Create an NG Network Query
Create a query to investigate the connections between firewall logs, endpoints, and network activity.
From the Query Builder you can investigate network events stitched across endpoints and the Palo Alto Networks next-generation firewalls logs.
Some examples of network queries you can run include:
- Source and destination of a process.
- Network connections that included a specific App ID
- Processes that created network connections.
- Network connections between specific endpoints.
To build a network query:
- From Cortex XDR, select.INVESTIGATIONQuery Builder
- SelectNETWORK CONNECTIONS.
- Enter the search criteria for the network events query.
- Network attributes—Define any additional process attributes for which you want to search. Use a pipe (|) to separate multiple values (for example80|8080). By default, Cortex XDR will return the events that match the attribute you specify. To exclude an attribute value, toggle the=option to=!. Options are:
To specify an additional exception (match this value except), click the+to the right of the value and specify the exception value.
- APP ID—App ID of the network.
- PROTOCOL—Network transport protocol over which the traffic was sent.
- SESSION STATUS
- FW DEVICE NAME—Firewall device name.
- FW RULE—Firewall rule.
- FW SERIAL ID—Firewall serial ID.
- (Optional) To limit the scope to a specific source, click the+to the right of the value and specify the exception value.Specify one or more attributes for the source.Use a pipe (|) to separate multiple values. Use an asterisk (*) to match any string of characters.
- HOST NAME—Name of the source.
- HOST IP—IP address of the source.
- HOST OS—Operating system of the source.
- PROCESS NAME—Name of the process.
- PROCESS PATH—Path to the process.
- CMD—Command-line used to initiate the process including any arguments, up to 128 characters.
- MD5—MD5 hash value of the process.
- SHA256—SHA256 hash value of the process.
- PROCESS USER NAME—User who executed the process.
- SIGNATURE—Signing status of the parent process: Signature Unavailable, Signed, Invalid Signature, Unsigned, Revoked, Signature Fail.
- PID—Process ID of the parent process.
- IP—IP address of the process.
- PORT—Port number of the process.
- USER ID—ID of the user who executed the process.
- Run search for both the process and the Causality actor—The causality actor—also referred to as the causality group owner (CGO)—is the parent process in the execution chain that XDR app identified as being responsible for initiating the process tree. Select this option if you want to apply the same search criteria to the causality actor. If you clear this option, you can then configure different attributes for the causality actor.
- (Optional) Limit the scope to a destination.Use a pipe (|) to separate multiple values. Use an asterisk (*) to match any string of characters.Specify one or more of the following attributes:
- REMOTE IP—IP address of the destination.
- COUNTRY—Country of the destination.
- DestinationTARGET HOST,NAME,PORT,HOST NAME,PROCESS USER NAME,HOST IP,CMD,HOST OS,MD5,PROCESS PATH,USER ID,SHA256,SIGNATURE, orPID
- Specify the time period for which you want to search for events.Options are:Last 24H(hours),Last 7D(days),Last 1M(month), or select aCustomtime period.
- Choose when to run the query.Select the calendar icon to schedule a query to run on or before a specific date,Run in backgroundto run the query as resources are available, orRunto run the query immediately and view the results in theQuery Center.
- When you are ready, View the Results of a Query.
Recommended For You
Recommended videos not found.