Explore
Select a tab
14 results found
Introduction to XQL: Writing Your First Query
Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024
Introduction to XQL: Custom Datasets for Threat Hunting
Both Cortex XDR and XSIAM let you go well beyond endpoint telemetry from the XDR Agent by ingesting custom datasets through the Broker VM. Forwarding Proxmox syslogs, you can analyze failed logins and suspicious system activity directly in XQL. This unlocks the ability to correlate hypervisor events with endpoint, network, and identity data—all in one platform. Tracking brute-force attempts against pvedaemon, custom datasets give you visibility into layers that traditional EDR misses.
Blog
•May 20, 2025
Introduction to XQL: Writing Your First Correlation Rule
Correlation Rules in Cortex XDR and XSIAM are how we can use XQL queries to detect patterns, anomalies or sequences of activities that could indicate malicious behavior, even when each individual event might not appear suspicious on its own. Correlation Rules typically leverage data from multiple datasets, but for our example, we'll keep it simple to alert on failed login attempts to a NGFW, and build on the query later.
Blog
•Dec 31, 2024
Platformizing the AI Decade with Palo Alto Networks
Palo Alto Networks' recent acquisitions signal a structural shift from portfolio integration to true platformization for the AI decade. By securing AI pipelines, embedding identity enforcement, converging observability, and governing autonomous endpoints, the platform aligns to machine-speed risk—positioning enterprises to architect resilient, future-ready security rather than react to disruption.
Blog
•Feb 24, 2026
The Journey of a Cortex XSOAR Playbook: Theory and Concepts
Master Cortex XSOAR by shifting your perspective on automation. Dive into the foundational concepts of Incidents, Indicators and Playbooks to design scalable, resilient workflows. Embrace integrations, sub-playbooks and error handling to enhance efficiency. Prepare to transform raw data into actionable insights, setting the stage for advanced automation.
Blog
•Jul 31, 2025
The Journey of Cortex XSOAR Playbook: Designing Your First Playbook
Transform your manual firewall upgrade process into a streamlined, automated workflow with Cortex XSOAR. This article guides you through designing a robust playbook for upgrading High Availability firewall pairs, emphasizing architectural decisions, governance integration and validation patterns. Discover how automation reduces errors, enhances efficiency and satisfies compliance requirements.
Blog
•Mar 2, 2026
Introduction to XQL: Building Your First Widget
Widgets transform XQL query results into interactive visualizations, aiding SOC analysts in identifying trends and anomalies. This article demonstrates using widgets to graph failed GlobalProtect logins, helping detect brute-force attacks and misconfigurations, and providing proactive assistance to users.
Blog
•Jun 4, 2025
Automating Third-Party Risk with Dataminr + Cortex XSOAR
The gap between collecting threat feeds and applying real-world threat intelligence to your environment is where most programs fail. Security teams know something happened, but struggle to detect it early, determine relevance, and trigger consistent response actions. Integrating Dataminr's AI-powered real-time threat intelligence with Cortex XSOAR enables your SOC to be ahead of physical and cyber threats correlated to your environment.
Blog
•Feb 13, 2026
Operationalizing Threat Intelligence with Cortex: A Maturity Model for SOCs
Transforming raw data into actionable intelligence is crucial for cybersecurity. This article explores the stages of operationalizing threat intelligence, from basic ingestion to fully automated, proactive security operations, using Cortex TIM. Learn how to enhance your SOC's capabilities, reduce manual effort and shift from reactive to proactive defense.
Blog
•Feb 17, 2025
Integrating Dataminr into a Palo Alto Networks–Centric Platform
Dataminr Pulse for Cyber Risk integrates external real-time intelligence into Palo Alto Networks' platform, enabling security teams to act on early warning signals before threats impact internal systems. This approach shifts security from reactive to prevention-based by leveraging AI-analyzed data from over a million public sources to detect risks outside organizational perimeters.
Blog
•Jan 28, 2026
The Evolution of Cortex: Building the Future of Security Operations
Built on a decade of innovation and strategic acquisitions, Cortex unifies data from endpoints, networks, and cloud environments, empowering organizations to efficiently combat advanced cyber threats with minimal manual intervention.
Blog
•Nov 11, 2024
From Chaos to Clarity: Effective Attack Surface Management with Cortex Xpanse
Attack Surface Management (ASM) is vital for modern cybersecurity. Cortex Xpanse offers continuous visibility, automated discovery and risk assessment of internet-facing assets. This structured approach, from discovery to advanced automation, helps organizations reduce their attack surface and secure assets effectively.
Blog
•Apr 3, 2025