Overview
Explore
Expertise
Ecosystem
Select a tab
35 results found
Introduction to XQL: Writing Your First Query
Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024
Introduction to XQL: Writing Your First Correlation Rule
Correlation Rules in Cortex XDR and XSIAM are how we can use XQL queries to detect patterns, anomalies or sequences of activities that could indicate malicious behavior, even when each individual event might not appear suspicious on its own. Correlation Rules typically leverage data from multiple datasets, but for our example, we'll keep it simple to alert on failed login attempts to a NGFW, and build on the query later.
Blog
•Dec 31, 2024
What is the Prisma Access Browser
The Prisma Access Browser, a custom Chromium-based browser by Palo Alto Networks, integrates advanced security services to offer seamless, robust protection. It validates users, limits access based on roles and eliminates the need for cumbersome VPNs, making it an ideal solution for modern, flexible work environments.
Blog
•Nov 11, 2024
PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists
Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023
Enterprise Browsers vs Virtual Desktop Infrastructure (VDI): What are they, what do they do and how are they different
In today's digital workspace, organizations seek secure, efficient solutions to manage remote access and application delivery. This blog post explores the concept of an enterprise browser and virtual desktop infrastructure (VDI), detailing their functionalities, use cases and key differences. By understanding these tools, businesses can make informed decisions on which solution best meets their usability, security and operational needs.
Blog
•Sep 2, 2024
Introduction to XQL: Custom Datasets for Threat Hunting
Both Cortex XDR and XSIAM let you go well beyond endpoint telemetry from the XDR Agent by ingesting custom datasets through the Broker VM. Forwarding Proxmox syslogs, you can analyze failed logins and suspicious system activity directly in XQL. This unlocks the ability to correlate hypervisor events with endpoint, network, and identity data—all in one platform. Tracking brute-force attempts against pvedaemon, custom datasets give you visibility into layers that traditional EDR misses.
Blog
•May 20, 2025
Demystifying Precision AI: How Palo Alto Networks Is Redefining Cybersecurity
Precision AI by Palo Alto Networks revolutionizes cybersecurity by integrating machine learning, deep learning and generative AI for real-time, high-confidence threat protection.
Blog
•Nov 5, 2024
Introduction to XQL: Building Your First Widget
Widgets transform XQL query results into interactive visualizations, aiding SOC analysts in identifying trends and anomalies. This article demonstrates using widgets to graph failed GlobalProtect logins, helping detect brute-force attacks and misconfigurations, and providing proactive assistance to users.
Blog
•Jun 4, 2025
The Grizzled CyberVet's Tactical Plan: Mapping Palo Alto Networks to MITRE ATT&CK
Next up in the Grizzled CyberVet series: A global enterprise faces a full-scale cyberattack spanning every stage of the MITRE ATT&CK framework. Armed with Palo Alto Networks' full security platform, they stop the threat at every turn. Learn how a unified security strategy can outmatch attackers before they succeed. Read on to see it in action!
Blog
•Mar 19, 2025
Contractors and the Prisma Access Browser Solution
How the Prisma Access Browser can safely allow contractors or employees on personal devices access to protected resources
Blog
•Apr 2, 2025
Prisma Access: How it Fits into your Environment
SASE feels like a confusing concept, but it is much simpler than you think
Blog
•Dec 15, 2024