Correlation Object
A correlation object is a definition file that specifies patterns to match against,
the data sources to use for the lookups, and time period within which to look for
these patterns. A pattern is a boolean structure of conditions that queries the
following data sources (or logs) on the firewall: application statistics, traffic,
traffic summary, threat summary, threat, data filtering, and URL filtering. Each
pattern has a severity rating, and a threshold for the number of times the pattern
match must occur within a defined time limit to indicate malicious activity. When
the match conditions are met, a correlated event is logged.
A correlation object can connect isolated network events and look for patterns that
indicate a more significant event. These objects identify suspicious traffic
patterns and network anomalies, including suspicious IP activity, known
command-and-control activity, known vulnerability exploits, or botnet activity that,
when correlated, indicate with a high probability that a host on the network has
been compromised. Correlation objects are defined and developed by the Palo Alto
Networks Threat Research team, and are delivered with the weekly dynamic updates to
the firewall and Panorama. To obtain new correlation objects, the firewall must have
a Threat Prevention license. Panorama requires a support license to get the
updates.
The patterns defined in a correlation object can be static or dynamic. Correlated
objects that include patterns observed in WildFire are dynamic, and can correlate
malware patterns detected by WildFire with command-and-control activity initiated by
a host that was targeted with the malware on your network or activity seen by a
Traps protected endpoint on Panorama. For example, when
a host submits a file to the WildFire cloud and the verdict is malicious, the
correlation object looks for other hosts or clients on the network that exhibit the
same behavior seen in the cloud. If the malware sample had performed a DNS query and
browsed to a malware domain, the correlation object will parse the logs for a
similar event. When the activity on a host matches the analysis in the cloud, a high
severity correlated event is logged.