply—When running this command you will be asked to enter the
following values.
• var.assets_bucket_name—Specify the GCP storage Bucket Name that you
configured in the Configure Account screen of the wizard to contain GCP cloud
asset data.
• var.host_project_id—Specify the GCP Project ID to host the XDR service
account and bucket, which you registered your applicaon. Ensure that you use a
permanent project.
• var.project_id—Specify the Project ID, Folder ID, or Organizaon ID that you
configured in the Configure Account screen of the wizard from GCP.
Aer specifying all the values, you need to Authorize gcloud to use your
credenals to make this GCP API call in the Authorize Cloud Shell dialog box that
is displayed.
Before the acon completes, you need to confirm whether you want to perform
these acons, and aer the process finishes running an Apply complete indicaon
is displayed.
Cortex® XDR™ Pro Administrator’s Guide 766 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
2. Select the JSON file produced aer running the Terraform script, and click Download.
7. Upload the downloaded Service Account Key JSON file in the Configure Account screen
in Cortex XDR. You can drag and drop the file, or Browse to the file.
8. Click Next.
Cortex® XDR™ Pro Administrator’s Guide 767 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 4 | (Oponal) Define the Change Asset Logs screen of the wizard.
You can skip this step if you’ve already configured a Google Cloud Plaorm data
collector with a Pub/Sub asset feed collecon.
1. In the GCP Console, search for Topics, and select the Topics link.
2. CREATE TOPIC.
Cortex® XDR™ Pro Administrator’s Guide 768 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
For more informaon on the gcloud CLI tool. see gcloud tool overview.
The command contains a parameter already populated and parameters that you need to
replace before running the command.
• <FEED_ID>—Replace this placeholder text with a unique asset feed idenfier of your
choosing.
• --project—This parameter is automacally populated from the Project ID field in
the Configure Account screen wizard in Cortex XDR.
• <Topic name>—Replace this placeholder text with the name of the topic you
created in the Topic details page in the GCP console.
5. In the GCP Console, search for Subscripon, and select the Subscipons link.
Cortex® XDR™ Pro Administrator’s Guide 769 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 770 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
9. Select the subscripon that you created for your topic and add PERMISSIONS for the
subscriber in the Subscripon details page.
10. ADD PRINCIPAL to add permissions for the Service Account that you created the key
for in the JSON file and uploaded to the Configure Account wizard screen in Cortex
XDR. Set the following permissions for the Service Account.
• New principals—Select the designated Service Account Key as you created in the
JSON file.
• Select a role—Select Pub/Sub Subscriber.
11. Copy the Subscripon name and paste it in the Subscripon Name field on the right-side
of the Change Asset Logs screen in Cortex XDR, and click Next.
The Subscripon Name is the name of the new Google Cloud Plaorm data
collector that is configured with a Pub/Sub asset feed collecon in Cortex XDR
under Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons
> Google Cloud Plaorm.
Cortex® XDR™ Pro Administrator’s Guide 771 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Whenever the Cloud Inventory data collector integraons are modified by using the
Edit, Disable, or Delete opons, it can take up to 10 minutes for these changes to be
reflected in Cortex XDR.
In addion, if you created a Pub/Sub asset feed collecon, a green check mark appears
underneath the Google Cloud Plaorm configuraon with the amount of data received.
STEP 7 | Aer Cortex XDR begins receiving GCP cloud assets, you can view the data in Assets >
Cloud Inventory, where All Assets and Specific Cloud Assets pages display the data in a table
format. For more informaon, see Cloud Inventory Assets.
Cortex® XDR™ Pro Administrator’s Guide 772 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex XDR provides a unified, normalized asset inventory for cloud assets in Microso Azure.
This capability provides deeper visibility to all the assets and superior context for incident
invesgaon.
To receive cloud assets from Microso Azure, you must configure the Collecon Integraons
sengs in Cortex XDR using the Cloud Inventory data collector to configure the Microso Azure
wizard. The Microso Azure wizard includes instrucons to be completed both in Microso Azure
and the Microso Azure wizard screens. Aer you set up data collecon, Cortex XDR begins
receiving new data from the source.
As soon as Cortex XDR begins receiving cloud assets, you can view the data in Assets > Cloud
Inventory, where All Assets and Specific Cloud Assets pages display the data in a table format.
To configure the Microso Azure cloud assets collecon in Cortex XDR.
STEP 1 | Open the Microso Azure wizard in Cortex XDR.
1. Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
2. In the Cloud Inventory configuraon, click the here link to begin a new configuraon.
3. Click Azure.
Cortex® XDR™ Pro Administrator’s Guide 773 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 774 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
4. Search for Management groups, select Management groups, copy the applicable ID in
Azure, and paste it in the Management Group ID field in the Configure Account screen
wizard in Cortex XDR.
5. Search for Tenant properes, select Tenant properes, copy the Tenant ID in Azure, and
paste it in the Tenant ID field in the Configure Account screen wizard in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 775 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
6. Specify a Cortex XDR Collecon Name to be displayed underneath the Cloud Inventory
configuraon for this Azure collecon.
7. Click Next.
Cortex® XDR™ Pro Administrator’s Guide 776 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
1. Download the Terraform script. The name of the file downloaded is dependent on the
Organizaon Level that you configured in the Configure Account screen of the wizard.
• Subscripon—cortex-xdr-azure-subscription-ro.tf
• Management Group—cortex-xdr-azure-group-ro.tf
• Tenant—cortex-xdr-azure-org-ro.tf
2. Login to the Azure Cloud Shell portal., and select Bash.
3. Click the upload/download icon ( ) to Upload the Terraform script to Cloud Shell,
browse to the file, and click Open.
A noficaon with the Upload desnaon is displayed on the boom-right corner of the
screen.
4. Use the following commands to upload the Terraform script, which you can copy from
the Account Details screen in Cortex XDR using the copy icon ( ).
1. teraform init—Inializes the Terraform script. You need to wait unl the
inializaon is complete before running the next command as indicated in the image
below.
Cortex® XDR™ Pro Administrator’s Guide 777 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
2. terraform apply—When running this command you will be asked to enter the
following values, which are dependent on the Organizaon Level that you configured.
• var.subscription_id—Specify the Subscripon ID that you configured in the
Configure Account screen of the wizard from Microso Azure. This value only
needs to be specified if the Subscripon ID is set to Subscripon.
• var.management.group_id—Specify the Management Group ID that you
configured in the Configure Account screen of the wizard from Microso
Cortex® XDR™ Pro Administrator’s Guide 778 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Azure. This value only needs to be specified if the Management Group is set to
Management Group.
• var.tenant_id—Specify the Tenant ID that you configured in the Configure
Account screen of the wizard from Microso Azure.
Before the acon completes, you need to confirm whether you want to perform these
acons, and aer the process finishes running an Apply complete indicaon is displayed.
5. Copy the client_id value displayed in the Cloud Shell window and paste it in the
Applicaon Client ID field in the Account Details screen in Cortex XDR.
6. Copy the secret value displayed in the Cloud Shell window and paste it in the Secret field
in the Account Details screen in Cortex XDR.
7. Download the JSON file from Cloud Shell using the upload/download icon ( ), so you
have output field values for future reference.
8. Click Next.
Cortex® XDR™ Pro Administrator’s Guide 779 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Whenever the Cloud Inventory data collector integraons are modified by using the
Edit, Disable, or Delete opons, it can take up to 10 minutes for these changes to be
reflected in Cortex XDR.
STEP 6 | Aer Cortex XDR begins receiving Azure cloud assets, you can view the data in Assets >
Cloud Inventory, where All Assets and Specific Cloud Assets pages display the data in a table
format. For more informaon, see Cloud Inventory Assets.
Cortex® XDR™ Pro Administrator’s Guide 780 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex XDR can receive Syslog from a variety of supported vendors (see External Data Ingeson
Vendor Support). In addion, Cortex XDR can receive Syslog from addional vendors that use CEF
or LEEF formaed over Syslog (TLS not supported).
Aer Cortex XDR begins receiving logs from the third-party source, Cortex XDR
automacally parses the logs in LEEF format and creates a dataset with the name
<vendor>_<product>_raw. You can then use XQL Search queries to view logs and create new
IOC, BIOC, and Correlaon Rules.
To receive Syslog from an external source:
STEP 1 | Set up your Syslog receiver to forward logs.
STEP 2 | Acvate the Syslog Collector applet on a Broker VM within your network.
Cortex® XDR™ Pro Administrator’s Guide 781 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex XDR can receive CSV log files from a shared Windows directory directly to your log
repository for query and visualizaon purposes. Aer you acvate the CSV Collector applet on
a broker VM in your network, which includes defining the list of folders mounted to the broker
VM and seng the list of CSV files to monitor and upload to Cortex XDR (using a username and
password), you can ingest CSV files as datasets.
The ingested CSV log files must conform to the following guidelines:
• Header field names must contain only leers (a-z, A-Z) or numbers (0-9) and must start with a
leer. Spaces are converted to underscores (_).
• Date values can be in either of the following formats:
• YYYY-MM-DD (oponally including HH:MM:SS)
• Unix Epoch me. For example, 1614858795.
Aer Cortex XDR begins receiving logs from the shared Windows directory, Cortex XDR
automacally parses the logs and creates a dataset with the specific name you set as the target
dataset when you configured the CSV Collector. The CSV Collector checks for any changes in
the configured CSV files, as well as any new CSV files added to the configuraon folders, in the
Windows directory every 10 minutes and replaces the data in the dataset with the data from
those files. You can then use XQL Search queries to view logs and create new IOC, BIOC, and
Correlaon Rules.
Configure Cortex XDR to receive CSV files as datasets from a shared Windows directory.
STEP 1 | Ensure that you share the applicable CSV files in your Windows directory.
STEP 2 | Acvate the CSV Collector applet on a broker VM within your network.
Cortex XDR can receive data from a client relaonal database directly to your log repository for
query and visualizaon purposes. Aer you acvate the Database Collector applet on a broker
VM in your network, which includes defining the database connecon details and sengs related
to the query details for collecng the data from the database to monitor and upload to Cortex
XDR, you can collect data as datasets.
Aer Cortex XDR begins receiving data from a client relaonal database, Cortex XDR
automacally parses the logs and creates a dataset with the specific name you set
as the target dataset when you configured the Database Collector using the format
<Vendor>_<Product>_raw. The Database Collector checks for any changes in the configured
database based on the SQL Query defined in the database connecon according to the execuon
frequency of collecon that you configured and appends the data to the dataset. You can then use
XQL Search queries to view data and create new Correlaon Rules.
Configure Cortex XDR to receive data as datasets data from a client relaonal database.
STEP 1 | Acvate the Database Collector applet on a broker VM within your network.
Cortex® XDR™ Pro Administrator’s Guide 782 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex XDR can receive logs from files and folders in a network share directly to your log
repository for query and visualizaon purposes. Aer you acvate the Files and Folders Collector
applet on a broker VM in your network, which includes defining the connecon details and
sengs related to the list of files to monitor and upload to Cortex XDR, you can collect files as
datasets.
Aer Cortex XDR begins receiving logs from files and folders in a network share, Cortex
XDR automacally parses the logs and creates a dataset with the specific name you set as
the target dataset when you configured the Files and Folders Collector using the format
<Vendor>_<Product>_raw. The Files and Folders Collector reads and processes the configured
files one by one, as well as any new files added to the configured files and folders, in the network
share according to the execuon frequency of collecon that you configured and adds the data
in these files to the dataset. You can then use XQL Search queries to view logs and create new
Correlaon Rules.
Configure Cortex XDR to receive logs as datasets from files and folders in a network share.
STEP 1 | Acvate the Files and Folders Collector applet on a broker VM within your network.
Cortex XDR can receive logs from files and folders via FTP, FTPS, or SFTP directly to your log
repository for query and visualizaon purposes. Aer you acvate the FTP Collector applet on a
broker VM in your network, which includes defining the connecon details and sengs related to
the list of files to monitor and upload to Cortex XDR, you can collect files as datasets.
Aer Cortex XDR begins receiving logs from files and folders via FTP, FTPS, or SFTP, Cortex XDR
automacally parses the logs and creates a dataset with the specific name you set as the target
dataset when you configured the FTP Collector using the format <Vendor>_<Product>_raw.
The FTP Collector reads and processes the configured FTP files one by one, as well as any new
FTP files added to the configured files and folders, in the FTP directory according to the execuon
frequency of collecon that you configured and adds the data in these files to the dataset. You can
then use XQL Search queries to view logs and create new Correlaon Rules.
Configure Cortex XDR to receive logs as datasets from files and folders via FTP, FTPS, or SFTP.
STEP 1 | Acvate the FTP Collector applet on a broker VM within your network.
Cortex® XDR™ Pro Administrator’s Guide 783 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex XDR can receive NetFlow flow records and IPFIX from a UDP port directly to your log
repository for query and visualizaon purposes. Aer you acvate the NetFlow Collectorapplet on
a broker VM in your network, which includes configuring your NetFlow Collector sengs, you can
ingest NetFlow flow records and IPFIX as datasets.
The ingested NetFlow flow record format must include, at the very least:
• Source and Desnaon IP addresses
• TCP/UDP source and desnaon port numbers
Aer Cortex XDR begins receiving flow records from the UDP port, Cortex XDR automacally
parses the flow records and creates a dataset with the specific name you set as the target dataset
when you configured the NetFlow Collector. The NetFlow Collector adds the flow records to the
dataset. You can then use XQL Search queries to view those flow records and create new IOC,
BIOC, and Correlaon Rules.
Configure Cortex XDR to receive NetFlow flow records as datasets from the routers and switches
that support NetFlow.
STEP 1 | Set up your NetFlow exporter to forward flow records to the IP address of the broker that
runs the NetFlow collector applet.
STEP 2 | Acvate the NetFlow Collector applet on a broker VM within your network.
STEP 3 | Use the XQL Search to query your flow records, using your designated dataset.
In addion to logs from supported vendors (see External Data Ingeson Vendor Support), you can
set up a custom HTTP log collector to receive logs in JSON or text format.
Aer Cortex XDR begins receiving logs from the third-party source, Cortex XDR automacally
parses the logs and creates a dataset with the name <vendor>_<product>_raw. You can then
use XQL Search queries to view logs and create new IOC or BIOC rules.
To set up an HTTP log collector to receive logs from an external source:
Cortex® XDR™ Pro Administrator’s Guide 784 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 785 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 4 | Aer Cortex XDR begins receiving logs, use the XQL Search to search your logs.
If you use BeyondTrust Privilege Management Cloud, you can take advantage of Cortex® XDR™
invesgaon and detecon capabilies by forwarding your logs to Cortex XDR. This enables
Cortex XDR to help you expand visibility into computer, acvity, and authorizaon requests in the
organizaon, correlate and detect access violaons, and query BeyondTrust Endpoint Privilege
Management logs using XQL Search.
As soon as Cortex XDR starts to receive logs, Cortex XDR can analyze your logs in XQL Search
and you can create new Correlaon Rules.
To integrate your logs, you first need to configure SIEM sengs and an AWS S3 Bucket according
to the specific requirements provided by BeyondTrust. You can then configure data collecon
in Cortex XDR by configuring an Amazon S3 data collector for a generic log type using the
Beyondtrust Cloud ECS log format.
Before you begin configuring data collecon verify that you are using BeyondTrust Privilege
Management Cloud version 21.6.339 or later.
Configure BeyondTrust Privilege Management Cloud collecon in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 786 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 1 | Configure SIEM sengs and an AWS S3 Bucket according to the requirements provided in
the BeyondTrust documentaon.
Ensure that when you add the AWS S3 bucket in the PMC and set the SIEM sengs, you
select ECS - Elasc Common Schema as the SIEM Format.
STEP 2 | Configure BeyondTrust logs collecon with Cortex XDR using an Amazon S3 data collector
for generic data.
Ensure your Amazon S3 data collector is configured with the following sengs.
• Log Type—Select Generic to configure your log collecon to receive generic logs from
Amazon S3.
• Log Format—Select the log format type as Beyondtrust Cloud ECS.
For a Log Format set to Beyondtrust Cloud ECS, the following fields are
automacally set and not configurable.
• Vendor—Beyondtrust
• Product—Privilege Management
• Compression—Uncompressed
STEP 3 | Aer Cortex XDR begins receiving data from BeyondTrust Privilege
Management Cloud, you can use XQL Search to search your logs using the
beyondtrust_privilege_management_raw dataset that you configured when seng
up your Amazon S3 data collector.
If you want to ingest logs about file acvity on your endpoints and servers and do not use the
Cortex XDR agent, you can install Elascsearch* Filebeat as a system logger and then forward
those logs to Cortex XDR. To facilitate log ingeson, Cortex XDR supports the same protocols that
Filebeat and Elascsearch use to communicate.
To provide addional context during invesgaons, Cortex XDR automacally creates a new
XQL dataset from your Filebeat logs. You can then use the XQL dataset to search across the logs
Cortex XDR received from Filebeat.
To receive logs, you configure collecon sengs for Filebeat in Cortex XDR and output sengs in
your Filebeat installaons. As soon as Cortex XDR begins receiving logs, the data is visible in XQL
Search queries.
Cortex® XDR™ Pro Administrator’s Guide 787 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Cortex® XDR™ Pro Administrator’s Guide 788 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
• hosts—Copy the API URL from your Filebeat configuraon and paste it in this field.
• compression_level—5 (recommended)
• bulk_max_size—1000 (recommended)
• api_key—Paste the key you created in when you configured Filebeat Log Collecon
in Cortex XDR.
• proxy_url—(Oponal) <server_ip>:<port_number>. You can specify your
own <server_ip> or use the broker VM to proxy Filebeat communicaon using the
Cortex® XDR™ Pro Administrator’s Guide 789 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Elascsearch is a trademark of Elascsearch B.V., registered in the U.S. and in other countries.
If you use Forcepoint DLP to prevent data loss over endpoint channels, you can take advantage of
Cortex® XDR™ invesgaon and detecon capabilies by forwarding your logs to Cortex XDR.
This enables Cortex XDR to help you expand visibility into data violaon by users and hosts in
the organizaon, correlate and detect DLP incidents, and query Forcepoint DLP logs using XQL
Search.
As soon as Cortex XDR starts to receive logs, Cortex XDR can analyze your logs in XQL Search
and you can create new Correlaon Rules.
To integrate your logs, you first need to set up an applet in a broker VM within your network to
act as a Syslog Collector. You then configure forwarding on your log devices to send logs to the
Syslog Collector in a CEF or LEEF format.
Configure Forcepoint DLP collecon in Cortex XDR.
STEP 1 | Verify that your Forcepoint DLP meet the following requirements:
• Must use version 8.8.0.347 or a later release.
• On premise installaon only.
Cortex® XDR™ Pro Administrator’s Guide 790 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 4 | Configure the log device that receives Forcepoint DLP logs to forward syslog events to the
Syslog Collector in a CEF or LEEF format.
For more informaon, see the Forcepoint DLP documentaon.
STEP 5 | Aer Cortex XDR begins receiving data from Forcepoint DLP, you can use XQL Search to
search your logs using the forcepoint_dlp_endpoint dataset.
To receive logs from Proofpoint Targeted Aack Protecon (TAP), you must first configure TAP
service credenals in the TAP dashboard, and then the Collecon Integraons sengs in Cortex
XDR based on your Proofpoint TAP configuraon. Aer you set up data collecon, Cortex XDR
begins receiving new logs and data from the source.
When Cortex XDR begins receiving logs, the app creates a new dataset (proofpoint_tap_raw)
that you can use to iniate XQL Search queries. For example queries, refer to the in-app XQL
Library.
Configure the Proofpoint TAP collecon in Cortex XDR.
STEP 1 | Generate TAP Service Credenals in Proofpoint TAP.
TAP service credenals can be generated in the TAP Dashboard, where you will receive a
Proofpoint Service Principal for authencaon and Proofpoint API Secret for authencaon.
Record these credenals as you will need to provide them when configuring the Proofpoint
Targeted Aack Protecon data collector in Cortex XDR. For more informaon on generang
TAP service credenals, see Generate TAP Service Credenals.
Cortex® XDR™ Pro Administrator’s Guide 791 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 3 | (Oponal) Manage your Proofpoint Targeted Aack Protecon data collector.
Aer you enable the Proofpoint Targeted Aack Protecon data collector, you can make
addional changes as needed.
You can perform any of the following.
• Edit the Proofpoint Targeted Aack Protecon data collector sengs.
• Disable the Proofpoint Targeted Aack Protecon data collector.
• Delete the Proofpoint Targeted Aack Protecon data collector.
Cortex® XDR™ Pro Administrator’s Guide 792 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
To receive data from the ServiceNow CMDB database, you must first configure data collecon
from ServiceNow CMDB. ServiceNow CMDB is a logical representaons of assets, services, and
the relaonships between them that comprise the infrastructure of an organizaon. It is built
as a series of connected tables that contain all the assets and business services controlled by a
company and its configuraons. You can configure the Collecon Integraon sengs in Cortex
XDR for the ServiceNow CMDB database, which includes selecng the specific tables containing
the data that you want to collect, in the ServiceNow CMDB Collector. You can select from the list
of default tables and also specify custom tables. By default, the ServiceNow CMDB Collector is
configured to collect data from the following tables, which you can always change depending on
your system requirements.
• cmdb_ci
• cmdb_ci_computer
• cmdb_rel_ci
• cmdb_ci_application_software
As soon as Cortex XDR begins receiving data, the app automacally creates a ServiceNow CMDB
dataset for each table using the format servicenow_cmdb_<table name>_raw. You can then
use XQL Search queries to view the data and create new Correlaon Rules.
You can only configure a single ServiceNow CMDB Collector, which is automacally configured
every 6 hours to reload the data from the configured tables and replace the exisng data. You can
always use the Sync Now opon to reload the data and replace the exisng data whenever you
want.
Complete the following task before you begin configuring Cortex XDR to receive data from
ServiceNow CMDB.
• Create a ServiceNow CMDB user with SNOW credenals, who is designated to access the
tables from ServiceNow CMDB for data collecon in Cortex XDR. Record the credenals for
this user as you will need them when configuring the ServiceNow CMDB Collector in Cortex
XDR.
Configure Cortex XDR to receive data from ServiceNow CMDB.
STEP 1 | Select Sengs ( ) > Configuraons > Data Collecon > Collecon Integraons.
Cortex® XDR™ Pro Administrator’s Guide 793 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 2 | In the ServiceNow CMDB Collector configuraon, click the here link to begin a new
configuraon.
Cortex® XDR™ Pro Administrator’s Guide 794 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 6 | Aer Cortex XDR begins receiving data from ServiceNow CMDB, you can use the XQL
Search to search for logs in the new datasets, where each dataset name is based on the table
name using the format servicenow_cmdb_<table name>_raw.
To receive Workday report data, you must first configure data collecon from Workday using a
Workday custom report to ingest the appropriate data. This is configured by seng up a Workday
Collector in Cortex® XDR™ and configuring report data collecon via this Workday custom report
that you set up.
As soon as Cortex XDR begins receiving data, the app automacally creates a Workday XQL
dataset (workday_workday_raw). You can then use XQL Search queries to view the data and
create new Correlaon Rules. In addion, Cortex XDR adds the workday fields next to each user
in the Key Assets list in the Incident View, and in the User node in the Causality View of Identy
Analycs alerts.
Any user with permissions to view alerts and incidents can view the Workday data.
You can only configure a single Workday Collector, which is automacally configured to run the
report every 6 hours. You can always use the Sync Now opon to run the report whenever you
want.
Complete the following tasks before you begin configuring Cortex XDR to receive report data
from Workday.
1. Create an Integraon System User that is designated to access the custom report from
Workday for data collecon in Cortex XDR.
2. Create an Integraon System Security Group for the Integraon System User created in Step 1
for accessing the report. When seng this group ensure to define the following.
• Type of Tenanted Security Group—Select either Integraon System Security Group
(Constrained) or Integraon System Security Group (Unconstrained) depending on how
your data is configured. For more informaon, see the Workday documentaon.
• Integraon System User—Select the user that you defined in step 1 for accessing the
custom report.
Cortex® XDR™ Pro Administrator’s Guide 795 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
3. Create the Workday credenals for the Integraon System User created in Step 1 so that
the username and password can be used to access the report in Cortex XDR. Record these
credenals as you will need them when configuring the Workday Collector in Cortex XDR.
For more informaon on compleng any of these prerequisite steps, see the Workday
documentaon.
Cortex® XDR™ Pro Administrator’s Guide 796 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
This is configured by selecng the applicable Field and leaving the default field name
that is displayed in the Column Heading Override XML Alias column. This default field
name is what is used in XQL Search and the dataset to view and query the data.
For the incident and card views in Cortex XDR, map the following fields in the table by
selecng the applicable Field that contains the data represenng the Cortex XDR field
name as provided below that should be added to the Column Heading Override XML
Alias. For example, for full_name, select the applicable Field from the Business Object
Cortex® XDR™ Pro Administrator’s Guide 797 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
defined that contains the full name of the user and in the Column Heading Override
XML Alias specify full_name to map the set Field to the Cortex XDR field name.
• full_name
• phone_number
• mailing_address
• business_email_address
• private_email_address
• position_title
• department
• employment_start_date
• employment_end_date
• manager
5. (Oponal) Filter out any employees that you do not want included in the Filter tab.
6. Share access to the report with the designated Integraon System User that you created
by seng the following sengs in the Share tab.
• Report Definion Sharing Opons—Select Share with specific authorized groups and
users.
• Authorized Users—Select the designated Integraon System User that you created for
accessing the custom report.
7. Ensure that the following Web Services Opons sengs in the Advanced tab are
configured.
Here is an example of the configured sengs, where the Web Service API Version and
Namespace are automacally populated and dependent on your report.
8. (Oponal) Test the report to ensure all the fields are populated.
9. Get the URL for the report.
1. In the related acons menu, select Acons > Web Service > View URLs.
2. Click OK.
3. Scroll down to the JSON secon.
4. Hover over the JSON link and click the icon, which open a new tab in your browser
with the URL for the report. You need to use the designated user credenals to open
the report.
5. Copy the URL for the report and record them somewhere as this URL needs to be
provided when seng up the Workday Collector in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 798 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
Once report data starts to come in, a green check mark appears underneath the
Workday Collector configuraon with the data and me that the data was last synced.
Cortex® XDR™ Pro Administrator’s Guide 799 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 4 | Aer Cortex XDR begins receiving report data from Workday, you can use the XQL Search to
search for logs in the new dataset (workday_workday_raw).
Cortex® XDR™ Pro Administrator’s Guide 800 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
If you send pre-parsed alerts using the Cortex XDR API, addional mapping is not required.
Storage of external alerts is determined by your Cortex Data Lake data retenon policy.
To ingest external alerts:
Cortex® XDR™ Pro Administrator’s Guide 801 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 2 | In Cortex XDR, select Sengs ( ) > Configuraons > External Alerts Mapping.
STEP 3 | Right-click the Vendor Product for your alerts and select Filter and Map.
STEP 4 | Use the filters at the top of the table to narrow the results to only the alerts you want to
map.
Cortex XDR displays a limited sample of results during the mapping rule creaon. As you define
your filters, Cortex XDR applies the filter to the limited sample but does not apply the filters
across all alerts. As a result, you might not see any results from the alert sample during the rule
creaon.
Cortex® XDR™ Pro Administrator’s Guide 802 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
If needed, use the field converter ( ) to translate the source field to the Cortex XDR
syntax.
For example, if you use a different severity system, you need to use the converter to map
your severies fields to the Cortex XDR risks of High, Medium, and Low.
You can also use regex to convert the fields to extract the data to facilitate matching with
the Cortex XDR format. For example, say you need to map the port but your source field
Cortex® XDR™ Pro Administrator’s Guide 803 ©2021 Palo Alto Networks, Inc.
External Data Ingeson
STEP 6 | Submit your alert filter and mapping rule when finished.
Cortex® XDR™ Pro Administrator’s Guide 804 ©2021 Palo Alto Networks, Inc.
Data Management
> Dataset Management
> Create Parsing Rules
> Manage XQL APIs
805
Data Management
Dataset Management
This feature requires a Cortex® XDR™ Pro license.
The Dataset Management page enables you to manage your datasets and understand your data
storage availability. The top part of the screen details your Storage License Details for the Cortex
XDR Pro licenses and Cortex Pro per RTN retenon licenses. In addion, a storage bar with all
the datasets usage informaon is displayed. The boom half of the screen lists your Datasets in a
table format.
Before the Cortex XDR ingeson and storage enforcements are applied based on your
licensing agreements, you will be nofied ahead of me explaining these changes and the
implementaon meline.
For each dataset listed in the table, the following informaon is available.
Certain fields are exposed and hidden by default. An asterisks (*) is beside every field that
is exposed by default.
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 806 ©2021 Palo Alto Networks, Inc.
Data Management
Field Descripon
(_) are supported, but not as the first
character of the name.
*TOTAL DAYS STORED The actual number of days that the data is
stored in the XDR data lake.
*TOTAL SIZE STORED The actual size of the data that is stored in the
XDR data lake. For the xdr_data dataset,
where the first 30 days of storage are included
with your license, the first 30 days are not
included in the TOTAL SIZE STORED number.
*AVERAGE DAILY SIZE The average daily amount stored in the XDR
data lake.
Cortex® XDR™ Pro Administrator’s Guide 807 ©2021 Palo Alto Networks, Inc.
Data Management
Field Descripon
FIRST STORED DATE The first me that Cortex XDR started to
store data in this dataset.
*LAST STORED DATE The last me that Cortex XDR started to store
data in this dataset.
Manage Datasets
This feature requires a Cortex® XDR™ Pro per TB license.
Cortex XDR runs every XQL query against a dataset. A dataset is a collecon of column:value sets.
You can upload datasets as a CSV, TSV, or JSON file that contains the data you are interested in
querying. If you do not specify a dataset in your query, Cortex XDR runs the query against the
default datasets configured, which is by default configured as xdr_data. The xdr_data dataset
contains all of the endpoint and network data that Cortex XDR collects. You can always change
the default datasets using the Set as default opon.
To query other datasets, you have two opons: you can either set the dataset as default, which
enables you to query the datasets without specifying them in the query, or you can name a
specific dataset at the beginning of your query with the dataset stage command. You can add to
your list of available datasets by uploading a CSV, TSV, or JSON file to Cortex XDR.
You cannot upload a file that contains a byte array (that is, binary data).
Cortex XDR Query Language (XQL) supports using different languages for dataset and field names.
Cortex® XDR™ Pro Administrator’s Guide 808 ©2021 Palo Alto Networks, Inc.
Data Management
Manage datasets from Cortex XDR > Sengs ( ) > Configuraons > Data Management >
Dataset Management. In the Dataset Management page you can import, view, and interact with
your available datasets.
Cortex® XDR™ Pro Administrator’s Guide 809 ©2021 Palo Alto Networks, Inc.
Data Management
Import a dataset.
1. Select + Lookup.
2. Browse to your CSV, TSV, or JSON file, or drag and drop it into the dialog window.You
can only upload a TSV file that contains a .tsv file extension.
When uploading a CSV, TSV, or JSON file, ensure that the file meets the
following requirements:
• Field names are supported using different languages, numbers (0-9), or
underscores (_). If you use any other characters, Cortex XDR automacally
converts them to underscores (_).
• Dataset names are supported using different languages. Numbers (0-9) and
underscores (_) are supported, but not as the first character of the name.
You can create dataset names using uppercase characters, but in queries
dataset names are always treated as if they are lowercase.
• Must start with a leer or underscore. Cannot use prefixes TABLE, FILE, or
_PARTITION.
• Cannot exceed 128 characters.
• No duplicate names, white spaces, or carriage returns.
3. (Oponal) Rename the file, where only English alphabecal characters are supported.
4. Add the file as a lookup.
5. Aer receiving a noficaon reporng that the upload succeeded, Refresh ( ) to view it
in your list of datasets.
If the file has the same name as an exisng dataset, Cortex XDR will append an
underscore and a number to the name to make it unique.
Cortex® XDR™ Pro Administrator’s Guide 810 ©2021 Palo Alto Networks, Inc.
Data Management
Query against a dataset by selecng it with the dataset command when you create an XQL
query.
Right-click a dataset to view the schema of the dataset, set it as default, delete it, copy it,
and show or hide datasets. In addion, for a dataset with a TYPE set to Lookup, you can also
download the JSON file.
• View Schema to view the schema informaon for every field found in the dataset result
set in the Schema tab of XQL Search. Each system field in the schema is wrien with an
underscore (_) before the name of the field in the FIELD NAME column in the table.
• Set as default to query the dataset without having to specify it in your queries in XQL
Search as dataset = <name of dataset>. Once configured, the DEFAULT QUERY
TARGET column entry for this dataset is set to Yes. By default, this opon is not available
when right-clicking the xdr_data dataset as this dataset is the only dataset configured as the
DEFAULT QUERY TARGET as it contains all of the endpoint and network data that Cortex
Cortex® XDR™ Pro Administrator’s Guide 811 ©2021 Palo Alto Networks, Inc.
Data Management
XDR collects. Once you Set as default another dataset, you can always remove it by right-
clicking the dataset, and selecng Remove from defaults. When seng mulple default
datasets, your query does not need to menon any of the dataset names, and Cortex XDR
queries the default datasets using a join.
• Delete to remove the dataset from Cortex XDR.
• Download the JSON file for a dataset with a Type set to Lookup. This opon is not available
for any other dataset type.
When you download a Lookup dataset with field names in a foreign language, the
downloaded JSON file displays the fields as COL_<randomstring> as opposed
to returning the fields in the foreign language as expected.
• Copy text to clipboard to copy the name of the dataset to your clipboard.
• Copy enre row to copy each cell in a row, separated by tabs, to your clipboard.
• Show rows with ‘<dataset_name>’ to create a filter that displays all datasets with the same
name.
• Hide rows with ‘<dataset_name>’ to create a filter that hides all datasets with the same
name.
Cortex® XDR™ Pro Administrator’s Guide 812 ©2021 Palo Alto Networks, Inc.
Data Management
Filter your available datasets to specify the ones you want to see.
1. Select Filter.
An interface for your filter criteria appears.
Cortex® XDR™ Pro Administrator’s Guide 813 ©2021 Palo Alto Networks, Inc.
Data Management
Cortex® XDR™ Pro Administrator’s Guide 814 ©2021 Palo Alto Networks, Inc.
Data Management
Cortex® XDR™ includes an editor for creang 3rd party Parsing Rules, which enables you to:
• Remove unused data that is not required for analycs, hunng, or regulaon.
• Reduce your data storage costs.
• Pre-process all incoming data for complex rule performance.
• Add tags to the ingested data as part of the ingeson flow.
• Easily idenfy and resolve Parsing Rules errors with error reporng.
Parsing Rules contain the following built-in characteriscs.
• Parsing Rules are bound to a specific vendor and product.
• Parsing Rules take raw log input, perform an arbitrary number of transions and modificaons
to the data using XQL, and return zero, one, or more rows that are eventually inserted into the
Data Lake.
• Parsing Rules can be grouped together by a no-match policy. This means, if all the rules of a
group did not produce an output for a specific log record, a no-match policy defines what to do,
such as drop the log or keep the log in some default format.
• Upon ingeson, all fields are retained even fields with a null value. You can also use the Cortex
XDR XQL query language to query parsing rules for null values.
Cortex XDR provides a number of default Parsing Rules that you can easily override as required
using the Cortex XDR Query Language and addional custom syntax that is specific to creang
Parsing Rules. Before you create your own Parsing Rules and override the defaults, we recommend
that you review the following.
• Parsing Rules Editor Views
• Parsing Rules File Structure and Syntax
• Error Reporng in Parsing Rules
• Parsing Rules Raw Dataset
To create Parsing Rules.
STEP 1 | In Cortex XDR, select Sengs ( ) > Configuraons > Data Management > Parsing Rules.
STEP 3 | Write your Parsing Rules using XQL syntax and the syntax specific for Parsing Rules. For
more informaon, see Parsing Rules File Structure and Syntax.
Cortex® XDR™ Pro Administrator’s Guide 815 ©2021 Palo Alto Networks, Inc.
Data Management
When there are any Parsing Rules errors to report, the Parsing Rules editor displays these
errors at the boom of the editor in a secon called List of Errors. Otherwise, this secon
is not displayed. For more informaon, see Error Reporng in Parsing Rules.
• User Defined Rules (default)—Displays an editor for wring your own custom parsing rules that
override the default rules.
Cortex® XDR™ Pro Administrator’s Guide 816 ©2021 Palo Alto Networks, Inc.
Data Management
• Default Rules—Displays the parsing rules that are provided by default with Cortex XDR in read-
only mode.
• Both—Side-by-side view of both the User Defined Rules and Default Rules, so you can easily
view the different rules in one screen.
File Structure
The Parsing Rules file consists of mulple secons of these three types, which also represent the
custom syntax specific to Parsing Rules.
• CONST—(Oponal) This secon is used to define strings and numbers that can be re-used
mulple mes within XQL statements in other INGEST secons by using $constName.
• INGEST—This secon is used to define the resulng Parsing Rule.
• RULE—(Oponal) Rules are part of the XQL syntax, which are tagged with a name, and can be
reused in the code in the INGEST secons by using [rule:ruleName].
Cortex® XDR™ Pro Administrator’s Guide 817 ©2021 Palo Alto Networks, Inc.
Data Management
The order of the secons is unimportant. The data of each secon type gets grouped together
during the parsing stage. Before any acon takes place all CONST secons are grouped together,
all RULE objects are grouped together, and all INGEST objects are collected to the same list.
Syntax
The syntax used in the Parsing Rules file is derived from XQL, but with a few modificaons. This
subset of XQL is called XQL for Parsing (XQLp).
For more informaon on the XQL syntax, see Cortex XDR XQL Language Reference.
The CONST, INGEST, and RULE syntax is derived from XQL, but with the following modificaons
for XQLp.
• A statement never starts with dataset or preset selecon. The query's data source is
meaningless. It is transparent to the user where the raw logs are coming from, fully handled by
the system.
• Only the following XQL stages are permied: alter, fields, filter, and join. In addion, a new
call stage is supported, which is used to invoke another rule.
• No output stages are supported.
• A Rule object can only contain a single statement.
• A join inner query is restricted to using a lookup as a data source and only supported in
XQLp stages.
There is no default lookup, so all join inner queries must start with dataset=<lookup>
| ....
• CONST reference ($MY_CONST) is supported.
• An IN condion can only take a sequence list, such as device_name in (“device1”,
“device2”, “device3”) and not another XQL or XQLp inner queries.
C-Type code comments can be used anywhere throughout the Parsing Rules file.
// line comment
/* inner comment */
Every statement in the Parsing Rules file must end with a semicolon (;).
CONST
A CONST secon is used to define strings and numbers that can be re-used mulple mes
within XQL statements in other INGEST secons by using $constName. This can be helpful to
avoid wring the same value in mulple secons, similar to constants in modern programming
languages.
For example:
[CONST]
DEFAULT_DEVICE_NAME = "firewall3060"; // string
FILE_REGEX = "c:\\users\\[a-zA-Z0-9.]*"; // complex string
Cortex® XDR™ Pro Administrator’s Guide 818 ©2021 Palo Alto Networks, Inc.
Data Management
my_num = 3; /* int */
An example of using a CONST inside XQL statements in other INGEST secons using
$constName:
The dollar sign ($) must be adjacent to the [CONST] name, without any whitespace in
between.
...
| filter device_name = $DEFAULT_DEVICE_NAME
| alter new_field = JSON_EXTRACT(field, $FILE_REGEX)
| filter age < $MAX_TIMEOUT
| join type=$DEFAULT_JOIN_TYPE conflict_strategy=
$DEFAULT_JOIN_CONFLICT_STRATEGY (dataset=my_lookup) as inn
url=inn.url
...
NOTICE: Only quoted or integer terminal values are considered valid for CONST secons. For
example, these will not compile:
[CONST]
WORD_CONST = abcde; //invalid
func_val = regex_extract(_raw_log, "regex"); // not possible
RECURSIVE_CONST = $WORD_CONST; // not terminal - not
possible
CONST secons are meant to replace values. Other types, such as column names, are not
supported:
...
| filter $DEVICE_NAME = "my_device" // illegal
...
INGEST
An INGEST secon is used to define the resulng Parsing Rule. The CONST and RULE secons
are only add-ons, used to help organize the INGEST secons, and are oponal to configure. Yet, a
Cortex® XDR™ Pro Administrator’s Guide 819 ©2021 Palo Alto Networks, Inc.
Data Management
Parsing Rules file that contains no INGEST secons, generates no Parsing Rules, and is mandatory
to configure.
INGEST syntax is derived from XQL with a few modificaons as explained in the Parsing Rules
syntax. In addion, INGEST secons contain the following syntax add-ons.
• INGEST secons can have more than one XQLp statement, separated by a semicolon (;). Each
statement creates a different Parsing Rule.
• Another new stage is available called drop.
• drop takes a condion similar to the XQL filter stage (same syntax), but drops every
log entry that passes that condion. One can think of it as a negave filter, so drop
<condition> is not equivalent to filter not <condition>.
• drop can only appear last in a statement. No other XQLp rules can follow.
• INGEST secons take parameters, and not names as RULE secons use, where some are
mandatory and others oponal.
Parameter Descripon
Cortex® XDR™ Pro Administrator’s Guide 820 ©2021 Palo Alto Networks, Inc.
Data Management
Parameter Descripon
except for _raw_log which holds the
original JSON log record.
Each statement represents a different Parsing Rule in the same group as depicted in the following
example.
[CONST]
DEVICE_NAME = "ngfw";
[rule:use_two_rules]
filter severity = "medium" | call basic_rule | call
use_xql_and_another_rule;
[rule:basic_rule]
fields log_type, severity | filter log_type="eal" and severity="HIGH"
and type="something";
[rule:use_xql_and_another_rule]call multiline_statement | filter
severity = "medium";
[rule:multiline_statement]
alter url = json_extract(_raw_log, "$.url")
| join type = inner conflict_strategy = both (dataset=my_lookup) as
inn url=inn.url
|filter severity = "medium";
[ingest:vendor=panw, product=ngfw, dataset=panw_ngfw_ds, no_hit=drop]
filter log_type="traffic" | alter url = json_extract(_raw_log,
"$.url");
call use_two_rules | join type = inner conflict_strategy = both
(dataset=my_lookup) as inn severity=inn.severity | fields severity,
log_type | drop device_name = $DEVICE_NAME;
This generates 1 group of 2 Parsing Rules for panw/ngfw, where all the ingested data into
panw_ngfw_ds dataset.
The following represents the syntax for the rules.
Rule #1:
filter log_type="traffic" | alter url = json_extract(_raw_log,
"$.url");
Rule #2:
filter severity = "medium"
| fields log_type, severity
| filter log_type="eal" and severity="HIGH" and type="something"
| alter url = json_extract(_raw_log, "$.url")
| join type = inner conflict_strategy = both (dataset=my_lookup) as
inn url=inn.url
| filter severity = "medium"
| filter severity = "medium"
| join type = inner conflict_strategy = both (dataset=my_lookup) as
inn severity=inn.severity
Cortex® XDR™ Pro Administrator’s Guide 821 ©2021 Palo Alto Networks, Inc.
Data Management
• You can add a single tagor list of tags to the ingested data as part of the ingeson flow that you
can easily query in XQL Search. You can add tags as part of the INGEST secon or using both
the INGEST and RULE secons. The following are examples of each.
• INGEST secon.
Adding a single tag.
Cortex® XDR™ Pro Administrator’s Guide 822 ©2021 Palo Alto Networks, Inc.
Data Management
[RULE:new_tag_rule]
tag add "test";
[RULE:new_tag_rule]
tag add "test1", "test2", "test3";
RULE
Rules are very similar to funcons in modern programming languages. They are essenally pieces
of XQL code, tagged with a name - alias, for easier code re-use and avoiding code duplicaons. A
RULE is an add-on to the Parsing Rule syntax and is oponal to configure.
RULE syntax is derived from XQL with a few modificaons as explained in the Parsing Rules
syntax.
For more informaon on the XQL syntax, see Cortex XDR XQL Language Reference.
[rule:filter_alerts]
filter raw_log not contains "alert";
• Rules are invoked by using a call keyword as depicted in the following example.
[rule:filter_alerts]
filter raw_log not contains "alert";
Cortex® XDR™ Pro Administrator’s Guide 823 ©2021 Palo Alto Networks, Inc.
Data Management
[rule:use_another_rule]
filter severity="LOW" | call filter_alerts | fields - raw_log;
[rule:use_another_rule]
filter severity="LOW" | filter raw_log not contains "alert" |
fields - raw_log;
• Rule names are not case sensive. They can be wrien in any user-desired casing,
such as UPPER_SNAKE, lower_snake, camelCase, and CamelCase). For example,
MY_RULE=My_Rule=my_rule.
• Rule names must be unique across the enre file. This means you cannot have the same rule
name defined more than once in the same file.
• Since secon order is unimportant, you do not have to declare a rule before using it. You can
have the rule definion secon wrien below other secons that uses this rule.
• You can add a single tag or list of tags to the ingested data as part of the ingeson flow that
you can easily query in XQL Search. You can add tags using both the INGEST and RULE
secons. For example,
Adding a single tag.
[RULE:new_tag_rule]
tag add "test";
[RULE:new_tag_rule]
tag add "test1", "test2", "test3";
You can also add tags using only the INGEST secon. For more informaon, see
INGEST.
To help you easily idenfy and resolve Parsing Rules errors, Cortex® XDR™ includes error
reporng in Parsing Rules for these scenarios.
Cortex® XDR™ Pro Administrator’s Guide 824 ©2021 Palo Alto Networks, Inc.
Data Management
• Unable to compile a rule for different reasons including invalid funcon parameters, such as
invalid regex.
• Unable to apply a rule to the data.
• Mismatch between expected data type, such as CEF, LEEF, or JSON with the actual data, such
as TEXT or CSV.
All errors are saved to a dataset called parsing_rules_errors, where the dataset type is
system_audit. The following table describes the fields that are available when running a query
in XQL Search for this dataset in alphabecal order.
• Some errors can only be found aer the applicable logs are collected in Cortex XDR.
• New errors generate a noficaon called Parsing Rules Error, which you can view when
selecng the noficaon icon ( ).
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 825 ©2021 Palo Alto Networks, Inc.
Data Management
Field Descripon
The Parsing Rules editor includes a separate secon called List of Errors at the boom page with
the following capabilies.
• Lists the details of the last 20 errors from the total number of errors found.
Cortex XDR only updates this list with new errors when the list is closed.
• Link to Open All in XQL Search to view addional informaon about these errors in XQL
Search from the last 24 hours. The enre list of errors in the parsing_rules_errors
dataset are displayed, so you can easily troubleshoot. You can edit the query opened in XQL
Search to search for a designated me of your choosing, for example, if you want to view the
results for the last week as opposed to 24 hours.
• When you Save changes in the Parsing Rules editor, all of the errors listed are removed from
the page.
Cortex® XDR™ Pro Administrator’s Guide 826 ©2021 Palo Alto Networks, Inc.
Data Management
Each vendor and product has its own raw dataset that uses the format
<vendor>_<product>_raw. For example, for Palo Alto Networks Next-Generaon Firewall,
the dataset is called panw_ngfw_raw. This raw dataset by default keeps all raw logs, whether
ingested or dropped for other datasets.
You can override the default raw dataset, by creang an INGEST secon referring to that dataset.
For example, the following syntax overrides the panw_ngfw_raw automac Parsing Rule.
Cortex® XDR™ Pro Administrator’s Guide 827 ©2021 Palo Alto Networks, Inc.
Data Management
Cortex® XDR™ Pro Administrator’s Guide 828 ©2021 Palo Alto Networks, Inc.
Data Management
STEP 1 | Navigate to > Configuraons > Data Management > XQL API Usage.
STEP 2 | In the Daily Usage in Compute Units secon, monitor the amount of quota units used over
the past 24 hours and the amount of free daily quota allocated according to your license size.
Time frame is calculated according to UTC me.
For Managed Security tenants, the values calculated are the total daily usage of parent and
child tenants.
Cortex® XDR™ Pro Administrator’s Guide 829 ©2021 Palo Alto Networks, Inc.
Data Management
STEP 3 | In the Compute Units over last 30 Days secon, to track your quota usage over the past 30
days. The red line represents your daily license quota. For Managed Security tenants, make
sure you select from the MSSP Tenant Selecon drop-down menu, the tenant for which you
want to display the informaon. To invesgate further:
• Hover over each bar to view the total number of query units used on each day.
• Select a bar to display in the XQL Queries Using API table the list of queries executed on
the selected day.
STEP 4 | In the XQL Queries Using API, invesgate all the XQL API queries that were executed on
your tenant. For Managed Security tenants, make sure you select from the MSSP Tenant
Selecon drop-down menu, the tenant for which you want to display the informaon. You
can filter and sort according to the following fields:
• ID—Unique idenfier represenng the executed XQL API query.
• Timestamp—Date and me of when the XQL API was executed.
• PAPI Key ID—API Key ID used to execute the XQL API.
• XQL Query—The XQL query called using an API search.
• Compute Unit Usage—Displays how many query units were to used to execute the API
query.
• Tenant—Appears only in a Managed Security tenant. Displays which tenant executed an API
query.
Cortex® XDR™ Pro Administrator’s Guide 830 ©2021 Palo Alto Networks, Inc.
Analycs
> Analycs Concepts
831
Analycs
Analycs Concepts
Network security professionals know that safeguarding a network requires a defense-in-depth
strategy. This layered approach to network security means ensuring that soware is always
patched and current, while running hardware and soware systems that are designed to keep
aackers out. Many strategies exist to keep unwanted users out of a network, most of these work
by stopping intrusion aempts at the network perimeter.
As good and necessary as those strategies and products are, they all can defend only against
known threats. Systems that looks for malicious soware, for example, tradionally do its work
based on previously idenfied MD5 signatures. But authors of these viruses constantly make
trivial modificaons to these signatures of the virus to avoid virus scanners unl their MD5
database is updated with the modified and newly discovered signatures.
In other words, defensive network systems are constantly trying to keep up with the best efforts
of aggressive, nimble aackers. Your defensive network soware must be 100% correct 100%
of the me to prevent successful aacks. A determined aacker, on the other hand, must be
successful only once to ruin your day.
Consequently, your network defense-in-depth strategy must include soware and processes that
are designed to detect and respond to an intruder who has successfully penetrated your systems.
This is the posion that Cortex XDR takes in your enterprise. The app efficiently and automacally
idenfies abnormal acvity on your network while providing you with the exact informaon you
need to rapidly evaluate potenal threats and then isolate and remove those threats from your
network before they can perform real damage.
• Analycs Engine
• Analycs Sensors
• Coverage of the MITRE Aack Taccs
• Analycs Detecon Time Intervals
• Analycs Alerts and Analycs BIOCs
• Identy Analycs
Analycs Engine
The Cortex XDR™ app uses an analycs engine to examine logs and data from your sensors. The
analycs engine retrieves logs from Cortex Data Lake to understand the normal behavior (creates
a baseline) so that it can raise alerts when abnormal acvity occurs. The analycs engine accesses
your logs as they are streamed to Cortex Data Lake and analyzes the data as soon as it arrives.
Cortex XDR raises an Analycs alert when the analycs engine determines an anomaly.
The analycs engine is built to process—in parallel—large amounts of data stored in Cortex
Data Lake. The ulmate goal is to idenfy normal behavior so the Cortex apps can recognize
and use alerts to nofy you of that abnormal behavior. The analycs engine can examine traffic
and data from a variety of sources such as network acvity from firewall logs, VPN logs (from
Prisma Access from the Panorama plugin), endpoint acvity data (on Windows endpoints), Acve
Directory or a combinaon of those sources, to idenfy endpoints and users on your network.
Aer endpoints and users are idenfied, the analycs engine collects relevant details about
every asset that it sees based on the informaon it obtains from the logs. The analycs engine
Cortex® XDR™ Pro Administrator’s Guide 832 ©2021 Palo Alto Networks, Inc.
Analycs
can detect threats from only network data or only endpoint data, but for more context when
invesgang an alert, a combinaon of data sources are recommended.
The list of what the engine looks for is large, varied, and constantly growing but, as a consequence
of this analysis, the analycs engine is able to build profiles about every endpoint and user of
which it knows about. Profiles allow the engine to put the acvity of the endpoint or user in
context by comparing it against similar endpoints or users. The analycs engine creates and
maintains a very large number of profile types but, generally, they can all be placed into three
categories:
• Peer Group Profiles—A stascal analysis of an enty or an enty relaon that compares
acvies from mulple enes in a peer group. For example, a domain might have a cross
organizaon popularity profile or per peer group popularity profile.
• Temporal Profiles—A stascal analysis of an enty or an enty relaon that compares the
same enty to itself over me. For example, a host might have a profile for how many ports did
it access in the past.
• Enty classificaon—A model detecng the role of an enty. For example, users can be
classified as service accounts, host as domain controllers.
Analycs Sensors
To detect anomalous behavior, Cortex XDR can analyze logs and data from a variety of sensors.
Sensor Descripon
Enhanced applicaon logs (EAL) To provide greater coverage and accuracy, you
can enable enhanced applicaon logging on
your Palo Alto Networks firewalls. EAL are
collected by the firewall to increase visibility into
network acvity for Palo Alto Networks apps and
services, like Cortex XDR. Only firewalls sending
logs to Cortex Data Lake can generate enhanced
applicaon logs.
Examples of the types of data that enhanced
applicaon logs gather includes records of DNS
queries, the HTTP header User Agent field that
specifies the web browser or tool used to access
a URL, and informaon about DHCP automac
Cortex® XDR™ Pro Administrator’s Guide 833 ©2021 Palo Alto Networks, Inc.
Analycs
Sensor Descripon
IP address assignment. With DHCP informaon,
for example, Cortex XDR can alert on unusual
acvity based on hostname instead of IP address.
This allows the security analyst using Cortex
XDR to meaningfully assess whether the user’s
acvity is within the scope of his or her role, and
if not, to more quickly take acon to stop the
acvity.
GlobalProtect and Prisma Access logs If you use GlobalProtect or Prisma Access to
extend your firewall security coverage to your
mobile users, Cortex XDR can also analyze VPN
traffic to detect anomalous behavior on mobile
endpoints.
Firewall URL logs (part of firewall threat Palo Alto Networks firewalls can log Threat
logs) log entries when traffic matches one of the
Security Profiles aached to a security rule on
the firewall. Cortex XDR can analyze entries for
Threat logs relang to URLs and raise alerts that
indicate malicious behavior such as command
and control and exfiltraon.
Cortex XDR agent endpoint data With a Cortex XDR Pro per Endpoint license, you
can deploy Cortex XDR agents on your endpoints
to protect them from malware and soware
exploits. The analycs engine can also analyze
the EDR data collected by the Cortex XDR agent
to raise alerts. To collect EDR data, you must
install Cortex XDR agent 6.0 or a later release
on your Windows endpoints (Windows 7 SP1 or
later).
The Cortex XDR analycs engine can analyze
acvity and traffic based solely on endpoint
acvity data sent from Cortex XDR agents. For
increased coverage and greater insight during
invesgaons, use a combinaon of Cortex XDR
agent data and firewalls to supply acvity logs
for analysis.
Cortex® XDR™ Pro Administrator’s Guide 834 ©2021 Palo Alto Networks, Inc.
Analycs
Sensor Descripon
and endpoints, and to provide more context
when invesgang alerts.
Directory Sync logs If you use the Cloud Identy Engine to provide
Cortex XDR with Acve Directory data, the
analycs engine can also raise alerts on your
Acve Directory logs.
External sensors
Windows Event Collector logs The Windows Event Collector (WEC) runs on the
broker VM collecng event logs from Domain
Controllers (DCs). The analycs engine can
analyze these event logs to raise alerts such as
for credenal access and defense evasion.
Cortex® XDR™ Pro Administrator’s Guide 835 ©2021 Palo Alto Networks, Inc.
Analycs
The analycs engine can alert on any of the following aack taccs as defined by the MITRE
ATT&CK™ knowledge base of taccs.
Tacc Descripon
Cortex® XDR™ Pro Administrator’s Guide 836 ©2021 Palo Alto Networks, Inc.
Analycs
Tacc Descripon
Some of the symptoms the app looks for are
increased administrave acvity, SMB usage,
and remote code execuon.
Cortex® XDR™ Pro Administrator’s Guide 837 ©2021 Palo Alto Networks, Inc.
Analycs
Cortex® XDR™ Pro Administrator’s Guide 838 ©2021 Palo Alto Networks, Inc.
Analycs
These me periods are different for every Cortex XDR Analycs detector. The actual amount of
logging data (measured in me) required to raise any given Cortex XDR Analycs alert is idenfied
in the Cortex XDR Analycs Alert Reference.
Cortex® XDR™ Pro Administrator’s Guide 839 ©2021 Palo Alto Networks, Inc.
Analycs
Identy Analycs
To help you invesgate suspicious user acvity informaon collected by the Analycs engine,
Cortex XDR provides the Identy Analycs. When enabled, the Identy Analycs aggregates and
displays user profile informaon, acvity, and alerts associated with a user-based Analycs type
alert and Analycs BIOC rule.
To easily track the alerts and Analycs BIOC rules, Cortex XDR displays an Identy Analycs
tag in the Alerts table > Alert Name field and Analycs BIOC Rules table > Name field. In the
Analycs Alert View, when selecng the User node, Cortex XDR details the acve directory
group, organizaonal unit, role, logins, hosts, alerts, and process execuons associated with the
user.
To enable the Identy Analycs, you must first:
• Set Up Cloud Identy Engine (Formally Directory Sync Services (DSS))
• Acvate Cortex XDR Analycs
Cortex XDR sends a noficaon if there any problems with the configuraons.
Aer configuring your Cloud Identy Engine instance and Cortex XDR Analycs, select Sengs
( ) > Configuraons > Cortex XDR - Analycs and in the Featured in Analycs secon, Enable
Identy Analycs.
Cortex® XDR™ Pro Administrator’s Guide 840 ©2021 Palo Alto Networks, Inc.
Asset Management
> Network Asset Management
> Cloud Inventory Assets
841
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 842 ©2021 Palo Alto Networks, Inc.
Asset Management
You can add a range which is fully contained in an exisng range, however you
cannot add a new range which parally intersect with another range.
The range names you define will appear when invesgang the network related events
within the Cortex XDR console.
• Save your definions.
• Upload from File
• In the Upload IP Address Ranges pop-up, drag and drop or search for a CSV file lisng
the IP address ranges. Download example file to view the correct format.
• Add your list of IP address ranges.
Cortex® XDR™ Pro Administrator’s Guide 843 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 844 ©2021 Palo Alto Networks, Inc.
Asset Management
STEP 2 | In the Internal Domain Suffixes secon, +Add the domain suffix you want to include as part
of your internal network. For example, acme.com.
Cortex® XDR™ Pro Administrator’s Guide 845 ©2021 Palo Alto Networks, Inc.
Asset Management
HOST NAME Host name of the asset, if The asset requires at least
available. one of the following:
• An installed Cortex XDR
agent
• A running Cortex XDR
collector
• A Global Protect client
9.1 or a later release,
configured to send HIP
Match logs
• Associated DHCP logs
covering this asset are sent
to Cortex XDR
Cortex® XDR™ Pro Administrator’s Guide 846 ©2021 Palo Alto Networks, Inc.
Asset Management
MAC ADDRESS Mac address of the asset. The asset requires at least
one of the following:
• An installed Cortex XDR
agent
• A running Cortex XDR
collector
• For Mac endpoints, a
Global Protect client 9.1 or
a later release, configured
to send HIP Match logs
• Associated DHCP logs
covering this asset are sent
to Cortex XDR
MAC ADDRESS VENDOR Vendor name of the Mac The asset requires at least
address of the asset. one of the following:
• An installed Cortex XDR
agent
• A running Cortex XDR
collector
• For Mac endpoints, a
Global Protect client 9.1 or
a later release, configured
to send HIP Match logs
• Associated DHCP logs
covering this asset are sent
to Cortex XDR
Cortex® XDR™ Pro Administrator’s Guide 847 ©2021 Palo Alto Networks, Inc.
Asset Management
• View agent details—Pivot to the Endpoints table filtered according to the agent ID. Choose
whether to open the view in a new tab or the same tab. This opon is available only for
assets with a Cortex XDR agent installed.
• Open in Quick Launcher—Open the Quick Launcher search results for the IP address.
• Remove Collector—Remove the Pathfinder Data Collector. Only available if a collector is
status is In Process.
Cortex® XDR™ Pro Administrator’s Guide 848 ©2021 Palo Alto Networks, Inc.
Asset Management
Using Identy Analycs, Cortex XDR is able to aggregate from Workday and Acve Directory a
list of all the user assets located within your network according to their associated incidents. To
help invesgate user acvies and detect compromised accounts and malicious acvies, Cortex
XDR calculates a User Score that allows you to easily idenfy the most high-risk users in your
organizaon.
The User Score is the higher score of the following two components:
• Incident Scoring Rules—Alerts within an incident matching your scoring rules criteria are each
given a score. The alert with the highest score from the incident is assigned as the User Score.
• System Rules—Alerts within an incident matching Cortex XDR generated scoring rules are each
given a score. Cortex XDR sums all the alerts for each incident up to a total of 100. The highest
score is assigned as the User Score.
As new alerts are associated with incidents, the User Score assigned is recalculated.
Navigate to the User Scores table to view the latest score, and the User View to track the
User Score trend.
Cortex® XDR™ Pro Administrator’s Guide 849 ©2021 Palo Alto Networks, Inc.
Asset Management
Field Descripon
LAST LOGIN Last date and me the user accessed Cortex
XDR.
STEP 3 | Invesgate further by locang the user you want to invesgate, right-click and Open User
View.
Cortex® XDR™ Pro Administrator’s Guide 850 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ provides a unified, normalized asset inventory for cloud assets in Google Cloud
Plaorm, Microso Azure, and Amazon Web Services. This capability provides deeper visibility
to all the assets and superior context for incident invesgaon. To receive cloud assets, you must
first configure a Cloud Inventory data collector for the vendor in Cortex XDR. As soon as Cortex
XDR begins receiving cloud assets, you can view the data in Assets > Cloud Inventory, where All
Cloud Assets and Specific Cloud Assets pages display the data in a table format.
The following are some of the main features available to you on these pages.
• When any row in the table is selected, a side panel on the right with greater details is displayed,
where you can view addional data divided by secons. The following are some descripons of
the main secons.
• Internet Exposure—When there are any open external ports, these ports and their
corresponding details are displayed, so you can quickly idenfy the source of the problem.
You can also view the raw JSON text of the banner details obtained from Cortex Xpanse.
• Asset Editors—Displays the idenes of the latest 5 editors lisng the percentage of eding
acons for a single identy. A link is provided to open a predefined query in XQL Search on
the cloud_audit_log dataset to view the edit operaons by the identy selected for this
asset in the last 7 days.
• Asset Metadata—Details the asset metadata collected for the parcular row selected in the
table.
• Depending on the cell you’ve selected in the table, different right-click pivot menus are
available, such as Open IP View and Open in Quick Launcher.
• You can export the tables and respecve asset views to a tab-separated values (TSV) file.
For more informaon on these secons in the side panel, see Manage Your Cloud Inventory
Assets.
The All Cloud Assets page enable you to view all your cloud assets from the various cloud assets
categories that you configured for collecon from Google Cloud Plaorm, Microso Azure, and
Amazon Web Services using the Cloud Inventory data collector.
To view the All Cloud Assets page, select Assets > Cloud Inventory > All Cloud Assets.
By default, the All Cloud Assets page displays all cloud assets according to the most recent me
that the data was updated. To search for specific assets, use the filters above the results table to
narrow the results. You can export the tables and respecve asset views to a tab-separated values
Cortex® XDR™ Pro Administrator’s Guide 851 ©2021 Palo Alto Networks, Inc.
Asset Management
(TSV) file. From the All Cloud Assets page, you can also manage the assets output using the right-
click pivot menu. For more informaon, see Manage Your Cloud Inventory Assets.
The All Cloud Assets table is comprised of a number of common fields that are available when
viewing any of the Specific Cloud Assets pages. The TYPE and SUBTYPE fields are only available
in the All Cloud Assets table as these fields determine the Specific Cloud Assets categories, and
can be used to filters the different types of assets from the enre list of assets.
When any row in the table is selected, a side panel on the right with greater details is displayed,
where you can view addional data divided by secons, such as Asset Metadata and Asset
Editors. The Asset Editors secon also provides a link to open a predefined query in XQL Search
on the cloud_audit_log dataset to view the edit operaons by the identy selected for this
asset in the last 7 days.
The following table describes the fields that are available when viewing All Cloud Assets in
alphabecal order.
Certain fields are exposed and hidden by default. An asterisk (*) is beside every field that is
exposed by default.
Field Descripon
CREATION TIME* Displays the me that the cloud asset was
created. This informaon is not always
available.
Cortex® XDR™ Pro Administrator’s Guide 852 ©2021 Palo Alto Networks, Inc.
Asset Management
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 853 ©2021 Palo Alto Networks, Inc.
Asset Management
Field Descripon
• VM Instance
• Bucket
• Disk
• Image
• Subnet
• Security Group
• Other
This field is unique to the All Cloud Assets
table.
Cortex® XDR™ Pro Administrator’s Guide 854 ©2021 Palo Alto Networks, Inc.
Asset Management
Field Descripon
UPDATE TIME* Displays the me that the cloud asset was
updated. This informaon is not always
available.
The Specific Cloud Assets pages enable you to view specific cloud assets from a designated
cloud assets category from all the assets you configured to collect from Google Cloud Plaorm,
Microso Azure, and Amazon Web Services using the Cloud Inventory data collector. These asset
cloud categories are based on a combinaon of asset types and subtypes. Each specific table
contains the common columns that are listed in the All Cloud Assets table and some addional
specific columns that are relevant for this type of cloud asset.
To view the Specific Cloud Assets pages, select Assets > Cloud Inventory > Specific Cloud Assets,
and select a specific cloud asset category.
By default, the Specific Cloud Assets pages displays the cloud assets according to the most recent
me that the data was updated. To search for specific assets, use the filters above the results table
to narrow the results. You can export the tables and respecve asset views to a tab-separated
values (TSV) file. From the Specific Cloud Assets page, you can also manage the assets output
using the right-click pivot menu. For more informaon, see Manage Your Cloud Inventory Assets.
When any row in the table is selected, a side panel on the right with greater details is displayed,
where you can view addional data divided by secons, such as Asset Metadata and Asset
Editors. The Asset Editors secon also provides a link to open a predefined query in XQL Search
on the cloud_audit_log dataset to view the edit operaons by the identy selected for this
asset in the last 7 days.
The image below is an example of a Specific Cloud Assets page for Compute Instances.
Cortex® XDR™ Pro Administrator’s Guide 855 ©2021 Palo Alto Networks, Inc.
Asset Management
The table below describes for the different Specific Cloud Assets pages the following:
• Specific Cloud Assets—The name of the specific cloud asset page.
• Asset Type—The asset type that is automacally associated to this specific cloud asset page.
• Asset Subtype—The asset subtype that is automacally associated to this specific cloud asset
page.
• Unique Fields—The unique fields that are only available when viewing this specific cloud asset
page, and are displayed in addion to the common fields listed for All Cloud Assets pages.
These fields are exposed by default.
Cortex® XDR™ Pro Administrator’s Guide 856 ©2021 Palo Alto Networks, Inc.
Asset Management
The All Cloud Assets and Specific Cloud Assets pages provide a central locaon from which
you can view and invesgate informaon relang to inventory assets in the cloud. These cloud
inventory assets are collected from Google Cloud Plaorm, Microso Azure, and Amazon Web
Services depending on your defined cloud configuraons, and are received by Cortex® XDR™
using the Cloud Inventory data collector. These pages are designed in a similar format so you can
navigate to the page, view the data, and perform the same tasks to easily invesgate your assets.
To manage your cloud inventory assets.
Cortex® XDR™ Pro Administrator’s Guide 857 ©2021 Palo Alto Networks, Inc.
Asset Management
STEP 2 | View all All Cloud Assets by remaining on the page, or select a Specific Cloud Assets page
from the list available on the le panel.
By default, the pages displays all cloud assets according to the most recent me that the data
was updated.
STEP 4 | (Oponal) Export your filtered results to a tab-separated values (TSV) file using the Export to
file icon ( ) on the top of page.
Cortex® XDR™ Pro Administrator’s Guide 858 ©2021 Palo Alto Networks, Inc.
Asset Management
STEP 5 | (Oponal) Invesgate any asset further by selecng the applicable row in the table to reveal
a side panel.
The side panel enables you to view addional data divided by secons, such as Asset
Metadata and Asset Editors. The Asset Editors secon also provides a link ( ) to open in a
new tab a predefined query in XQL Search on the cloud_audit_log dataset to view the edit
operaons by the identy selected for this asset in the last 7 days.
The following table describes the common side panel components that are displayed for all
asset types and subtypes, and the specific side panel components based on the specific cloud
assets type selected.
Cortex® XDR™ Pro Administrator’s Guide 859 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 860 ©2021 Palo Alto Networks, Inc.
Asset Management
The Project
is called
something
else in
each cloud
provider.
For more
informaon,
see the
PROJECT
descripon.
• Public IPs—Displays list of
external public IPs.
• Private IPs—Displays list of
internal private IPs.
• Cloud Tags—Displays
any cloud tags or labels
configured according to
the cloud provider.
• Last Reported Status—
Last reported status of the
asset, such as AVAILABLE
or READY.
Cortex® XDR™ Pro Administrator’s Guide 861 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 862 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 863 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 864 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 865 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 866 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 867 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 868 ©2021 Palo Alto Networks, Inc.
Asset Management
• Show rows 30 days prior to ‘<mestamp field>’—For all mestamp fields in the assets
tables, you can filter the column list to only display the rows 30 days earlier than the
selected mestamp field.
• Show rows 30 days aer to ‘<mestamp field>’—For all mestamp fields in the assets
tables, you can filter the column list to only display the rows 30 days aer the selected
mestamp field.
Cortex® XDR™ Pro Administrator’s Guide 869 ©2021 Palo Alto Networks, Inc.
Asset Management
Cortex® XDR™ Pro Administrator’s Guide 870 ©2021 Palo Alto Networks, Inc.
Monitoring
> Cortex® XDR™ Dashboard
> Monitor Cortex XDR Incidents
> Monitor Cortex XDR Gateway Management Acvity
> Monitor Administrave Acvity
> Monitor Agent Acvity
> Monitor Agent Operaonal Status
871
Monitoring
The dashboard comprises Dashboard Widgets (2) that summarize informaon about your endpoint
in graphical or tabular format. You can customize Cortex XDR to display Predefined Dashboards
or create your own custom dashboard using the dashboard builder. You can toggle between your
available dashboards using the dashboard menu (1).
In addion, the dashboard provides a color theme toggle (3) that enables you to switch the
interface colors between light and dark.
Dashboard Widgets
Cortex XDR provides the following list of widgets to help you create dashboards and reports
displaying summarized informaon about your endpoints.
Cortex® XDR™ Pro Administrator’s Guide 872 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex XDR sorts widgets in the Cortex XDR app according to the following categories:
• Agent Management Widgets
• Incident Management Widgets
• Invesgaon Widgets
• User Defined Widgets
• Asset Widgets
• XQL Search
• Custom Widget
• System Monitoring
• Host Insights
Agent Content Version Breakdown Displays the total number of registered Cortex
XDR agents and the distribuon of agents by
content update version.
Cortex® XDR™ Pro Administrator’s Guide 873 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 874 ©2021 Palo Alto Networks, Inc.
Monitoring
Overdue Incidents of top 5 Assignees Display the last 30 days, 7 days, or 24 hours
of the following informaon according to the
incidents creaon me:
• Top 5 assignees, by assignee name, with
the highest number of overdue incidents.
For further invesgaon, select a user to pivot
to the Incident table filtered according to the
incident creaon me and assignee.
Resolved Incidents by Assignee Display a breakdown of the top five users with
the most resolved incidents assigned to them
according to the incident creaon me.
For further invesgaon, select an assignee to
pivot to the Incidents table filtered according
to the assignee and the resolved incident
resoluon me.
Cortex® XDR™ Pro Administrator’s Guide 875 ©2021 Palo Alto Networks, Inc.
Monitoring
Invesgaon Widgets
Open Incidents by Severity Displays the total open incidents over the last
30 days according to severity.
Select a severity to open a filtered view of
incidents by the selected severity.
Response Acon Breakdown Displays the top response acons taken in the
Acon Center over the last 24 hours, 7 days,
or 30 Days.
Cortex® XDR™ Pro Administrator’s Guide 876 ©2021 Palo Alto Networks, Inc.
Monitoring
Top Hosts Displays the top ten hosts with the highest
number of incidents in order of severity over
the last 30 days. Incidents are color-coded:
red for high severity and yellow for medium
severity.
Click a host to open a filtered view of all open
incidents for the selected host.
Top Incidents Displays the top ten current incidents with the
highest number of alerts according to severity
over the last 30 days. Alerts are color-coded;
red for high and yellow for medium.
Click a severity to open a filtered view of all
open alerts for the selected incident.
Cortex® XDR™ Pro Administrator’s Guide 877 ©2021 Palo Alto Networks, Inc.
Monitoring
Asset Widgets
Top 5 Notable Users Displays the top 5 users with the highest User
Score. Select a user to pivot to the User View.
XQL Search
Cortex® XDR™ Pro Administrator’s Guide 878 ©2021 Palo Alto Networks, Inc.
Monitoring
Custom Widget
System Monitoring
Cortex® XDR™ Pro Administrator’s Guide 879 ©2021 Palo Alto Networks, Inc.
Monitoring
Host Insights
(Requires a Cortex XDR Host Insights Add-on)
Top CVEs By Affected Endpoints Displays the top Crical, High, and Medium
severity CVEs currently exisng in your
network according to the total number of
endpoints affected by each CVE.
Click a CVE to open a filtered view of all
affected endpoints.
Cortex® XDR™ Pro Administrator’s Guide 880 ©2021 Palo Alto Networks, Inc.
Monitoring
Vulnerabilies On All Endpoints Over Time Displays CVEs over me across your network.
Select the me scope in the upper right to
view the number of CVEs over the last 24
hours, 7 days, or 30 Days.
Hover over the graph to view the number of
exisng CVEs on a specific day.
Cortex® XDR™ Pro Administrator’s Guide 881 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 882 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 883 ©2021 Palo Alto Networks, Inc.
Monitoring
XQL queries generated from the widget library do not appear in the Query
Center. The results are used only for creang the custom widget.
5. In the Widget secon, define how you want to visualize the results.
6. Aer you are happy with the query parameters and visualizaon definions, Save
widget.
The custom widget appears in the list of exisng widgets.
• Search for custom and predefined widgets.
1. Search for a widget or Show widgets according to the type of category.
2. Select a widget type to display the widget graph type and parameters. By default, Cortex
XDR displays the widget with Mock Data. Toggle to display your current Real Data.
• Edit exisng custom widgets.
1. Locate a custom widget.
2. Select Update widget ( ) to edit the widget or Delete widget from library.
Eding an exisng widget affects all dashboards that include the widget and
future generated reports.
STEP 2 | (Oponal) Include the widgets listed in the widget library in your custom dashboards and
reports.
Predefined Dashboards
Cortex XDR comes with predefined dashboards that display widgets tailored to the dashboard
type. You can select any of the predefined dashboards directly from the dashboard menu in
Reporng > Dashboard. You can also select and rename a predefined dashboard in the Dashboard
Builder available by clicking + New Dashboard. The types of dashboards that are available to you
depend on your license type but can include:
• Agent Management Dashboard
• Incident Management Dashboard
• Security Manager Dashboard
• Data Ingeson Dashboard
• Security Admin Dashboard
Support for the Agent Management Dashboard requires either a Cortex XDR Prevent or
Cortex XDR Pro per Endpoint license.
Cortex® XDR™ Pro Administrator’s Guide 884 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 885 ©2021 Palo Alto Networks, Inc.
Monitoring
The Security Manager Dashboard requires either a Cortex XDR Prevent or Cortex XDR Pro
per Endpoint license.
Cortex® XDR™ Pro Administrator’s Guide 886 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 887 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 888 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 889 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 890 ©2021 Palo Alto Networks, Inc.
Monitoring
STEP 2 | Enter a unique Dashboard Name and an oponal Descripon of the dashboard.
Cortex® XDR™ Pro Administrator’s Guide 891 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 892 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 893 ©2021 Palo Alto Networks, Inc.
Monitoring
STEP 6 | When you have finished customizing your dashboard, click Next.
STEP 7 | To set the custom dashboard as your default dashboard when you log in to Cortex XDR,
Define as default dashboard.
STEP 8 | To keep this dashboard visible only for you, select Private.
Otherwise, the dashboard is public and visible to all Cortex XDR app users with the appropriate
roles to manage dashboards.
Manage Dashboards
From the Reporng > Dashboards Manager, you can view all custom and default dashboards.
From the Dashboards Manager, you can also delete, edit, duplicate, disable, and perform addional
management acons on your dashboards.
To manage an exisng dashboard, right click the dashboard and select the desired acon.
• Delete - Permanently delete a dashboard.
• Edit - Edit an exisng dashboard. You cannot edit the default dashboards provided by Palo Alto
Networks, but you can save it as a new dashboard.
• Save as new - Duplicate an exisng template.
• Disable - Temporarily disable a dashboard. If the dashboard is public, this dashboard is also
removed for all users.
• Set as default - Make the dashboard the default dashboard that displays when you (and other
users, if the dashboard is public) log in to Cortex XDR.
• Save as report template - Save a report as a template.
Cortex® XDR™ Pro Administrator’s Guide 894 ©2021 Palo Alto Networks, Inc.
Monitoring
STEP 2 | Right-click the dashboard from which you want to generate a report, and select Save as
report template.
STEP 3 | Enter a unique Report Name and an oponal Descripon of the report, then Save the
template.
STEP 6 | Aer your report completes, you can download it from the Reporng > Reports page.
STEP 2 | Enter a unique Report Name and an oponal Descripon of the report.
STEP 7 | When you have finished customizing your report template, click Next.
Cortex® XDR™ Pro Administrator’s Guide 895 ©2021 Palo Alto Networks, Inc.
Monitoring
STEP 8 | If you are ready to run the report, select Generate now.
STEP 9 | To run the report on a regular Schedule, you can specify the me and frequency that Cortex
XDR will run the report.
STEP 10 | (Oponal) Enter an Email Distribuon list or Slack workspace to send a PDF version of your
report.
Select Add password used to access report sent by email and Slack to set a password
encrypon.
STEP 11 | (Oponal) Aach CSV file of your XQL query widget to a report.
From the drop-down menu, search and select one or more of your custom widgets to aach
to the report. The XQL query widget is aached to the report as a CSV file along with the
customized PDF. Depending on how you selected to send the report, the CSV file is aached
as follows:
• Email—Sent as separate aachments for each widget. The total size of the aachment in the
email cannot exceed 20MB.
• Slack—Sent within a ZIP file that includes the PDF file.
STEP 13 | Aer your report completes, you can download it from the Reporng > Reports page.
In the Name field, reports with mulple files, PDF and CSV files, are marked with a icon,
while reports with a single PDF are marked with a icon.
Cortex® XDR™ Pro Administrator’s Guide 896 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 897 ©2021 Palo Alto Networks, Inc.
Monitoring
You must have Account Admin role permissions to access the Management Auding page.
Field Descripon
Descripon Log message describing the acon taken and on which tenant. To filter
according to a tenant, use the contains operator.
Cortex® XDR™ Pro Administrator’s Guide 898 ©2021 Palo Alto Networks, Inc.
Monitoring
Field Descripon
Timestamp Date and me when the acon occurred displayed in UTC.
Cortex® XDR™ Pro Administrator’s Guide 899 ©2021 Palo Alto Networks, Inc.
Monitoring
The following table describes the default and oponal addional fields that you can view in
alphabecal order.
Field Descripon
Descripon Descripve summary of the administrave acon. Hover over this field
to view more detailed informaon in a popup toolp. This enables
you to know exactly what has changed, and, if necessary, roll back the
change.
Cortex® XDR™ Pro Administrator’s Guide 900 ©2021 Palo Alto Networks, Inc.
Monitoring
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 901 ©2021 Palo Alto Networks, Inc.
Monitoring
Field Descripon
• Live Terminal—Remote terminal sessions created and acons
taken in the file manager or task manager, a complete history of
commands issued, their success, and the response.
• Managed Threat Hunng—Acvity relang to managed threat
hunng.
• MSSP—Management of security services providers.
• Policy & Profiles—Acvity related to managing policies and profiles.
• Prevenon Policy Rules—Modificaon of prevenon policy rules.
• Protecon Policy—Modificaon of the protecon policy.
• Protecon Profile—Modificaon of the protecon profile.
• Public API—Authencaon acvity using an associated Cortex XDR
API key.
• Query Center—Operaons in the Query Center.
• Remediaon—Remediaon operaons.
• Reporng—Any reporng acvity.
• Response—Remedial acons taken. For example: Isolate a host,
undo host isolaon, add a file hash signature to block list, or undo
the addion to the block list.
• Rules—Modificaon to rules.
• Rules Excepons—Creaon, eding, or deleon under Rules
excepons.
• SaaS Collecon—Any collected SaaS data.
• Script Execuon—Any script execuon.
• Starred Incidents—Modificaon of starred incidents.
• Vulnerability Assessment—Any vulnerability assessment acvity.
Cortex® XDR™ Pro Administrator’s Guide 902 ©2021 Palo Alto Networks, Inc.
Monitoring
The Cortex XDR agent logs entries for events that are monitored by the Cortex XDR agent and
reports the logs back to Cortex XDR hourly. Cortex XDR stores the logs for 365 days. To view the
Cortex XDR agent logs, select Sengs ( ) > Agent Auding.
To ensure you and your colleagues stay informed about agent acvity, you can Configure
Noficaon Forwarding to forward your Agent Audit log to an email distribuon list, Syslog server,
or Slack channel.
You can customize your view of the logs by adding or removing fields to the Agent Audits Table.
You can also filter the page result to narrow down your search. The following table describes the
default and oponal fields that you can view in the Cortex XDR Agents Audit Table:
Field Descripon
Category The Cortex XDR agent logs these endpoint events using one of the
following categories:
• Audit—Successful changes to the agent indicang correct
behavior.
Cortex® XDR™ Pro Administrator’s Guide 903 ©2021 Palo Alto Networks, Inc.
Monitoring
Field Descripon
• Monitoring—Unsuccessful changes to the agent that may require
administrator intervenon.
• Status—Indicaon of the agent status.
Reason If the acon or acvity failed, this field indicates the idenfied cause.
Received Time Date and me when the acon was received by the agent and
reported back to Cortex XDR.
Type and Sub-Type Addional classificaon of agent log (Type and Sub-Type:
• Installation:
• Install
• Uninstall
• Upgrade
• Policy change:
• Local Configuration Change
• Content Update
• Policy Update
• Process Exception
• Hash Exception
• Agent service:
• Service start (reported only when the agent fails to start
and the RESULT is Fail)
• Service stopped
Cortex® XDR™ Pro Administrator’s Guide 904 ©2021 Palo Alto Networks, Inc.
Monitoring
Field Descripon
• Agent modules:
• Module initialization
• Local analysis module
• Local analysis feature extraction
• Agent status:
• Fully protected
• OS incompatible
• Software incompatible
• Kernel driver initialization
• Kernel extension initialization
• Proxy communication
• Quota exceeded (reported when old prevenon data is being
deleted from the endpoint)
• Minimal content
• Action:
• Scan
• File retrieval
• Terminate process
• Isolate
• Cancel isolation
• Payload execution
• Quarantine
• Restore
• Block IP address
• Unblock IP address
XDR Agent Version Version of the Cortex XDR agent running on the endpoint.
Cortex® XDR™ Pro Administrator’s Guide 905 ©2021 Palo Alto Networks, Inc.
Monitoring
Status Descripon
Protected (Windows, Mac, and Linux) Indicates all protecon modules are
running as configured on the endpoint.
Cortex® XDR™ Pro Administrator’s Guide 906 ©2021 Palo Alto Networks, Inc.
Monitoring
Status Descripon
• Behavioral threat protecon is not running
• An-malware flow is asynchronous
• Malware protecon is not running
• Exploit protecon is not running
Cortex® XDR™ Pro Administrator’s Guide 907 ©2021 Palo Alto Networks, Inc.
Monitoring
Cortex® XDR™ Pro Administrator’s Guide 908 ©2021 Palo Alto Networks, Inc.
Log Forwarding
To help you stay informed and updated, you can easily forward Cortex XDR™ alerts
and reports to an external syslog receiver, a Slack channel, or to email accounts.
909
Log Forwarding
Alerts
Reports — —
Cortex® XDR™ Pro Administrator’s Guide 910 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 911 ©2021 Palo Alto Networks, Inc.
Log Forwarding
STEP 2 | Select the provided link to install Cortex XDR on your Slack workspace.
You are directed to the Slack browser to install the Cortex XDR app. You can only use
this link to install Cortex XDR on Slack. Aempng to install from Slack marketplace
will redirect you to Cortex XDR documentaon.
Cortex® XDR™ Pro Administrator’s Guide 912 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 913 ©2021 Palo Alto Networks, Inc.
Log Forwarding
STEP 2 | Select Sengs ( ) > Configuraons > Integraons > External Applicaons.
Cortex® XDR™ Pro Administrator’s Guide 914 ©2021 Palo Alto Networks, Inc.
Log Forwarding
If your Syslog receiver uses a self signed CA, Browse and upload your self-signed Syslog
receiver CA.
If you only use a trusted root CA leave the Cerficate field empty.
• Ignore Cerficate Error—Cortex XDR does not recommend, but you can choose to select
this opon to ignore cerficate errors if they occur. This will forward alerts and logs even if
the cerficate contains errors.
Cortex® XDR™ Pro Administrator’s Guide 915 ©2021 Palo Alto Networks, Inc.
Log Forwarding
STEP 5 | Test the parameters to ensure a valid connecon and Create when ready.
You can define up to five Syslog servers. Upon success, the table displays the Syslog servers
and their status.
If you find the Syslog data limited, Cortex XDR recommended to run the Get Alerts
API for complete alert data.
Cortex® XDR™ Pro Administrator’s Guide 916 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex XDR applies the filter only to future alerts and events.
Use this workflow to configure noficaons for alerts, agent audit logs, and management audit
logs. To receive noficaons about reports, see Create a Report from Scratch.
STEP 1 | Select Sengs ( ) > Configuraons > General > Noficaons.
STEP 4 | Select the Log Type you want to forward, one of the following:
• Alerts—Send noficaons for specific alert types (for example, XDR Agent or BIOC).
• Agent Audit Logs—Send noficaons for audit logs reported by your Cortex XDR agents.
• Management Audit Logs—Send noficaons for audit logs about events related to your
Cortex XDR management console.
STEP 5 | In the Configuraon Scope, Filter the type of informaon you want included in a noficaon.
For example, set a filter Severity = Medium, Alert Source = XDR Agent. Cortex
XDR sends the alerts or events matching this filter as a noficaon.
Cortex® XDR™ Pro Administrator’s Guide 917 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Before you can select a Slack channel or Syslog receiver you must Integrate Slack for
Outbound Noficaons and Integrate a Syslog Receiver.
1. Enter the Slack channel name and select from the list of available channels.
Slack channels are managed independently of Cortex XDR in your Slack workspace. Aer
integrang your Slack account with your Cortex XDR tenant, Cortex XDR displays a list
of specific Slack channels associated with the integrated Slack workspace.
2. Select a Syslog receiver.
Cortex XDR displays the list of receivers integrated with your Cortex XDR tenant.
STEP 9 | (Oponal) To later modify a saved forwarding configuraon, right-click the configuraon, and
Edit, Disable, or Delete it.
Cortex® XDR™ Pro Administrator’s Guide 918 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type-Acon Center
Type—Agent Configuraon
Cortex® XDR™ Pro Administrator’s Guide 919 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Type—Agent Installaon
• Severity—Informaonal
Type—Alert Exclusions
Cortex® XDR™ Pro Administrator’s Guide 920 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Status—Success
• Severity—Informaonal
Type—Alert Noficaons
Cortex® XDR™ Pro Administrator’s Guide 921 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Alert Rules
Type—Api Key
Cortex® XDR™ Pro Administrator’s Guide 922 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Authencaon
• Sub Type—Login
• Status—Success
• Severity—Informaonal
• Sub Type—Logout
• Status—Success
• Severity—Informaonal
Type—Broker API
Type—Broker VMs
Cortex® XDR™ Pro Administrator’s Guide 923 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Low
Cortex® XDR™ Pro Administrator’s Guide 924 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Low
Cortex® XDR™ Pro Administrator’s Guide 925 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Low
Type—Dashboards
Cortex® XDR™ Pro Administrator’s Guide 926 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Cortex® XDR™ Pro Administrator’s Guide 927 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
from a violation event to profile • Severity—Informaonal
{profile_name}
Cortex® XDR™ Pro Administrator’s Guide 928 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Type—EDL Management
Type—Endpoint Administraon
Cortex® XDR™ Pro Administrator’s Guide 929 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Cortex® XDR™ Pro Administrator’s Guide 930 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Endpoint Groups
Cortex® XDR™ Pro Administrator’s Guide 931 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Type—Extensions Policy
Type—Extensions Profile
Cortex® XDR™ Pro Administrator’s Guide 932 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Cortex® XDR™ Pro Administrator’s Guide 933 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Type—Global Excepons
Cortex® XDR™ Pro Administrator’s Guide 934 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Host Insights
Type—Incident Management
Cortex® XDR™ Pro Administrator’s Guide 935 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Cortex® XDR™ Pro Administrator’s Guide 936 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Type—Ingest Data
Type—Integraons
Cortex® XDR™ Pro Administrator’s Guide 937 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Licensing
Cortex® XDR™ Pro Administrator’s Guide 938 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Live Terminal
Cortex® XDR™ Pro Administrator’s Guide 939 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Low
Cortex® XDR™ Pro Administrator’s Guide 940 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—MSSP
Cortex® XDR™ Pro Administrator’s Guide 941 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Type—Permission
Cortex® XDR™ Pro Administrator’s Guide 942 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Cortex® XDR™ Pro Administrator’s Guide 943 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Cortex® XDR™ Pro Administrator’s Guide 944 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Status—Success
• Severity—Informaonal
Type—Public API
Type—Query Center
Cortex® XDR™ Pro Administrator’s Guide 945 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Type—Remediaon
•
•
•
Type—Reporng
Cortex® XDR™ Pro Administrator’s Guide 946 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Response
Cortex® XDR™ Pro Administrator’s Guide 947 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Low
Cortex® XDR™ Pro Administrator’s Guide 948 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Low
Cortex® XDR™ Pro Administrator’s Guide 949 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Low
Type—Rules
Cortex® XDR™ Pro Administrator’s Guide 950 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Cortex® XDR™ Pro Administrator’s Guide 951 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Cortex® XDR™ Pro Administrator’s Guide 952 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Rules Excepons
Cortex® XDR™ Pro Administrator’s Guide 953 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
• Severity—Informaonal
Type—SaaS Collecon
Cortex® XDR™ Pro Administrator’s Guide 954 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Scoring Rules
Cortex® XDR™ Pro Administrator’s Guide 955 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—Starred Incidents
Cortex® XDR™ Pro Administrator’s Guide 956 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Message Details
Type—System
Email Account
Alert noficaons are sent to email accounts according to the sengs you configured when
you Configure Noficaon Forwarding. If only one alert exists in the queue, a single alert email
format is sent. If more than one alert was grouped in the me frame, all the alerts in the queue
are forwarded together in a grouped email format. Emails also include an alert code snippet of the
fields of the alerts according to the columns in the Alert table.
Single Alert Email Example
Cortex® XDR™ Pro Administrator’s Guide 957 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Username:<user name>
Excluded: No
Starred: Yes
Alert: <link to Cortex XDR app alert view>
Incident: <link to Cortex XDR app incident view>
{
"original_alert_json":{
"uuid":"<UUID Value>",
"recordType":"threat",
"customerId":"<Customer ID>",
"severity":4,
"generatedTime":"2020-11-03T07:46:03.166000Z",
"originalAgentTime":"2020-11-03T07:46:01.372974700Z",
"serverTime":"2020-11-03T07:46:03.312633",
"isEndpoint":1,
"agentId":"<agent ID>",
"endPointHeader":{
"osVersion":"<OS version>",
"agentIp":"<Agent IP Address>",
"deviceName":"<Device Name>",
"agentVersion":"<Agent Version>",
"contentVersion":"152-40565",
"policyTag":"<Policy Tag Value>",
"securityStatus":0,
Cortex® XDR™ Pro Administrator’s Guide 958 ©2021 Palo Alto Networks, Inc.
Log Forwarding
"protectionStatus":0,
"dataCollectionStatus":1,
"isolationStatus":0,
"agentIpList":[
"<IP Address>"
],
"addresses":[
{
"ip":[
"<IP Address>"
],
"mac":"<Mac ID>"
}
],
"liveTerminalEnabled":true,
"scriptExecutionEnabled":true,
"fileRetrievalEnabled":true,
"agentLocation":0,
"fileSearchEnabled":false,
"deviceDomain":"env21.local",
"userName":"Aragorn",
"userDomain":"env21.local",
"userSid":"<User S ID>",
"osType":1,
"is64":1,
"isVdi":0,
"agentId":"<Agent ID>",
"agentTime":"2020-11-03T07:46:03.166000Z",
"tzOffset":120
},
"messageData":{
"eventCategory":"prevention",
"moduleId":"COMPONENT_WILDFIRE",
"moduleStatusId":"CYSTATUS_MALICIOUS_EXE",
"preventionKey":"<Prevention Key>",
"processes":[
{
"pid":111,
"parentId":<Parent ID>,
"exeFileIdx":0,
"userIdx":0,
"commandLine":"\"C:\\<file path>\\test.exe\" ",
"instanceId":"Instance ID",
"terminated":0
}
],
"files":[
{
"rawFullPath":"C:\\<file path>\\test.exe",
"fileName":"test.exe",
"sha256":"<SHA256 Value>",
"fileSize":"12800",
"innerObjectSha256":"<SHA256 Value>"
}
],
"users":[
Cortex® XDR™ Pro Administrator’s Guide 959 ©2021 Palo Alto Networks, Inc.
Log Forwarding
{
"userName":"<User Name>",
"userDomain":"<Domain Name>",
"domainUser":"<Domain Name>\\<User Name>"
}
],
"urls":[
],
"postDetected":0,
"sockets":[
],
"containers":[
],
"techniqueId":[
],
"tacticId":[
],
"modules":[
],
"javaStackTrace":[
],
"terminate":0,
"block":0,
"eventParameters":[
"C:\\<file path>\\test.exe",
"B30--A56B9F",
"B30--A56B9F",
"1"
],
"sourceProcessIdx":0,
"fileIdx":0,
"verdict":1,
"canUpload":0,
"preventionMode":"reported",
"trapsSeverity":2,
"profile":"Malware",
"description":"WildFire Malware",
"cystatusDescription":"Suspicious executable detected",
"sourceProcess":{
"user":{
"userName":"<User Name>",
"userDomain":"<Domain Name>",
"domainUser":"<Domain Name>"\\"<User Name>"
},
"pid":1111,
"parentId":<Parent ID>,
"exeFileIdx":0,
"userIdx":0,
"commandLine":"\"C:\\<file path>\\test.exe\" ",
Cortex® XDR™ Pro Administrator’s Guide 960 ©2021 Palo Alto Networks, Inc.
Log Forwarding
"instanceId":"<Instance ID>",
"terminated":0,
"rawFullPath":"C:\\<file path>\\Test.exe",
"fileName":"test.exe",
"sha256":"<SHA256 Value>",
"fileSize":"12800",
"innerObjectSha256":"<SHA256 Value>"
},
"policyId":"<Policy ID>"
}
},
"internal_id":<Internal ID>,
"external_id":"<External ID>",
"severity":"SEV_030_MEDIUM",
"matching_status":"MATCHED",
"end_match_attempt_ts":1604389636437,
"alert_source":"TRAPS",
"local_insert_ts":1604570760,
"source_insert_ts":160470366,
"alert_name":"WildFire Malware",
"alert_category":"Malware",
"alert_description":"Suspicious executable detected",
"bioc_indicator":null,
"matching_service_rule_id":null,
"attempt_counter":1,
"bioc_category_enum_key":null,
"alert_action_status":"REPORTED",
"case_id":111,
"is_whitelisted":false,
"starred":false,
"deduplicate_tokens":null,
"filter_rule_id":null,
"mitre_technique_id_and_name":[
""
],
"mitre_tactic_id_and_name":[
""
],
"agent_id":"80d2e314c92f6",
"agent_version":"7.2.1.2718",
"agent_ip_addresses":[
"10.208.213.137"
],
"agent_hostname":"<Agent Hostname>",
"agent_device_domain":"<Device Domain>",
"agent_fqdn":"<FQDN Value>",
"agent_os_type":"AGENT_OS_WINDOWS",
"agent_os_sub_type":"<Operating System Sub-Type> ",
"agent_data_collection_status":true,
"mac":"<Mac ID>",
"agent_is_vdi":null,
"agent_install_type":"STANDARD",
"agent_host_boot_time":[
1604446615
],
"event_sub_type":null,
Cortex® XDR™ Pro Administrator’s Guide 961 ©2021 Palo Alto Networks, Inc.
Log Forwarding
"module_id":[
"WildFire"
],
"association_strength":null,
"dst_association_strength":null,
"story_id":null,
"is_disintegrated":null,
"event_id":null,
"event_type":[
1
],
"event_timestamp":[
1604389563166
],
"actor_effective_username":[
"<Domain Name>\\<User Name>"
],
"actor_process_instance_id":[
"<Actor>\/<Instance ID>"
],
"actor_process_image_path":[
"C:\\<file path>\\test.exe"
],
"actor_process_image_name":[
"test.exe"
],
"actor_process_command_line":[
"\"C:\\<file path>\\test.exe\" "
],
"actor_process_signature_status":[
"SIGNATURE_UNSIGNED"
],
"actor_process_signature_vendor":null,
"actor_process_image_sha256":[
"SHA256 Value>"
],
"actor_process_image_md5":[
"MD5 Value>"
],
"actor_process_causality_id":[
"<Actor>\/<Causality ID>"
],
"actor_causality_id":null,
"actor_process_os_pid":[
1111
],
"actor_thread_thread_id":[
1222
],
"causality_actor_process_image_name":[
"test1.exe"
],
"causality_actor_process_command_line":[
"C:\\<file path>\\test1.EXE"
],
"causality_actor_process_image_path":[
Cortex® XDR™ Pro Administrator’s Guide 962 ©2021 Palo Alto Networks, Inc.
Log Forwarding
"C:\\<file path>\\test1.exe"
],
"causality_actor_process_signature_vendor":[
"Microsoft Corporation"
],
"causality_actor_process_signature_status":[
"SIGNATURE_SIGNED"
],
"causality_actor_causality_id":[
"AdaxtV\/iNIMAAAc8AAAAAA=="
],
"causality_actor_process_execution_time":[
1604389557724
],
"causality_actor_process_image_md5":null,
"causality_actor_process_image_sha256":[
"SHA256 value>"
],
"action_file_path":null,
"action_file_name":null,
"action_file_md5":null,
"action_file_sha256":null,
"action_file_macro_sha256":null,
"action_registry_data":null,
"action_registry_key_name":null,
"action_registry_value_name":null,
"action_registry_full_key":null,
"action_local_ip":null,
"action_local_port":null,
"action_remote_ip":null,
"action_remote_port":null,
"action_external_hostname":null,
"action_country":[
"UNKNOWN"
],
"action_process_instance_id":null,
"action_process_causality_id":null,
"action_process_image_name":null,
"action_process_image_sha256":null,
"action_process_image_command_line":null,
"action_process_signature_status":[
"SIGNATURE_UNAVAILABLE"
],
"action_process_signature_vendor":null,
"os_actor_effective_username":null,
"os_actor_process_instance_id":null,
"os_actor_process_image_path":null,
"os_actor_process_image_name":null,
"os_actor_process_command_line":null,
"os_actor_process_signature_status":[
"SIGNATURE_UNAVAILABLE"
],
"os_actor_process_signature_vendor":null,
"os_actor_process_image_sha256":null,
"os_actor_process_causality_id":null,
"os_actor_causality_id":null,
Cortex® XDR™ Pro Administrator’s Guide 963 ©2021 Palo Alto Networks, Inc.
Log Forwarding
"os_actor_process_os_pid":null,
"os_actor_thread_thread_id":[
1396
],
"fw_app_id":null,
"fw_interface_from":null,
"fw_interface_to":null,
"fw_rule":null,
"fw_rule_id":null,
"fw_device_name":null,
"fw_serial_number":null,
"fw_url_domain":null,
"fw_email_subject":null,
"fw_email_sender":null,
"fw_email_recipient":null,
"fw_app_subcategory":null,
"fw_app_category":null,
"fw_app_technology":null,
"fw_vsys":null,
"fw_xff":null,
"fw_misc":null,
"fw_is_phishing":[
"NOT_AVAILABLE"
],
"dst_agent_id":null,
"dst_causality_actor_process_execution_time":null,
"dns_query_name":null,
"dst_action_external_hostname":null,
"dst_action_country":null,
"dst_action_external_port":null,
"is_pcap":null,
"contains_featured_host":[
"NO"
],
"contains_featured_user":[
"YES"
],
"contains_featured_ip":[
"YES"
],
"events_length":1,
"is_excluded":false
Cortex® XDR™ Pro Administrator’s Guide 964 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Slack Channel
You can send alert noficaons to a single Slack contact or a Slack channel. Noficaons are
similar to the email format.
Syslog Server
Alert noficaon forwarded to a Syslog server are sent in a CEF format RF 5425.
Cortex® XDR™ Pro Administrator’s Guide 965 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Secon Descripon
Syslog Header
<9>: PRI (considered a prioirty
field)1: version number2020-03-2
2T07:55:07.964311Z: timestamp of
when alert/log was sentcortexxd
r: host name
CEF Header
HEADER/Vendor="Palo Alto Network
s" (as a constant string)HEADER/
Device Product="Cortex XDR" (as
a constant string)HEADER/Product
Version= Cortex XDR version (2.
0/2.1....)HEADER/Severity=(integ
er/0 - Unknown, 6 - Low, 8 - Med
ium, 9 - High)HEADER/Device Even
t Class ID=alert sourceHEADER/na
me =alert name
CEF Body
end=timestamp shost=endpoint_nam
e deviceFacility=facility cat=ca
tegory externalId=external_id re
quest=request cs1=initiated_by_p
rocess cs1Label=Initiated by (co
nstant string) cs2=initiator_com
mande cs2Label=Initiator CMD (co
nstant string) cs3=signature cs3
Label=Signature (constant string
) cs4=cgo_name cs4Label=CGO name
(constant string) cs5=cgo_comma
nd cs5Label=CGO CMD (constant st
ring) cs6=cgo_signature cs6Label
=CGO Signature (constant string)
dst=destination_ip dpt=destinat
ion_port src=source_ip spt=sourc
e_port fileHash=file_hash filePa
th=file_path targetprocesssignat
ure=target_process_signature ten
antname=tenant_name tenantCDLid=
tenant_id CSPaccountname=account
_name initiatorSha256=initiator_
hash initiatorPath=initiator_pat
h osParentName=parent_name osPar
entCmd=parent_command osParentSh
a256=parent_hash osParentSignatu
re=parent_signature osParentSign
er=parent_signer incident=incide
nt_id act=action suser=actor_eff
ective_username
Cortex® XDR™ Pro Administrator’s Guide 966 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Example
Cortex XDR forwards the agent audit log to external data resources according to the following
formats.
Email Account
Cortex XDR can forward agent audit log noficaons to email accounts.
Cortex® XDR™ Pro Administrator’s Guide 967 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Syslog Server
Agent audit logs forwarded to a Syslog server are sent in a CEF format RFC 5425 according to the
following mapping.
Secon Descripon
Syslog Header
<9>: PRI (considered a prioirty field)1: version n
umber2020-03-22T07:55:07.964311Z: timestamp of whe
n alert/log was sentcortexxdr: host name
CEF Header
HEADER/Vendor="Palo Alto Networks" (as a constant
string)HEADER/Device Product="Cortex XDR Agent" (a
s a constant string)HEADER/Device Version= Cortex
XDR Agent version (7.0/7.1....)HEADER/Severity=(in
teger/0 - Unknown, 6 - Low, 8 - Medium, 9 - High)H
EADER/Device Event Class ID="Agent Audit Logs" (as
a constant string)HEADER/name = type
CEF Body
dvchost=domain shost=endpoint_name cat=category en
d=timestamp rt=received_time cs1Label=agentversion
(constant string) cs1=agent_version cs2Label=subt
ype (constant string) cs2=subtype cs3Label=result
(constant string) cs3=result cs4Label=reason (cons
tant string) cs4=reason msg=event_description tena
ntname=tenant_name tenantCDLid=tenant_id CSPaccoun
tname=csp_id
Example:
Cortex® XDR™ Pro Administrator’s Guide 968 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Email Account
Management audit log noficaons are forward to email accounts.
Syslog Server
Management Audit logs forwarded to a Syslog server are sent in a CEF format RF 5425 according
to the following mapping:
Secon Descripon
Syslog Header
<9>: PRI (considered a prioirty field)1: version
number2020-03-22T07:55:07.964311Z: timestamp of w
hen alert/log was sentcortexxdr: host name
CEF Header
HEADER/Vendor="Palo Alto Networks" (as a constant
string)HEADER/Device Product="Cortex XDR" (as a
constant string)HEADER/Device Version= Cortex XDR
version (2.0/2.1....)HEADER/HEADER/Severity=(int
eger/0 - Unknown, 6 - Low, 8 - Medium, 9 - High)H
EADER/Device Event Class ID="Management Audit Log
s" (as a constant string)HEADER/name = type
Cortex® XDR™ Pro Administrator’s Guide 969 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Secon Descripon
CEF Body
suser=user end=timestamp externalId=external_id c
s1Label=email (constant string) cs1=user_mail cs2
Label=subtype (constant string) cs2=subtype cs3La
bel=result (constant string) cs3=result cs4Label=
reason (constant string) cs4=reason msg=event_des
cription tenantname=tenant_name tenantCDLid=tenan
t_id CSPaccountname=csp_id
Example
"/edrData/action_country","/edrData/action_download","/edrData/
action_external_hostname","/edrData/action_external_port","/
edrData/action_file_extension","/edrData/action_file_md5","/
edrData/action_file_name","/edrData/action_file_path","/
edrData/action_file_previous_file_extension","/
edrData/action_file_previous_file_name","/edrData/
action_file_previous_file_path","/edrData/action_file_sha256","/
edrData/action_file_size","/edrData/action_file_remote_ip","/edrData/
action_file_remote_port","/edrData/action_is_injected_thread","/
edrData/action_local_ip","/edrData/action_local_port","/
edrData/action_module_base_address","/edrData/
action_module_image_size","/edrData/action_module_is_remote","/
edrData/action_module_is_replay","/edrData/action_module_path","/
edrData/action_module_process_causality_id","/
edrData/action_module_process_image_command_line","/
edrData/action_module_process_image_extension","/
edrData/action_module_process_image_md5","/edrData/
action_module_process_image_name","/edrData/
action_module_process_image_path","/edrData/
action_module_process_image_sha256","/edrData/
action_module_process_instance_id","/edrData/
action_module_process_is_causality_root","/
Cortex® XDR™ Pro Administrator’s Guide 970 ©2021 Palo Alto Networks, Inc.
Log Forwarding
edrData/action_module_process_os_pid","/edrData/
action_module_process_signature_product","/
edrData/action_module_process_signature_status","/
edrData/action_module_process_signature_vendor","/
edrData/action_network_connection_id","/edrData/
action_network_creation_time","/edrData/action_network_is_ipv6","/
edrData/action_process_causality_id","/edrData/
action_process_image_command_line","/edrData/
action_process_image_extension","/edrData/
action_process_image_md5","/edrData/action_process_image_name","/
edrData/action_process_image_path","/edrData/
action_process_image_sha256","/edrData/action_process_instance_id","/
edrData/action_process_integrity_level","/
edrData/action_process_is_causality_root","/
edrData/action_process_is_replay","/edrData/
action_process_is_special","/edrData/action_process_os_pid","/
edrData/action_process_signature_product","/
edrData/action_process_signature_status","/edrData/
action_process_signature_vendor","/edrData/action_proxy","/edrData/
action_registry_data","/edrData/action_registry_file_path","/edrData/
action_registry_key_name","/edrData/action_registry_value_name","/
edrData/action_registry_value_type","/edrData/
action_remote_ip","/edrData/action_remote_port","/
edrData/action_remote_process_causality_id","/
edrData/action_remote_process_image_command_line","/
edrData/action_remote_process_image_extension","/
edrData/action_remote_process_image_md5","/
edrData/action_remote_process_image_name","/
edrData/action_remote_process_image_path","/
edrData/action_remote_process_image_sha256","/
edrData/action_remote_process_is_causality_root","/
edrData/action_remote_process_os_pid","/edrData/
action_remote_process_signature_product","/
edrData/action_remote_process_signature_status","/
edrData/action_remote_process_signature_vendor","/
edrData/action_remote_process_thread_id","/edrData/
action_remote_process_thread_start_address","/edrData/
action_thread_thread_id","/edrData/action_total_download","/
edrData/action_total_upload","/edrData/action_upload","/edrData/
action_user_status","/edrData/action_username","/edrData/
actor_causality_id","/edrData/actor_effective_user_sid","/
edrData/actor_effective_username","/edrData/
actor_is_injected_thread","/edrData/actor_primary_user_sid","/
edrData/actor_primary_username","/edrData/
actor_process_causality_id","/edrData/actor_process_command_line","/
edrData/actor_process_execution_time","/edrData/
actor_process_image_command_line","/edrData/
actor_process_image_extension","/edrData/
actor_process_image_md5","/edrData/actor_process_image_name","/
edrData/actor_process_image_path","/edrData/
actor_process_image_sha256","/edrData/actor_process_instance_id","/
edrData/actor_process_integrity_level","/edrData/
actor_process_is_special","/edrData/actor_process_os_pid","/
edrData/actor_process_signature_product","/
edrData/actor_process_signature_status","/edrData/
actor_process_signature_vendor","/edrData/actor_thread_thread_id","/
Cortex® XDR™ Pro Administrator’s Guide 971 ©2021 Palo Alto Networks, Inc.
Log Forwarding
edrData/agent_content_version","/edrData/agent_host_boot_time","/
edrData/agent_hostname","/edrData/agent_id","/edrData/
agent_ip_addresses","/edrData/agent_is_vdi","/edrData/
agent_os_sub_type","/edrData/agent_os_type","/edrData/
agent_session_start_time","/edrData/agent_version","/
edrData/causality_actor_causality_id","/edrData/
causality_actor_effective_user_sid","/edrData/
causality_actor_effective_username","/edrData/
causality_actor_primary_user_sid","/edrData/
causality_actor_primary_username","/edrData/
causality_actor_process_causality_id","/edrData/
causality_actor_process_command_line","/edrData/
causality_actor_process_execution_time","/edrData/
causality_actor_process_image_command_line","/
edrData/causality_actor_process_image_extension","/
edrData/causality_actor_process_image_md5","/
edrData/causality_actor_process_image_name","/
edrData/causality_actor_process_image_path","/
edrData/causality_actor_process_image_sha256","/
edrData/causality_actor_process_instance_id","/
edrData/causality_actor_process_integrity_level","/
edrData/causality_actor_process_is_special","/
edrData/causality_actor_process_os_pid","/edrData/
causality_actor_process_signature_product","/edrData/
causality_actor_process_signature_status","/edrData/
causality_actor_process_signature_vendor","/edrData/
event_id","/edrData/event_is_simulated","/edrData/
event_sub_type","/edrData/event_timestamp","/edrData/
event_type","/edrData/event_utc_diff_minutes","/edrData/
event_version","/edrData/host_metadata_hostname","/edrData/
missing_action_remote_process_instance_id","/facility","/
generatedTime","/recordType","/recsize","/trapsId","/uuid","/
xdr_unique_id","/meta_internal_id","/external_id","/is_visible","/
is_secdo_event","/severity","/alert_source","/internal_id","/
matching_status","/local_insert_ts","/source_insert_ts","/
alert_name","/alert_category","/alert_description","/
bioc_indicator","/matching_service_rule_id","/external_url","/
xdr_sub_type","/bioc_category_enum_key","/alert_action_status","/
agent_data_collection_status","/attempt_counter","/case_id","/
global_content_version_id","/global_rule_id","/is_whitelisted"
When alert logs are forwarded by email, each field is labeled, one line per field:
Email body format example:
edrData/action_country:
edrData/action_download:
edrData/action_external_hostname:
edrData/action_external_port:
edrData/action_file_extension: pdf
edrData/action_file_md5: null
edrData/action_file_name: XORXOR2614081980.pdf
edrData/action_file_path: C:\ProgramData\Cyvera\Ransomware
\16067987696371268494\XORXOR2614081980.pdf
edrData/action_file_previous_file_extension: null
edrData/action_file_previous_file_name: null
Cortex® XDR™ Pro Administrator’s Guide 972 ©2021 Palo Alto Networks, Inc.
Log Forwarding
edrData/action_file_previous_file_path: null
edrData/action_file_sha256: null
edrData/action_file_size: 0
edrData/action_file_remote_ip: null
edrData/action_file_remote_port: null
edrData/action_is_injected_thread:
edrData/action_local_ip:
edrData/action_local_port:
edrData/action_module_base_address:
edrData/action_module_image_size:
edrData/action_module_is_remote:
edrData/action_module_is_replay:
edrData/action_module_path:
edrData/action_module_process_causality_id:
edrData/action_module_process_image_command_line:
edrData/action_module_process_image_extension:
edrData/action_module_process_image_md5:
edrData/action_module_process_image_name:
edrData/action_module_process_image_path:
edrData/action_module_process_image_sha256:
edrData/action_module_process_instance_id:
edrData/action_module_process_is_causality_root:
edrData/action_module_process_os_pid:
edrData/action_module_process_signature_product:
edrData/action_module_process_signature_status:
edrData/action_module_process_signature_vendor:
edrData/action_network_connection_id:
edrData/action_network_creation_time:
edrData/action_network_is_ipv6:
edrData/action_process_causality_id:
edrData/action_process_image_command_line:
edrData/action_process_image_extension:
edrData/action_process_image_md5:
edrData/action_process_image_name:
edrData/action_process_image_path:
edrData/action_process_image_sha256:
edrData/action_process_instance_id:
edrData/action_process_integrity_level:
edrData/action_process_is_causality_root:
edrData/action_process_is_replay:
edrData/action_process_is_special:
edrData/action_process_os_pid:
edrData/action_process_signature_product:
edrData/action_process_signature_status:
edrData/action_process_signature_vendor:
edrData/action_proxy:
edrData/action_registry_data:
edrData/action_registry_file_path:
edrData/action_registry_key_name:
edrData/action_registry_value_name:
edrData/action_registry_value_type:
edrData/action_remote_ip:
edrData/action_remote_port:
edrData/action_remote_process_causality_id:
edrData/action_remote_process_image_command_line:
edrData/action_remote_process_image_extension:
Cortex® XDR™ Pro Administrator’s Guide 973 ©2021 Palo Alto Networks, Inc.
Log Forwarding
edrData/action_remote_process_image_md5:
edrData/action_remote_process_image_name:
edrData/action_remote_process_image_path:
edrData/action_remote_process_image_sha256:
edrData/action_remote_process_is_causality_root:
edrData/action_remote_process_os_pid:
edrData/action_remote_process_signature_product:
edrData/action_remote_process_signature_status:
edrData/action_remote_process_signature_vendor:
edrData/action_remote_process_thread_id:
edrData/action_remote_process_thread_start_address:
edrData/action_thread_thread_id:
edrData/action_total_download:
edrData/action_total_upload:
edrData/action_upload:
edrData/action_user_status:
edrData/action_username:
edrData/actor_causality_id: AdUcamNT99kAAAAEAAAAAA==
edrData/actor_effective_user_sid: S-1-5-18
edrData/actor_effective_username: NT AUTHORITY\SYSTEM
edrData/actor_is_injected_thread: false
edrData/actor_primary_user_sid: S-1-5-18
edrData/actor_primary_username: NT AUTHORITY\SYSTEM
edrData/actor_process_causality_id: AdUcamNT99kAAAAEAAAAAA==
edrData/actor_process_command_line:
edrData/actor_process_execution_time: 1559827133585
edrData/actor_process_image_command_line:
edrData/actor_process_image_extension:
edrData/actor_process_image_md5:
edrData/actor_process_image_name: System
edrData/actor_process_image_path: System
edrData/actor_process_image_sha256:
edrData/actor_process_instance_id: AdUcamNT99kAAAAEAAAAAA==
edrData/actor_process_integrity_level: 16384
edrData/actor_process_is_special: 1
edrData/actor_process_os_pid: 4
edrData/actor_process_signature_product: Microsoft Windows
edrData/actor_process_signature_status: 1
edrData/actor_process_signature_vendor: Microsoft Corporation
edrData/actor_thread_thread_id: 64
edrData/agent_content_version: 58-9124
edrData/agent_host_boot_time: 1559827133585
edrData/agent_hostname: padme-7
edrData/agent_id: a832f35013f16a06fc2495843674a3e9
edrData/agent_ip_addresses: ["10.196.172.74"]
edrData/agent_is_vdi: false
edrData/agent_os_sub_type: Windows 7 [6.1 (Build 7601: Service Pack
1)]
edrData/agent_os_type: 1
edrData/agent_session_start_time: 1559827592661
edrData/agent_version: 6.1.0.13895
edrData/causality_actor_causality_id: AdUcamNT99kAAAAEAAAAAA==
edrData/causality_actor_effective_user_sid:
edrData/causality_actor_effective_username:
edrData/causality_actor_primary_user_sid: S-1-5-18
edrData/causality_actor_primary_username: NT AUTHORITY\SYSTEM
Cortex® XDR™ Pro Administrator’s Guide 974 ©2021 Palo Alto Networks, Inc.
Log Forwarding
edrData/causality_actor_process_causality_id:
edrData/causality_actor_process_command_line:
edrData/causality_actor_process_execution_time: 1559827133585
edrData/causality_actor_process_image_command_line:
edrData/causality_actor_process_image_extension:
edrData/causality_actor_process_image_md5:
edrData/causality_actor_process_image_name: System
edrData/causality_actor_process_image_path: System
edrData/causality_actor_process_image_sha256:
edrData/causality_actor_process_instance_id: AdUcamNT99kAAAAEAAAAAA==
edrData/causality_actor_process_integrity_level: 16384
edrData/causality_actor_process_is_special: 1
edrData/causality_actor_process_os_pid: 4
edrData/causality_actor_process_signature_product: Microsoft Windows
edrData/causality_actor_process_signature_status: 1
edrData/causality_actor_process_signature_vendor: Microsoft
Corporation
edrData/event_id: AAABa13u2PQsqXnCAB1qjw==
edrData/event_is_simulated: false
edrData/event_sub_type: 1
edrData/event_timestamp: 1560649063308
edrData/event_type: 3
edrData/event_utc_diff_minutes: 120
edrData/event_version: 20
edrData/host_metadata_hostname:
edrData/missing_action_remote_process_instance_id:
facility:
generatedTime: 2019-06-16T01:37:43
recordType: alert
recsize:
trapsId:
uuid:
xdr_unique_id: ae65c92c6e704023df129c728eab3d3e
meta_internal_id: None
external_id: 318b7f91-ae74-4860-abd1-b463e8cd6deb
is_visible: null
is_secdo_event: null
severity: SEV_010_INFO
alert_source: BIOC
internal_id: None
matching_status: null
local_insert_ts: null
source_insert_ts: 1560649063308
alert_name: BIOC-16
alert_category: CREDENTIAL_ACCESS
alert_description: File action type = all AND name = *.pdf
bioc_indicator:
"[{""pretty_name"":""File"",""data_type"":null,""render_type"":""entity"",
""entity_map"":null},{""pretty_name"":""action
type"",""data_type"":null,
""render_type"":""attribute"",""entity_map"":null},
{""pretty_name"":""="",
""data_type"":null,""render_type"":""operator"",""entity_map"":null},
{""pretty_name"":""all"",""data_type"":null,""render_type"":""value"",
""entity_map"":null},{""pretty_name"":""AND"",""data_type"":null,
""render_type"":""connector"",""entity_map"":null},
Cortex® XDR™ Pro Administrator’s Guide 975 ©2021 Palo Alto Networks, Inc.
Log Forwarding
{""pretty_name"":""name"",""data_type"":""TEXT"",
""render_type"":""attribute"",""entity_map"":""attributes""},
{""pretty_name"":""="",""data_type"":null,""render_type"":""operator"",
""entity_map"":""attributes""},{""pretty_name"":""*.pdf"",
""data_type"":null,""render_type"":""value"",
""entity_map"":""attributes""}]"
matching_service_rule_id: 200
external_url: null
xdr_sub_type: BIOC - Credential Access
bioc_category_enum_key: null
alert_action_status: null
agent_data_collection_status: null
attempt_counter: null
case_id: null
global_content_version_id:
global_rule_id:
is_whitelisted: false
The following table summarizes the field prefixes and addional relevant fields available for BIOC
and IOC alert logs.
Cortex® XDR™ Pro Administrator’s Guide 976 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 977 ©2021 Palo Alto Networks, Inc.
Log Forwarding
[{""pretty_name"":""File"",""data
_type"":null,
""render_type"":""entity"",""enti
ty_map"":null},
{""pretty_name"":""action type"",
Cortex® XDR™ Pro Administrator’s Guide 978 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 979 ©2021 Palo Alto Networks, Inc.
Log Forwarding
sub_type,time_generated,id,version_info/
document_version,version_info/magnifier_version,version_info/
detection_version,alert/url,alert/category,alert/
type,alert/name,alert/description/html,alert/description/
text,alert/severity,alert/state,alert/is_whitelisted,alert/
ports,alert/internal_destinations/single_destinations,alert/
internal_destinations/ip_ranges,alert/external_destinations,alert/
app_id,alert/schedule/activity_first_seen_at,alert/schedule/
activity_last_seen_at,alert/schedule/first_detected_at,alert/
schedule/last_detected_at,user/user_name,user/url,user/
display_name,user/org_unit,device/id,device/url,device/mac,device/
hostname,device/ip,device/ip_ranges,device/owner,device/
org_unit,files
sub_type: Update
time_generated: 1547717480
id: 4
version_info/document_version: 1
version_info/magnifier_version: 1.8
version_info/detection_version: 2019.2.0rc1
alert/url: https:\/\/ptop.only.wip.la:443\/https\/ddc1...
alert/category: Recon
alert/type: Port Scan
alert/name: Port Scan
alert/description/html: \t<ul>\n\t\t<li>The device....
alert/description/text: The device ...
alert/severity: Low
alert/state: Reopened
alert/is_whitelisted: false
alert/ports: "[1,2,3,4,5,6,7,8,9,10,11...]
Cortex® XDR™ Pro Administrator’s Guide 980 ©2021 Palo Alto Networks, Inc.
Log Forwarding
alert/internal_destinations/single_destinations: []
alert/internal_destinations/ip_ranges:
"[{""max_ip"":""..."",""name"":""..."",""min_ip"":""...""}]"
alert/external_destinations: []
alert/app_id:
alert/schedule/activity_first_seen_at: 1542178800
alert/schedule/activity_last_seen_at: 1542182400
alert/schedule/first_detected_at: 1542182400
alert/schedule/last_detected_at: 1542182400
user/user_name:
user/url:
user/display_name:
user/org_unit:
device/id: 2-85e40edd-b2d1-1f25-2c1e-a3dd576c8a7e
device/url: https:\/\/ptop.only.wip.la:443\/https\/ddc1 ...
device/mac: 00-50-56-a5-db-b2
device/hostname: DC1ENV3APC42
device/ip: 10.201.102.17
device/ip_ranges:
"[{""max_ip"":""..."",""name"":""..."",""min_ip"":""..."",""asset"":""""}]"
device/owner:
device/org_unit:
files: []
time_generated Time the log record was sent to the Cortex Data
Lake. Value is a Unix Epoch mestamp.
Cortex® XDR™ Pro Administrator’s Guide 981 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 982 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 983 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 984 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 985 ©2021 Palo Alto Networks, Inc.
Log Forwarding
The FUTURE_USE tag applies to fields that Cortex XDR does not currently implement.
With log forwarding to an email desnaon, the Cortex Data Lake sends an email with each field
on a separate line in the email body.
• Threat Logs
• Config Logs
• Analycs Logs
• System Logs
Threat Logs
Syslog format: recordType, class, FUTURE_USE, eventType, generatedTime, serverTime,
agentTime, tzOffset, FUTURE_USE, facility, customerId, trapsId, serverHost,
serverComponentVersion, regionId, isEndpoint, agentId, osType, isVdi, osVersion, is64,
agentIp, deviceName, deviceDomain, severity, trapsSeverity, agentVersion, contentVersion,
proteconStatus, prevenonKey, moduleId, profile, moduleStatusId, verdict, prevenonMode,
terminate, terminateTarget, quaranne, block, postDetected, eventParameters(Array),
sourceProcessIdx(Array), targetProcessIdx(Array), fileIdx(Array), processes(Array), files(Array),
users(Array), urls(Array), descripon(Array)
Email body format example:
Cortex® XDR™ Pro Administrator’s Guide 986 ©2021 Palo Alto Networks, Inc.
Log Forwarding
recordType: threat
messageData/class: threat
messageData/subClass:
eventType: AgentSecurityEvent
generatedTime: 2019-01-29T05:07:58.045-08:00
serverTime: 2018-07-02T20:01:39.591Z
endPointHeader/agentTime: 2018-07-02T20:01:03Z
endPointHeader/tzOffset: 180
product:
facility: TrapsAgent
customerId: 245143
trapsId: mac510a2monday-01
serverHost: coreop-qaauta-2606-0-112132729246-266
serverComponentVersion: 2.0.2
regionId: 70
isEndpoint: 1
agentId: dc3af3198f172048082c21ff0956866b
endPointHeader/osType: 2
endPointHeader/isVdi: 0
endPointHeader/osVersion: 10.11.6
endPointHeader/is64: 1
endPointHeader/agentIp: 10.200.37.201
endPointHeader/deviceName: A1260700MC1011
endPointHeader/deviceDomain:
severity: emergency
messageData/trapsSeverity: medium
endPointHeader/agentVersion: 5.1.0.1401
endPointHeader/contentVersion: 26-3625
endPointHeader/protectionStatus: 0
messageData/preventionKey: 9a94965188d2455486dd8d60cf4b3849
messageData/moduleId: COMPONENT_EPM_J01
messageData/profile: ExploitModules
messageData/moduleStatusId: CYSTATUS_JIT_EXCEPTION
messageData/verdict:
messageData/preventionMode: blocked
messageData/terminate: 1
messageData/terminateTarget:
quarantine:
messageData/block: 0
messageData/postDetected: 0
messageData/eventParameters: "[""/Users/administrator/Desktop/JitMac/
j01_test"",""711046b89e2f2c70cdbb41f615c54bd1b4270ecbbb176edeb1bb4fe4619""]"
messageData/sourceProcessIdx: 0
messageData/targetProcessIdx: -1
messageData/fileIdx: 0
messageData/processes: "[{""exeFileIdx"":0,""commandLine"":""/
Users/Administrator/Desktop/JitMac/j01_test test=system
depth=1"",""userIdx"":0,""pid"":1359,""parentId"":452}]"
messageData/files:
"[{""sha256"":""711046b89e2f2c70cdbb41f615c54bd1b4270ecbbb176edeb1bb4654619"",
""rawFullPath"":""/Users/administrator/Desktop/JitMac/
j01_test"",""signers"":[""N/A""],""fileName"":""j01_test""}]"
messageData/users: "[{""userName"":""Administrator""}]"
messageData/urls: []
messageData/description: Memory Corruption Exploit
Cortex® XDR™ Pro Administrator’s Guide 987 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 988 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 989 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 990 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 991 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 992 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 993 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 994 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 995 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 996 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Config Logs
Syslog format: recordType, class, FUTURE_USE, subClassId, eventType, eventCategory,
generatedTime, serverTime, FUTURE_USE, facility, customerId, trapsId, serverHost,
serverComponentVersion, regionId, isEndpoint, severity, trapsSeverity, messageCode,
friendlyName, FUTURE_USE, msgTextEn, userFullName, userName, userRole, userDomain,
addionalData(Array), messageCode, errorText, errorData, resultData
Email body format example:
recordType: system
messageData/class: system
messageData/subClass: Provisioning
messageData/subClassId: 13
eventType: ServerLogPerTenant
messageData/eventCategory: tenant
generatedTime: 2019-01-31T18:15:19.000000+00:00
serverTime: 2019-01-31T18:15:19.000000+00:00
product:
facility: TrapsServerManagement
customerId: 004403511
trapsId: 18520498190303952
serverHost: 14917869646-201.proda.brz
serverComponentVersion: 2.0.9+624
regionId:
isEndpoint: 0
agentId:
severity: notice
messageData/trapsSeverity: informational
messageData/messageCode: 19015
messageData/friendlyName: User Login
messageData/msgTextLoc:
messageData/msgTextEn: User [email protected] has logged
in with role superadmin
endPointHeader/userFullName:
endPointHeader/username:
endPointHeader/userRole:
endPointHeader/userDomain:
endPointHeader/agentTime:
endPointHeader/tzOffset:
endPointHeader/osType:
endPointHeader/isVdi:
endPointHeader/osVersion:
endPointHeader/is64:
endPointHeader/agentIp:
endPointHeader/deviceName:
endPointHeader/deviceDomain:
endPointHeader/agentVersion:
endPointHeader/contentVersion:
endPointHeader/protectionStatus:
messageData/userFullName:
messageData/username:
messageData/userRole:
messageData/userDomain:
messageData/messageName:
messageData/messageId:
Cortex® XDR™ Pro Administrator’s Guide 997 ©2021 Palo Alto Networks, Inc.
Log Forwarding
messageData/processStatus:
messageData/errorText:
messageData/errorData:
messageData/resultData:
messageData/parameters:
messageData/additionalData: {}
Cortex® XDR™ Pro Administrator’s Guide 998 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 999 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1000 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1001 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Analycs Logs
Syslog format: recordType, class, FUTURE_USE, eventType, eventCategory, generatedTime,
serverTime, agentTime, tzOffset, FUTURE_USE, facility, customerId, trapsId, serverHost,
serverComponentVersion, regionId, isEndpoint, agentId, osType, isVdi, osVersion, is64, agentIp,
deviceName, deviceDomain, severity, agentVersion, contentVersion, proteconStatus, sha256,
type, parentSha256, lastSeen, fileName, filePath, fileSize, localAnalysisResult, reported, blocked,
execuonCount
Email body format example:
recordType: analytics
messageData/class: agent_data
messageData/subClass:
eventType: AgentTimelineEvent
messageData/eventCategory: hash
generatedTime: 2019-01-31T18:00:43Z
serverTime: 2019-01-31T18:59:46.586Z
endPointHeader/agentTime: 2019-01-31T18:00:43Z
endPointHeader/tzOffset: -480
product:
facility: TrapsAgent
customerId: 110044035
trapsId: 18520039498190352
serverHost: coreop-f-proda-mnmauto03930348053-311.proda.brz
Cortex® XDR™ Pro Administrator’s Guide 1002 ©2021 Palo Alto Networks, Inc.
Log Forwarding
serverComponentVersion: 2.0.9+564
regionId: 10
isEndpoint: 1
agentId: 3bcf7e5ff56e2891c78684a38b728e49
endPointHeader/osType: 2
endPointHeader/isVdi: 0
endPointHeader/osVersion: 10.12.6
endPointHeader/is64: 1
endPointHeader/agentIp: 192.168.0.21
endPointHeader/deviceName: Jeffreys-MacBook-Pro.local
endPointHeader/deviceDomain:
severity:
endPointHeader/agentVersion: 5.0.5.1193
endPointHeader/contentVersion: 42-6337
endPointHeader/protectionStatus: 0
messageData/sha256:
87e27ba9128d9c3b3d113c67623a06817a030b3bbb4d2871d1e6da9002206f26
messageData/type: macho
messageData/parentSha256:
messageData/lastSeen: 2019-01-31T18:00:43Z
messageData/fileName: crashpad_handler
messageData/filePath: /users/username/library/google/
googlesoftwareupdate/googlesoftwareupdate.bundle/contents/macos/
messageData/fileSize: 353680
messageData/localAnalysisResult:
"{""contentVersion"":""42-6337"",""result"":""Benign"",""trusted"":""None"",
""publishers"":[""developer id application: google, inc.
(eqhxz8m8av)""],""resultId"":0,""trustedId"":0}"
messageData/reported: 0
messageData/blocked: 0
messageData/executionCount: 4179
Cortex® XDR™ Pro Administrator’s Guide 1003 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1004 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1005 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1006 ©2021 Palo Alto Networks, Inc.
Log Forwarding
System Logs
Syslog format: recordType, class, FUTURE_USE, subClassId, eventType, eventCategory,
generatedTime, serverTime, FUTURE_USE, facility, customerId, trapsId, serverHost,
serverComponentVersion, regionId, isEndpoint, agentId, severity, trapsSeverity, messageCode,
friendlyName, FUTURE_USE, msgTextEn, userFullName, username, userRole, userDomain,
agentTime, tzOffset, osType, isVdi, osVersion, is64, agentIp, deviceName, deviceDomain,
agentVersion, contentVersion, proteconStatus, userFullName, username, userRole, userDomain,
messageName, messageId, processStatus, errorText, errorData, resultData, parameters,
addionalData(Array)
Email body format example:
recordType: system
messageData/class: system
messageData/subClass: Provisioning
messageData/subClassId: 13
eventType: ServerLogPerTenant
messageData/eventCategory: tenant
generatedTime: 2019-01-31T18:15:19.000000+00:00
serverTime: 2019-01-31T18:15:19.000000+00:00
product:
facility: TrapsServerManagement
customerId: 004403511
trapsId: 18520498190303952
serverHost: 14917869646-201.proda.brz
serverComponentVersion: 2.0.9+624
Cortex® XDR™ Pro Administrator’s Guide 1007 ©2021 Palo Alto Networks, Inc.
Log Forwarding
regionId:
isEndpoint: 0
agentId:
severity: notice
messageData/trapsSeverity: informational
messageData/messageCode: 19015
messageData/friendlyName: User Login
messageData/msgTextLoc:
messageData/msgTextEn: User [email protected] has logged
in with role superadmin
endPointHeader/userFullName:
endPointHeader/username:
endPointHeader/userRole:
endPointHeader/userDomain:
endPointHeader/agentTime:
endPointHeader/tzOffset:
endPointHeader/osType:
endPointHeader/isVdi:
endPointHeader/osVersion:
endPointHeader/is64:
endPointHeader/agentIp:
endPointHeader/deviceName:
endPointHeader/deviceDomain:
endPointHeader/agentVersion:
endPointHeader/contentVersion:
endPointHeader/protectionStatus:
messageData/userFullName:
messageData/username:
messageData/userRole:
messageData/userDomain:
messageData/messageName:
messageData/messageId:
messageData/processStatus:
messageData/errorText:
messageData/errorData:
messageData/resultData:
messageData/parameters:
messageData/additionalData: {}
Cortex® XDR™ Pro Administrator’s Guide 1008 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1009 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1010 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1011 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1012 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Analycs Logs
Format: recordType, class, FUTURE_USE, eventType, category, generatedTime,
serverTime, agentTime, tzoffset, FUTURE_USE, facility, customerId, trapsId, serverHost,
serverComponentVersion, regionId, isEndpoint, agentId, osType, isVdi, osVersion, is64, agentIp,
deviceName, deviceDomain, severity, agentVersion, contentVersion, proteconStatus, sha256,
type, parentSha256, lastSeen, fileName, filePath, fileSize, localAnalysisResult, reported, blocked,
execuonCount
Email body format example:
recordType: analytics
messageData/class: agent_data
messageData/subClass:
eventType: AgentTimelineEvent
messageData/eventCategory: hash
generatedTime: 2019-01-31T18:00:43Z
serverTime: 2019-01-31T18:59:46.586Z
endPointHeader/agentTime: 2019-01-31T18:00:43Z
endPointHeader/tzOffset: -480
product:
facility: TrapsAgent
customerId: 110044035
trapsId: 18520039498190352
serverHost: coreop-f-proda-mnmauto03930348053-311.proda.brz
serverComponentVersion: 2.0.9+564
regionId: 10
isEndpoint: 1
agentId: 3bcf7e5ff56e2891c78684a38b728e49
endPointHeader/osType: 2
endPointHeader/isVdi: 0
endPointHeader/osVersion: 10.12.6
endPointHeader/is64: 1
endPointHeader/agentIp: 192.168.0.21
endPointHeader/deviceName: Jeffreys-MacBook-Pro.local
endPointHeader/deviceDomain:
severity:
endPointHeader/agentVersion: 5.0.5.1193
endPointHeader/contentVersion: 42-6337
endPointHeader/protectionStatus: 0
messageData/sha256:
87e27ba9128d9c3b3d113c67623a06817a030b3bbb4d2871d1e6da9002206f26
messageData/type: macho
messageData/parentSha256:
messageData/lastSeen: 2019-01-31T18:00:43Z
Cortex® XDR™ Pro Administrator’s Guide 1013 ©2021 Palo Alto Networks, Inc.
Log Forwarding
messageData/fileName: crashpad_handler
messageData/filePath: /users/username/library/google/
googlesoftwareupdate/googlesoftwareupdate.bundle/contents/macos/
messageData/fileSize: 353680
messageData/localAnalysisResult:
"{""contentVersion"":""42-6337"",""result"":""Benign"",""trusted"":""None"",
""publishers"":[""developer id application: google, inc.
(eqhxz8m8av)""],""resultId"":0,""trustedId"":0}"
messageData/reported: 0
messageData/blocked: 0
messageData/executionCount: 4179
Cortex® XDR™ Pro Administrator’s Guide 1014 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1015 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1016 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1017 ©2021 Palo Alto Networks, Inc.
Log Forwarding
Cortex® XDR™ Pro Administrator’s Guide 1018 ©2021 Palo Alto Networks, Inc.
Managed Security
> About Managed Security
> Cortex XDR Managed Security Access Requirements
> Switch to a Different Tenant
> Pair a Parent Tenant with Child Tenant
> Manage a Child Tenant
> About Managed Threat Hunng
> Set up Managed Threat Hunng
> Invesgate Managed Threat Hunng Reports
1019
Managed Security
Cortex® XDR™ Pro Administrator’s Guide 1020 ©2021 Palo Alto Networks, Inc.
Managed Security
Child Customer Support Portal Add the user name from the
(CSP) Account parent tenant who is iniang
the parent-child pairing and
ensure the user name has
Super User role permissions.
Cortex® XDR™ Pro Administrator’s Guide 1021 ©2021 Palo Alto Networks, Inc.
Managed Security
If you don’t own more than one account, the tenant navigator funcon is not available.
Cortex® XDR™ Pro Administrator’s Guide 1022 ©2021 Palo Alto Networks, Inc.
Managed Security
STEP 2 | From the list of available tenants, choose the tenant to which you want to switch (navigate).
You can also type a tenant name in the Search line to filter the list of tenants according to
what you type.
Cortex® XDR™ Pro Administrator’s Guide 1023 ©2021 Palo Alto Networks, Inc.
Managed Security
Cortex® XDR™ Pro Administrator’s Guide 1024 ©2021 Palo Alto Networks, Inc.
Managed Security
STEP 3 | In the Pair Tenant window, select the child tenant you want to pair. The drop-down only
displays child tenants your are allowed to pair with.
Child tenants are grouped according to:
• Unpaired—Children that have not yet been paired and are available. If another parent has
requested to pair with the child but the child has not yet agreed, the tenant will appear.
• Paired—Children that have already been paired to this parent.
• Paired with others—Children that have been paired with other parents.
• Pending—Children with a pending pairing request.
STEP 5 | In the child tenant Cortex XDR console, a child tenant user with Admin role permissions
needs to approve the pairing by navigang to , locate the Request for Pairing noficaon
and select Approve.
Cortex® XDR™ Pro Administrator’s Guide 1025 ©2021 Palo Alto Networks, Inc.
Managed Security
In the child tenant’s, pages managed by you appear with a read-only banner. Child tenant users
cannot perform any acons from these pages, but can view the configuraons you create on
their behalf.
Cortex® XDR™ Pro Administrator’s Guide 1026 ©2021 Palo Alto Networks, Inc.
Managed Security
Once a configuraon is created Cortex XDR resets the child tenant data and synchronizes
the security acons configured in the parent tenant.
Cortex® XDR™ Pro Administrator’s Guide 1027 ©2021 Palo Alto Networks, Inc.
Managed Security
The Tenant Management page displays the following informaon about each of your child
tenants:
Field Descripon
BIOC RULES & EXCEPTIONS Name of the configuraon managing the BIOC
rules and excepons acons.
Cortex® XDR™ Pro Administrator’s Guide 1028 ©2021 Palo Alto Networks, Inc.
Managed Security
Field Descripon
Cortex® XDR™ Pro Administrator’s Guide 1029 ©2021 Palo Alto Networks, Inc.
Managed Security
STEP 1 | Navigate to each of the following Cortex XDR pages and follow the detailed steps:
• Rules > BIOC > Rules and Excepons Configuraons panel
• Invesgaon > Incident Management > Exclusions > Alert Exclusions Configuraon panel
• Invesgaon > Incident Management > Starred Alerts > Starred Alerts Configuraon panel
• Endpoints > Policy Management > Prevenon > Profiles > Profile Configuraon panel
• Response > Acon Center > Currently Applied Acons > Block List/Allow List > Allow
List/Block List configuraon panel
STEP 2 | In the corresponding Configuraon panel (1), + Create New (2) configuraon.
STEP 4 | Create.
The new configuraon (3) appears in the Configuraon pane.
STEP 6 | In the Tenant Management table, right-click a child tenant row and Edit Configuraons.
Cortex® XDR™ Pro Administrator’s Guide 1030 ©2021 Palo Alto Networks, Inc.
Managed Security
STEP 7 | Assign the configuraon you want to use to manage each of the security acons.
You can configure Profiles only as Managed or Unmanaged. All profiles you create are
automacally cloned to your child tenants.
STEP 8 | Update.
The Tenant Management table is updated with your assigned configuraons.
Cortex® XDR™ Pro Administrator’s Guide 1031 ©2021 Palo Alto Networks, Inc.
Managed Security
STEP 2 | In the corresponding Configuraon panel, select the acon configuraon you created and
allocated to your child tenant.
The corresponding security acon Table displays the acons managing the child tenant.
Cortex® XDR™ Pro Administrator’s Guide 1032 ©2021 Palo Alto Networks, Inc.
Managed Security
Cortex® XDR™ Pro Administrator’s Guide 1033 ©2021 Palo Alto Networks, Inc.
Managed Security
STEP 2 | Configure noficaon emails for the impact reports and threat inquiries you want Cortex
XDR to send.
1. Select Sengs ( ) > Configuraons > Managed Threat Hunng.
2. Enter one or more email addresses to which you want to send reports and inquires and
ADD each one.
Cortex® XDR™ Pro Administrator’s Guide 1034 ©2021 Palo Alto Networks, Inc.
Managed Security
STEP 3 | Ensure a successful set up by locang in your defined email address mailbox the Welcome to
the Palo Alto Networks Cortex XDR Managed Threat Hunng Service email. If you did not
receive such an email, contact your Palo Alto sales representave.
STEP 4 | (Oponal) If desired, forward Managed Threat Hunng alerts to external sources such as
email or slack from the Sengs ( ) > Configuraons > General > Noficaons page.
This will forward both the alert itself and the detailed report in a PDF format.
Cortex® XDR™ Pro Administrator’s Guide 1035 ©2021 Palo Alto Networks, Inc.
Managed Security
The MTH page is available for users with the Managed Threat Hunng license and have
the necessary permission to view and triage alerts and incidents in Cortex XDR.
Cortex® XDR™ Pro Administrator’s Guide 1036 ©2021 Palo Alto Networks, Inc.
Managed Security
STEP 1 | In the Cortex XDR app, from the top menu select the MTH tab.
The Managed Threat Hunng page displays a side-by-side view of all your reports and their
corresponding report details and communicaon.
Cortex® XDR™ Pro Administrator’s Guide 1037 ©2021 Palo Alto Networks, Inc.
Managed Security
Cortex® XDR™ Pro Administrator’s Guide 1038 ©2021 Palo Alto Networks, Inc.
Managed Security
STEP 2 | In the le-pane, select the report you want to invesgate. You can sort the list according to
the report Type, Insert Time, or Severity, and use the search bar to help you locate reports.
Aer selecng a report, the right-pane view displays a summary of the Managed Threat
Hunng findings along with an aachment of the complete report.
STEP 3 | In the right-pane, invesgate the report findings and add your comments.
The comments are a way for you to communicate directly with the Managed Threat Hunng
without the need to send separate emails. When you post a comment, the Managed Threat
Hunters team is nofied and can see and reply to your comments. Comments are listed
chronologically and are visible to all the Cortex XDR tenant users with access to the MTH
page and the Managed Threat Hunng team. You can aach up to ten PDF or image format
files with a maximum of 10MB per file in each comment. Eding and deleng a comments is
available only on comments you wrote.
Cortex® XDR™ Pro Administrator’s Guide 1039 ©2021 Palo Alto Networks, Inc.
Managed Security
Cortex® XDR™ Pro Administrator’s Guide 1040 ©2021 Palo Alto Networks, Inc.