Uploaded by xenonthegreat

PCSAE Study Guide

advertisement
Palo Alto Networks Certified Security
Automation Engineer
(PCSAE)
Study Guide
July 2022
PCSAE | Study Guide
Table of Contents
How to Use This Study Guide
7
About the PCSAE Exam
7
Exam Format
7
How to Take This Exam
8
Disclaimer
8
Audience and Qualifications
Skills Required
8
8
Domain 1: Playbook Development
1.1 Reference and manipulate context data to manage automation workflow
1.1.1 References
1.2 Summarize inputs, outputs, and results for playbook tasks
1.2.1 References
1.3 Configure Inputs and Outputs for Sub-playbooks Tasks
1.3.1 References
1.4 Enable and Configure Looping on a Sub-playbook
1.4.1 References
1.5 Differentiate among Playbook Task Types
9
9
10
11
12
12
13
13
15
15
1.5.1 Manual
15
1.5.2 Automated
15
1.5.3 Conditional
15
1.5.4 Data Collection
15
1.5.5 Sub-Playbook
15
1.5.6 References
16
1.6 Apply filters and transformers to manipulate data
1.6.1 References
1.7 Apply the Playbook Debugger to Aid in Development Playbooks
1.7.1 Reference
16
18
18
19
1.8 Summary of Key Ideas
19
1.9 Sample Questions
20
Domain 2: Incident Objects
22
2.1 Configure Incident Types
22
2.2 Identify the Role of an Incident Type within the Incident Lifecycle
23
2.2.1 References
2.3 Configure an Incident Layout
24
24
2.3.1 Fields and Buttons
25
2.3.2 Tabs
25
2.3.3 New/Edit and Close Forms
26
2.3.4 References
26
2.4 Summarize the Function, Capabilities, and Purpose of Incident Fields
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
26
2
2.4.1 References
2.5 Configure Classifier and Mappers
2.5.1 References
28
29
30
2.6 Summary of Key Ideas
30
2.7 Sample Questions
31
Domain 3: Automations, Integrations, and Related Concepts
3.1 Define the Capabilities of Automation across XSOAR Functions
33
33
3.1.1 Playbook Tasks
33
3.1.2 War Room
33
3.1.3 Layouts (Dynamic Sections, Buttons)
34
3.1.4 Jobs
34
3.1.5 Field Trigger Scripts
35
3.1.6 Pre/Post-Processing
36
3.1.7 References
37
3.2 Differentiate between Automations, Commands, and Scripts
3.2.1 References
3.3 Interpret and Modify Automation Scripts
37
38
38
3.3.1 Script Helper
38
3.3.2 Script Settings
40
3.3.3 Language Types
41
3.3.4 Using Script to Create Widget for Dashboards
41
3.3.5 References
42
3.4 Identify the Properties and Capabilities of the XSOAR Framework for Integration
3.4.1 References
3.5 Configure and Manage Integration Instances
3.5.1 Reference
43
43
43
44
3.6 Summary of Key Ideas
44
3.7 Sample Questions
46
Domain 4: Content Management and Solution Architecture
4.1 Apply Marketplace Concepts for the Management of Content
48
48
4.1.1 Searching in Marketplace
48
4.1.2 Installation and Updates
48
4.1.3 Dependencies
50
4.1.4 Version History
51
4.1.5 Partner-supported Versus XSOAR-supported
51
4.1.6 Submitting Content to the Marketplace
52
4.1.7 Reference
53
4.2 Apply General Content Customization and Management Concepts
54
4.2.1 Custom versus System Content
54
4.2.2 Duplicating Content
55
4.2.3 Importing/Exporting Custom Content
56
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
3
4.2.4 Version Control
57
4.2.5 References
58
4.3 Manage Local Changes in a Remote Repository (dev-prod) Configuration
4.3.1 Reference
4.4 Describe the Components of the XSOAR System Architecture
58
61
61
4.4.1 System Hardware Requirements
61
4.4.2 Remote Repositories (dev-prod)
62
4.4.3 Engines
63
4.4.4 Multi Tenancy
65
4.4.5 Elasticsearch/HA
67
4.4.6 Docker
69
4.4.7 Reference
69
4.5 Describe the Incident Lifecycle within XSOAR
4.5.1 Reference
4.6 Define the Capabilities of RBAC
70
71
71
4.6.1 Page Access
71
4.6.2 Integration Permissions
72
4.6.3 Incident Tabs (Layout Specification)
73
4.6.4 Automation Permissions,
74
4.6.5 Incident Viewing Permission by Role
77
4.6.6 Reference
4.7 Identify the Troubleshooting Tools Available to Obtain More Diagnostic Information
78
79
4.7.1 Log Bundles
79
4.7.2 Integration Testing
79
4.7.3 References
79
4.8 Identify Options Available for Performance Tuning
80
4.8.1 Ignore Output
80
4.8.2 Quiet Mode
80
4.8.3 Reference
80
4.9 Monitor System Health using the System Diagnostic Page
4.9.1 Reference
80
81
4.10 Summary of Key Ideas
81
4.11 Sample Questions
82
Domain 5: UI Workflow, Dashboards, and Reports.
5.1 Identify Methods for Querying Data
84
84
5.1.1 Indicators
84
5.1.2 Incidents
85
5.1.3 Dashboards
87
5.1.4 Global Search
89
5.1.5 Reference
5.2 Summarize the Workflow Elements used during an Investigation
5.2.1 Layouts
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
90
90
90
4
5.2.2 War Room
93
5.2.3 Work Plan
95
5.2.4 Evidence Board
96
5.2.5 Actions Menu
97
5.2.6 Reference
98
5.3 Interact with Layouts for Incident Management
98
5.3.1 Sections
98
5.3.2 Fields
99
5.3.3 Buttons
101
5.3.4 Reference
103
5.4 Summarize Tools used for Managing Incidents
103
5.4.1 Bulk Incident Actions
103
5.4.2 Table View versus Summary View
104
5.4.3 Table Settings
105
5.4.4 Reference
107
5.5 Identify the Capabilities of Existing Dashboards and Reports
5.5.1 References
107
110
5.6 Summarize what Information can be Created, Edited, or Shared within Dashboards and
Reports
110
5.6.1 Reference
5.7 Summarize the Capabilities of the Widget Builder
5.7.1 Reference
111
111
112
5.8 Summary of Key Ideas
112
5.9 Sample Questions
113
Domain 6: Threat Intel Management
6.1 Identify the Parameters Available for Configuring Indicator Objects
115
115
6.1.1 Layouts and Types
115
6.1.2 Fields
115
6.1.3 Reputation Scripts and Command
116
6.1.4 Expiration
116
6.1.5 Reference
6.2 Generate Threat Intel Reports
6.2.1 Reference
6.3 Describe the Features of the Threat Intel Page
117
117
118
118
6.3.1 Unit 42 Intel Feature
118
6.3.2 XSOAR Indicators
121
6.3.3 Export/Import Capabilities
121
6.3.4 References
122
6.4 Configure Threat Intel Feed Integrations
6.4.1 Reference
6.5 Identify the Options Available to Auto Extract
6.5.1 Exclusion List
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
122
122
122
122
5
6.5.2 Playbook Auto Extract
125
6.5.3 Regex for Auto Extract
126
6.5.4 System Defaults
126
6.5.5 Extraction Settings for Incident Types
127
6.5.6 Reference
129
6.6 Summary of Key Ideas
129
6.7 Sample Questions
130
Appendix A: Sample Questions with Answers
132
Appendix B: Sample Test
142
Appendix C: Answers to the Sample Test
147
Appendix D: Glossary
152
Appendix E: What’s Different in This Study Guide
156
Continuing Your Learning Journey with Palo Alto Networks
157
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
6
How to Use This Study Guide
Welcome to the Palo Alto Networks Palo Alto Networks PCSAE Study Guide. The purpose of this
guide is to help you prepare for your Palo Alto Networks Certified Security Automation Engineer
(PCSAE) exam and achieve your PCSAE credential.
You can read through this study guide from start to finish, or you may jump straight to topics you
would like to study. Hyperlinked cross-references will help you locate important definitions and
background information from earlier sections.
About the PCSAE Exam
The test format is 85 multiple-choice items. Candidates will have five minutes to complete the
non-disclosure agreement (NDA), 80 minutes (1 hour, 20 minutes) to complete the questions, and
five minutes to complete a survey at the end of the exam.
This exam is based on Cortex XSOAR 6.6.
More information is available from the Palo Alto Networks public page at:
https://www.paloaltonetworks.com/cortex/xsoar
Cortex XSOAR technical documentation is located at:
https://docs.paloaltonetworks.com/cortex/cortex-xsoar.html
Exam Format
The approximate distribution of items by topic (Exam Domain) and topic weightings are shown in
the following table.
Exam Domain
Weight (%)
Playbook Development
27%
Incident Objects
13%
Automations, Integrations, and Related
Concepts
18%
Content Management and Solution
Architecture
17%
UI Workflow, Dashboards, and Reports
13%
Threat Intel Management
12%
TOTAL
100%
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
7
How to Take This Exam
The exam is available through the third-party Pearson VUE testing platform.
To register for the exam, visit: https://home.pearsonvue.com/paloaltonetworks
Disclaimer
This study guide is intended to provide information about the objectives covered by this exam,
related resources, and recommended courses. The material contained within this study guide is not
intended to guarantee that a passing score will be achieved on the exam. Palo Alto Networks
recommends that candidates thoroughly understand the objectives indicated in this guide and use
the resources and courses recommended in this guide where needed to gain that understanding.
Audience and Qualifications
Skills Required
●
●
●
You can Develop Playbooks and integrations, configure incidents and layouts, configure and
manage indicator fields in XSOAR, know basics of Cyber Security such as IOC blocking, etc
and can configure dashboards and reports
You have experience coding in Python and in cyber security as an Analyst
There is no exam or course prerequisite towards attempting the PCSAE exam
Recommended Training
Palo Alto Networks strongly recommends that you attend the following instructor-led training
courses or equivalent digital-learning courses:
● Cortex XSOAR: IT Administrator (DL)
● Cortex XSOAR Engineer- Building the Next-Generation SOC (DL)
● Cortex XSOAR SOC Analyst Training or equivalent knowledge (DL)
● Cybersecurity Fundamentals of Security Operations Center (DL)
● EDU 280 - Cortex XSOAR Analyst
● EDU 380 - Cortex XSOAR Engineer
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
8
Domain 1: Playbook Development
Playbooks are at the heart of the Cortex XSOAR system. Playbooks enable you to automate many
security processes, including handling investigations and managing tickets. You can structure and
automate security responses that were previously handled manually. Playbook tasks can open
tickets in a ticketing system, such as Jira, detonate a file using a sandbox, or extract information
from an incident (such as an email or attachment) for further review. You can interact with users in
your organization using communication tasks, or remediate an incident by interacting with a 3rd
party integration.
Playbooks have different task types for each of the actions you want to take. Manual tasks can be
used where an analyst needs to confirm information or escalate an incident. Conditional tasks can
be used with a loop to check if certain information is present, so that you can proceed with the
investigation.
1.1 Reference and manipulate context data to manage automation workflow
“Context data” is all of the gathered data. Every incident and playbook has a place to store data
called the “context,” which stores the results from every integration command and every
automation script that is run. The context is a map or key-value pair dictionary, the values of which
can nest additional structures. Context objects are in JSON-format, and they are created for each
incident.
The context keys are strings, while the values can be strings, numbers, objects, or arrays. The
context’s primary use is to pass data between playbook tasks; one task stores its output in the
context, and the other task reads that output from the context and uses it.
The context of a sub-playbook can be either private or global.
You can use private context when you want the content to be affected only by the inputs that this
sub-playbook receives rather than by outside changes.
Global context is for when the context in the parent playbook should be considered and accessed.
Note that a change made to a sub-playbook will impact the parent playbook during the next run of
the parent playbook.
The output result is stored into the JSON context in the incident or the playground, whether you
run an integration command from the CLI or a playbook task. For example, a command such as
!whois query="paloaltonetworks.com" would return the data and store the results into the
context.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
9
Another use is to capture the important structured data from automations and display that data in
the incident summary.
1.1.1 References
●
●
Context and Outputs, https://xsoar.pan.dev/docs/integrations/context-and-outputs
Playbook Development,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/pla
ybook-development
1.2 Summarize inputs, outputs, and results for playbook tasks
Depending on the task type you select and the script you are running, playbook tasks have inputs.
Inputs are data pieces that are present in the playbook or task. The inputs are often manipulated or
enriched, and they produce outputs. Outputs are the objects whose entries will serve the tasks
throughout the playbook. They can be derived from the result of a task or command.
For the playbook tasks, the inputs might come from the incident itself, such as the role to which to
assign the incident, or input can be provided by integration—for example, when an Active Directory
integration is used in a task to extract a user’s credentials.
The following graphics show a playbook that is triggered based on context data, meaning an
incident. The first two inputs are the SrcIP, which comes from the incident.src key, and DstIP,
which is retrieved from incident.dest.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
10
The playbook itself creates output objects whose entries will serve the tasks throughout the
playbook.
Outputs can be data that was extracted or derived from the inputs. For example, the following
images show the user’s credentials being retrieved from Active Directory. Those credentials will be
used to get the user’s account name, email address, and any groups to which they belong.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
11
Key Idea
●
The above example uses incident context data as the playbook input, Threat
Intel Management playbooks
1.2.1 References
●
●
Playbook Tasks,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/pla
ybook-tasks
Playbook Inputs and Outputs,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/pla
ybook-inputs-and-outputs
1.3 Configure Inputs and Outputs for Sub-playbooks Tasks
Playbooks can be divided into two categories, depending on their use. Technically, they are the
same, but there are some differences in terms of use.
“Parent” playbooks are playbooks that run as the main playbook of an incident. The other type is
“sub-playbooks,” which are just playbooks that are being called by another playbook.
Sub-playbooks are playbooks that can be nested into other playbooks, which are referred to as
parent playbooks. Sub-playbooks appear as tasks in the flow and have a book icon, but they can
contain a whole playbook. Inputs can be passed into sub-playbooks from the parent playbook,
used, processed in the sub-playbook, and then sent as output to the parent playbook.
Examples of parent playbooks are “Phishing Investigation —Generic v2” or “Endpoint Malware
Investigation – Generic” because an incident starts with them. Examples of sub-playbooks are “IP
Enrichment —Generic v2” or “Retrieve File From Endpoint – Generic” because they are steps taken
as part of the bigger investigation.
Because sub-playbooks are used as part of a bigger investigation, they should have inputs and
outputs. Ensure that the data you want to get from a sub-playbook is defined in its outputs, so that
it can be used outside of that playbook. Because sub-playbooks are building blocks that preferably
will be usable in other playbooks and use cases, you should define generic inputs for them.
Key Idea
●
Any change made to a sub-playbook impacts the parent playbook in the
next run of the parent playbook
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
12
1.3.1 References
●
Playbook Contribution Guide,
https://xsoar.pan.dev/docs/playbooks/playbook-contributions
1.4 Enable and Configure Looping on a Sub-playbook
You can add the sub-playbook in the parent playbook as follows:
Navigate to Playbooks in the task viewer and select the sub-playbook to use as described in the
figure below:
You configure when to exit the loop by selecting one of the following options:
●
For Each Input: The loop will exit automatically when the array it is looping over executes
the last item in the array. Note the following:
○
If the input is a single item, the sub-playbook will run one time. However, if the input
is a list of items, the sub-playbook will run as many times as there are items in the list.
Each iteration of the sub-playbook will use the next item in the list as the input.
○
If there are multiple input lists with the same number of items, then the
sub-playbook will run once for each input set. For example, if you have “input1” and
“input2”, “input1[i]” will run with “input2[i]”.
○
If there are multiple input lists with different numbers of items, the sub-playbook will
run once for each item in the input that has the greater number of items. When the
input with fewer items reaches its last item, the subsequent runs will continue to use
the last item in the shorter list until all items in the largest list have run.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
13
●
Built-in or Choose Loop automation: The loop will exit based on a condition. The playbook
will not loop through the inputs, but it will take the inputs as a whole.
Key Idea
Consider the following when adding a loop:
● The maximum number of loops (default is 100). A high amount or a high
wait time combined with a large number of incidents, may affect
performance.
● Periodically check looping conditions to ensure they are still valid for the
data set.
● When the tasks input is an array, it is iterated automatically (no need to
define a loop)
1.4.1 References
●
●
Configure a Sub-playbook Loop,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/con
figure-a-sub-playbook-loop
Sub-Playbook Loop Example,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/con
figure-a-sub-playbook-loop/sub-playbook-tutorial
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
14
1.5 Differentiate among Playbook Task Types
1.5.1 Manual
Standard tasks are used for classic manual or script-based tasks, such as closing an investigation,
escalating to another analyst, or using a script to enrich data.
1.5.2 Automated
Automation is where tasks are arranged by the integrations they serve. You can scroll through the
integrations list and expand it to see the tasks by clicking the +. You can search for a task by name,
tag, or keyword in the search box above the list of integrations.
1.5.3 Conditional
Conditional tasks can be selected for decision trees or communicating with users through an Ask
task. Conditional tasks are used for determining different paths for your playbook. You can use
conditional tasks for something simple, such as proceeding if a particular integration exists or
determining whether a user account has an email address.
1.5.4 Data Collection
Data collection tasks can be selected for surveying users. Data collection tasks are multi question
surveys or forms that survey recipient access from a link in the message. The survey resides on an
external site that does not require authentication, thereby allowing survey recipients to respond
without restriction.
1.5.5 Sub-Playbook
The existing playbooks can be found and dragged into the new playbook to be used as
sub-playbooks. You should create small playbooks for the procedures used frequently so that they
can be called easily. Cortex XSOAR provides many predefined playbooks you can either use as is or
copy and customize to your needs. Refer to 1.4 for details.
To create a new task, either click + Create Task or drag off a line from the default section header
Playbook Triggered:
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
15
For a new task, you can choose three different types: standard, conditional, and data collection.
1.5.6 References
●
●
Playbook Tasks,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/pla
ybook-tasks
Create Playbooks,
https://xsoar.pan.dev/docs/playbooks/playbooks
1.6 Apply filters and transformers to manipulate data
In Cortex XSOAR, data is extracted and collected from various sources, such as playbook tasks,
command results, and fetched incidents, and is presented in JSON format. The data can be
manipulated by using filters and transformers.
You can add filters and transformers in a playbook task or when mapping an instance.
Filters enable the extraction of relevant data that you can use elsewhere in Cortex XSOAR. For
example, if an incident has several files with varying file types and extensions, you can filter the files
by file extension or file type and use the filtered files in a detonation playbook.
Transformers enable you to take one value and transform or render it to another value—for
example, converting a date in non-Unix format to Unix format. Another example is applying the
count transformer, which renders the number of elements.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
16
You can create filters and transformers to manipulate context data when adding or editing a task in
a playbook or when mapping an instance.
You can filter as many nested objects as required. Cortex XSOAR automatically calculates the
context root to which to filter. For example, if you want to work with file extensions, Cortex XSOAR
calculates context root as File.Extension.
Filters enable you to extract relevant data for use elsewhere in Cortex XSOAR. For example, if an
incident has several files with varying file types and extensions, you can filter the files by file
extension or file type and use the filtered files in a detonation playbook.
Filter categories are as follows:
Boolean: Determines whether a Cortex XSOAR field is true or false, or whether the string
representation is true or false
Date: Determines whether the left-side time value is earlier than, later than, or the same time as the
right-side time value. Different time and date formats are supported. For a detailed table, see the
references.
General: Includes general filters such as contains, doesn’t contain, in, and empty
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
17
String: Determines the relationship between the left-side string value and the right-side string
value, such as starts with, includes, and in list. The string filter returns partial matches as true.
Number: Determines the relationship between the left-side number value and the right-side
number value, such as equals, greater than, and less than.
Unknown: Miscellaneous filter category
Transformers enable you to take one value and transform or render it to another value. When you
have more than one transformer, you can reorder them by clicking and dragging them.
Transformer categories are as follows:
Date: Transforms the date. For example, Date to string and Date to Unix
General: Includes general transformers such as join, sort, splice, and stringify
String: Transforms strings. To make regex non-sensitive to case, use the (?i) prefix—for example,
(?i)yourRegexText.
Number: Transforms a number—for example, round, absolute, and to percent
Key Idea
●
In Cortex XSOAR, data is presented in JSON format.
1.6.1 References
●
●
●
●
Filters and Transformers,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/filte
rs-and-transformers
Create Filters and Transformers in a Playbook,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/filte
rs-and-transformers/create-filters-and-transformers
Filter Operators,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/filte
rs-and-transformers/filter-operators
Transformers Operators,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/filte
rs-and-transformers/transformers-operators
1.7 Apply the Playbook Debugger to Aid in Development Playbooks
The Cortex XSOAR playbook debugger enables you to build and troubleshoot playbooks by helping
you find tasks that might fail and by testing different conditions, branches, and input and output
options. Common use cases include:
●
Playbook development – Test and improve playbooks as you build them.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
18
●
Proof of concept – Begin to create and test playbooks even before all integrations are in
place by manually providing inputs and outputs as needed.
●
Error troubleshooting – Use the debugger to find and fix issues if a playbook stops on an
error.
●
Explore Marketplace playbooks – Install content packs and use the debugger to see whether
the included playbooks are relevant for your use case.
Building a playbook is an iterative process. The debugger provides a test environment where you
can make changes to data and playbook logic and view the results in real time. You have the
opportunity to see exactly what is written to context at each step and which indicators are
extracted.
The debugger runs the playbook with the permissions of the logged in user, not as dBot. When the
user sets breakpoints, skips tasks, or overrides inputs or outputs, those changes only apply to the
individual user’s session and do not permanently change the playbook. Using an existing incident
as test data does not affect the original incident or change the original context data. When tasks
run, however, they execute the same as they would without the debugger. For example, if you run
the debugger and a task adds an item to a list, that item will be in the real list, accessible across
Cortex XSOAR for all users with permission to view that list.
Key Idea
●
Debugger runs the playbook with the permissions of the logged in user and
not as dBot.
1.7.1 Reference
●
Playbook Debugger,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-2/cortex-xsoar-admin/playbooks/deb
ugger
1.8 Summary of Key Ideas
●
●
●
●
●
Any change made to a sub-playbook impacts the parent playbook in the next run of the
parent playbook.
The above example uses incident context data as the playbook input, Threat Intel
Management playbooks.
Consider the following when adding a loop:
○ The maximum number of loops (default is 100). A high amount or a high wait time
combined with a large number of incidents, may affect performance.
○ Periodically check looping conditions to ensure they are still valid for the data set.
○ When the tasks input is an array, it is iterated automatically (no need to define a
loop).
In Cortex XSOAR, data is presented in JSON format.
Debugger runs the playbook with the permissions of the logged in user and not as dBot.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
19
1.9 Sample Questions
Q1. Which statement is true about context data?
a.
b.
c.
d.
It is purged after each task in a playbook is run.
It must be transformed before a task can use it.
After it is written, it can be changed only by manual editing.
It does not necessarily include all data generated by the incident-related activity.
Q2. What is the context data is primarily used for?
a.
b.
c.
d.
Sending data to related incidents
Passing data between playbook tasks
Storing data for use with integrations
Mapping data to required fields
Q3. Which of the following provides dynamic input to playbook tasks and automation?
a.
b.
c.
d.
Incident tasks
Context data
Quick view
System
Q4.Which of the following is a category of playbooks?
a.
b.
c.
d.
System
Parent
Boolean
Number
Q5. What is a sub-playbook?
a.
b.
c.
d.
A playbook used as a task in another playbook
An obsolete playbook of inferior quality
An app that underlies a playbook to ensure that it flows from task to task
An updated playbook that substitutes for an older playbook
Q6. If the input is a list of items, then what will the sub-playbook do?
a.
b.
c.
d.
Run once for each input set
Run twice for each input set
Run as many times as there are items in the list
Run once for each item in the input that has a greater number of items
Q7. Which of the following is not a playbook task type?
a.
b.
c.
d.
Manual
Automated
Conditional
Boolean
Q8. Which of the following is not a part of the transformer category?
a. Date
b. String
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
20
c. Boolean
d. Number
Q9. In which format type is the context root calculated by the Cortex XSOAR?
a.
b.
c.
d.
File.Get
File.Extension
File.String
File.Number
Q10. Which of the following is the function of error troubleshooting?
a. Use the debugger to find and fix issues if a playbook stops on an error.
b. Test and improve playbooks as you build them.
c. Install content packs and use the debugger to see whether the included playbooks are
relevant for your use case.
d. Begin to create and test playbooks even before all integrations are in place by manually
providing inputs and outputs as needed.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
21
Domain 2: Incident Objects
2.1 Configure Incident Types
Incident types are used to classify the events that are ingested into the Cortex XSOAR system. Each
incident type can be configured to work with a dedicated playbook, which can run either
automatically when an event is ingested or when triggered separately at a later point. You also can
configure dedicated service-level agreement (SLA) parameters for each incident type and run
specific post-processing scripts for the given incident type.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
22
2.2 Identify the Role of an Incident Type within the Incident Lifecycle
Cortex XSOAR is an orchestration and automation system used to bring all of the various pieces of
your security apparatus together.
Using Cortex XSOAR, you can define integrations with your third-party security and incident
management vendors. You can then trigger events from these integrations that become incidents
in Cortex XSOAR. Once the incidents are created, you can run playbooks on these incidents to
enrich them with information from other products in your system, which helps to paint a more
complete picture.
In most cases, you can use rules and automation to determine if an incident requires further
investigation or can be closed based on the findings. This enables your analysts to focus on the
minority of incidents that require further investigation.
The following diagram explains the incident lifecycle in Cortex XSOAR.
The create fields phase is used to display information from third-party integrations and playbook
tasks when an incident is created or processed.
The create incident types phase is used to classify the different types of attacks with which your
organization deals.
The create incident layouts phase is used to customize your layouts for each incident type to make
sure the most relevant information is shown for each type.
Key Idea
●
Using Cortex XSOAR, you can define integrations with your third-party
security, incident management vendors and trigger events.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
23
2.2.1 References
●
Incident Lifecycle,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/inci
dent-lifecycle
2.3 Configure an Incident Layout
After you define the incident type, you can configure its layout using the Cortex XSOAR embedded
Incident Layout Builder. For example, analysts will be interested in different information when
investigating a phishing incident versus a ransomware incident. You can customize the layout for
each incident to be presented with exactly the information the analysts need. In a phishing incident
example, that information might include the email headers and the email body, whereas for the
ransomware, the information would center on the family to which the ransomware belongs.
After configuring the layout for the incident type, you must map the different incident types that
your organization handles and the third-party integrations you have. For example, Cortex XSOAR
comes with ready-to-use incident types for phishing attacks. If you work with a different phishing
integration product, you can define an incident type specifically for those events. When you
configure your phishing product integration, you will associate it with your phishing product’s new
incident type, which will probably also have a dedicated phishing playbook.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
24
As is the case with the fields, definition of incident types should be an iterative process. As you plan
your deployment and begin working with your system, you will learn which incident types are
missing. You then can add the new incident types to your system and fine-tune the entire
incident-ingestion process.
2.3.1 Fields and Buttons
You can add dynamic fields to a layout, such as a graph of the number of bad indicators, their
source, and severity. You can also use queries to filter the information in the dynamic section to suit
your exact needs. In addition, buttons may be added to a tab depending upon the type of
investigation being conducted.
2.3.2 Tabs
You can customize almost every aspect of the layout, including which tabs appear, the order in
which they appear, who has permissions, and what type of information appears. You can add filters
in each field or tab by clicking on the eye icon, which enables you to add conditions that show
specific fields or tabs. For example, if an analyst decides that a Cortex XDR Malware incident is a
Ransomware subtype, they may only want fields showing data about the encryption method to
appear and not to show information if the Malware subtype is adware.
You may also want to limit specific tabs to certain scenarios. For example, if a user clicks a phishing
link, the new tab can contain the relevant fields and action buttons for this scenario.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
25
2.3.3 New/Edit and Close Forms
●
New/Edit Form: When creating or editing an incident, you can add or delete sections and
fields as required.
●
Close Form: Add, edit, or delete sections, fields, filters, when closing an incident.
Key Idea
●
There are several Cortex XSOAR system layout sections and fields that you
cannot remove, but you can rearrange them in the layout and modify their
queries and filters.
2.3.4 References
●
●
Incident Management,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/inci
dent-management#id79e86392-cdd0-42d8-9878-160e69df540f
Working with Incident Types,
https://xsoar.pan.dev/docs/incidents/incident-types
2.4 Summarize the Function, Capabilities, and Purpose of Incident Fields
Use the Settings > ADVANCED > Fields screen to see system fields and add custom fields for
Incidents, Evidence, and Indicators.
Use Incident Fields to accept or populate incident data coming from incidents. You create fields for
the information you want to insert that arrives from third-party integrations. The fields are added to
incident type layouts and are mapped using the Classification and Mapping feature.
Incident fields can be populated by the incident team members during an investigation, at the
beginning of the investigation, or before closing the investigation.
Use Indicator Fields to add specific indicator information to incidents. When you create an
indicator field, you can associate it with one particular incident type or all incident types.
You can add the following field types when adding a new field:
●
●
●
●
●
Attachments: Enables addition of an attachment such as .doc, malicious files, reports, and
images of an incident
Boolean: Determines whether a Cortex XSOAR field is true or false, or whether the string
representation is true or false
Date picker: Enables the user to select datetime in ISO 8601 format using the datetime
widget in XSOAR
Grid (table): Includes an interactive, editable grid as a field type for selected incident types
or all incident types
HTML: Configuring the HTML field provides the capability to insert data into the field as
HTML. However, this makes the field not searchable in incident query.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
26
●
●
●
●
●
●
●
●
●
●
●
Long text: You can configure the Long text field for situations where the field is required to
store longer texts without a character limitation. However, this will make the field not
searchable in incident query.
Markdown: Markdown is a lightweight markup language that can be best suited to
represent tables, lists and formatted texts. You can configure a field as markdown to allow
using markdown to display formatted text in incident layouts. However, this will make the
field not searchable in incident query.
Multi select / Array: Includes two options a) Multi select from a pre-filled list b) An empty
array field for the user to add one or more values as a comma separated list.
Number: Can contain any number. The default number is 0, but any quantity can be used.
Role: Roles assigned to the incident determine which users (by the role to which they are
assigned) can view the incident.
Short text: Maximum of 60,000 characters
Single select: This type of parameter is used to allow selecting a single input from a list of
allowed inputs.
Tags: accepts a single tag or a comma-separated list, not case sensitive.
Timer/SLA: View how much time is left before an SLA becomes past due and configure
actions to take if the SLA does pass.
URL: Include the address of the web page
User: A user in the system; used to state a manager or fallback
Fields can be system fields and custom fields for the incidents, indicators, and evidence. Use the
Settings > ADVANCED > Fields screen to see system fields and add custom fields.
Different field types are used in different parts of the investigation and integrations. For example,
the Dest NT Domain incident field is assigned to the Access, Malware, and Brute Force incident
types and can be used with them, as seen in the following screenshot.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
27
You can create fields and assign them either to different incidents and indicators or to all types of
incidents and indicators. For example, the Detection Engines indicator field is assigned to all types
of indicators.
Key Idea
●
Creating Incident Fields is an iterative process in which you continue to
create fields as you gain a better understanding of your needs and the
information available in the third party integrations that you use.
2.4.1 References
●
●
●
●
●
Customize Incident Layouts,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/cust
omize-incident-view-layouts/customize-incident-layouts
Incident Fields,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/inci
dent-management/incident-fields
Indicator Fields,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/understand-indicators/indicator-fields
Field Types, https://xsoar.pan.dev/docs/incidents/incident-fields#field-types
Create a Custom Incident Field,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/inci
dent-management/incident-fields/create-a-custom-incident-field
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
28
●
Create a Custom Indicator Field,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/understand-indicators/indicator-fields/create-a-custom-indicator-field#id0e6ff3a2-0b5
7-4d56-b032-c933f9b8a48a
2.5 Configure Classifier and Mappers
The classification and mapping feature enables you to take the events and event information that
Cortex XSOAR ingests from integrations and classify the event as a type of Cortex XSOAR incident.
For example, Cortex might generate alerts from Cortex Traps, which you would classify according to
the information in those events either as a dedicated Traps incident type or perhaps Authentication
or Malware. Also, you might have EWS configured to ingest both phishing and malware alerts
which you want to classify to their respective incident types based on some information in the
event. By classifying the events as different incident types, you can process them with different
playbooks suited to their respective requirements.
Classification
Classification determines the type of incident that is created for events ingested from a specific
integration. You create a classifier and define that classifier in an integration.
Mapping
You can map the fields from your third party integration to the fields you defined in your incident
layouts.
Starting with version 6.0, mappers are separate entities from classifiers. This enables you to do the
following:
●
Map your fields to incident types irrespective of the integration or classifier. This means that
you can create a mapping before defining an instance and ingesting incidents. By doing so,
when you do define an instance and apply a mapper, the incidents that come in are already
mapped.
●
Create a default mapping for all of the fields that are common to all incident types, and then
map only those fields that are specific to each incident type individually. You can still
overwrite the contents of a field in the specific incident type.
●
Use auto-map to automatically map fields based on their naming convention. For example,
severity would be mapped to importance.
●
Mirror content in Cortex XSOAR with third party integrations. This enables you to make
changes to an incident in Cortex XSOAR and have that change be reflected in the case
managed by the integration. For example, if you are using a case management system such
as JIRA or Salesforce, you can close an incident in Cortex XSOAR and have that closure
reflected automatically.
Key Idea
●
The integration must support pulling the integration schema for mirroring to
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
29
work.
2.5.1 References
●
Classification and Mapping,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/clas
sification-and-mapping
2.6 Summary of Key Ideas
●
●
●
●
Using Cortex XSOAR, you can define integrations with your third-party security, incident
management vendors and trigger events.
There are several Cortex XSOAR system layout sections and fields that you cannot remove,
but you can rearrange them in the layout and modify their queries and filters.
Creating Incident Fields is an iterative process in which you continue to create fields as you
gain a better understanding of your needs and the information available in the third party
integrations that you use.
The integration must support pulling the integration schema for mirroring to work.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
30
2.7 Sample Questions
Q1. What is the primary use of incident types?
a.
b.
c.
d.
Classify the events ingested into the Cortex XSOAR system
Integrate with third-party security
Determine further investigational needs
Customize the layouts
Q2. Which phase is used to display information from playbook tasks and third-party integrations?
a.
b.
c.
d.
Pre-processing phase
Create fields phase
Post processing phase
Planning phase
Q3. Why is the create incident types phase used?
a.
b.
c.
d.
Display information
Customize layouts by incident type
Show relevant information of each incident type
Classify the types of attacks with which the organization deals
Q4. How can you configure the incident type layout?
a.
b.
c.
d.
Incident Layout Builder
Settings tab
Advanced tab
Layouts tab
Q5. Which action should a user perform after configuring the layout?
a.
b.
c.
d.
Work with a phishing integration product.
Define incident type for all events.
Plan deployment.
Map the different incident types that your organization handles.
Q6. When will you learn about the missing incident types?
a.
b.
c.
d.
After adding the new incident types to your system
As you plan deployment and start working on your system
After configuring the layout for the incident type
After you configure your phishing product
Q7. Who can populate the incident fields during an investigation?
a.
b.
c.
d.
Analyst
Administrator
Incident team members
Partners
Q8. Which three field types can you add when creating a new field? (Choose three.)
a. Short text
b. HTML
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
31
c. Date picker
d. Attachments
e. Decimal number
Q9. What do the classification and map features enable users to do? (Choose two.)
a.
b.
c.
d.
e.
Generate alters
Classify phishing and malware alerts to respective incident types
Use events and event information that Cortex XSOAR ingests from integration
Map the fields from third-party integration to the fields defined in the incident layouts.
Create mapping for specific fields.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
32
Domain 3: Automations, Integrations, and Related Concepts
3.1 Define the Capabilities of Automation across XSOAR Functions
3.1.1 Playbook Tasks
You have three different playbook types to use when you create playbooks. And when you create a
new task, you have three different types to choose from: standard, conditional, and data collection.
Standard tasks are used for classic manual or script-based tasks, such as closing an investigation,
escalating to another analyst, or using a script to enrich data.
Conditional tasks can be selected for decision trees or communicating with users through an Ask
task. Conditional tasks are used for determining different paths for your playbook. You can use
conditional tasks for something simple, such as proceeding if a particular integration exists or
determining whether a user account has an email address.
Data collection tasks can be selected for surveying users. Data collection tasks are multi question
surveys or forms that survey recipient access from a link in the message. The survey resides on an
external site that does not require authentication, thereby allowing survey recipients to respond
without restriction.
Key Idea
●
You can collect responses in custom fields, for example, a Grid field.
3.1.2 War Room
War Room commands are commands that can be entered manually in the CLI at the bottom of the
screen.
The automation scripts that can be used with an integration can be found in several ways. Choose
the one best for you and the specific scenario you are in:
Start by typing ! and continue writing the name of an automation script or an integration
command from an enabled integration in the CLI. Cortex XSOAR will autocomplete and show
possible commands or scripts for that integration.
Start by typing ! and the CLI will autocomplete possible commands that you can execute and
provide tips for using the command. For example, !whois paloaltonetworks.com will return
registration information for the paloaltonetworks.com domain.
To see all possible commands for an enabled integration, open the integration in Settings >
Integration > Servers & Services and click the Show Commands link.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
33
Key Idea
●
●
To access the War Room: If you have an Admin role, clicking Playground on
the side bar opens the Playground - War Room tab. If you have another role,
typing any command in the CLI at the bottom of the page opens this tab.
Cortex XSOAR does not index notes, chats, and pinned as evidence entries. If
you want to index these entries, see War Room Indexing.
3.1.3 Layouts (Dynamic Sections, Buttons)
The two different layout types are incident layouts and indicator layouts. Layouts are used to show
you the required information in different views and tabs.
For a phishing incident, you will want to see email headers, which would not be relevant for an
access incident or a file hash indicator; however, you might want to count how many times the
hash indicator is found in related incidents.
You can add automation script-based content to the Incident Summary and Incident Quick View
layout by adding the General Purpose Dynamic Section in the layout builder. The General
Purpose Dynamic Section enables you to configure a section in the Incident Info tab from an
automation script. The automation can return a simple text, markdown, or an HTML, the results of
which appear in General Purpose Dynamic Section.
You can add any required information from an automation. For example, you can assign a script
that calculates the total number of entries that exist for an incident, and it dynamically updates
when new entries are added to the incident. You can also Add a Custom Widget to the Incident
page and Add Note Information Using an Automation Script.
Before you begin, you need to create an automation script.
Key Idea
●
Indicators are used to show required information in different views and tabs.
3.1.4 Jobs
You can create scheduled events in Cortex XSOAR using jobs. Jobs are triggered by either
time-triggered events or feed-triggered events.
For example, you can define a feed-triggered job to trigger a playbook when a specified threat
intelligence management (TIM) feed finishes a fetch operation for new indicators. Or you can
schedule a time-triggered job that runs nightly and removes expired indicators.
You can use the jobs feature for the following cases:
●
Analyze from feeds.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
34
●
●
●
●
Batch processing data.
Detect information.
Schedule process to move from folder to list for use.
Push indicator to SIEM products.
Key Idea
●
Jobs are triggered by time-triggered events or feed-triggered events.
3.1.5 Field Trigger Scripts
You can associate indicator fields with trigger automation scripts that check for field changes and
then take actions based on them. These scripts can perform any action when the conditions are
met. Indicator field trigger scripts allow indicators to become a proactive force within Cortex
XSOAR. For example, you can:
●
Define a script that will run when the Verdict field of an indicator has changed. For example,
the script will fetch all incidents related to that indicator, and take any action that is
configured (reopen, change severity, etc.).
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
35
●
Define a script that will run when the Expiration Status field has changed. For example, you
can define a script that will immediately update the relevant allow/block list (and not wait
for the next iteration) as seen in the following script example:
indicators = demisto.args().get('indicators')
new_value = demisto.args().get('new')
indicator_values = []
for indicator in indicators:
current_value = indicator.get('value')
indicator_values.append(current_value)
if new_value == "Expired":
# update allow/block list regarding expired indicators
else:
# update allow/block list regarding active indicators
Automations can be created in Python, PowerShell, or JavaScript in the Automation page. To use a
field trigger automation, you need to add the field-change-triggered-indicator tag when creating
the automation. You can then add the automation in the Attributes tab, when you edit or Create a
Custom Indicator Field. If you did not add the tag when creating the automation, the automation
will not be available for use.
Key Idea
●
Automations can be created using Python, PowerShell or JavaScript in the
automation page.
3.1.6 Pre/Post-Processing
Pre-Processing
Pre-processing rules enable you to perform certain actions on incidents as they are ingested into
Cortex XSOAR directly from the UI. Using the rules, you can select incoming events on which to
perform actions. For example, you can link the incoming event to an existing incident or, based on
configured conditions, drop the incoming incident altogether. For more information, see Create
Pre-Process Rules for Incidents.
Post-Processing
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
36
Once the incident is complete and you are ready to close it out, you can run various post-processing
actions on the incident. These actions might include sending an email to the person who opened
the incident informing them that their incident has been resolved, or closing an incident in a
ticketing system.
3.1.7 References
●
●
●
●
●
●
●
Playbook Tasks,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-8/cortex-xsoar-admin/playbooks/pla
ybook-tasks
Incident Tasks,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/inci
dent-management/incident-tasks#id82f6c4a9-846c-4a79-9e0d-ac94123b942c
War Room Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/inci
dent-management/war-room-overview
Customized Incident Layouts,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/cust
omize-incident-view-layouts/customize-incident-layouts
Add a Script to the Incident Layout,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/cust
omize-incident-view-layouts/add-a-script-in-the-incident-layout
Jobs, https://xsoar.pan.dev/docs/incidents/incident-jobs
Indicator Field Trigger Scripts,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/mana
ge-indicators/understand-indicators/indicator-fields/indicator-field-trigger-scripts
3.2 Differentiate between Automations, Commands, and Scripts
Automations
The Automation section is where you manage, create, and modify scripts. These scripts perform a
specific action and are comprised of commands associated with an integration. You write scripts in
either Python or JavaScript. Scripts are used as part of tasks, which are in turn used in playbooks
and commands in the War Room.
Scripts can access all Cortex XSOAR APIs, including access to incidents and investigations, and
share data to the War Room, and so on. Scripts can receive and access arguments, and you can
password protect scripts.
The Automation section includes a Script Helper, which provides a list of available commands and
scripts, ordered alphabetically.
Commands
Cortex XSOAR has two different kinds of commands:
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
37
●
System commands – Commands that enable you to perform Cortex XSOAR operations, such
as clearing the playground or closing an incident. These commands are not specific to an
integration. System commands are entered in the command line using a /.
●
External commands – Integration-specific commands that enable you to perform actions
specific to an integration. For example, you can quickly check the reputation of an IP
address. External commands are entered in the command line using a !. For example, !ip.
Scripts
Common Scripts are scripts that contain common code (functions, variables, etc.) to be used across
scripts which can be embedded when writing your own Automation scripts and Integrations. The
common scripts appear in the Automation page, but are used to enhance the API in other scripts
and integrations.
For example, the function tableToMarkdown in CommonServer.yml takes a JSON and transforms it
to markdown. You can call this function from integrations and scripts that you author.
Key Idea
●
●
Scripts written in Python or JavaScript can access all Cortex APIs.
Common scripts can be embedded when writing your own Automation
scripts and Integrations.
3.2.1 References
●
●
●
Automations,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-8/cortex-xsoar-admin/playbooks/aut
omations
Cortex XSOAR Concepts,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/cortex-xsoar-o
verview/cortex-xsoar-concepts
Common Scripts to use in Automations,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/aut
omations/common-scripts-to-use-in-automations
3.3 Interpret and Modify Automation Scripts
3.3.1 Script Helper
The Automation section includes a Script Helper, which provides an alphabetical list of available
commands and scripts:
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
38
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
39
3.3.2 Script Settings
In Script settings, you can define the following information:
Basic
Parameter
Description
Name
An identifying name for the automation
Language
type
Select the automation language
Version
The automation language version
Description
A meaningful description for the automation
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
40
Tags
Predefined script identifiers that determine
where the automation is available. For
example, to use this automation as a
pre-processing automation, it must be
tagged with the pre-processing tag.
Run on
The Cortex XSOAR server, single engine, or
Load-balancing group.
Propagation
Labels
(Multitenant) Select the propagation labels
for the automation
Enabled
Whether the automation is available for
playbook tasks, indicator types, incident
types, and fields.
Content pack
The content pack for which the automation
belongs
3.3.3 Language Types
In the Automation page, you can view, edit, and create automations in JavaScript, Python, or
Powershell. When creating an automation, you can access all Cortex XSOAR APIs, including
incidents and investigations, share data to the War Room, and so on. Automations can receive and
access arguments, and can also be password protected.
Key Idea
●
In the Automation page, you can view, edit and create automations using
JavaScript, Powershell or Python.
3.3.4 Using Script to Create Widget for Dashboards
Create a script that queries and returns current on-line users and displays the data in a markdown
table.
In the automation script, type one of the following return values:
JavaScript
return executeCommand(“getUsers”, {online:true})[0].HumanReadable;
Python
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
41
demisto.results(demisto.executeCommand(“getUsers”, {“online”: True })[0][“HumanReadable”])
When creating or editing the widget in the Cortex XSOAR, to add a page break,
type /pagebreak in the text box. When you generate a report, the widgets that follow the page
break are on a separate page.
In the dashboard, the following widget displays the on-line users:
3.3.5 References
●
●
Cortex XSOAR IDE, https://xsoar.pan.dev/docs/concepts/xsoar-ide#the-script-helper
Automations,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/aut
omation
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
42
●
●
Automations,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/aut
omation
Script based Widgets using Automation Scripts Examples,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/widgets/creat
e-a-custom-widget-using-an-automation-script/widget-type-examples-using-automation-s
cripts
3.4 Identify the Properties and Capabilities of the XSOAR Framework for Integration
Throughout development of integrations and scripts, your code likely will cause something to break
at some point. One of the most significant features of Cortex XSOAR is its use of machine learning
to better time these crashes so they occur during your time off.
To find the source of the problem, you can check logs and War Room entries, and you can also use
the Demistomock library.
There is also a fourth option to debug your integration. The Cortex XSOAR plugin for the PyCharm
IDE enables you to design and author scripts and integrations for Cortex XSOAR directly from
PyCharm. The plugin adds a sidebar with Automation and Integration Settings, just like the
Settings sidebar in the Cortex XSOAR script editor. When you write code, the plugin provides you
with autocomplete of Cortex XSOAR and Python functions and allows you to debug your code
easily.
Key Idea
●
You can easily debug your integration using the Cortex XSOAR plugin.
3.4.1 References
●
●
Debugging,
https://xsoar.pan.dev/docs/integrations/debugging
Create an Integration,
https://xsoar.pan.dev/docs/tutorials/tut-integration-ui
3.5 Configure and Manage Integration Instances
You can poll third party integration instances for events and turn them into Cortex XSOAR incidents
that trigger automations (fetching). There are a number of integrations that support fetching, but
not all support this feature. You can view each integration in the Cortex XSOAR Developer Hub.
When setting up an instance, you can configure the integration instance to fetch events. You can
also set the interval for which to fetch new incidents by configuring the Incident Fetch
Interval field. This enables you to control the interval in which an integration instance reaches out
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
43
to third party platforms to fetch incidents into Cortex XSOAR. If the integration instance does not
have the Incident Fetch Interval field, you can add this field by editing the integration settings.
The fetch interval default is 1 minute.
You can change the default for all integration instances by setting the server configuration using
the serversiemincidents.schedule key. The value is the interval in seconds (s), minutes (m), or
hours (h). Setting the incident fetch interval when defining an instance overrides the server
configuration settings.
Go to Settings > About > Troubleshooting.For example, type jobs.serversiemincidents.schedule
key and 120s value. It is recommended that you do not set the value to less than one minute (1m).
Set the objects to be fetched and their mapping in Settings > OBJECTS SETUP > Incidents >
Classification & Mapping.
Key Idea
●
●
You can add the field to any integration that fetches incidents. For
out-of-the-box integrations, to add the field, you need to create a copy of the
integration. Editing the integration settings including adding the Incident
Fetch Interval field, breaks the connection to out-of-the-box content. Any
future updates to this integration will be applied to the out-of-the-box
integration and not to the copy integration.
If you turn off fetching for a period of time and then turn it on or disabled the
instance and enabled it, the instance remembers the "last run" timestamp,
and pulls all events that occurred while it was off. If you don't want this to
happen, verify that the instance is enabled and then click Reset the “last
run” timestamp in the settings window. Also, note that "last run" is retained
when an instance is renamed.
3.5.1 Reference
●
Fetch Incidents from an Integration Instance,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/inci
dent-management/fetch-incidents-from-an-integration
3.6 Summary of Key Ideas
●
●
●
●
●
●
●
●
You can collect responses in custom fields, for example, a Grid field.
To access the War Room: If you have an Admin role, clicking Playground on the side bar
opens the Playground - War Room tab. If you have another role, typing any command in
the CLI at the bottom of the page opens this tab.
Cortex XSOAR does not index notes, chats, and pinned as evidence entries. If you want to
index these entries, see War Room Indexing.
Indicators are used to show required information in different views and tabs.
Jobs are triggered by time-triggered events or feed-triggered events
Automations can be created using Python, PowerShell or JavaScript in the automation page
Scripts written in Python or JavaScript can access all Cortex APIs.
Common scripts can be embedded when writing your own Automation scripts and
Integrations.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
44
●
●
●
●
In the Automation page, you can view, edit and create automations using JavaScript,
Powershell or Python.
You can easily debug your integration using the Cortex XSOAR plugin.
You can add the field to any integration that fetches incidents. For out-of-the-box
integrations, to add the field, you need to create a copy of the integration. Editing the
integration settings including adding the Incident Fetch Interval field, breaks the
connection to out-of-the-box content. Any future updates to this integration will be applied
to the out-of-the-box integration and not to the copy integration.
If you turn off fetching for a period of time and then turn it on or disabled the instance and
enabled it, the instance remembers the "last run" timestamp, and pulls all events that
occurred while it was off. If you don't want this to happen, verify that the instance is enabled
and then click Reset the “last run” timestamp in the settings window. Also, note that "last
run" is retained when an instance is renamed
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
45
3.7 Sample Questions
Q1. Which playbook task can be selected for surveying users?
a.
b.
c.
d.
Conditional task
Standard task
Data collection task
None of the above
Q2. Which statement about War Rooms is true?
a.
b.
c.
d.
War Room commands are used for script-based tasks.
War Room commands are used to determine different paths for your playbook.
War Room commands are commands entered manually in the CLI.
War Room commands are used as integration commands.
Q3. What are the two types of layouts? (Choose two.)
a.
b.
c.
d.
Incident layouts
Dynamic layouts
Indicator layouts
Button layouts
Q4. Why use automations?
a.
b.
c.
d.
To create scripts
To create, manage and modify scripts
To write scripts in Java and Python
To access a few Cortex XSOAR APIs
Q5. Which two kinds of commands are available in Cortex XSOAR? (Choose two.)
a.
b.
c.
d.
Internal commands
System commands
Warm room commands
External commands
Q6. Which statement regarding Script helper is true?
a.
b.
c.
d.
Provides a list of commands
Provides a list of available commands and scripts in alphabetical order
Provides the language version
Provides a list of scripts
Q7. Which three parameters can you define in Script settings? (Choose three.)
a.
b.
c.
d.
Language type
Disabled
Run on
Content pack
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
46
Q8. Where can you check the source of a problem?
a.
b.
c.
d.
Settings
Logs and War Room entries
Library
PyCharm IDE
Q9. What is the default fetch interval time?
a.
b.
c.
d.
Two minutes
30 seconds
One minute
15 seconds
Q10. Where can you view every integration instance?
a.
b.
c.
d.
Cortex XSOAR
Integration settings field
Cortex XSOAR Developer Hub
Incident Fetch Interval field
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
47
Domain 4: Content Management and Solution Architecture
4.1 Apply Marketplace Concepts for the Management of Content
4.1.1 Searching in Marketplace
You can install, delete, and update content and contribute and share content items such as
playbooks, integration, and incident types in the Marketplace.
You can browse all content (including installed content), view only the installed content packs, or
see your contributions. When a content pack needs to be updated, you receive notifications and
view the updates on the Installed Content Packs tab.
When you search for content, you can use the search bar by adding text and then selecting the
content from which to search.
4.1.2 Installation and Updates
All Cortex XSOAR content is organized in packs. Packs are essentially groups of artifacts that
implement use cases in the product. Content packs are created by Palo Alto Networks, technology
partners, consulting companies, MSSPs, customers, and individual contributors. As was discussed in
Task 5.1.2, content packs may include various components, such as integrations, automations,
playbooks, incident types, and widgets.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
48
Before you install a content pack, you should review the content pack to see what it includes, any
dependencies that are required, reviews, etc. When selecting a content pack, you can view the
following information:
●
Details – General information about the content pack, including installation, content, version,
author, status, etc.
●
Content – Information about the content pack such as automations, integrations, etc.
●
Release Notes – Contains information about each version including fixes, improvements, etc.
●
Dependencies – Details of any Required Content Packs and Optional Content Packs that
may need to be installed with the content pack.
●
Review: You can view or add a review to the content pack (but you must be logged in).
If you experience timeout issues when downloading content, see Marketplace Troubleshooting.
When content packs need to be updated by the creators, they become ready for use after the
review and approval process by the Cortex XSOAR team, and you are notified about the updates in
the Cortex XSOAR interface.
Suppose you want to contribute the content entities you created. In that case, you should create a
content pack and submit it for review to Cortex XSOAR team so that it can be added to the Cortex
XSOAR Marketplace and thereafter become available to customers.
When a content pack is available for update, a notification appears next to the Marketplace icon,
and a message about content pack updates displays at the top of the Settings page.
You can update to the latest content version or specific versions. Any customizations you have made
are automatically included in any update. All dependent content packs update automatically with
the main content pack.
Users can see updates for content packs they have in their environment that were downloaded by
another user.
Key Idea
●
If you want to downgrade, any content that depends on the content pack
including any customizations may be deleted if it does not exist in the target
content pack version.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
49
4.1.3 Dependencies
In Cortex XSOAR, some objects are dependent on other objects. For example, a playbook may be
dependent on other playbooks, scripts, integrations, and incident fields, etc.
In the figure above, you can see that an incident type depends on a playbook, an incident layout,
and an incident field. A widget depends on an incident field and a script. A script depends on
another script, and an integration and how they all are dependent on each other.
When you install a content pack, mandatory dependencies, including required content packs, are
added automatically to ensure that it installs correctly.
Some content which is not essential for installation still ensures that the other content runs
successfully. These dependencies include optional content packs, which can be added or removed
in the Cart.
Key Idea
●
If you delete a content pack, which depends on other content packs, these
content packs may not run correctly. Also, if you roll back to an earlier version
of a content pack, other content packs might be affected. For example, if
content pack A depends on layouts from content pack B Version 2, reverting
to Content Back B Version 1 could cause content pack A to stop working.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
50
4.1.4 Version History
You can revert to an earlier version of an installed content pack by following the these steps:
Step 1: In the Installed Content Packs tab of the Marketplace, search for the content pack.
Step 2: In the Version History tab of the content pack, view the previous versions.
Step 3: Choose the version you want to revert to and click Revert to this version. The selected
version will be added to your cart.
Step 4 : In the Marketplace cart, click Downgrade.
Key Idea
●
If you roll back to an earlier version of a content pack, other content packs
might be affected. For example, if content pack A depends on layouts from
content pack B Version 2, reverting to content pack B Version 1 could cause
content pack A to stop working.
4.1.5 Partner-supported Versus XSOAR-supported
Partner-supported content packs
This term applies to content packs published by Cortex XSOAR Technology Partners. Support and
maintenance is provided by the Technology Partner, whose contact information appears in the
content pack details.
Cortex XSOAR Technology Partners are required to join the industry-standard support
framework, TSANet, to deliver support to our mutual customers. Customers engage directly with the
Partner for support and maintenance of the partner-supported content pack.
Cortex XSOAR-supported content packs
This term applies only to content packs published by Palo Alto Networks. These content packs are
supported and maintained by Palo Alto Networks according to the Palo Alto Networks End User
Support Agreement.
Key Idea
●
Palo Alto Networks is not liable for and does not warrant or support any
content pack produced by a third-party publisher.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
51
4.1.6 Submitting Content to the Marketplace
Any user can add content to a content pack. The content pack is submitted and reviewed by Cortex
XSOAR to ensure it complies with Cortex XSOAR standards. After approval, the content pack can be
used in the Marketplace.
Step 1 : Select Marketplace > CONTRIBUTIONS > Contribute Content
Step 2 : In the Content Pack Editor field, type a meaningful name for the content pack.
Step 3 : In the Add Content section, select the type of content you want from the drop-down list,
locate the content you want to add, and click Add.
For more information about how to build a content pack, see the Dev Hub documentation.
Step 4 : If you want to continue adding content at a later time or to use the Validate Pack option,
click the Save button.
Step 5 : (Optional) Click Validate Pack to check for errors. The pack must be saved before you
validate.
Step 6 : If you have finished and want to send the content pack to a Cortex XSOAR developer for
review, click Save and contribute to either contribute or download your contribution.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
52
Step 7 : (Optional) In the Contribute dialog box, add a description.
Step 8 : Select Save and submit your contribution, enter your email address and click Contribute.
Instead of submitting the contribution, you can also download the content pack and upload it, for
example, to GitHub.
After sending the content pack, a confirmation message appears. You will be contacted about the
next steps in the review process.
4.1.7 Reference
●
●
●
●
●
Update a Content Pack,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/marketplace/c
ontent-pack-installation/update-a-content-pack
Content Pack Lifecycle,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/marketplace/
marketplace-subscriptions
Content Pack Installation,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/marketplace/c
ontent-pack-installation#id330fd342-f533-4345-9dae-9ea0cecf8690
Content Pack Installation,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/marketplace/c
ontent-pack-installation#id330fd342-f533-4345-9dae-9ea0cecf8690
Version Control,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/vers
ion-control
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
53
●
●
●
Revert a Content Pack,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/marketplace/c
ontent-pack-installation/revert-a-content-pack
Install a Content Pack Offline,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/marketplace/i
nstall-a-content-pack-offline
Create a Content Pack,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/marketplace/c
ontent-pack-contributions/create-a-content-pack
4.2 Apply General Content Customization and Management Concepts
4.2.1 Custom versus System Content
All Cortex XSOAR content is organized in packs. Packs are essentially groups of artifacts that
implement use cases in the product. Content packs are created by Palo Alto Networks, technology
partners, consulting companies, MSSPs, customers, and individual contributors, and they may
include various components, such as integrations, automations, playbooks, incident types, and
widgets.
When content packs need to be updated by the creators, they become ready after the review and
approval process by the Cortex XSOAR team, and you are notified about the updates in the Cortex
XSOAR interface. To contribute the content entities you created, you should create a content pack
and submit it for review for it to be added to the Cortex XSOAR Marketplace and become available
to customers.
Any user can add content to a content pack that has been created, submitted, and reviewed by
Cortex XSOAR to ensure that it complies with Cortex XSOAR standards. After approval, the content
pack can be used in the Marketplace.
You can install only one content pack at a time from the Marketplace. Cortex XSOAR automatically
adds any content that is required to install the content pack. You also can add any recommended
content packs that use the content pack you want to install.
Before you install a content pack, search for it by using the Browse tab. When you find the required
pack, you can see what is included in it and then use the Install button to finish the installation.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
54
Key Idea
●
You can install only one content pack at a time from the Marketplace.
4.2.2 Duplicating Content
To edit a content item, the item must be detached or be custom content. When content items are
detached, they do not receive updates from the Marketplace. There are two options for editing
content items:
●
Detach the content item (playbook, automation, etc.) and edit it. If you want to receive
content updates in the future, you can reattach the content item, but the modifications
you made while the item was detached will be overwritten in the next content update.
●
Duplicate the content item and edit the copy. When a content item is duplicated, it
becomes a custom content item and therefore will not receive updates, but you can still
view updates to the original content item.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
55
Key Idea
●
When a content item is duplicated, it becomes a custom content and will
not receive updates but you can view updates.
4.2.3 Importing/Exporting Custom Content
When you create your content packs, you can use the Contributions tab in the Marketplace to send
them to Cortex XSOAR for review and approval. If you want to prepare the content pack and send it
later for review or upload it to GitHub, you can export your package in the Contribution screen by
selecting the Save and download your contribution option:
You usually need an Internet connection when using the Marketplace for tasks such as
downloading and subscribing to content packs because all these services are in the cloud. However,
you can upload content packs offline. The administrator downloads the content pack to install,
which is in ZIP format.
In ZIP format, you can upload the following:
●
●
Each content pack separately
Several content packs together
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
56
●
An all-packs zip, which installs all content packs at the same time. All dependencies are
included.
Before you start uploading content that you want to install, you should update server configurations
to turn off Marketplace synchronization in the cloud for both the content packs and the review
process by adding the following keys values to Settings > About > Troubleshooting > Add Server
Configuration. Addition of those keys improves system performance.
Key
Value
marketplace.sync.enabled
false
marketplace.content.packs.rating.enabled
false
marketplace.subscriptions.sync.enabled
false
Key Idea
●
You need internet connection when using the Marketplace for tasks such as
downloading and subscribing to content packs.
4.2.4 Version Control
You can save versions of a playbook as you develop it. When you save a version of a playbook, add a
meaningful comment so that you will be able to recognize the changes you made to that version at
a later time. The saved version includes the name of the playbook, your commit message, an
indication of what the change was (modify, insert, etc.), the date the playbook was saved, and the
name of the author who last saved it. If necessary, you can access the playbook’s version history and
revert your playbook to a previous version.
Step 1 : From the Save Playbook drop-down list, click Save version for current Playbook.
Step 2 : Enter a description of the change that was made to the current version.
Step 3 : Click Update Playbook.
Step 4 : To access a version of a playbook:
1.
Click Version history for all Playbooks.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
57
2.
Search for the required playbook. The description you entered when you saved the version
should help you locate the version you now require.
3.
Click Restore to open the required version of the playbook.
4.2.5 References
●
●
●
●
Content Pack Contributions,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/marketplace/c
ontent-pack-contributions#id155ef400-1b97-4e8b-9027-055c7fe873e6
Marketplace FAQs,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/marketplace/
marketplace-faqs
Troubleshoot Content Issues,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/5-5/cortex-xsoar-multi-tenant-guide/re
mote-repositories-for-multi-tenant-deployments/troubleshoot-a-remote-repository-configur
ation/troubleshoot-content-issues#id8ccd163f-44fd-49ac-a8f3-275b2a7809c2
Version Control,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/vers
ion-control
4.3 Manage Local Changes in a Remote Repository (dev-prod) Configuration
Once you develop your content, you must push the changes to the remote repository for the
updated content to be available as part of a content update for the production environment.
You can save versions and manage revisions locally using the Save Version button. Alternatively, you
can click the save button to save the changes.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
58
These options are only available for the following content types:
●
●
●
●
●
●
●
●
●
●
●
●
Automation
Playbooks
Integrations
Classifiers
Layouts
Reports
Dashboards
Incident types
Fields
Preprocess rules
Lists
Jobs
For all other content types, your changes are automatically saved locally.
You can push individual items such as a playbook or content packs as a whole. If you want to have
more granular control over the items in the content packs that you push, add the
ui.version.control.push.partial.packs server configuration and set the value to true.
Step 1 : Push content to the Remote Repository
1.
Go to Settings > Local Changes. Push the following content according to the tabs:
● Items: Content that is not related specifically to a content pack. For example,
customized automations or playbooks.
If you have already pushed a content pack and later edit one of its content items, the
edited items will appear in the Items tab, not the Packs tab.
●
Packs: All of the content that is specific to the content packs you installed from
Marketplace.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
59
2.
3.
4.
Select the changes that you want to push to the remote repository and click Push.
In the dialog box, add an optional message and click Push.
If the items have dependencies, review the contents and click Push.
● Sometimes you may not want to push all content, content pack dependencies, etc.
For example, when a user makes a change in a playbook that includes an automation
dependency to which another user is adding a feature, and the change does not
require the new feature (version) of the automation, you can push the playbook
without the new automation.
Step 2 : On the remote repository, install the new content.
1.
2.
3.
4.
5.
At the top of any page, click Install New Content.
In the dialog box, click Install Content.
You can also check for new content that has been pushed.
If conflicts appear, click Resolve conflicts.
In the Action column, select one of the following:
● Skip: Keeps the local content in your production environment
● Replace: Deletes the local content and installs the content from the remote repository
6. Click OK to save the changes.
Step 3 : (Optional) If you want to control access when pushing content, do the following on the
remote repository:
1.
2.
3.
4.
Select Settings > About > Troubleshooting > Server Configuration
Click Add Configuration.
Under key, enter UI.version.control.admin.only
Click Save.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
60
Key Idea
●
When working with remote repositories and upgrading to v6.0 and above,
push your classifiers and mappers on the development environment before
grading the product environment.
4.3.1 Reference
●
Edit and Push Content to a Remote Repository,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/remote-reposit
ory/edit-and-push-content-to-a-remote-repository
4.4 Describe the Components of the XSOAR System Architecture
4.4.1 System Hardware Requirements
Cortex XSOAR requires the following hardware. Ensure you meet all minimum system requirements.
Cortex XSOAR Server
Cortex XSOAR server has specific operating system and hardware requirements.
Hardware Requirements
COMPONENT
PRODUCTION MINIMUM
CPU
DEV ENVIRONMENT
MINIMUM
8 CPU cores
Memory
16GB RAM
32GB RAM
Storage
500GB SSD
1TG SSD with minimum
3k dedicated IOPS
16 CPU cores
If your hard drive is partitioned, we recommend a minimum of 450GB for the /var partition for the
development environment, and 900GB for the /var partition for the production environment.
When deploying Cortex XSOAR with BoltDB, we recommend a limit of 1 million indicators for the
development environment and 5–7 million indicators for the production environment. If you will
have more indicators, we recommend using Elasticsearch.
Docker/Podman Requirements
Cortex XSOAR requires Docker or Podman for container management. Cortex XSOAR installs either
Docker or Podman automatically based on your operating system. IPv4 forwarding is required.
You may need to take additional steps to set up Docker or Podman, depending on your operating
system.
Podman, by default, uses the $HOME/.local/share/containers/storage
recommend reserving 100GB for the /home partition.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
directory, and we
61
Key Idea
●
●
A minimum of 450 GB for var/partition for the development environment
and 900 GB for var/partition for the production development is
recommended.
Cortex XSOAR requires Docker or Podman for container management.
4.4.2 Remote Repositories (dev-prod)
The Remote repository feature in the UI
Cortex XSOAR supports the ability to work with separate repositories for development and
production environments. This enables you to develop and test all of your content in one location,
and when it is ready, you push the content to the remote repository. In your production
environment, you pull the content as you would all other content updates. This feature does not
need the resources for CI/CD process and is designed for less complicated content, usually one or
two developers working on a local machine.
Working with the Remote repository feature in the UI
In the production environment, the content appears as a content update, just like any other, and
you pull the content from the remote repository into your working branch.
In addition, Cortex XSOAR content updates are only delivered to the development environment. This
enables you to determine which updates you want to push to production.
●
Working with remote repositories is Git-based. Any service that supports this protocol can be
used, for example, GitHub, GitLab, Bitbucket, etc. In addition, on-premise repositories are also
supported.
●
Verify that your Cortex XSOAR has access to the remote repository as this feature can not be
configured to work with Engines.
To work with remote repositories, you must have two separate Cortex XSOAR environments on two
separate machines. The development environment is used to write the following content:
●
●
●
●
●
●
●
●
●
●
●
●
●
Automations
Playbooks
Integrations
Classification
Incident fields
Evidence fields
Incident layouts
Incident types
Pre-processing rules
Indicator types
Reports
Dashboards
Widgets
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
62
It is not possible to edit these elements in the production environment.
You need to configure the remote repository feature both on your development machine and
the main account. If you want your developed content to be available as part of a content update for
the production environment, you must push the changes to the remote repository. If you
experience issues, learn how to troubleshoot remote repositories.
The Remote Repository UI feature and High Availability
The remote repository feature in the UI is not supported on development environments that run as
High Availability (multi-app servers). You can still use a development > staging > production set
up, where development is a single server (not High availability), but production can be High
Availability. In this setup, both staging and production pull from the same git repository. If your
development environment runs as High Availability, use the CI/CD Solution.
Key Idea
●
●
Working with remote repositories is git-based. Any service that supports this
protocol can be used, for example, GitHub, GitLab, Bitbucket, etc. In addition
on-premise repositories are also supported.
If you have more than two pre-processing rules in your Local Changes queue,
you must push all of those changes to the remote repository.
4.4.3 Engines
Cortex XSOAR engines are installed in a remote network and allow communication between the
remote network and the Cortex XSOAR server. You can run scripts and integration commands on an
engine. It is possible to install a single engine or multiple engines.
You can install multiple engines on the same machine (Shell installation only) which is useful in a
dev-prod environment where you do not want to have numerous engines in different environments,
and to manage those machines. In a multi-tenant environment, users may want to deploy engines
for tenants on the same machine, and you can share an engine between tenants.
An engine is used for the following purposes:
●
●
Proxy
Load-balancing
Engine Proxy
Cortex XSOAR engines enable the Cortex XSOAR server to access internal or external services that
are otherwise blocked by a firewall, proxy, or other blockers. For example, if a firewall blocks external
communication and you want to run the Rasterize integration, you need to install an engine to
access the Internet.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
63
Within the network, you need to allow the engine to access the Cortex XSOAR server's IP address
and listening port (by default, TCP 443). The engine always initiates the communication to the
server.
Engine Load-Balancing
Engines can be part of a load-balancing group, which enables distribution of the command
execution load. The load-balancing group uses an algorithm to efficiently share the workload for
integrations that the group is assigned to, thereby speeding up execution time. In general, heavy
workloads are caused by playbooks that run a high number of commands.
Before configuring an integration to run using multiple engines in a load-balancing group, we
recommend you test the integration using a single engine in the load-balancing group.
By default, the Cortex XSOAR server is part of the load balancing group. It is recommended that
you Remove the Cortex XSOAR Server From the Load-Balancing Group, which increases
performance, when there are two or more engines in the load-balancing group or if you use engines
to access integrations that are inaccessible from the Cortex XSOAR server.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
64
Engine Installation and Configuration
You can Install a Cortex XSOAR Engine on Linux and Windows machines. After installing the engine,
you can Configure Engines, such as log levels, add/remove servers to a load-balancing group, use as
a web proxy, etc. You can also Manage Engines, such as getting logs, add/remove engines, delete
engines, remove engines, etc. Before installing, review the system requirements in Install a Cortex
XSOAR Engine.
Key Idea
●
●
●
You cannot share a multiple engine installation with a single engine
installation.
When you add an engine to a load balancing group, you cannot use that
engine separately. The engine does not appear in the engines drop-down
menu when configuring an integration instance.
For Linux machines, you need to install Docker before installing an engine. If
you use the Shell installer, Docker is automatically installed.
4.4.4 Multi Tenancy
Multitenancy architecture is based on the platform’s ability to run multiple instances (processes and
data) of the XSOAR server on a single server. Each deployment consists of a main server and tenant
accounts. All tenant accounts can reside on the same (main) server or an MSSP can choose to run
tenants on additional hosts. Tenants are deployed across hosts for several reasons.
Scalability: This includes full horizontal scalability; when a server or host is maxed out due to an
excess of tenants on the same host, MSSPs can add another host on which to run tenants. MSSPs
can easily move tenants between hosts.
Geography: A global MSSP may have customers in multiple countries or even continents. To
increase responsiveness, the MSSP may choose to locate a host or multiple hosts in each location.
Compliance: In some cases, MSSPs are asked to run the tenant within the country where the
customers’ offices are located or even within the customer’s internal network. For the latter, XSOAR
supports installing a single host running a single tenant that can be installed on the customer’s
premises.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
65
Components
Main host
The main host is the main instance in the architecture from which you access and administer
tenants (accounts) and create and manage hosts.
Host
A host is an instance of Cortex XSOAR that acts as a proxy between the main host and tenants. In a
multi tenant deployment, hosts are not required but they do enable you to scale your deployment
by managing a collection of tenants. Data is not stored on host machines.
Tenant
A tenant is also an instance of Cortex XSOAR that serves a customer or account and can be located
either on the main or other hosts. The tenant has customer-specific data such as indicators,
incidents, layouts, etc., which are stored in the tenant’s index of the database. Tenants share
indicators with the main host using a shared database index. The tenant can also inherit content,
such as playbooks, indicators, incident types, etc. from the main host using propagation labels.
Engines
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
66
Engines are smaller installations of Cortex XSOAR that are used to enable communication between
third-party integrations, which might sit in a different part of the network or might be blocked
through firewalls, and the main host. Engines can be installed on their own or as part of an engine
group, which distributes the load from an integration, or several integrations, between multiple
engines.
Data Segmentation
Cortex XSOAR content, including playbooks, automation scripts, and incident/indicator layouts,
among others, is managed on the main host and propagated to tenants.
Indicator Sharing
Each tenant account has a dedicated shared index in Elasticsearch, which enables tenant accounts
to share local indicators to a dedicated Elasticsearch index, from which other tenants can ingest
those indicators (as configured on the main host). Storing local indicators on a shared index
maintains data segregation between tenants, but the tenants are able to benefit from the locally
discovered threat intel.
Communication
The main host and hosts communicate with each other using TLS 2.1 over port 443 (this is the
default port, but can be configured). In addition, all hosts working with Elasticsearch communicate
with the database over port 9200.
Requests to the tenants are sent through the hosts (main or other) on port 443. The hosts forward
the requests to the tenants, which listen on ports 18501 and higher.
4.4.5 Elasticsearch/HA
Elasticsearch is a distributed, open source search and analytics engine for all types of data. It enables
processing and storing large amounts of data.
When you migrate the objects that exist in Cortex XSOAR to Elasticsearch, they are moved to a
designated index used by a specific Elasticsearch instance. Every Elasticsearch index is composed of
at least one primary shard where the data is stored. A replica shard is a copy of a primary shard.
Replicas provide redundant copies of your data to protect against hardware failure and increase
capacity to serve read requests like searching or retrieving data.
The following diagram depicts a Cortex XSOAR environment with Elasticsearch.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
67
The number of primary shards in an index is fixed at the time that an index is created, but the
number of replica shards can be changed at any time without interrupting indexing or query
operations.
In order to move to Elasticsearch, you must have Cortex XSOAR v6.0 and Elasticsearch installed. We
recommend that you install Elasticsearch on a different server than Cortex XSOAR due to the high
memory consumption for both services.
Perform the migration by running the migration tool, which is a standalone binary file. The binary
file must be run with either sudo or admin permission. The migration tool uses the demisto.conf file
to read the following information:
● Database location
●
Partitions data
The migration tool begins by reading the Cortex XSOAR database to identify existing partitions and
custom fields. It then creates the index (if it does not already exist) based on the Elasticsearch
configuration in the demisto.conf file, or based on the Elasticsearch default configurations set in the
Elasticsearch cluster setting. After Elasticsearch is successfully configured, the tool reads each
partition, from older to newer, and copies all objects to the index. Duplicate objects are overridden,
taking only the latest version of the object.
When working with Elasticsearch, Cortex XSOAR does not maintain, nor is it responsible for, the
following:
●
Redundancy
●
Backups
●
Security
●
Elasticsearch clusters
Key Idea
●
●
You must stop the Cortex XSOAR server before you run the migration tool.
This enables the tool to safely access the database and required
configurations.
Moving data from the Elasticsearch database back to the Cortex XSOAR Bolt
database is not supported.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
68
4.4.6 Docker
Cortex XSOAR primarily uses Docker to run Python scripts and integrations in a controlled
environment. The scripts and integrations run isolated from the server to prevent someone from
accidentally damaging the server. By packaging libraries and dependencies, you can prevent
unknown issues from occurring because the environment is all the same.
Palo Alto Networks maintains a large repository of Docker images. All Docker images are available
via the Docker Hub under the Demisto organization at https://hub.docker.com/u/demisto/.
The Docker image creation process is managed via the open-source project “demisto/dockerfiles.”
Before you try to create a new Docker image, check to see whether one already is available. You can
search the repository-info branch updated nightly with image metadata and os/python packages
used in the images.
Note: For security reasons, Cortex XSOAR cannot accept images that are not part of the Docker Hub
Palo Alto Networks (Demisto) organization.
If you cannot find an existing image, see the article about creating a Docker image for testing and
production use at https://xsoar.pan.dev/docs/integrations/docker#docker-image-creation.
Suppose you need to install Docker images in air-gapped environments. In that case, you can
download Docker images by appending &downloadName=dockerimages to the Cortex XSOAR
server download link you received from Cortex XSOAR, then read the required instructions in the
related reference documents in the “References” section below.
Key Idea
●
For security, images that are not part of the Demisto organization in Docker
hub cannot be accepted.
4.4.7 Reference
●
●
●
●
●
System Requirements,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/installation/sys
tem-requirements
Remote Repositories Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-multi-tenant-guide/re
mote-repositories-for-multi-tenant-deployments/remote-repositories-overview
Remote Repositories Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/remote-reposit
ory/remote-repositories-overview#idd7d0e7b2-d264-4fb6-92a9-e3cb757bcaef
Cortex XSOAR Engines Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/engines/under
stand-demisto-engines
Multi-Tenant Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-multi-tenant-guide/m
ulti-tenant-deployments/multi-tenant-overview#ida761db45-9bd8-4dc9-8209-36f0b3ada236
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
69
●
●
●
●
●
●
Elasticsearch Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/elasticsearch/o
verview
Incident Access Control Configuration,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/incid
ent-access-control-configuration
Using Docker, https://xsoar.pan.dev/docs/integrations/docker
Dockerfiles, https://github.com/demisto/dockerfiles/blob/master/README.md
Docker Images in Cortex XSOAR,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/docker/dockerimages-in-demisto#idd1e8360c-99c3-41e7-ad86-89c3ad460aa7
Docker Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/docker/dockeroverview
4.5 Describe the Incident Lifecycle within XSOAR
The Cortex XSOAR is an orchestration and automation system which is used to bring all of the
various pieces of your security apparatus together. You can define integrations with your third-party
security and incident management vendors using Cortex XSOAR. You can then trigger events from
these integrations that become incidents in Cortex XSOAR. Once the incidents are created, you can
run playbooks on these incidents to enrich them with information from other products in your
system, which helps to paint a more complete picture.
In most cases, you can use rules and automation to determine if an incident requires further
investigation or can be closed based on the findings. This enables your analysts to focus on the
minority of incidents that require further investigation.
The following diagram explains the incident lifecycle in Cortex XSOAR.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
70
The create fields phase is used to display information from third-party integrations and playbook
tasks when an incident is created or processed. The create incident types phase is used to classify
the different types of attacks with which your organization deals. The create incident layouts allow
you to customize layouts for each incident type to make sure the most relevant information is
shown for each type.
4.5.1 Reference
●
Incident Lifecycle,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-0/cortex-xsoar-admin/incidents/incid
ent-lifecycle#id7fb4dd09-6ebf-472f-a3a4-c9998c6f2224
4.6 Define the Capabilities of RBAC
4.6.1 Page Access
Cortex XSOAR uses role-based access control (RBAC) for controlling user access. RBAC helps
manage access to Cortex XSOAR components so that users, based on their roles, are granted the
minimal access required to accomplish their tasks:
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
71
Key Idea
●
To restrict access to integrations using RBAC, see Roles in Cortex XSOAR.
4.6.2 Integration Permissions
You can use Role Based Access Control (RBAC) to assign commands at the integration instance
level. If you have multiple instances of the same integration, you can assign different roles
(permission levels) for the same command in each instance.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
72
If you want to view or edit integration permissions, go to Settings > USERS AND ROLES >
Integration Permissions. You can see a list of all the enabled integrations in Cortex XSOAR. Under
each integration you can see the following:
●
Commands: A list of all commands for the integration
●
Instance: A list of all instances for the integration
●
Permitted roles: A drop-down list of roles you can assign to the command
Users that do not have command permissions cannot do the following:
●
Run the command from the CLI (!)
●
Complete pending tasks in a Work Plan that run the command
●
Edit arguments for playbook tasks that have this command
●
Select the command when editing a playbook
●
Select a script if using a reputation-command
4.6.3 Incident Tabs (Layout Specification)
It is important to build or customize the layout to ensure that you see the information that is
relevant to the incident type. For example, in a phishing incident, you would want to view email
headers, which would not be relevant for an access incident.
While some information might be relevant for multiple incident types, its location in one incident
type might require more prominence than in another incident type.
You can see which incident type uses the incident layout in the Types tab (Settings > OBJECTS
SETUP > Incidents). The incident layout name appears in the Layout column. You can edit the
layouts in the Layouts tab, which shows both out-of-the-box content pack and custom layouts.
Content Pack Incident Layouts
Out-of-the-box content pack incident layouts display a locked icon, which means you must
complete one of the following options to edit the layout:
●
Duplicate an incident layout. To add the layout to the incident type, you need to detach the
incident type and then add the layout.
●
Detach the layout. When detached, the layout does not receive content pack updates until
reattached. You do not need to edit the incident type because the layout name remains the
same. If you detach a layout, make edits, and later want to receive content pack updates for
that layout, we recommend you duplicate the incident layout before reattaching the original
to protect your changes from content pack updates.
Incident Layout Builder
You can customize the display information, including fields for existing incidents, by modifying the
sections and fields for the following views, as explained below:
●
Incident Summary
o Within the incident summary, you can see different tabs that appear for the incident
type, some of which can be customized.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
73
You can customize almost every aspect of the layout, including which tabs appear,
the order they appear, who has permissions, and what type of information appears.
You can add filters by clicking on the eye icon in each field or tab, which enables you
to add conditions that show specific fields or tabs. For example, if an analyst decides
that a Cortex XDR Malware incident is a Ransomware subtype, they may only want
fields to appear that show data about the encryption method rather than the
different information shown if the Malware subtype is adware.
o
You may also want to limit specific tabs to certain scenarios. For example, if a user clicks a phishing
link, the new tab can contain the relevant fields and action buttons for this scenario.
You can add dynamic fields to a layout, such as a graph of the number of bad indicators, their
source, and severity. You can also use queries to filter the information in the dynamic section to suit
your exact needs.
●
New/Edit Form
When creating or editing an incident you can add, edit, delete sections, fields, and filters as
required.
●
Close Form
Add, edit, or delete sections, fields, and filters when closing an incident.
●
Incident Quick View
Add, edit, and delete sections, fields, and filters in the Incident Quick view section within the
incident.
Key Idea
●
There are several Cortex XSOAR system layout sections and fields that you
cannot remove, but you can rearrange them in the layout and modify their
queries and filters.
4.6.4 Automation Permissions,
Permissions for automations in Cortex XSOAR are determined by the Run as and Role fields.
Run as determines the permissions with which the automation runs.
Role determines who the automation can be seen and executed by.
By default, most automations in Cortex XSOAR are run as the limited user. However, some
automations require higher permissions and are delivered out-of-the-box with Run as set
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
74
to DbotRole, which means the automation executes with elevated permissions. When an
automation runs with elevated permissions, its results can still be viewed by users with lower
permissions. To mitigate this, you should assign a role to the automation that is aligned with the
users to whom you want to expose the information the automation can extract.
Consider, for example, that you have an automation that searches for all incidents in the system. The
following scenarios show how the system behaves given the various configurations.
Scenario 1
Set the automation with Run as, defined as DBotRole, and do not set the Role parameter.
Anyone can run the automation, whether they are an analyst or administrator, and they have access
to all incidents that are returned.
Scenario 2
Set the Run as parameter to DBotRole, and set the Role parameter to Analyst. Any user with at least
analyst permissions will have access to execute the automation. All other users are not able to
implement the automation in playbook tasks. They cannot run the automation manually from
either the command line or in a playbook.
All users can see the results of the execution in the War Room.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
75
Scenario 3
Set the Run as parameter to Analyst and do not set a role. Everyone can run the automation, but
only incidents that are viewable by the analyst role are returned.
Scenario 4
You set the Run as as parameter to Analyst and define the Role parameter as Analyst. Only users
with at least the analyst role are able to execute the automation, and only incidents that are
viewable by the analyst role are returned.
For example, you implemented the following roles on your incidents:
●
●
●
●
Incident 1 viewable to Administrators
Incident 2 without any role assigned
Incident 3 viewable by Analysts
Incident 4 viewable by nested Analyst (custom role)
As a nested analyst, you run the automation to search for the incidents in your system.
●
●
●
In scenario 1, you will see incidents 1 through 4.
In scenario 2, you will not be able to execute the automation, but if a playbook runs the
automation, you will see incidents 1 through 4.
In scenario 3, you will be able to see incidents 2 through 4.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
76
●
In scenario 4, you will not be able to execute the automation. However, if a playbook runs the
automation, you will see incidents 2 and 4.
If you do not detach or duplicate the automation, the changes made are overwritten the next time
the content is updated. You can change the Run As parameter without having to detach or
duplicate the automation. This parameter is not overwritten.
For more information, see Role-based Permission Levels.
Key Idea
●
As content packs may use a number of these automations, and the
automations could have some dependency on each another, it is important
that you assign the Run as and Role parameters consistently to ensure that
all of the automations can run properly.
4.6.5 Incident Viewing Permission by Role
There are a number of different roles and responsibilities in any SOC team. For example, you have
specific teams to deal with specific threats, such as threat intelligence researchers, security analysts
(Tier 1), senior analysts (Tier 2), SOC leads, SOC manager, SIEM engineers, etc. After Cortex XSOAR
begins ingesting incidents, you should consider how you want to investigate the incidents being
ingested. You have various options to limit access to incidents and investigations, including:
●
Exclude access to incident actions and investigations according to roles, such as SIEM
engineers. This enables you to limit role permission levels in investigations, data, and
chats in the War Room and restrict batch table actions in the Incidents page.
●
Restrict an Investigation to only team members. For example, if an incident contains
sensitive data, and you only want specific users to investigate the incident, you can mark
the incident as restricted. Other users cannot view or access the incident. Team members
are added automatically when you send them a notification in the CLI or add them from
the gear button. You can remove the investigation’s restrictions at any time.
●
Limit Access to Investigations using RBAC.
o
Limit investigations according to specific roles. By adding a role to the
investigation, you restrict access to all roles other than those you have specifically
added. For example, after an investigation is closed, add administrators or those with
specialty roles so only they can reopen or link incidents.
The added roles have read and write permission, but all other roles do not have access
unless you have added them in the read-only field. If team members have been
added to the incident, the team members and the added roles have access to the
investigation.
You can limit the investigation by either adding a role in the Roles field to the Incident
Summary page, use the incident_set roles command, or run the command in a
playbook. If using the Roles field in the Incident Summary page, you need to add the
field when Customize Incident Layouts customizing incident layouts.
o
Give read-only access to certain roles. For example, when an incident is in triage
(phase 1), you may want all Tier 2 analysts to have read-only access, so that only Tier 1
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
77
analysts can edit the incident. When the phase changes to phase 2, Tier 1 analysts
have read-only access.
Add roles in the XSOAR Read-Only field in the Incident Summary page, use
the incident_set role command, or add the command to a playbook.
If using the XSOAR Read-Only field in the Incident Summary page, you need to add
the field when customizing incident layouts. You can manually change the XSOAR
Read-Only field or automate the process by creating a custom incident field using
a Incident Field Trigger Scripts, or by creating a script and adding a new field button.
When granting read-only access, the user can view the incident but not edit. Adding
a team member overrides the XSOAR read-only role, so if you add User A, (Tier 1) as a
team member, even if you assign Tier 1 as a read-only role, the user still has read/write
access. You need to remove the user as a Team Member.
Key Idea
●
●
●
All team members have read and write permissions. If you add team
members, but their roles have read-only permission, the user still has read
and write permission and can access the investigation.
If you add a role, but the incident has been restricted to team members, and
the user is not a team member, the user cannot access the incident
regardless of the role. For example, if you restrict the incident to User A and
User B team members who are Tier 1 analysts but then try to add Tier 2
analysts (none of whom are team members) to the list of roles, a Tier 2
analyst cannot access the incident.
If you assign a role (read and write permission) and assign the same role as
read only, the user still has read/write permission. You need to remove the
assigned role. If you restrict the incident, the read-only role does not override
the restriction. In other words, team members permission takes precedence.
4.6.6 Reference
●
●
●
●
Integration Permissions,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/users-and-role
s/integration-permissions#ida5e08d7e-348a-402b-bbfc-d051212913c0
Customize Incident Layouts,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/cust
omize-incident-view-layouts/customize-incident-layouts
Automations,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/aut
omations
Incident Access Control Configuration,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/incid
ent-access-control-configuration
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
78
4.7 Identify the Troubleshooting Tools Available to Obtain More Diagnostic Information
4.7.1 Log Bundles
The Cortex XSOAR logs provide information about events that occur in the system. These logs are a
valuable tool in troubleshooting issues that might arise in your Cortex XSOAR environment.
A log bundle is a zip file of additional logs available in the Cortex XSOAR system. These logs provide
additional information that is useful in troubleshooting issues that arise in your Cortex XSOAR
system. Send the log bundle zip file to Cortex XSOAR support to use for debugging purposes. After
you create the log bundle, the logs also will appear in /var/log/demisto/.
4.7.2 Integration Testing
Product integrations or automations are codes that allow Cortex XSOAR to communicate with other
products. These integrations can be executed through REST APIs, webhooks, and other techniques.
An integration can be unidirectional or bidirectional, with the latter allowing both products to
execute cross-console actions. Integrations enable connections with third-party tools and services
that the Cortex XSOAR platform uses to orchestrate and automate security operations center (SOC)
operations. In addition to third-party tools, you can create your own integration using the BYOI
feature.
Apply basic troubleshooting if the integration is not performing
Throughout development of integrations and scripts, your code likely will cause something to break
at some point. One of the most significant features of Cortex XSOAR is its use of machine learning to
better time these crashes so they occur on your time off.
You can check logs and War Room entries and use the Demistomock library.
Another option is to debug your integration. The Cortex XSOAR plugin for the PyCharm IDE enables
you to design and author scripts and integrations for Cortex XSOAR directly from PyCharm. The
plugin adds a sidebar with Automation and Integration Settings, just like the Settings sidebar in the
Cortex XSOAR script editor. When you write code, the plugin provides you with autocomplete of
Cortex XSOAR and Python functions and allows you to debug your code easily.
4.7.3 References
●
●
●
Create a Log Bundle,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/logs/create-a-l
og-bundle
Audit Trail,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-0/cortex-xsoar-admin/logs/audit-trail
Send the Audit Trail to an External Log Service,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/logs/send-theaudit-trail-to-an-external-log-service#id09b7780e-c88d-4ace-8079-3fe5f6603a9d
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
79
4.8 Identify Options Available for Performance Tuning
4.8.1 Ignore Output
When selected, this takes the results from the Extend context field and overwrites existing output.
4.8.2 Quiet Mode
Determine if this task operates in Quiet Mode. When in Quiet Mode, tasks do not display inputs and
outputs, nor do they extract indicators. Errors and Warnings are still documented. You can
determine to turn Quiet Mode on or off for a given task or control Quiet Mode by what is defined at
the playbook level.
4.8.3 Reference
●
Playbook Task Fields,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/playbooks/play
book-tasks/playbook-task-fields
4.9 Monitor System Health using the System Diagnostic Page
The System Diagnostics page enables you to monitor and improve system performance and
resilience. On the System Diagnostics page, you can view CPU and memory usage, the status of the
Docker service, unusually large tasks, storage issues, etc. In some cases, the issue can be corrected
within the System Diagnostics page. Audit Trails, for example, can be deleted with one click. For
issues that require more in depth troubleshooting, you can click through to a Knowledge Base
article with more information and solutions. System Diagnostics thresholds can be customized.
You can view the System Diagnostics page at Settings > About > System Diagnostics.
A daily email is sent by default to all site administrators, notifying them of possible issues. The
following server configurations enable you to disable or modify email notifications.
Key
Value
diagnostics.notification.enabled
Default is true. False disables all system diagnostics
email notifications.
diagnostics.notification.send.on.atRisk
Default is true. False disables notifications when
status is at risk.
diagnostics.notification.send.to.default.a
dmin
Default is true. False disables notifications to the
default administrator.
diagnostics.notification.send.to.roles
Default is “Administrator.” Can be empty (no roles), or
a list: “Role1, Role2, Role3.” Will notify all users in the
roles provided. If empty (no roles), the default
administrator will still receive notifications.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
80
diagnostics.notification.hour.of.the.day
Default is 12. Format is HH. The hour of the day to
send the notification email (server time).
(Multitenant) To view System Diagnostics for hosts in a multitenant environment, go to Settings >
Account Management > Hosts in the main host account. Each host has a Diagnostics page. You
can also view information about CPU, Storage, and Memory usage for each tenant account on the
host.
You can also use the getSystemDiagnostics command to create a JSON output of this data. If
you have an open support ticket related to system performance, you can attach the output of this
command to the ticket to provide Cortex XSOAR Customer Support with relevant information. Use
the associated verbose argument to return additional information, such as the specific IDs of
incidents with big context data.
4.9.1 Reference
●
System Diagnostics,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/cortex-xsoar-o
verview/system-diagnostics
4.10 Summary of Key Ideas
●
●
●
●
●
●
●
●
●
●
●
If you want to downgrade, any content that depends on the content pack including any
customizations may be deleted if it does not exist in the target content pack version
If you delete a content pack, which depends on other content packs, these content packs
may not run correctly. Also, if you roll back to an earlier version of a content pack, other
content packs might be affected. For example, if content pack A depends on layouts from
content pack B Version 2, reverting to Content Back B Version 1 could cause content pack A
to stop working.
If you roll back to an earlier version of a content pack, other content packs might be affected.
For example, if content pack A depends on layouts from content pack B Version 2, reverting
to content pack B Version 1 could cause content pack A to stop working.
Palo Alto Networks is not liable for and does not warrant or support any content pack
produced by a third-party publisher.
You can install only one content pack at a time from the Marketplace.
When a content item is duplicated, it becomes a custom content and will not receive
updates but you can view updates.
You need internet connection when using the Marketplace for tasks such as downloading
and subscribing to content packs.
When working with remote repositories and upgrading to v6.0 and above, push your
classifiers and mappers on the development environment before grading the product
environment.
Working with remote repositories is git-based. Any service that supports this protocol can be
used, for example, GitHub, GitLab, Bitbucket, etc. In addition on-premise repositories are also
supported.
If you have more than two pre-processing rules in your Local Changes queue, you must push
all of those changes to the remote repository.
You cannot share a multiple engine installation with a single engine installation.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
81
●
●
●
●
●
●
●
●
●
●
When you add an engine to a load balancing group, you cannot use that engine separately.
The engine does not appear in the engines drop-down menu when configuring an
integration instance.
For Linux machines, you need to install Docker before installing an engine. If you use the
Shell installer, Docker is automatically installed.
You must stop the Cortex XSOAR server before you run the migration tool. This enables the
tool to safely access the database and required configurations.
Moving data from the Elasticsearch database back to the Cortex XSOAR Bolt database is not
supported.
For security, images that are not part of the Demisto organization in Docker hub cannot be
accepted.
To restrict access to integrations using RBAC, see Roles in Cortex XSOAR.
As content packs may use a number of these automations, and the automations could have
some dependency on each another, it is important that you assign the Run as and Role
parameters consistently to ensure that all of the automations can run properly.
All team members have read and write permissions. If you add team members, but their
roles have read-only permission, the user still has read and write permission and can access
the investigation.
If you add a role, but the incident has been restricted to team members, and the user is not a
team member, the user cannot access the incident regardless of the role. For example, if you
restrict the incident to User A and User B team members who are Tier 1 analysts but then try
to add Tier 2 analysts (none of whom are team members) to the list of roles, a Tier 2 analyst
cannot access the incident.
If you assign a role (read and write permission) and assign the same role as read only, the
user still has read/write permission. You need to remove the assigned role. If you restrict the
incident, the read-only role does not override the restriction. In other words, team members
permission takes precedence.
4.11 Sample Questions
Q1. Which two search actions can you perform in the Marketplace? (Choose two.)
a.
b.
c.
d.
Only view installed content packs.
Install, delete, and update content.
Contribute and share content items.
Only view playbooks.
Q2. How is Cortex XSOAR content organized?
a.
b.
c.
d.
Files
Packs
Both files and packs
Sequence
Q3. What is the other name for custom content packs?
a.
b.
c.
d.
System content packs
Contributions
Partner-supported content packs
Cortex XSOAR-supported content packs
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
82
Q4. The Version history for Playbook tabs enables users to…?
a.
b.
c.
d.
Update a playbook
Access a playbook version
Restore a playbook version
Search the required playbook
Q5. What does the Cortex XSOAR require for container management?
a.
b.
c.
d.
BoltDB
Docker
Docker or Podman
Only IPv4
Q6. You can install the Cortex XSOAR Engine on which two types of machine? (Choose two.)
a.
b.
c.
d.
Windows
Mac OS
Linus
Ubuntu
Q7. What is an accurate description of an Elasticsearch? (Choose two.)
a.
b.
c.
d.
Enables storing and processing large amount of data
Manages paybooks, automation scripts, and others on the main host
Helps to migrate objects present in Cortex XSOAR to Elasticsearch
An open source, distributed search, and analytics engine for all types of data
Q8. How can you edit the locked icon of the content pack incident layout? (Choose two.)
a.
b.
c.
d.
Duplicate an incident layout.
Detach the layout.
Edit the layouts in the Layouts tab.
Edit incident type.
Q9. Who can view the results when an automation runs with elevated permissions?
a.
b.
c.
d.
All users
Users with high permissions
Users with low permissions
User to whom Cortex team assign permission
Q10. What happens when a task operates in Quiet Mode? (Choose two.)
a.
b.
c.
d.
e.
It only display inputs.
It does not display inputs and outputs.
It does not extract indicators.
It displays inputs and outputs.
It displays errors and warnings.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
83
Domain 5: UI Workflow, Dashboards, and Reports.
5.1 Identify Methods for Querying Data
5.1.1 Indicators
The indicators tab provides a summary of threat intelligence data that Palo Alto Networks has on a
particular threat indicator, including URLs, domains, IP addresses (IPv4 and IPv6), and hashes. The
threat intelligence summary data, depending on the type of indicator, can include the WildFire
verdict, detection reasons, associated metadata (including the indicator source(s)), WHOIS
information, tags, logs of DNS activity from all samples analyzed with WildFire active/passive DNS
history where autofocus detected instances of the artifact, and other related information. This can
help you assess whether a specific hash, domain, URL, or IP address is associated with suspicious
behavior and analyze the nature of a threat.
Threat Indicator Overview
The threat indicator summary provides a breakdown of the properties, behaviors, and activities
reported by various Palo Alto Networks analytics services. URL entries can include additional context
provided by analysis data derived from the improved URL analysis capabilities found in the WildFire
global cloud. This content is categorized into three categories: Summary, Evidence, and Analyst.
Summary content provides a high-level overview of the URL, including PAN-DB categorization
details, detection reasons with verdict, WHOIS information, all accompanied by a screenshot.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
84
Evidence shows details regarding why and how the verdict was reached. Analyst describes various
insights into the operational details of the web page, including network traffic and file transfers. For
all other indicators, the threat indicator summary provides a breakdown of the general properties,
behaviors, and activities reported by various Palo Alto Networks analytics services. The following list
shows some of the threat data that can populate the threat indicator overview.
●
WildFire Verdict: The verdict of the sample based on the WildFire analysis of the file or
email link.
●
Tags: Lists the tags or tag groups associated with the threat indicator.
●
Upload Source: Lists which of your connected Palo Alto Networks services or appliances
uploaded the threat indicator.
●
First/Last Seen Date: Displays when the threat indicator was first and last sent to WildFire
for analysis.
●
WHOIS: Shows general domain information.
●
PAN-DB Categorization: View URLs associated with the domain, URL, or IP address
through PAN-DB and the PAN-DB category for each URL.
●
WildFire DNS History: View a log of domain to IP address mappings based on all samples
that launched a request to connect to a domain during WildFire Analysis.
●
DNS Security Results: A list of domains that have been analyzed by DNS Security is
displayed here.
●
Passive DNS History: View a passive history of domain to IP address mappings that
contain matches to the artifact you searched for.
●
Active DNS History: View active domain to IP address mappings that contain matches to
the artifact you searched for.
Virus Total
A direct link to the Virus Total analysis of the specified file hash.
This option is only available for file hashes.
Sample and Session Details
You can pivot to a sample or session search on the specified indicator. This automatically initiates a
search based off of the initial query and can provide a wider context and additional details.
Key Idea
●
The Virus Total option is only available for file hashes.
5.1.2 Incidents
By using Cortex XSOAR, you can define integrations with your third-party security and incident
management vendors. Then you can trigger events from these integrations that become incidents
in Cortex XSOAR. Once the incidents are created, you can run playbooks on these incidents to enrich
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
85
them with information from other products in your system. Use rules and automation to determine
if an incident requires further investigation or can be closed based on the findings as this enables
your analysts to focus on the minority of incidents that require further investigation.
Planning
Before you begin configuring integrations and ingesting information from third parties, consider
the following:
PHASE
DESCRIPTION
Create fields
Used to display information from
third-party integrations and playbook
tasks when an incident is created or
processed. For more information, see
Incident Fields.
Create incident types
Classify the different types of attacks
with which your organization deals.
Create incident layouts
Customize layouts for each incident type
to make sure the most relevant
information is shown for each type. For
more
information, see Customize
Incident Layouts.
This is an iterative process. After you initially create your fields and incident types and then
implement them in your incident layouts, you can start the process of ingesting information. At that
point, you can see how accurately you mapped out your information. Make changes as you go along
and learn more about the information you are receiving. Information not mapped to fields is
available in labels, but it is much easier to work with the information when it is properly mapped to
a field and displayed in the relevant layouts.
Configure Integrations
Configure integrations with your third-party products to start fetching events. Events can be
potential phishing emails, authentication attempts, and SIEM events, among others.
Classification Mapping
Once you configure the integrations, you must determine how the events ingested from those
integrations will be classified as incidents. For example, for email integrations, you might want to
classify items based on the subject field; however, for SIEM events, you will classify by event type. In
addition, you need to map the information coming from the integrations into the fields you created
in the planning stage. For more information, see Classification and Mapping.
Pre-Processing
Pre-processing rules enable you to perform certain actions on incidents as they are ingested into
Cortex XSOAR directly from the UI. Using the rules, you can select incoming events on which to
perform actions; for example, you can link the incoming event to an existing incident, or based on
configured conditions, drop the incoming incident altogether. For more information, see Create
Pre-Process Rules for Incidents.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
86
Incident Created
Incidents of various types are created based on the definitions you provided in the Classification and
Mapping stage and the rules you created for pre-processing events. All incidents appear in the
Incidents page of the Cortex XSOAR user interface, where you can start the process of investigating.
Running Playbooks
Playbooks are triggered either when an incident is created or when you manually run the playbooks
as part of an investigation. When triggered as part of an incident that was created, the playbooks for
the type of incident that was classified will run on the incident. Alternatively, if you are manually
running a playbook, you can select whichever playbook is relevant for the investigation. For
example, playbooks can take IP address information from one integration and enrich that IP address
with information from additional integrations or sources.
Post-Processing
Once the incident is complete and you are ready to close it out, you can run various post-processing
actions on the incident. For example, you can send an email to the person who opened the incident
informing them that their incident has been resolved, or close an incident in a ticketing system.
5.1.3 Dashboards
The dashboard consists of visualized data powered by fully customizable widgets that enable you to
analyze data from inside or outside Cortex XSOAR in different formats such as graphs, pie charts, or
text from information. For more information about widgets, see Widgets Overview.
When you first install Cortex XSOAR, the following dashboard tabs are created:
●
Incidents: Information relating to incidents, such as severity type, active incidents,
unassigned incidents, and so on
●
System Health: Information relating to the Cortex XSOAR Server
●
My Dashboard: A personalized dashboard relating to your incidents, tasks, and so on
●
SLA: Information relating to your Service Level Agreement
My Dashboard Options
In every dashboard, you can set the date range from which to return data and the refresh rate. In the
DASHBOARDS tab, you can do the following:
●
Filter Data for all widgets
You can filter dashboard data either by typing the query in the query bar, or, in the
relevant widget, by clicking Filter In. When clicking Filter In, the query is added to the
query bar. To filter out, delete the query. For example, if you only want to see critical Cortex
XDR incidents, hover over the Cortex XDR incident and click Filter In in the Incident
Severity by Type widget.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
87
In the Active Incidents by Severity widget, hover over Critical and click Filter In. The dashboard
only shows active critical incidents relating to Cortex XDR.
●
After creating the filter, you can send the URL of the filtered dashboard to other users.
●
Change Color of Widgets: You can change the group color of some of the widgets. The
color changes only for that widget in the dashboard. To permanently change the color of
the widget, edit the color in the Widgets Library. For example, while in the Widgets
Library, if you change the color for Cortex XDR in the Incident Severity by Type to red, that
widget remains red the next time you add it to a dashboard. However, it does not change
for any other widget.
●
Copy the value: From the widget, selecting Copy value enables you to copy the value
used in the widget for commands, in the War Room, etc.
●
Create a Dashboard
●
Edit a Dashboard
●
Import and export a dashboard, which is useful in a test and production environment.
The dashboard is exported as a JSON file. You can make any changes you require and
then import the file.
●
Add default dashboards
In a production environment, an administrator defines the default dashboards for each
user, which is dependent on a user’s role. If a user has not modified their dashboard, these
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
88
dashboards are added automatically. Otherwise users can add these dashboards to their
existing dashboards. These default dashboards can be removed but not deleted, and can
be added again if required.
●
Share a Dashboard
●
Duplicate, delete, or remove (if shared) a dashboard.
●
Create a report
You can generate a report from the dashboard as is or add new widgets as required. You
can set the format, when to run, orientation, etc. To run the report, click Run Now. The
report is generated and also appears in the Reports tab, which can be run again. For
more information about creating reports, see Create a Report.
Key Idea
●
●
If you install a Content Pack which contains dashboards, these can be added
when creating a new dashboard. To change the order of the dashboards,
click next to the relevant dashboard, and then drag and drop the dashboard
into the required location.
If you want to see more information about the data, click the data to take
you to the relevant page. For example, in the Active Incidents by Severity
widget, to see only critical incidents, click Critical. This takes you to the
Incident page, where you can see all the active critical incidents.
5.1.4 Global Search
Use the search function to perform both simple and complex searches based on threat indicators or
identifiers. The search function has a range of features for customizing and executing searches. For
details on navigating and using the search results (including adding identifiers to your search as you
go), refer to Drill Down in Search Results.
Open the Search editor on the navigation pane and select a search type.
● Indicators—Search based on threat indicators; these include artifacts that have been
ascertained by security experts as exhibiting signs of a compromised network. Artifacts
include file hashes, domains, URLS, and IP addresses.
● Sample—Search based on samples sent to WildFire for analysis by various connected
appliances and services. WildFire receives samples from firewalls, WildFire, Traps, Traps
Android, Magnifier, Proofpoint, Prima SaaS, manual uploads, partner integrations, and other
industry sources.
● Session—Search based on the session data provided by samples during sample submission.
This allows you to search based on various context details, such as the time stamp, upload
source, application, file URL, and more. The session data displayed in the search results
include all relevant data submitted to WildFire through your organization's various product
integrations.
See the following topics for details on using the AutoFocus search:
○
○
○
○
○
Start an Indicator Search.
Start a sample or session simple mode search.
Start a sample or session advanced mode search.
Add a search condition to a remote search.
Use a saved search.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
89
5.1.5 Reference
●
●
●
●
Indicators,
https://docs.paloaltonetworks.com/autofocus/autofocus-admin/autofocus-search/drill-down-i
n-search-results/indicators
Incident Lifecycle,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/incid
ent-lifecycle
Dashboard Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/dashboards/da
shboard-overview#id8327f032-160d-430b-87c8-600e751099e5
Work with the Search,
https://docs.paloaltonetworks.com/autofocus/autofocus-admin/autofocus-search/work-with-t
he-search-editor
5.2 Summarize the Workflow Elements used during an Investigation
5.2.1 Layouts
Each out-of-the-box threat intel type comes with its own associated layout, but there might be
times where customization is needed. You can customize almost every aspect of the layout,
including which tabs appear, in which order they appear, who has permissions to view the tabs, and
which information appears and how it is displayed.
Out-of-the-box and custom report types appear in the Threat Intel Reports > Types tab. The name
of the layout for the out-of-the-box reports appears in the Threat Intel Reports > Layouts tab.
To customize the layout of an out-of-the-box report, you can do any of the following:
●
Duplicate and edit the report layout, and then edit the report type to add the new layout.
●
Detach the layout and edit it.
●
While a report layout is detached, it does not receive content pack updates. If you detach
a report type layout, make edits, and later want to receive content pack updates for that
layout, we recommend you duplicate the report layout before reattaching the original to
protect your changes from content pack updates.
●
Create a new layout, detach the report type, and then edit the report type to add the new
layout.
Create a New Report Layout
The following procedure describes how to create a new layout, but you can follow similar steps to
customize an existing layout (using the guidelines mentioned above).
Step 1 : Go to Settings > OBJECTS SETUP > Threat Intel Reports > Layouts
Step 2 : Click to add a New Layout
Step 3 : Customize the tabs
1.
2.
3.
4.
If relevant, create a new tab.
Edit a tab’s name by clicking the tab.
Click and drag a tab to reorder the tabs.
Click the cog wheel icon and then configure any of the following options:
● Rename
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
90
●
●
●
●
●
●
●
●
Duplicate
Delete
Hide Empty Fields
The setting that you configure in the layout becomes the default value seen in the
report for the specific tab, which can then be overridden. You can also set a global
default value using the UI. summary.page.hide.empty.fields server configuration,
which can also be overridden for a specific tab.
Hide Tab
Format for exporting
Build your layout based on A4 proportions to match the format used for exporting.
Selecting this option hides the tab by default, but the tab will remain available for
export.
Viewing Permissions
When clicking Viewing permissions, select which roles can view the tabs.
Display Filter
This option enables you to add or view a filter applied to the tab. If the filters apply, the
specific fields or tabs are shown in the layout. If the mandatory field is not shown in
the layout, the user is not obliged to complete it.
Step 4 : Add sections to the layout.
1.
From the Library section, drag and drop the required Cortex XSOAR Sections as follows:
SECTION
DESCRIPTION
New Section
After creating a new section, click
the Fields and Buttons tab and
drag and drop the fields as required.
General Purpose Dynamic Section
Enables you to Add a Script in the
Threat Intel Report Layout
Relationships
Enables you to manually create a
relationship between the report and
an indicator
Step 5 : Define the section properties.
You can determine how a section appears in the layout. For example, does the section include the
section header? You can also configure the fields to appear in rows or as cards. For example, if you
know that some of the field values will be very long, you are better off using rows. If you know that
the field values are short, you might want to use cards so you can fit more fields in a section.
1.
Select the section, click
and then click Edit section settings.
2.
Edit the section as required and click OK.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
91
3.
Click the save button or Save Version.
Step 6 : Remove or duplicate a section, select the section, click
and select the relevant option.
Step 7 : Add the layout to the report type.
1.
Go to Settings > OBJECTS SETUP > Threat Intel Reports > Types
2.
Select the report type and click Edit.
3.
Add the customized layout from the drop-down list in the Layout field.
Step 8 : If the layout you created was for a new report type that was based on an out-of-the-box
threat intel report type, you can contribute it to Marketplace.
1.
In the Layouts page, click the new report type you want to contribute to Marketplace.
2.
Complete the information in the Contribute form and click Contribute.
Add a Script in the Threat Intel Report Layout
You can add content to threat intel report layouts, based on an automation script. You need to add
the General Purpose Dynamic Section when editing layouts.
The General Purpose Dynamic Section allows you to configure a section in a layout tab from an
automation script. The automation can return a simple text, markdown, or an HTML, the results of
which appear in the General Purpose Dynamic Section. You can add any required information from
an automation. Before you begin, you need to create an automation script.
The following is an example of a script that can be added. This script can be used to add a button to
the layout that sets a threat intel report as published.
def publish ():
now_utc = datetime.now(timezone.utc)
object = demisto.args('object')
object_id = object.get('id')
roles = execute_command('getRoles', {})
execute_command(
'setThreatIntelReport',
{
'id': object_id,
'xsoarReadOnlyRoles': demisto.dt(
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
92
roles, 'DemistoRoles.name'
),
'reportstatus': 'Published',
'published': now_utc.isoformat(),
},
)
demisto.results('ok')
if __name__ in ('__main__', '__builtin__', 'builtins'):
publish()
Step 1 : Edit the relevant threat intel report layout.
Step 2 : Drag and drop the General purpose Dynamic Section onto the page.
Step 3 : Select the General purpose Dynamic Section, click
and then Edit section settings.
Step 4 : In the Name and Description fields, add a meaningful name and a description for the
dynamic section that explains what the script displays.
Step 5 : In the Automation script field, select from the drop-down list the script that returns data for
the dynamic section.
Step 6. Click OK.
Key Idea
● Only automations to which you have added the general-dynamic-section
tag appear in the drop down list.
5.2.2 War Room
Within Cortex XSOAR, real-time investigation is facilitated through the War Room, which is powered
by Chat Ops and helps analysts do the following:
●
Run real-time security actions through the CLI without switching consoles
●
Run security playbooks, scripts, and commands
●
Collaborate and execute remote actions across integrated products
●
Capture incident context from different sources
●
Document all actions in one source
●
Converse with others for joint investigations
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
93
Cortex XSOAR also provides machine learning insights to suggest the most effective analyses and
command-sets. Each incident has a unique War Room.
When you open the War Room, you can see a number of entries such as commands, notes,
evidence, tasks, etc., in several formats such as Markdown, HTML, and so on. When Markdown,
HTML, or geographical information is received, the content is displayed in the relevant format.
You can do the following actions for each artifact entry:
ACTION
DESCRIPTION
Edit
You can edit, format, or delete your own entries. If an entry has
been changed, a History link will appear where you can view all
changes to the entry.
Mark as Evidence
Opens the Mark as Evidence window, where you specify the
evidence details to be saved in the Evidence Board. The Evidence
Board stores key artifacts for current and future analysis. You can
add evidence in the Case Info tab, the Evidence Board, or the War
Room.
View artifact in new
tab
Opens a new tab for the artifact
Detach from task
Removes a task from the artifact
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
94
Attach to a task
Add a task to the artifact
Download artifact
Downloads an artifact according to the entry type, such txt files
for text, json for a JSON entry, etc.
Add tags
Add relevant tags to use, which help you to find relevant
information.
You can run various commands in the CLI by typing the following:
● Integration commands, automations, and built-in commands. For example, add evidence,
assign an analyst, etc.
● /: System commands/operations. For example, add notes, close an investigation, etc.
●
@: User tagging. Send notifications to administrators, teams, analysts, etc.
You can edit incidents, create a report, add child incidents, and so on, as described in Incident
Actions.
Filter Entities
You can filter entries by clicking
. You can add any filter by selecting the check box or click
to
remove that action. The filter menu contains three types of War Room entities by which you can
filter, including:
●
Actions
●
Tags
●
From
Use the And/Or toggles between the Actions, Tags, and From sections.
●
And: Use to combine two or more filters.
●
Or: When one item is found, it shows relevant entries.
You can save the filter by clicking Add. You can also retrieve Saved filters.
Key Idea
●
●
To access the War Room: If you have an Admin role, clicking Playground on
the side bar opens the Playground - War Room tab. If you have another role,
typing any command in the CLI at the bottom of the page opens this tab.
Cortex XSOAR does not index notes, chats, and pinned as evidence entries. If
you want to index these entries, see War Room Indexing.
5.2.3 Work Plan
The Work Plan is a visual representation of the running Playbook that is assigned to an incident.
Playbooks enable you to automate many of your security processes, including but not limited to
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
95
handling your investigations and managing your tickets. Work Plans enable you to monitor and
manage a playbook workflow and add new tasks to tailor the Playbook to a specific investigation.
After clicking the Follow check box, you can see the playbook executing in real time.
You can do the following in the Work Plan:
●
View inputs and outputs of a playbook.
●
View, create, and edit a playbook task for each required step.
When you create a task, add a name, automation, and description. The name and
description should be meaningful so that the task corresponds to the data that you are
collecting.
For each task you can do the following:
Designate tasks as complete either manually or by running a script.
Assign an owner for a task.
Set a due date for the task.
Add comments and completed notes as required.
●
Re-run the playbook, zoom in and out, and export to a PNG format.
The color coding and symbols in the Work Plan help you to easily troubleshoot errors or respond to
manual steps. The following table displays the color codes and their meanings.
5.2.4 Evidence Board
In the War Room, you can mark any entity as evidence by clicking the flag next to each entry. You
can view the evidence within the War Room or by opening the evidence entry from the Evidence
Board. When adding evidence, you need to add a description, which should contain enough details
that it can be referred to at a later date. Adding a tag helps you to find the evidence by searching for
the tag. You can also add an occurrence date and time.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
96
The Evidence Board stores key artifacts for current and future analysis. You can view and manage
evidence entities that were detected in the War Room and then designated as evidence.
You can also search for evidence and select the date range for when the evidence occurred.
Evidence can be viewed in Table View or Summary View. In the Table View, you can remove,
export, or show in the War Room. In the Summary View, you can remove or edit the evidence.
5.2.5 Actions Menu
In an incident, you can undertake a number of actions, including editing the incident, adding a child
incident, adding tasks and notes, and so on.
After selecting Actions, you can undertake the following actions:
ACTION
DESCRIPTION
Edit
Edit the incident as required.
Report
Create a report to capture investigation specific data and share it
with team members.
Add child incident
Adds a child incident to the incident.
Child investigations are used to compartmentalize sensitive War
Room activity. You can create child investigations to collaborate
discreetly with a select group of people on a specific topic of
investigation. Child investigations are also used in situations where
a secondary investigation is needed and its content may add too
much "noise" in the original investigation.
You can also create child investigations from the CLI using the
/investigation_child_create command.
To turn the child investigation to a discrete investigation, select the
Restricted check box.
Restrict incident
Restrict an investigation to the incident owner and team.
Close incident
Marks the incident as closed
Delete
Deletes the incident
When clicking
ACTION
you can undertake the following actions:
DESCRIPTION
Quick View
You can see a summary of the incident, timeline information, labels,
and indicators.
Incident tasks
Add tasks for users to complete as part of an investigation.
Team
Add team members to the incident.
Context Data
View context data. The context is a map (dictionary) created for each
incident and is used to store structured results from the integration
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
97
commands and automation scripts. The context keys are strings and
the values can be strings, numbers, objects, and arrays.
You can use context data to:
● Pass data between playbook tasks
● Capture the important structured data from automations
and display the data in the incident summary
You can also edit or add actions in the Case Info/Incident Info field.
Key Idea
●
Closing a parent investigation also closes all associated child investigations.
5.2.6 Reference
●
●
●
●
●
Configure Threat Intel Report Layouts,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-threat-intel-manage
ment-guide/threat-intel-reports/set-up-and-customize-threat-intel-report-templates/configu
re-threat-intel-layouts
War Room Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/incid
ent-management/war-room-overview
Work Plan,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/incid
ent-management/work-plan
Evidence Handling,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/incid
ent-management/evidence-handling
Incident Actions,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/incid
ent-management/incident-actions
5.3 Interact with Layouts for Incident Management
5.3.1 Sections
You can add dynamic sections to a layout, such as a graph of the number of bad indicators, their
source, and severity. You also can use queries to filter the information in the dynamic section to fit
your exact needs.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
98
When you start to create or edit an incident layout by using Incident Layout Builder, you can use the
Library feature to add ready-to-use Sections, Fields and Buttons, and Tabs.
5.3.2 Fields
Use Incident Fields to accept or populate incident data coming from incidents. You create fields for
information that arrives from third party integrations in which you want to insert information. The
fields are added to Incident Type layouts and mapped using the Classification and Mapping feature.
Incident Fields can be populated by the incident team members during an investigation, at the
beginning of the investigation, or prior to closing the investigation.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
99
Incident Field Types
You can add the following field types when adding a new field.
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
Attachments: Enables addition of an attachment such as .doc, malicious files, reports, and
images of an incident
Boolean : Determines whether a Cortex XSOAR field is true or false, or whether the string
representation is true or false
Date picker: Enables the user to select datetime in ISO 8601 format using the datetime
widget in XSOAR
Grid (table): Includes an interactive, editable grid as a field type for selected incident types or
all incident types
HTML: Configuring the HTML field provides the capability to insert data into the field as
HTML. However, this makes the field not searchable in incident query.
Long text: You can configure the Long text field for situations where the field is required to
store longer texts without a character limitation. However, this will make the field not
searchable in incident query.
Markdown: Markdown is a lightweight markup language that can be best suited to
represent tables, lists and formatted texts. You can configure a field as markdown to allow
using markdown to display formatted text in incident layouts. However, this will make the
field not searchable in incident query.
Multi select / Array: Includes two options a) Multi select from a pre-filled list b) An empty
array field for the user to add one or more values as a comma separated list.
Number: Can contain any number. The default number is 0, but any quantity can be used.
Role: Roles assigned to the incident determine which users (by the role to which they are
assigned) can view the incident.
Short text:
●
Treated as a single unit of text, not indexed by word. Advanced search, including
wildcards, is not supported.
●
Case sensitive by default, but can be changed to case insensitive when creating the
field.
●
While editing a short text field, pressing enter will save and close.
●
Maximum length 60,000 characters
●
Recommended use is one
●
Word entries. Examples include username and email address.
Single select: This type of parameter is used to allow selecting a single input from a list of
allowed inputs.
Tags: accepts a single tag or a comma-separated list, not case sensitive.
Timer/SLA: View how much time is left before an SLA becomes past due and configure
actions to take if the SLA does pass.
URL: Include the address of the web page
User: A user in the system; used to state a manager or fallback
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
100
Key Idea
●
Creating Incident Fields is an iterative process in which you continue to
create fields as you gain a better understanding of your needs and the
information available in the third party integrations that you use.
5.3.3 Buttons
To add custom buttons, you need to create an automation and then add the buttons to the layout
using the automation. These buttons can simplify and assist an analyst in carrying out various tasks.
For example, you can add buttons for an analyst to self-assign an incident, link or unlink an incident,
close an incident as a duplicate, generate a summary report, etc.
For optional fields (script arguments), you can define whether to show them to analysts when they
click buttons. To expose an optional field, select the Ask User check box next to the script
argument/s in the button settings page.
The script that runs when an action button is clicked accepts only mandatory arguments through
the pop up window and does not provide an option for any non-mandatory arguments to be filled
in when the button is clicked. Palo Alto Networks recommends using a wrapper script to collect and
validate arguments in scenarios where there can be a combination of mandatory and
non-mandatory arguments for a button.
In the following example, we will add a button to self assign an incident for an analyst. The
automation is included in the Case Management – Generic Content Pack.
Step 1: Drag the +New Button and drop into the relevant section.
Step 2: Click to configure.
Step 3: Enter a descriptive name for the button, select a color, and select the script that you want to
run when the button is clicked.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
101
Step 4: Click Save.
In the Incident Summary tab, when you click Assign To Me, the incident will be self-assigned.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
102
5.3.4 Reference
●
●
●
Customize Incident Layouts,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/cust
omize-incident-view-layouts/customize-incident-layouts#id497ae31a-9e74-407e-9700-46d28
be0767e
Incident Fields,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-5/cortex-xsoar-admin/incidents/incid
ent-management/incident-fields
Customize Incident Layouts,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/incidents/cust
omize-incident-view-layouts/customize-incident-layouts
5.4 Summarize Tools used for Managing Incidents
5.4.1 Bulk Incident Actions
The Threat Intel page displays a table or summary view of all indicators and enables you to perform
several indicator actions.
Indicator actions
You can perform the following actions on the Indicators page.
ACTION
DESCRIPTION
View and take action on an
indicator
Click an indicator to view and take action on the indicator. You
can view in detail the verdict, relationships, and timeline, enrich
indicators, add tags, etc.
By default, when editing the following inline values in an
incident/indicator, the changes are not saved until you confirm
your changes (clicking the check mark icon in the value field).
These include:
●
Drop-down values, such as Owner, Severity, etc.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
103
Text values, such as Asset ID. (You can only edit when you
click the pencil in the value field.)
These icons are designed to give you an additional level of
security before you make changes to the fields in
incidents/indicators.
To change this default behavior, set the inline.edit.on.blur to true
to allow changes to the inline fields without clicking the check
mark. The changes are automatically saved when clicking
anywhere on the page or when navigating to another page. You
can also click anywhere in the value field to edit text values.
●
Create a new indicator
Manually create a new indicator in the system.
Create incident
Create an incident from the selected indicators and populate
relevant incident fields with indicator data.
Edit
Edit a single indicator or select multiple indicators to perform a
bulk edit.
Delete and Exclude
Delete and exclude one or more indicators from all indicator
types or from a subset of indicator types.
If you select the Do not add option to the exclusion list check
box; the selected indicators are only deleted.
Export
Export the selected indicators to a CSV file. You can Export an
Indicator to CSV Using the UTF8-BOM Format.
Export (STIX)
Export the selected indicators to a STIX file.
Upload a STIX file
Upload a STIX file and add the indicators from the file to the
system.
5.4.2 Table View versus Summary View
Incident Management Dashboard
The Incidents Management Dashboard provides a graphical summary of incidents in your
environment, with incidents prioritized and listed by severity, assignee, incident age, and affected
hosts.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
104
The Incidents page displays all incidents in the Cortex XDR management console to help you
prioritize, track, triage, investigate, and take remedial action.
5.4.3 Table Settings
Most pages in Cortex XDR present data in table format and provide controls to help you manage
and filter the results. If additional views or actions are available for a specific value, you can pivot
(right-click) from the value in the table. For example, you can view the incident details or pivot to the
Causality View for an alert or to the results for a query.
On most pages, you can also refresh (
) the content on the page.
To manage tables in the app:
Filter Page Results
To reduce the number of results, you can filter by any heading and value. When you apply a filter,
Cortex XDR displays the filter criteria above the results table. You can also filter individual columns
for specific values using the icon to the right of the column heading.
Some fields also support additional operators such as =, !=, Contains, not Contains, *, !*.
There are three ways you can filter results:
●
●
●
By column, using the filter next to a field heading
By building a filter query for one or more fields using the filter builder
By pivoting from the contents of a cell (show or hide rows containing)
Filters are persistent. When you navigate away from the page and return, any filter you added
remains active.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
105
Export Results to File
If needed, you can export the page results for most pages in Cortex XDR to a tab separated values
(TSV) file.
Save and Share Filters
You can save and share filters across your organization.
Show or Hide Results
As an alternative to building a filter query from scratch or using the column filters, you can pivot
from rows and specific values to define the match criteria to fine tune the results in the table. You
can also pivot on empty values to show only results with empty values or only results that do not
have empty values in the column from which you pivot.
The show or hide action is a temporary means of filtering the results: If you navigate away from the
page and later return, any results you previously hid will appear again.
This option is available for fields which have a finite list of options.
Manage Columns and Rows
From Cortex XDR pages, you can manage how you want to view the results table and what
information you want the Cortex XDR app to display. This includes:
●
●
●
Adjust the row height and column width.
Add or Remove fields in the table.
Configure the order of the columns.
Any adjustments you make to the columns or rows persist when you navigate away from and later
return to the page.
Display Quick Actions
From the Cortex XDR tables, you can quickly initiate actions using icons available in the table rows.
Depending on the table, the icons provide a quick alternative to the corresponding right-click pivot
menus. You can:
●
●
Navigate to a Cortex XDR table throughout the Cortex XDR app
Hover over a table row to display the available actions
Key Idea
●
CMD fields are limited to 128 characters. If you pivot on a CMD field with a
truncated value, the app shows or hides all results that match the first 128
characters.
●
Field names that are locked (
) cannot be moved.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
106
5.4.4 Reference
●
●
Threat Intel Page,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/understand-indicators/indicators-page
Manage Tables,
https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/get-started-with-c
ortex-xdr-pro/use-cortex-xdr/manage-tables
5.5 Identify the Capabilities of Existing Dashboards and Reports
Dashboards
The dashboard consists of visualized data powered by fully customizable widgets, which enables
you to analyze data from inside or outside Cortex XSOAR in different formats such as graphs, pie
charts, or text from information. For more information about widgets, see Widgets Overview.
When you first install Cortex XSOAR, the following dashboard tabs are created:
●
Incidents: Information relating to incidents, such as severity type, active incidents,
unassigned incidents, and so on
●
System Health: Information relating to the Cortex XSOAR Server
●
My Dashboard: A personalized dashboard relating to your incidents, tasks, and so on
●
SLA: Information relating to your Service Level Agreement
Dashboard Options
In every dashboard, you can set the date range from which to return data and the refresh rate. In
the DASHBOARDS tab, you can do the following:
●
Filter Data for all widgets
You can filter dashboard data by either typing the query into the query bar, or in the relevant
widget by clicking Filter In. When clicking Filter In, the query is added to the query bar. To
filter out, delete the query. For example, if you only want to see critical Cortex XDR incidents,
hover over the Cortex XDR incident in the Incident Severity by Type widget and click Filter
In.
In the Active Incidents by Severity widget, hover over Critical and click Filter In. The dashboard
only shows active critical incidents relating to Cortex XDR.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
107
To remove the filter, delete the query.
After you have created the filter, you can send the URL of the filtered dashboard to other users.
●
Change Color of Widgets: You can change the group color in some of the widgets. The color
changes only for that particular widget in the dashboard. To change the color of the widget
permanently, edit the color in the Widgets Library. For example, if you change the color for
Cortex XDR in the Incident Severity by Type to red within the Widgets Library, the next time
you add it to a dashboard, the color will remain red for that widget only. It does not change
for any other widget.
●
Copy the value: From the widget, you can select Copy value, which enables you to copy the
value used in the widget for commands, in the War Room, etc.
●
Create a Dashboard
●
Edit a Dashboard
●
Import and export a dashboard, which is useful in a test and production environment.
The dashboard is exported as a JSON file. You can make any changes you require and then
import the file.
●
Add default dashboards
In a production environment, an administrator defines the default dashboards for each user,
which is dependent on a user’s role. If a user has not modified their dashboard, these
dashboards are added automatically; otherwise, users can add these dashboards to their
existing dashboards. These default dashboards can be removed but not deleted, and can be
added again if required.
●
Share a Dashboard
●
Duplicate, delete or remove (if shared) a dashboard.
●
Create a report
You can generate a report from the dashboard as is, or add new widgets as required. You can
set the format, when to run, orientation, etc. To run the report, click Run Now. The Report is
generated and it also appears in the Reports tab, which can be run again. For more
information about creating reports, see Create a Report.
●
Reports
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
108
Reports contain statistical data in the form of widgets, which enable you to analyze data
from inside or outside Cortex XSOAR in different formats such as graphs, pie charts, or text
from information.
After generating a report, it also appears in the Reports tab, so you can use the report again.
You can then do the following:
●
Create a custom report
When creating a report, what you see is what you get; how you configure the report is how it
generates. You can add widgets to a report, change the format, paper size, insert page
breaks (by adding the Page Break widget), etc. If you have a table widget that contains
many rows, you can select the number of rows on each page or print the whole table (in the
table widget, right click and select Force Print full Chart).
●
You can add your own logo, by going to Settings > Troubleshooting and uploading your
logo in the Full-size logo field.
Reports are generated in PDF, Word, and CSV formats.
Create a report from a dashboard
You can create a report from the dashboard as is or add new widgets as required. These
widgets provide the same functionality as custom reports, such as format, when to run,
orientation, etc. To create a report from the dashboard, click Create report.
Schedule a report
You can schedule a report to run at specific times, or you can run the report immediately.
You can also send to the report specific recipients or restrict it according to roles.
●
Generate an out-of-the-box report
Cortex XSOAR comes with out-of-the-box reports, such as critical and High incidents, Daily
incidents, last seven days incidents, and so on. You can change the time range for the
incidents, the scheduled time, and who can receive the report. If you want to make more
comprehensive changes to these types of out-of-the-box reports, copy or download (and
upload) the report.
o
Edit a report
o
Change the Report Logo
o
Configure the Time Zone and Format in a Report
o
Schedule a report from an incident
This process captures investigation-specific data and shares it with team members. You can
customize how the information is displayed for existing incidents.
If you encounter problems with reports, see Troubleshoot Reports.
Key Idea
●
Information may be provided in the form of custom reports, reports
generated from Dashboards, or even from out-of-the-box reports.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
109
5.5.1 References
●
●
Dashboard Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/dashboards/da
shboard-overview#id8327f032-160d-430b-87c8-600e751099e5
Reports Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/reports/reportoverview
5.6 Summarize what Information can be Created, Edited, or Shared within Dashboards and
Reports
You can create and customize reports in the REPORT tab. You can add widgets, schedule times,
incident time range, add recipients, change the format, size, and so on. Reports support PDF, CSV,
and Word formats.
Step 1 : Select Dashboards & Reports > REPORTS > New Report.
Step 2 : In the Widgets Library, add the widgets as required and as described in Add a Widget to a
Report.
Step 3 : From the Date Range drop-down list, select the date range from which to generate the
report.
Widgets can have their own date range, which can be different from the report’s date range.
Step 4 : To schedule a report, click Disabled.
Step 5 : To change the number of recipients or their details, click the number of recipients in the
Recipients field.
Step 6 : To change the format, orientation, or paper size, select the options as required.
Palo Alto Networks recommends that users select the landscape orientation to ensure that all
information displays in the report.
Step 8 : Before generating the report, click Preview to see a preview of the report. You can change
the size, arrange the widgets, insert a page break (using the Page Break Widget), etc.
Step 9 : Click Save or Save Version.
Save Version enables you to view a history of the changes made to your report. You can
revert to previous reports.
Step 10 : In the Reports tab, edit the Date Range of the incidents if required, and click Run Now to
generate the report immediately. The Report then downloads. Ensure that you enable
pop-ups in your browser.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
110
5.6.1 Reference
●
Create a Report,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/reports/createa-report
5.7 Summarize the Capabilities of the Widget Builder
In the Widgets Library, creating a widget through the widget builder allows you to define and
configure data and preview how that widget appears. The widget builder also allows you to create
complex widgets, which eliminates the need to write scripts or upload JSON files (although you
have the option to do this). These complex widgets have the same capabilities as if you were
creating a script-based widget.
You can create the following types of widgets through the widget builder:
●
Incidents: Widgets relating to incidents, such as active incidents by type, incidents by phase,
late incidents, etc.
●
Indicators: Widgets relating to indicators, such as indicators by type, indicators activity, bad
indicators, etc.
●
Script: Automation driven widgets. Although you can create complex widgets using the
widget builder, you can also create dynamic widgets using automation scripts, such as
calculating the percentage of incidents that DBot closed. The automation script can also pull
information from the Cortex XSOAR API.
In the widget builder, although you cannot manipulate the data (no data appears in the
operations tab) you can define the arguments for the script and change the color, layout,
legends, etc.
For automation script examples, see Create a Custom Widget Using an Automation Script.
●
War Room Entries: Widgets relating to the number of War Room entries, including number
of entries according to owner, etc.
●
SOAR Metrics: Widgets relating to automations, playbooks, integrations, such as
troubleshooting, how long it runs, number of runs for API, errors, etc.
●
Threat Intel Reports: Widgets relating to threat intel reports that have been created, such as
reports by type, status, etc.
●
Upload: You can upload a JSON file to create a static widget, which displays relatively
straightforward information such as grouping incidents severity by type, active incidents by
type, and so on.
Key Idea
●
Before creating a script based widget, you need to create a script in the
Automation page and then select the script in the widget builder. The script
must have the widget tag assigned, otherwise it does not appear when
selecting the script in the widget builder.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
111
5.7.1 Reference
●
Widget Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/widgets/widge
t-overview#id1a61212d-6957-48dc-aaf8-d563fd709ead
5.8 Summary of Key Ideas
● If you install a Content Pack which contain dashboards, these can be added when creating a
●
●
●
●
●
●
●
●
●
●
●
new dashboard. To change the order of the dashboards, click next to the relevant dashboard,
and then drag and drop the dashboard into the required location.
If you want to see more information about the data, click the data to take you to the relevant
page. For example, in the Active Incidents by Severity widget, to see only critical incidents,
click Critical. This takes you to the Incident page, where you can see all the active critical
incidents
Only automations to which you have added the general-dynamic-section tag appear in the
drop down list.
To access the War Room: If you have an Admin role, clicking Playground on the side bar
opens the Playground - War Room tab. If you have another role, typing any command in the
CLI at the bottom of the page opens this tab.
Cortex XSOAR does not index notes, chats, and pinned as evidence entries. If you want to
index these entries, see War Room Indexing.
Closing a parent investigation also closes all associated child investigations.
Creating Incident Fields is an iterative process in which you continue to create fields as you
gain a better understanding of your needs and the information available in the third party
integrations that you use.
CMD fields are limited to 128 characters. If you pivot on a CMD field with a truncated value,
the app shows or hides all results that match the first 128 characters.
Field names that are locked (
) cannot be moved.
If you install a Content Pack which contain dashboards, these can be added when creating a
new dashboard. To change the order of the dashboards, click next to the relevant dashboard,
and then drag and drop the dashboard into the required location.
If you want to see more information about the data, click the data to take you to the relevant
page. For example, in the Active Incidents by Severity widget, to see only critical incidents,
click Critical. This takes you to the Incident page, where you can see all the active critical
incidents.
Before creating a script based widget, you need to create a script in the Automation page
and then select the script in the widget builder. The script must have the widget tag
assigned, otherwise it does not appear when selecting the script in the widget builder.
5.9 Sample Questions
Q1. Which statement is true about incidents?
a. Using Cortex you can define integration with third party security and incident management
vendors
b. You cannot run playbooks after incident creation
c. Using Cortex XSOAR you can determine the investigation of incidents
d. You cannot trigger events after integration
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
112
Q2. What option can be selected for “Virus Total?”
e.
f.
g.
h.
Direct link
Total analysis
File hash
All the above
Q3. What is the primary use of the indicator?
a.
b.
c.
d.
Provides data URLs, domains, IP addresses and hashes
Provides WildFire verdict and detection reasons
It provides summary of threat intelligence
Does not provide a Paloalto networks analytics services
Q4. What are the essential tabs used by dashboards?
a.
b.
c.
d.
My dashboard
SLA
System Health
Indicators
Q5. Which option provides War Room and Workplan?
a.
b.
c.
d.
Filter entities
Playbooks
Market place
Incidents
Q6. Why are fields used?(Choose three)
a.
b.
c.
d.
e.
To accept or populate incident data coming from an incident
To add incident type layouts and map using the mapping feature
To help incident team members during an investigation
To restore long text field
To collect information deriving from third-party integration
Q7. What type of arguments does the script accept when an action button is clicked?
a.
b.
c.
d.
Script arguments
Non-mandatory arguments
Combination of mandatory and non-mandatory arguments
Mandatory arguments
Q8. What is meant by “Table settings?”
a. Ability to sort columns
b. Ability to navigate page to page
c. Ability to adjust the number of rows
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
113
d. Represents complex table format in Cortex XSOAR
Q9. What can existing dashboards and reports do?
a.
b.
c.
d.
Schedule reports for email delivery
Report a pulse on your network
View reports
Delete default dashboards
Q10. Which two requirements can be added to reports and dashboards? (Choose two.)
a.
b.
c.
d.
Schedule time
Incident time range
Create, edit, or share
Change the format or size
Q11. What type of widgets can you create using Widget builder?
a.
b.
c.
d.
Widget library
Incident table
Operation
Location
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
114
Domain 6: Threat Intel Management
6.1 Identify the Parameters Available for Configuring Indicator Objects
6.1.1 Layouts and Types
1.
2.
3.
4.
5.
6.
7.
8.
9.
Go to Settings > Advanced > Incident Types
Create an Incident Type for the self-service read-only user. Be sure to configure the playbook
to run automatically.
Select the Incident Type and click Edit Layouts.
Create a new incident tab dedicated to self-service read-only users.
Hover over the tab you want the self-service read-only user to view and click the gear icon.
Click Viewing Permissions.
In the Viewing Permissions window, select the Permit users with no roles to view this tab
option.
Customize this incident tab to only include widgets with data read-only users can access.
Such information can include Case Details, Timeline Information, Attachments, and War
Room entries.
Test and validate this incident tab layout as a self-service read-only user to ensure it displays
correctly and without an insufficient permission error message.
6.1.2 Fields
Synopsis
fields [-] <field_1> [as <name1>], <field_2> [as <name2>], ...
Description
The field stage identifies which fields are returned in the result set. If this stage is used, then
subsequent stages can operate only on the fields identified by this stage.
Use a wildcard (*) to include all fields that match the pattern. Use a '-' to exclude a field from the
result set.
Use the “as” clause to set an alias for a field. If you use the as clause, then subsequent stages must
use that alias to refer to the field.
Examples
Return the action_country field from all xdr_data records where the action_country field is both not
null and not "-". Also include all fields with names that match event_* except for event_type
dataset = xdr_data
| fields action_country as ac
| fields event_*
| fields - event_type
| filter ac != null and ac != "-"
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
115
6.1.3 Reputation Scripts and Command
Reputation Script
The output of the reputation script is a verdict score, which is used as the basis for the indicator
verdict. Reputation scripts must be tagged “reputation” in order to appear in the drop-down for the
indicator type.
Reputation scripts are user-created scripts that either:
Return only the verdict as a number. The number will override the verdict returned from the
reputation command. The reliability of the score from a reputation script is A++ – Reputation script
by default and controlled by the enrichment.reputationScript.reliability server configuration.
Return entry with entry context. The entry context must have DbotScore as with reputation
commands. The entry context will be mapped to the custom fields of the indicator with the same
reliability as if it came from a reputation command. The default is A+ – third party enrichment, but
the entry context can be controlled per vendor by the integrations.enrichment.reliability.%s server
configuration.
The results of reputation scripts do not print to the War Room in the extraction flow.
Reputation Command
The reputation command calculates the reputation of indicators of this type. The verdict
(reputation) is only associated with the specific indicator on which it is run (not the indicator type).
The command returns the reputation of the indicator as an entry with entry context and in some
cases also returns context values that can be mapped to the custom fields of the indicator. The
results of the reputation command do not print to the War Room in the auto-extract flow.
6.1.4 Expiration
Indicators can have the Expiration Status field set to Active or Expired, which is determined by the
Expiration field. When indicators expire, they still exist in Cortex XSOAR, meaning they are still
displayed and you can still search for them. A job that runs every hour checks for newly expired
indicators and updates the Expiration Status field.
When indicators expire, the expiration Status and expiration fields are updated. You can use an
indicator field trigger script to take actions based on indicator expiration.
You can set the default expiration method for indicators to either never expire, or expire after a
specific period of time. The default expiration method is set by the indicator type. For more
information, see Indicator Type Profile.
This is the hierarchy by which indicators are expired:
Manual: A user manually expires the indicator or sets it to never expire. This method overrides all
others.
Automation script : Use the expireIndicators command to change the expiration status to Expired
for one or more indicators. This script accepts a comma-separated list of indicator values and
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
116
supports multiple indicator types. For example, an IP address, domain, and file hash:
!expireIndicators value=1.1.1.1,safeurl.com,45356A9DB614ED7161A3B9192E2F318D0AB5AD10
(Automation scripts sit in the same indicator expiration hierarchy as manual.)
Use the !setIndicators command to reset the indicator's expiration value. The value can also be set to
Never so that the indicators never expire. For example, !setIndicators indicatorsValues=watson.com
expiration=Never
Feed integration : The expiration method is configured for an integration instance, which overrides
the method defined for the indicator type.
Indicator type : The expiration method (interval or never) is defined according to indicator type,
which applies to all indicators of this type. This is the default expiration method for an indicator.
6.1.5 Reference
●
●
●
●
●
Create the Read-only Incident Type and Layout,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-2/cortex-xsoar-admin/users-and-role
s/self-service-read-only-users/create-the-read-only-incident-type-and-layout
Fields,
https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-xql-language-reference/stage
s-commands-reference/stages-commands-reference-fields
Indicator Type Profile,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/understand-indicators/indicator-types/indicator-type-profile
Indicator Expiration,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/understand-indicators/indicator-expiration
6.2 Generate Threat Intel Reports
You can create a threat intel report by choosing a type of report and defining other basic report
information. Before you create a report, make sure you set up threat intel report types first to ensure
that your type is defined correctly. The creation process generates a blank report based on the type
you choose. Once created, you will need to edit the report to populate it with relevant content
before you Export or Share a Threat Intel Report.
The core of the report is the Report Body, which is used to enter freeform text. After report creation,
you can edit any predefined template text in this section and replace it with your own content.
Using the Markdown Editor, you can apply rich formatting options to the body text, including text
sizing, coloring, formatting, pictures/icons, and section headers.
Step 1: Go to Threat Intel Reports.
Step 2: Create a New Threat Intel Report from the button at the top right.
Step 3: In the Report Details section, enter a Name and Type and configure any other relevant fields.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
117
Step 4: In the Permissions section, assign Roles that you want to grant read/write access to the
report. If you don’t assign any roles to a report, all roles will have read/write access for the
report.
Step 5: Create the report.
The report is displayed.
Step 6: From the Summary tab, you can edit report fields as needed and add any information
pertaining to the specific report.
Key Idea
●
If you don’t assign any roles to a report, all roles will have read/write access
for the report.
6.2.1 Reference
●
Create a Threat Intel Report,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-threat-intel-manage
ment-guide/threat-intel-reports/create-a-threat-intel-report#id6aa00977-833b-44fd-bb0c-c0
474ea55f3c
6.3 Describe the Features of the Threat Intel Page
6.3.1 Unit 42 Intel Feature
Cortex XSOAR Threat Intel includes access to the Unit 42 Intel service, enabling you to identify
threats in your network and discover and contextualize trends. Unit 42 Intel provides data from
WildFire (Palo Alto Networks’ cloud based malware sandbox), the PAN-DB URL Filtering database,
Palo Alto Networks’ Unit 42 threat intelligence team, and from third-party feeds (including both
closed and open-source intelligence). Unit 42 Intel data is continually updated to include the most
recent threat samples analyzed by Palo Alto Networks, enabling you to keep up with threat trends
and take a proactive approach to securing your network.
Unit 42 Intel data is cloud based and remotely maintained, so you can view data from Unit 42 Intel
and add only the information you need to your Cortex XSOAR threat intel library. When you search
for an IP address, domain, URL, or file in the Threat Intel page, you can view the indicator in Cortex
XSOAR as well as the additional information provided by Unit 42 Intel. When an indicator does not
yet exist in Cortex XSOAR but does exist in Unit 42 Intel, you are able to add the indicator into the
Cortex XSOAR threat intel library. You have the option to add the indicator and enrich it with your
existing integrations or add the indicator without enrichment. When the indicator already exists in
Cortex XSOAR but there is additional information available from Unit 42 Intel, you can update your
indicator with the most recent data from Unit 42 Intel.
For IP addresses, domains, URLs, and files, the following information is available:
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
118
INDICATOR TYPE
IP Address
URL
DOMAIN
FILE
LAYOUT SECTION
●
●
●
●
References and Source References
Relationships
PAN-DB Categorization
Passive DNS
●
●
●
●
●
Verdict
Source
Relationships
PAN-DB Categorization
WHOIS
●
●
●
●
●
●
Verdict
Source
Relationships
PAN-DB Categorization
Passive DNS
WHOIS
●
●
●
●
●
●
Verdict
Source
Relationships
Summary
WildFire Analysis
Related Sessions & Submissions
Sample Analysis
With respect to files, Unit 42 Intel also provides sample analysis that helps you conduct in-depth
investigations, find links between attacks, and analyze threat patterns. If the file indicator is in the
Unit 42 Intel service, you have access to a full report on activities, properties, and behaviors
associated with the file. In addition, you can see how many other malicious, suspicious, or unknown
file samples are included the same activities, properties, and behaviors, and also build queries to
find related samples.
Sessions & Submissions
Cortex XSOAR customers can use their Sessions & Submissions data for investigation and analysis in
Cortex XSOAR. Sessions & Submissions data is available for customers with a TIM license and one or
more of the following products:
Firewall – Samples that a Palo Alto Networks firewall forwarded to WildFire
WF Appliance – Samples that a WildFire appliance submitted to the WildFire public cloud
Cortex XDR – Samples submitted through Cortex XDR
Prisma SaaS – Samples submitted through Prisma SaaS
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
119
Prisma Access – Samples submitted through Prisma Access
While the Sample Analysis tab provides information on what a file did, the Sessions & Subscriptions
tab provides in-depth information on communication between devices. Consider, as an example,
that you have a file indicator that has been determined to be malicious, and you have a Palo Alto
Networks firewall and Cortex XDR. In the Sessions and Submissions tab, you can see where this
malicious file originated and where it has gone in your network by viewing the firewall sessions that
this file passed through. You can see which XDR agents in your system reported the file, which tells
you which machines might be infected. You can block the external IP address with your firewall,
and, if needed, isolate the affected machines to contain the attack. If the source is internal, you can
investigate that endpoint.
Relationships
The Threat Intel Management system in Cortex XSOAR includes a feed that brings in a collection of
threat intel objects as indicators. These indicators are stored in the Cortex XSOAR threat intel library
and include Malware, Attack Patterns, Campaigns, and Threat Actors.
When you add or update an indicator from Unit 42 Intel, a relationship is formed in the database
between the relevant threat intel object and the new, or updated, indicator.
Unit 42 Intel is available from Cortex XSOAR 6.5 for customers with a TIM license. When upgrading
from an earlier Cortex XSOAR version, the TIM license must also be updated. Contact Cortex XSOAR
Customer Support to receive the updated license file.
License Requirements
Unit 42 Intel includes indicator relationship data provided as part of the Unit 42 Intel Objects Feed.
The feed integration instance is automatically configured for new Cortex XSOAR v6.5 or later
installations with a TIM license. When upgrading from an earlier version to Cortex XSOAR v6.5 or
later or adding a TIM license to an existing Cortex XSOAR v6.6 deployment, the TIM license must be
updated and the feed integration must be installed and enabled.
●
If you have an existing TIM license and are upgrading from Cortex v6.2 or earlier to Cortex
XSOAR v6.6:
Contact Cortex XSOAR Customer support to receive the updated TIM license file. Confirm the Unit
42 Intel Objects Feed is installed and enabled.
●
If you have an existing Cortex XSOAR license for v6.6 (without TIM) and are adding a TIM
license:
Confirm the Unit 42 Intel Objects Feed is installed and enabled.
Multitenant Deployments
Tenants accounts have access to Unit 42 Intel, with the following limitations:
●
On the Sample Analysis page, only Public Samples are available. My Samples data is not
available for multitenant deployments.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
120
●
Sessions & Submissions data is not available for multitenant deployments.
●
For tenant accounts, the API key must be manually entered for the Unit 42 Intel Objects
Feed integration and the Palo Alto Networks WildFire Reports integration. Enter the API key
in the instance configuration.
Key Idea
●
Unit 42 Intel is available from Cortex XSOAR v6.5, for customers with a TIM
license. When upgrading from an earlier Cortex XSOAR version, the TIM
license must be updated. Contact Cortex XSOAR Customer Support to
receive the updated license file.
6.3.2 XSOAR Indicators
Indicators are artifacts associated with incidents and are an essential part of the incident
management and remediation process. They help correlate incidents, create hunting operations,
and enable you to easily analyze incidents and reduce Mean Time to Response (MTTR).
Detect and ingest indicators
There are several methods by which indicators are detected and ingested in Cortex XSOAR.
Integration
●
Feed: Integrations that fetch indicators from a feed – for example TAXII, AutoFocus, Office
365, and so on.
●
Enrichment integrations: Enhance the indicator, giving it more context and information – for
example, AutoFocus, VirusTotal, Ipinfo, and so on.
Indicator Extraction
Indicators are extracted from selected incidents that flow into Cortex XSOAR – for example, from a
SIEM integration.
Manual
●
Command line
●
Mark: User marks a piece of data as an indicator.
●
STIX file: Manually upload a STIX file on the Indicators page.
6.3.3 Export/Import Capabilities
You can import and export rules from each rule management page on the ESM Console. This
enables you to:
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
121
●
Back up user-defined rules before migrating or upgrading to a new version of the ESM
Console.
●
Back up user-defined rules before deploying a policy to multiple independent ESM Consoles.
●
Import user-defined rules from another ESM Console (running the same version).
●
Update your default security policy with the latest recommendations and best practices from
Palo Alto Networks.
The ESM Console supports the ability to import both user-defined rules and default security rules.
When you import a policy file that contains multiple types of rules, the ESM Console automatically
determines the rule type and distributes the rules to their respective rule management pages.
When you export a policy or set of rules, you can only export user-defined rules of the same type.
This is because you must select the rules from a single rule management page when you perform
the export. When you export rules, the ESM Console saves them to an XML file in the location of your
choice.
When you import user-defined rules, the ESM Console appends the rules to the existing policy and
assigns each rule a unique ID number. When you install a content update to import the latest
default security rules, the ESM Console overwrites the existing rules with the updated policy. When
available, you can download the latest default security policy from the Dynamic Updates section of
the Support portal.
6.3.4 References
●
●
Unit 42 Intel Overview,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-threat-intel-manage
ment-guide/unit42-intel/unit42-intel-overview
Indicator Detection and Ingestion,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/understand-indicators
6.4 Configure Threat Intel Feed Integrations
The Cortex XSOAR Threat Intel Management guide provides you with the ability to unify the core
components of threat intel, including threat intel aggregation, scoring, and haring.
6.4.1 Reference
●
Cortex XSOAR Threat Intel Management Guide,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-threat-intel-manage
ment-guide
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
122
6.5 Identify the Options Available to Auto Extract
6.5.1 Exclusion List
The exclusion list prevents indicators from being extracted and created in the system. For example,
to prevent google.com from being flagged as a malicious indicator, add it to the exclusion list.
When millions of indicators are ingested and processed daily, two practices are essential:
●
●
Control whether they are active or expired.
Define how and when indicators are expired.
The indicator field Expiration Status displays the indicator status, either Active or Expired. The
indicator field Expiration displays when that indicator expired and by which method.
Indicator expiration is applied at the indicator type level. Indicators assigned to a specific indicator
type inherit the indicator type’s expiration method.
Indicators added to the exclusion list are disregarded by the system and are not created or involved
in automated flows such as indicator extraction. You can still manually enrich IP addresses and URLs
that are on the exclusion list, but the results are not posted to the War Room.
There are several methods by which to add indicators to the exclusion list.
Delete and exclude indicators
You can select one or more indicators from the Indicators table and click the Delete and Exclude
button. The indicators are deleted from the Indicators table and added to the exclusion list. You can
associate these indicators with one or more indicator types.
If you delete the indicator it is removed from Cortex XSOAR. This option should be used mainly for
correcting errors in ingestion and not as part of your regular work flow.
Manually add indicators to the exclusion list
From the Exclusion List page, you can manually add a single indicator or define indicators using a
regular expression (regex) or CIDR.
Regex
A regular expression enables you to identify a sequence of characters in an unknown string. The
following example would identify www.demisto.com:
[A-Za-z0-9!@#$%\ .&]*demisto[A-Za-z0-9!@#$%\ .&]*.
CIDR
Classless inter-domain routing (CIDR) enables you to define a range of IP addresses. For example,
the IPv4 block 192.168.100.0/22 represents the 1024 IPv4 addresses from 192.168.100.0 to
192.168.103.255.
Exclusion List examples:
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
123
EXCLUSIONS
DESCRIPTION
SETTINGS
URLs, domains,
and subdomains
Excludes the top level
domain (TLD), its
subdomains, and URLs (http
or https) on the top level
domain.
Value: The top-level domain (TLD).
Example:example.com
Check Use Regex
Do not select any indicator types.
Subdomain (and
URLs) specifically
Excludes the given
subdomain and its URLs, but
the TLD is still extracted.
Value: The subdomain.
Example:
examplesub.example.com
Check Use Regex
Do not select any indicator types.
Specific domain
only
Specifically excludes the TLD.
Subdomains and URLs are
still extracted.
Value: The domain.
Example: example.com
Do NOT select Use Regex
Select indicator type: Domain
URL with
wildcards
Excludes any indicators of
type URL matching the
regex. Indicators
example.com and
examplesub.example.com of
type Domain would still be
extracted. Start the regex
with
https?:// to exclude both
HTTP and HTTPS URLs.
Value: The URL with wildcard
added at the end.
Example:
http://examplesub.example.com/*
Check Use Regex
Select indicator type:
URL.
Specific URL
Excludes the given URL, but
the TLD and subdomains are
still extracted.
Value: The URL.
Example:
http://examplesub.example.com/m
yexample
Do NOT select Use Regex
Select indicator type: URL
URLs, domain, and
subdomains,
case-insensitive,
anchored to start
Excludes domain
example.com, its
subdomains, and its URLs.
Case-insensitive. Anchors
regex match to the start of
the indicator value, so
indicators that contain but
do not start with a match
(e.g.,
Value example:
(?i)^(https?://)?(([a-zA-Z0-9\-]+\ .)+)?
example\ .com
Check Use Regex
Select indicator types: URL,
Domain.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
124
example.net?param=exampl
e.com) are not excluded.
6.5.2 Playbook Auto Extract
When using indicator extraction rules, indicators are extracted from tasks in playbooks.
The default indicator extraction value depends on the playbook task. For example, the indicator
extraction mode is set to none in the Enrich offending user account task (from the Impossible
Traveler playbook). In the Extract the email address of the reporting user task (from the Phishing
Generic V3 playbook), indicator extract is set to system default.
You can use the following commands in a task:
●
extractIndicators
●
Reputation commands, such as !ip, !file, etc.
●
enrichIndicators
For more information, see Run Indicator Extraction in the CLI.
Step 1 : If a content pack installed playbook, click either Duplicate Playbook or Detach Playbook.
Step 2 : Select the playbook you want to extra indicators, and click Edit.
Step 3 : In the playbook, click a task to extract indicators.
Step 4 : Click the Advanced tab.
Step 5 : In the indicator extraction drop-down menu, select the mode you want to use.
Step 6 : Click OK.
Extract Indicators from a Phishing Email
The following scenario shows how indicator extraction is used in the Process Email –
Generic playbook to extract and enrich a very specific group of indicators.
This playbook parses the headers in the original email used in a phishing attack. It is important to
parse the original email used in the phishing attack and not the email that was forwarded to ensure
that you only extract the email headers from the malicious email and not the one your organization
uses to report phishing attacks.
Step 1 : Go to the Playbooks page and search for the Process Email – Generic playbook.
Step 2 : Click either Duplicate Playbook or Detach Playbook.
Step 3 : If you have already duplicated or detached the playbook, click Edit.
Step 4 : Scroll down and open the Add original email details to context task.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
125
Step 5 : In the Automation field, click Set and select ParseEmailFilesV2.
In the Outputs tab, you can see all of the different data that the task extracts, such as Email To, CC,
From, etc.
Step 6 : Go to the Advanced tab.
Under Indicator Extraction mode, ensure that the Inline option is selected. This indicates that all of
the outputs are processed before the playbook moves ahead to the next task.
Step 7 : Open the Display email information in layout task. This task receives the data from the
saved attachment tasks and sets the various data points to context.
Under the Advanced tab, ensure that Indicator Extraction mode is set to None because the
indicators have already been extracted earlier in the Extract email artifacts and attachments task
and there is no need to repeat the process.
Key Idea
●
If you select system default in a task, the default is set to none. You can
change the default by updating the reputation.calc.algorithm.tasks server
configuration. For more information, see Indicator Extraction Modes.
6.5.3 Regex for Auto Extract
Regex: A regular expression enables you to identify a sequence of characters in an unknown string.
The following example would identify www.paloaltonetworks.com:
[A-Za-z0-9!@#$%\ .&]*demisto[A-Za-z0-9!@#$%\ .&]*.
6.5.4 System Defaults
Resetting the firewall to factory defaults will result in the loss of all configuration settings and logs.
Step 1: Set up a console connection to the firewall.
●
Connect a serial cable from your computer to the Console port and connect to the firewall
using terminal emulation software (9600-8-N-1).
If your computer does not have a 9-pin serial port, use a USB-to-serial port connector.
●
Enter your login credentials.
●
Enter the following CLI command: debug system maintenance-mode
The firewall will reboot in the maintenance mode.
Step 2: Reset the system to factory default settings.
●
When the firewall reboots, press Enter to continue to the maintenance mode menu.
●
Select Factory Reset and press Enter.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
126
●
Select Factory Reset and press Enter again.
The firewall will reboot without any configuration settings. The default username and password to
log in to the firewall is admin/admin.
To perform initial configuration on the firewall and to set up network connectivity, see Integrate the
Firewall into Your Management Network.
6.5.5 Extraction Settings for Incident Types
You can extract indicators from incident fields upon creation of an incident and when a field
changes. For example, you want to extract the IP address upon incident creation and again when
the field changes.
The indicator extraction feature extracts indicators from incident fields and enriches them using
commands and scripts defined for the indicator type.
Step 1: Go to Settings > OBJECTS > SETUP > IncidentsTypes.
Step 2: For Content Pack-installed incident types, select the incident type check box to define the
extraction rules and the click Detach.
Step 3: Click Edit.
Step 4: From the Indicators Extraction Rules tab, in the On incident creation and the On field
change fields, select the required indicator extraction mode.
If you select Out of band, the extracted indicators do not appear in the context. If you want the
extracted indicators to appear, select Inline.
Step 5: In the What to Extract section, if you want to extract all incident fields, select Extract all
indicators from all fields.
Step 6: If you want to choose which indicators are extracted according to each field, select Extract
specific indicators.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
127
You can search and filter the incident fields. For each field, use the drop-down menu to control the
indicator types to extract.
Optionally, you can select all indicators, set all indicators to none, or copy settings from an incident
type by clicking: to the right of the table’s column headers.
INDICATOR TYPE TO
EXTRACT
DESCRIPTION
No indicators are extracted.
None
All indicator types with regex
Specific indicator types
Some indicator types are associated with a regex (such
as IP), and some are not (such as Registry Key).
Only indicators that are associated with a regex are
extracted.
You can choose one or more indicator types based on
regex. The system extracts values that match the regex
from this incident field.
Select the Use field value check box to use any indicator based on the field value (not regex based).
This creates an indicator out of the entire value of the field, regardless whether the indicator type
has a configured regex. This can be used in cases such as extracting hostnames.
Note the following:
●
It is recommended to turn off incident extraction (select “‘none”) for the Labels incident field.
When an incident JSON is received from an integration, the JSON members are mapped to
incident fields (based on the mapping configuration). Every member in the JSON that was
not mapped to a field will be written to the Labels field. If the Labels field extracts indicators,
it can expose unmapped or unknown data to external sources. You should only map the
relevant data to fields and set their extraction settings.
●
If you want to extract attachments, select the attachment field and then select File as the
indicator type to extract. The File extracts a hash (usually SHA-256), which can be viewed in
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
128
the War Room. You may want to disable indicator extraction for attachments to reduce
external API usage and protect restricted data (the hash) from being sent.
Step 7: Click Save.
In this example, if an email is forwarded that potentially includes phishing, we want to extract at
incident creation (inline) and upon a field change (out of band):
●
Email Body: Extract all indicators.
●
Email From: Extract Email only.
●
Email Subject: Extract all indicators.
●
Email To: Extract Email only.
6.5.6 Reference
●
●
●
●
Threat Intel Concepts,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-threat-intel-manage
ment-guide/threat-intelligence-management-overview/threat-intelligence-concepts#idc5bd
04c0-d11f-448d-ab2f-748f225db392
Exclusion List,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/understand-indicators/exclusion-list
Create Indicator Extract Rules for a Playbook Task,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/auto-extract-indicators/define-indicator-extract-rules-for-a-playbook-task
Exclusion List,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/understand-indicators/exclusion-list
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
129
●
Create Indicator Extraction Rules for an Incident Type,
https://docs.paloaltonetworks.com/cortex/cortex-xsoar/6-6/cortex-xsoar-admin/manage-indic
ators/auto-extract-indicators/define-indicator-extraction-rules-for-an-indicator-type
6.6 Summary of Key Ideas
●
●
●
If you don’t assign any roles to a report, all roles will have read/write access for the report.
Unit 42 Intel is available from Cortex XSOAR v6.5, for customers with a TIM license. When
upgrading from an earlier Cortex XSOAR version, the TIM license must be updated. Contact
Cortex XSOAR Customer Support to receive the updated license file.
If you select system default in a task, the default is set to none. You can change the default
by updating the reputation.calc.algorithm.tasks server configuration. For more information,
see Indicator Extraction Modes.
6.7 Sample Questions
Q1. What is the purpose of the wildcard in the field?
a.
b.
c.
d.
To include all fields that do not match the pattern
To exclude a field from the result set
To include a field from the result set
To include all fields that match the pattern
Q2. The indicator verdict is based on what?
a.
b.
c.
d.
Verdict Score
Reputation script
Indicator type
User script
Q3. What does the reputation command do?
a. Calculates the verdict score
b. Calculates the reputation of indicators of this type
c. Calculates the specific indicator
d. Calculates specific indicators when the command runs
Q4. What is/are updated when the indicator expires?
a.
b.
c.
d.
expirationStatus
expiration fields
expirationStatus and expiration fields
default method
Q5. What must you do before creating a Threat Intel report?
a.
b.
c.
d.
Edit the report to populate it with relevant content.
Edit any predefined template text in this section.
Assign roles to which you want to grant read/write access to the report.
Set up Threat Intel report types to ensure that your type is defined correctly.
Q6. From where does Unit 42 Intel provide data?
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
130
a.
b.
c.
d.
Only WildFire
Only the PAN-DB URL Filtering database
Only Palo Alto Networks Unit 42 threat intelligence team
WildFire, the PAN-DB URL Filtering database, Palo Alto Networks Unit 42 threat intelligence
team, and third-party feeds
Q7. What are the essential parts of the incident management and remediation process?
a.
b.
c.
d.
Indicators
Layouts
Fields
Reputation script
Q8. What happens when you import a policy that contains multiple types of rules?
a. The ESM Console automatically determines the rule type and distributes the rules to their
respective rule management pages.
b. You can only export user-defined rules of the same type.
c. The ESM Console appends the rules to the existing policy and assigns each rule a unique ID
number.
d. The ESM Console overwrites the existing rules with the updated policy.
Q9. Which ability does Cortex XSOAR Threat Intel Management provide?
a.
b.
c.
d.
Unifying the core components of threat intel
Including threat intel aggregation
Scoring and sharing
extracting indicators from the system
Q10. What are the two essential practices when indicators are ingested and processed daily?
(Choose two.)
a.
b.
c.
d.
Control whether they are active or expired.
Define how and when indicators are expired.
Prevent indicators from being extracted.
Add indicator to the exclusion list.
Q11. On which task does the default indicator extraction value depend?
a.
b.
c.
d.
Playbook task
Commands
Indicator extract
Default
Q12. Why is indicator extraction mode set to None under the advanced tab in the Playbooks page?
a. The indicators have already been extracted in the Extract email artifacts and attachments
task, and there is no need to do it again.
b. This task receives the data from the saved attachment tasks and sets the various data points
in context.
c. You can see all of the different data that the task extracts, such as Email To, CC, From, etc.
d. You can define indicators using regular expression
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
131
Q13. Which of the following enables you to identify a sequence of characters in an unknown string?
a.
b.
c.
d.
Array
Sets
Matrices
Regex
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
132
Appendix A: Sample Questions with Answers
Below are the questions offered throughout the study guide, with the correct answers indicated.
Domain 1
Q1. Which statement is true about context data?
a. It is purged after each task in a playbook is run.
b. It must be transformed before a task can use it.
c. After it is written, it can be changed only by manual editing.
d. It does not necessarily include all data generated by the incident-related activity.
Q2. What is the context data is primarily used for?
a.
b.
c.
d.
Sending data to related incidents
Passing data between playbook tasks
Storing data for use with integrations
Mapping data to required fields
Q3. Which of the following provides dynamic input to playbook tasks and automation?
a.
b.
c.
d.
Incident tasks
Context data
Quick view
System
Q4. Which of the following is a category of playbooks?
a.
b.
c.
d.
System
Parent
Boolean
Number
Q5. What is a sub-playbook?
a.
b.
c.
d.
A playbook used as a task in another playbook
An obsolete playbook of inferior quality
An app that underlies a playbook to ensure that it flows from task to task
An updated playbook that substitutes for an older playbook
Q6. If the input is a list of items, then what will the sub-playbook do?
a.
b.
c.
d.
Run once for each input set
Run twice for each input set
Run as many times as there are items in the list
Run once for each item in the input that has a greater number of items
Q7. Which of the following is not a playbook task type?
a.
b.
c.
d.
Manual
Automated
Conditional
Boolean
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
133
Q8. Which of the following is not a part of the transformer category?
a.
b.
c.
d.
Date
String
Boolean
Number
Q9. In which format type is the context root calculated by the Cortex XSOAR?
a.
b.
c.
d.
File.Get
File.Extension
File.String
File.Number
Q10. Which of the following is the function of error troubleshooting?
a. Use the debugger to find and fix issues if a playbook stops on an error.
b. Test and improve playbooks as you build them.
c. Install content packs and use the debugger to see whether the included playbooks are
relevant for your use case.
d. Begin to create and test playbooks even before all integrations are in place by manually
providing inputs and outputs as needed.
Domain 2
Q1. What is the primary use of incident types?
a.
b.
c.
d.
Classify the events ingested into the Cortex XSOAR system
Integrate with third-party security
Determine further investigational needs
Customize the layouts
Q2. Which phase is used to display information from playbook tasks and third-party integrations?
a.
b.
c.
d.
Pre-processing phase
Create fields phase
Post processing phase
Planning phase
Q3. Why is the create incident types phase used?
a.
b.
c.
d.
Display information
Customize layouts by incident type
Show relevant information of each incident type
Classify the types of attacks with which the organization deals
Q4. How can you configure the incident type layout?
a.
b.
c.
d.
Incident Layout Builder
Settings tab
Advanced tab
Layouts tab
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
134
Q5. Which action should a user perform after configuring the layout?
a.
b.
c.
d.
Work with a phishing integration product.
Define incident type for all events.
Plan deployment.
Map the different incident types that your organization handles.
Q6. When will you learn about the missing incident types?
a.
b.
c.
d.
After adding the new incident types to your system
As you plan deployment and start working on your system
After configuring the layout for the incident type
After you configure your phishing product
Q7. Who can populate the incident fields during an investigation?
a.
b.
c.
d.
Analyst
Administrator
Incident team members
Partners
Q8. Which three field types can you add when creating a new field? (Choose three.)
a.
b.
c.
d.
e.
Short text
HTML
Date picker
Attachments
Decimal number
Q9. What do the classification and map features enable users to do? (Choose two.)
a.
b.
c.
d.
e.
Generate alters
Classify phishing and malware alerts to respective incident types
Use events and event information that Cortex XSOAR ingests from integration
Map the fields from third-party integration to the fields defined in the incident layouts.
Create mapping for specific fields.
Domain 3
Q1. Which playbook task can be selected for surveying users?
a.
b.
c.
d.
Conditional task
Standard task
Data collection task
None of the above
Q2. Which statement about War Rooms is true?
a.
b.
c.
d.
War Room commands are used for script-based tasks.
War Room commands are used to determine different paths for your playbook.
War Room commands are commands entered manually in the CLI.
War Room commands are used as integration commands.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
135
Q3. What are the two types of layouts? (Choose two.)
a.
b.
c.
d.
Incident layouts
Dynamic layouts
Indicator layouts
Button layouts
Q4. Why use automations?
a.
b.
c.
d.
To create scripts
To create, manage and modify scripts
To write scripts in Java and Python
To access a few Cortex XSOAR APIs
Q5. Which two kinds of commands are available in Cortex XSOAR? (Choose two.)
a.
b.
c.
d.
Internal commands
System commands
Warm room commands
External commands
Q6. Which statement regarding Script helper is true?
a.
b.
c.
d.
Provides a list of commands
Provides a list of available commands and scripts in alphabetical order
Provides the language version
Provides a list of scripts
Q7. Which three parameters can you define in Script settings? (Choose three.)
a.
b.
c.
d.
Language type
Disabled
Run on
Content pack
Q8. Where can you check the source of a problem?
a.
b.
c.
d.
Settings
Logs and War Room entries
Library
PyCharm IDE
Q9. What is the default fetch interval time?
a.
b.
c.
d.
Two minutes
30 seconds
One minute
15 seconds
Q10. Where can you view every integration instance?
a. Cortex XSOAR
b. Integration settings field
c. Cortex XSOAR Developer Hub
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
136
d. Incident Fetch Interval field
Domain 4
Q1. Which two search actions can you perform in the Marketplace? (Choose two.)
a.
b.
c.
d.
Only view installed content packs.
Install, delete, and update content.
Contribute and share content items.
Only view playbooks.
Q2. How is Cortex XSOAR content organized?
a.
b.
c.
d.
Files
Packs
Both files and packs
Sequence
Q3. What is the other name for custom content packs?
a.
b.
c.
d.
System content packs
Contributions
Partner-supported content packs
Cortex XSOAR-supported content packs
Q4. The Version history for Playbook tabs enables users to…?
a.
b.
c.
d.
Update a playbook
Access a playbook version
Restore a playbook version
Search the required playbook
Q5. What does the Cortex XSOAR require for container management?
a.
b.
c.
d.
BoltDB
Docker
Docker or Podman
Only IPv4
Q6. You can install the Cortex XSOAR Engine on which two types of machine? (Choose two.)
a.
b.
c.
d.
Windows
Mac OS
Linus
Ubuntu
Q7. What is an accurate description of an Elasticsearch? (Choose two.)
a. Enables storing and processing large amount of data
b. Manages paybooks, automation scripts, and others on the main host
c. Helps to migrate objects present in Cortex XSOAR to Elasticsearch
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
137
d. An open source, distributed search, and analytics engine for all types of data
Q8. How can you edit the locked icon of the content pack incident layout? (Choose two.)
a.
b.
c.
d.
Duplicate an incident layout.
Detach the layout.
Edit the layouts in the Layouts tab.
Edit incident type.
Q9. Who can view the results when an automation runs with elevated permissions?
a.
b.
c.
d.
All users
Users with high permissions
Users with low permissions
User to whom Cortex team assign permission
Q10. What happens when a task operates in Quiet Mode? (Choose two.)
a.
b.
c.
d.
e.
It only display inputs.
It does not display inputs and outputs.
It does not extract indicators.
It displays inputs and outputs.
It displays errors and warnings.
Domain 5
Q1. Which statement is true about incidents?
a. Using Cortex you can define integration with third party security and incident
management vendors
b. You cannot run playbooks after incident creation
c. Using Cortex XSOAR you can determine the investigation of incidents
d. You cannot trigger events after integration
Q2. What option can be selected for “Virus Total?”
a.
b.
c.
d.
Direct link
Total analysis
File hash
All the above
Q3. What is the primary use of the indicator?
a.
b.
c.
d.
Provides data URLs, domains, IP addresses and hashes
Provides WildFire verdict and detection reasons
It provides summary of threat intelligence
Does not provide a Paloalto networks analytics services
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
138
Q4. What are the essential tabs used by dashboards?
a.
b.
c.
d.
My dashboard
SLA
System Health
Indicators
Q5. Which option provides War Room and Workplan?
a.
b.
c.
d.
Filter entities
Playbooks
Market place
Incidents
Q6. Why are fields used?(Choose three)
a.
b.
c.
d.
e.
To accept or populate incident data coming from an incident
To add incident type layouts and map using the mapping feature
To help incident team members during an investigation
To restore long text field
To collect information deriving from third-party integration
Q7. What type of arguments does the script accept when an action button is clicked?
a.
b.
c.
d.
Script arguments
Non-mandatory arguments
Combination of mandatory and non-mandatory arguments
Mandatory arguments
Q8. What is meant by “Table settings?”
a.
b.
c.
d.
Ability to sort columns
Ability to navigate page to page
Ability to adjust the number of rows
Represents complex table format in Cortex XSOAR
Q9. What can existing dashboards and reports do?
a.
b.
c.
d.
Schedule reports for email delivery
Report a pulse on your network
View reports
Delete default dashboards
Q10. What type of widgets can you create using Widget builder?
a. Widget library
b. Incident table
c. Operation
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
139
d. Location
Q11. Why is the incident tab layout tested and validated as a self-service read-only user?
a. To ensure that it displays correctly and without an “insufficient permission” error
message
a. To ensure that it displays correctly and with an “insufficient permission” error message
b. To ensure that it displays correctly
c. To ensure permissions
Domain 6
Q1. What is the purpose of the wildcard in the field?
a. To include all fields that do not match the pattern
b. To exclude a field from the result set
c. To include a field from the result set
d. To include all fields that match the pattern
Q2. The indicator verdict is based on what?
a.
a.
b.
c.
Verdict Score
Reputation script
Indicator type
User script
Q3. What does the reputation command do?
a.
b.
c.
d.
Calculates the verdict score
Calculates the reputation of indicators of this type
Calculates the specific indicator
Calculates specific indicators when the command runs
Q4. What is/are updated when the indicator expires?
a.
b.
c.
d.
expirationStatus
expiration fields
expirationStatus and expiration fields
default method
Q5. What must you do before creating a Threat Intel report?
a.
b.
c.
d.
Edit the report to populate it with relevant content.
Edit any predefined template text in this section.
Assign roles to which you want to grant read/write access to the report.
Set up Threat Intel report types to ensure that your type is defined correctly.
Q6. From where does Unit 42 Intel provide data?
a.
b.
c.
d.
Only WildFire
Only the PAN-DB URL Filtering database
Only Palo Alto Networks Unit 42 threat intelligence team
WildFire, the PAN-DB URL Filtering database, Palo Alto Networks Unit 42 threat
intelligence team, and third-party feeds
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
140
Q7. What are the essential parts of the incident management and remediation process?
a.
b.
c.
d.
Indicators
Layouts
Fields
Reputation script
Q8. What happens when you import a policy that contains multiple types of rules?
a. The ESM Console automatically determines the rule type and distributes the rules to
their respective rule management pages.
b. You can only export user-defined rules of the same type.
c. The ESM Console appends the rules to the existing policy and assigns each rule a unique ID
number.
d. The ESM Console overwrites the existing rules with the updated policy.
Q9. Which ability does Cortex XSOAR Threat Intel Management provide?
a.
b.
c.
d.
Unifying the core components of threat intel
Including threat intel aggregation
Scoring and sharing
extracting indicators from the system
Q10. What are the two essential practices when indicators are ingested and processed daily?
(Choose two.)
a.
b.
c.
d.
Control whether they are active or expired.
Define how and when indicators are expired.
Prevent indicators from being extracted.
Add indicator to the exclusion list.
Q11. On which task does the default indicator extraction value depend?
a.
b.
c.
d.
Playbook task
Commands
Indicator extract
Default
Q12. Why is indicator extraction mode set to None under the advanced tab in the Playbooks page?
a. The indicators have already been extracted in the Extract email artifacts and
attachments task, and there is no need to do it again.
b. This task receives the data from the saved attachment tasks and sets the various data points
in context.
c. You can see all of the different data that the task extracts, such as Email To, CC, From, etc.
d. You can define indicators using regular expression
Q13. Which of the following enables you to identify a sequence of characters in an unknown string?
a. Array
b. Sets
c. Matrices
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
141
d. Regex
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
142
Appendix B: Sample Test
Q1. Which of the following is related to inputs in playbook tasks?
a.
b.
c.
d.
Inputs are data pieces that are present in the playbook or task.
Inputs are the objects whose entries will serve the tasks throughout the playbook.
Inputs are multiquestion surveys or forms that survey recipient access.
Inputs are used for classic manual or script-based tasks.
Q2. Which two of the following are examples of a sub-playbook? (Choose two.)
a.
b.
c.
d.
Phishing Investigation
IP Enrichment
Endpoint Malware
Retrieve File From Endpoint
Q3. Which two types of actions can be specified with a Standard playbook task? (Choose two.)
a.
b.
c.
d.
Manual
Automated
Conditional
Data Collection
Q4. Which of the following is not a function of the Cortex XSOAR playbook debugger?
a.
b.
c.
d.
Build playbook
Troubleshoot playbook
Enable the performance of certain actions on incidents
Find tasks that might fail
Q5. Which automation system is used to bring all the various pieces of your security apparatus
together?
a.
b.
c.
d.
Playbooks
Cortex XSOAR
Prisma
Third-party security tool
Q6. What dynamic field can you add to an Incident Layout? (Choose two)
a.
b.
c.
d.
e.
Phishing link
Email header
Graph of the number of bad indicators
Email body
Severity of bad indicators
Q7. When can the incident team populate Incident fields? (Choose two)
a.
b.
c.
d.
At the beginning of the investigation
After accepting the incident data coming from incidents
After adding custom fields for incidents, evidence and indicators
During an investigation
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
143
e. After closing the investigation
Q8. Which markup language is best suited to represent table, formatted texts and lists?
a.
b.
c.
d.
HTML
SGML
Markdown
SLA
Q9. Select the types available when creating a new playbook task? (Choose three)
a.
b.
c.
d.
e.
Custom task
Standard task
Ask task
Conditional task
Data collection task
Q10. Which script checks for field changes and takes action on them?
a.
b.
c.
d.
Field trigger script
Feed-trigger script
Trigger automation script
Indicator field trigger script
Q11. Why is Demistomock library used?
a.
b.
c.
d.
To integrate script
To find source of the problem in the code
To debug your integration
To check logs and War Room entries
Q12. How can you change the default for all integration instances?
a.
b.
c.
d.
Using serversiemincidents.schedule key
Using jobs.serversiemincidents.schedule key
Using Script Helper tab
Using ! and the integration command
Q13. Why is the content pack submitted and reviewed by Cortex XSOAR?
a.
b.
c.
d.
To use in the Marketplace
To check for errors
To ensure that it complies with Cortex XSOAR standards
To make it available for customers
Q14. Which action should a user perform to make the developed content part of the product
environment update content?
a. Save versions.
b. Install new content.
c. Save changes.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
144
d. Push the changes to the remote repository.
Q15. How will you determine whether an incident requires further investigation or not?
a.
b.
c.
d.
Using rules and automation
Running playbooks
Using Cortex XSOAR
Using tenants
Q16. Which three elements can you view on the System Diagnostics page? (Choose three.)
a.
b.
c.
d.
e.
Status of the Docker service
CPU and memory usage
System performance
Storage issues
Modify email modifications
Q17. Which of the following are incident types?
a.
b.
c.
d.
Planning
Pre-processing
Indicator
None
Q18. Which two types of actions can be specified with the actions menu?
a.
b.
c.
d.
Reset client
Deny
Default
modify
Q19. Which incidents are displayed for the “automatic remediation” search?
a.
b.
c.
d.
Bulk incident actions
Table view
Summary view
graphical summary of incidents
Q20. Where do logs appear after creating a log bundle?
a.
b.
c.
d.
/var/log
/var/log/demisto
DbotRole
demisto.dockerfiles
Q21. What is the field stage used for?
a.
b.
c.
d.
The number of fields
To determine fields pattern
To identify which fields are returned in the result set
To exclude a field from the result set
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
145
Q22. The Indicators can set the expiration status fields to?
a.
b.
c.
d.
Active or Expired
Active
Expired
Update
Q23. What happens if you don't assign any role in the permissions section of Threat Intel Reports?
a.
b.
c.
d.
All roles will have read/write access to the report.
No role will have read access to the report.
No role will have read/write access to the report.
No role will have write access to the report.
Q24. What are the Unit 42 Intel service features enabled by the Cortex XSOAR threat?
a.
b.
c.
d.
You can take a proactive approach to secure your network.
You can add the indicator into the Cortex XSOAR threat intel library.
You can identify threats in your network and discover and contextualize trends.
You can updated the most recent threat samples analyzed by Cortex XSOAR team
Q25. Which of the following is not a method by which indicators are detected and ingested in Cortex
XSOAR?
a.
b.
c.
d.
Feed integration
Indicator extraction
Manual command line
SIME integration
Q26. Which abilities are supported by the ESM Console?
a.
b.
c.
d.
The ability to import both user-defined rules and default security rules
The ability to import only user-defined rules
The ability to import only default security rules
The ability to back-up default security rules
Q27. At which layer is indicator expiration applied?
a. Intel report level
b. Indicator type level
c. Management layer
d. Unit level
Q28. What happens if you reset the firewall to factory defaults?
a.
b.
c.
d.
The firewall integrates with the management network
The firewall reboots in maintenance mode.
The firewall reboots without any configuration settings.
The reset results in the loss of all configuration settings and logs.
Q29. When an incident JSON is received from an integration, the JSON members are mapped to
incident fields based on which criteria?
a. Incident extraction
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
146
b. The mapping configuration
c. Layouts
d. Fields
Q30. Why is indicator extraction disabled?
a. For attachments to reduce external API usage and protect restricted data (the hash) from
being sent
a. To unrestrict data
b. To give access to data
c. For read/write access to data
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
147
Appendix C: Answers to the Sample Test
Q1. Which of the following is related to inputs in playbook tasks?
a.
b.
c.
d.
Inputs are data pieces that are present in the playbook or task.
Inputs are the objects whose entries will serve the tasks throughout the playbook.
Inputs are multiquestion surveys or forms that survey recipient access.
Inputs are used for classic manual or script-based tasks.
Q2. Which two of the following are examples of a sub-playbook? (Choose two.)
a.
b.
c.
d.
Phishing Investigation
IP Enrichment
Endpoint Malware
Retrieve File From Endpoint
Q3. Which two types of actions can be specified with a Standard playbook task? (Choose two.)
a.
b.
c.
d.
Manual
Automated
Conditional
Data Collection
Q4. Which of the following is not a function of the Cortex XSOAR playbook debugger?
a.
b.
c.
d.
Build playbook
Troubleshoot playbook
Enable the performance of certain actions on incidents
Find tasks that might fail
Q5. Which automation system is used to bring all the various pieces of your security apparatus
together?
a.
b.
c.
d.
Playbooks
Cortex XSOAR
Prisma
Third-party security tool
Q6. What dynamic field can you add to an Incident Layout? (Choose two)
a.
b.
c.
d.
e.
Phishing link
Email header
Graph of the number of bad indicators
Email body
Severity of bad indicators
Q7. When can the incident team populate Incident fields? (Choose two)
a.
b.
c.
d.
At the beginning of the investigation
After accepting the incident data coming from incidents
After adding custom fields for incidents, evidence and indicators
During an investigation
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
148
e. After closing the investigation
Q8. Which markup language is best suited to represent table, formatted texts and lists?
a.
b.
c.
d.
HTML
SGML
Markdown
SLA
Q9. Select the types available when creating a new playbook task? (Choose three)
a.
b.
c.
d.
e.
Custom task
Standard task
Ask task
Conditional task
Data collection task
Q10. Which script checks for field changes and takes action on them?
a.
b.
c.
d.
Field trigger script
Feed-trigger script
Trigger automation script
Indicator field trigger script
Q11. Why is Demistomock library used?
a.
b.
c.
d.
To integrate script
To find source of the problem in the code
To debug your integration
To check logs and War Room entries
Q12. How can you change the default for all integration instances?
a.
b.
c.
d.
Using serversiemincidents.schedule key
Using jobs.serversiemincidents.schedule key
Using Script Helper tab
Using ! and the integration command
Q13. Why is the content pack submitted and reviewed by Cortex XSOAR?
a.
b.
c.
d.
To use in the Marketplace
To check for errors
To ensure that it complies with Cortex XSOAR standards
To make it available for customers
Q14. Which action should a user perform to make the developed content part of the product
environment update content?
a. Save versions.
b. Install new content.
c. Save changes.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
149
d. Push the changes to the remote repository.
Q15. How will you determine whether an incident requires further investigation or not?
a.
b.
c.
d.
Using rules and automation
Running playbooks
Using Cortex XSOAR
Using tenants
Q16. Which three elements can you view on the System Diagnostics page? (Choose three.)
a.
b.
c.
d.
e.
Status of the Docker service
CPU and memory usage
System performance
Storage issues
Modify email modifications
Q17. Which of the following are incident types?
a.
b.
c.
d.
Planning
Pre-processing
Indicator
None
Q18. Which two types of actions can be specified with the actions menu?
a.
b.
c.
d.
Reset client
Deny
Default
modify
Q19. Which incidents are displayed for the “automatic remediation” search?
a.
b.
c.
d.
Bulk incident actions
Table view
Summary view
graphical summary of incidents
Q20. Where do logs appear after creating a log bundle?
a.
b.
c.
d.
/var/log
/var/log/demisto
DbotRole
demisto.dockerfiles
Q21. What is the field stage used for?
a.
b.
c.
d.
The number of fields
To determine fields pattern
To identify which fields are returned in the result set
To exclude a field from the result set
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
150
Q22. The Indicators can set the expiration status fields to?
a.
b.
c.
d.
Active or Expired
Active
Expired
Update
Q23. What happens if you don't assign any role in the permissions section of Threat Intel Reports?
a.
b.
c.
d.
All roles will have read/write access to the report.
No role will have read access to the report.
No role will have read/write access to the report.
No role will have write access to the report.
Q24. What are the Unit 42 Intel service features enabled by the Cortex XSOAR threat?
a.
b.
c.
d.
You can take a proactive approach to secure your network.
You can add the indicator into the Cortex XSOAR threat intel library.
You can identify threats in your network and discover and contextualize trends.
You can updated the most recent threat samples analyzed by Cortex XSOAR team
Q25. Which of the following is not a method by which indicators are detected and ingested in Cortex
XSOAR?
a.
b.
c.
d.
Feed integration
Indicator extraction
Manual command line
SIME integration
Q26. Which abilities are supported by the ESM Console?
a.
b.
c.
d.
The ability to import both user-defined rules and default security rules
The ability to import only user-defined rules
The ability to import only default security rules
The ability to back-up default security rules
Q27. At which layer is indicator expiration applied?
a.
b.
c.
d.
Intel report level
Indicator type level
Management layer
Unit level
Q28. What happens if you reset the firewall to factory defaults?
a.
b.
c.
d.
The firewall integrates with the management network
The firewall reboots in maintenance mode.
The firewall reboots without any configuration settings.
The reset results in the loss of all configuration settings and logs.
Q29. When an incident JSON is received from an integration, the JSON members are mapped to
incident fields based on which criteria?
a. Incident extraction
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
151
b. The mapping configuration
c. Layouts
d. Fields
Q30. Why is indicator extraction disabled?
a. For attachments to reduce external API usage and protect restricted data (the hash)
from being sent
b. To unrestrict data
c. To give access to data
d. For read/write access to data
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
152
Appendix D: Glossary
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
Active Directory integration- Is the process of incorporating directory services — a suite of
tools for managing users, groups, and resources — into a network of computers.
Adware- Software that automatically displays or downloads advertising material such as
banners or pop-ups when a user is online.
Security orchestration, automation, and response (SOAR)- Technology that helps
coordinate, execute, and automate tasks between various people and tools, allowing
companies to respond quickly to cybersecurity attacks and improve their overall security
posture. SOAR tools use playbooks to automate and coordinate workflows that may include
any number of disparate security tools and human tasks. See also “playbook.”
Artificial intelligence (AI)- The ability of a system or application to interact with and learn
from its environment, and automatically perform actions accordingly, without requiring
explicit programming.
Augmented reality (AR)- Augmented reality enhances a real-world environment with virtual
objects.
BoltDB- Is an embedded ACID key/value database written in Go. It supports MVCC with
shadow paging by allowing only one writer and multiple readers.
Boolean- A system of algebraic notation used to represent logical propositions.
Bot- Individual endpoints that are infected with advanced malware that enables an attacker
to take control of the compromised endpoint. Also known as a zombie. See also botnet and
malware.
Botnet- A network of bots (often tens of thousands or more) working together under the
control of attackers using numerous command-and-control (C2) servers. See also bot.
Command Line Interface (CLI)- Is a text-based user interface (UI) used to run programs,
manage computer files and interact with the computer.
Cortex- The AI-based continuous security operations platform—extends next-generation
security into cloud.
Cortex XDR- is the world's first detection and response app that natively integrates network,
endpoint and cloud data to stop sophisticated attacks.
Cortex XSOAR- is a comprehensive security orchestration, automation and response (SOAR)
platform that unifies case management, automation, real-time collaboration and threat intel
management to serve security teams across the incident lifecycle.
Dashboard- It consists of visualized data powered by fully customizable widgets that enable
you to analyze data from inside or outside Cortex XSOAR in different formats such as graphs,
pie charts, or text from information.
Dbot- is the Cortex XSOAR machine learning bot, which ingests information about indicators
to determine if they are malicious.
Debugger- a computer program that assists in the detection and correction of errors in
other computer programs.
Docker- Is a software framework for building, running, and managing containers. Cortex
XSOAR uses Docker to run Python scripts, PowerShell scripts, and integrations in a controlled
environment.
Elasticsearch- Is a distributed, open source search and analytics engine for all types of data.
It enables processing and storing large amounts of data.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
153
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
Endpoint- Is a remote computing device that communicates back and forth with a network
to which it is connected.
Endpoint Protection- is a means of securing endpoint devices from cyber threats.
Evidence board- Stores key artifacts for current and future analysis. You can view and
manage evidence entities that were detected in the War Room and designated as Evidence.
GitHub- A website and cloud-based service that helps developers store and manage their
code, as well as track and control changes to their code.
GitLab- Is a DevOps software package that combines the ability to develop, secure, and
operate software in a single application.
GlobalProtect- Provides a complete infrastructure for managing your mobile workforce to
enable secure access for all your users, regardless of what endpoints they are using or where
they are located.
High availability (HA)- Is a deployment in which two firewalls are placed in a group and their
configuration is synchronized to prevent a single point of failure on your network.
Hypertext Transfer Protocol (HTTP)- An application protocol used to transfer data between
web servers and web browsers.
Internet of things (IoT)- The IoT refers to the network of physical smart, connected objects
that are embedded with electronics, software, sensors, and network connectivity.
Internet Protocol (IP) address- A 32-bit or 128-bit identifier assigned to a networked device
for communications at the Network layer of the OSI model or the Internet layer of the TCP/IP
model.
Jira- Is a proprietary issue tracking product developed by Atlassian that allows bug tracking
and agile project management.
Load balancing- Refers to the process of distributing a set of tasks over a set of resources,
with the aim of making their overall processing more efficient.
Log bundle- is a zip file of additional logs available in the Cortex XSOAR system. These logs
provide additional information that is useful in troubleshooting issues that arise in your
Cortex XSOAR system.
Machine Learning- A subset of AI that applies algorithms to large datasets to discover
common patterns in the data that then can be used to improve the performance of the
system.
Malware- Malicious software or code that typically damages, takes control of, or collects
information from an infected endpoint. Malware broadly includes viruses, worms, trojan
horses (including remote access trojans, or RATs), anti-AV, logic bombs, back doors, root kits,
boot kits, spyware, and (to a lesser extent) adware.
Markdown- is a lightweight markup language that can be best suited to represent tables,
lists and formatted texts.
Mean Time to Response (MTTR)- is the average time required to return a system to
operational condition after receiving notification of a failure or cyberattack.
Multitenancy architecture- Is based on the platform’s ability to run multiple instances
(processes and data) of the XSOAR server on a single server.
Network Mapper- allows you to scan your network to detect and identify unmanaged hosts
in your environment according to defined IP address ranges.
Orchestration- Is the automated configuration, coordination, and management of computer
systems and software.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
154
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
Partner-supported content packs- This term applies to content packs published by Cortex
XSOAR Technology Partners. Support and maintenance is provided by the Technology
Partner, whose contact information appears in the content pack details.
Phishing- is an attempt by an individual or group to solicit personal information from
unsuspecting users.
Playbook- It enables you to automate security processes, including handling investigations
and managing tickets.
Podman- Is a daemonless container engine for developing, managing, and running OCI
Containers on the Linux System.
Proof of concept (POC)- is the effective test you can run to make sure you're getting the
right NGFW for your environment.
Proxy server- Is a dedicated computer or software system that sits between an end “client,”
such as a desktop computer or mobile device, and a desired destination, such as a website,
server, or web- or cloud-based application.
PyCharm- Is an integrated development environment used in computer programming,
specifically for the Python programming language.
Ransomware- is a criminal business model that uses malicious software to hold something
of value for ransom or shutting down a victim's operations.
Role-based access control (RBAC)- Enables you to define the privileges and responsibilities
of administrative users (administrators). Every administrator must have a user account that
specifies a role and authentication method.
Sandbox- Is a security mechanism for separating running programs, usually in an effort to
mitigate system failures and/or software vulnerabilities from spreading.
Script Helper- It provides a list of available commands and scripts, ordered alphabetically.
Security Information and Event Management (SIEM)- Helps to manage security incidents
through the collection and analysis of log data, security events and other event or data
sources.
Security operations center (SOC)- Is a physical room or area in an organization's office
where cybersecurity analysts work to monitor enterprise systems; defend against security
breaches; and identify, investigate and mitigate cybersecurity threats.
Security orchestration, automation, and response (SOAR)- Technology that helps
coordinate, execute, and automate tasks between various people and tools, allowing
companies to respond quickly to cybersecurity attacks and improve their overall security
posture. SOAR tools use playbooks to automate and coordinate workflows that may include
any number of disparate security tools and human tasks. See also “playbook.”
Software as a service (SaaS)- A category of cloud computing services in which the customer
is provided access to a hosted application that is maintained by the service provider.
Tags- Are used to identify the purpose of a rule or a configuration object and better organize
your rulebase. You can tag objects to group related items and add color to the tag in order to
visually distinguish them for easy scanning. You can create tags for the following objects:
address objects, address groups, user groups, zones, service groups, and policy rules.
Tenant- Is also an instance of Cortex XSOAR that serves a customer or account and can be
located either on the main or other hosts.
Transformers- enable you to take one value and transform or render it to another value.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
155
●
●
●
●
●
●
●
Unix- Is a family of multitasking, multiuser computer operating systems that derive from the
original AT&T Unix, whose development started in 1969 at the Bell Labs research center by
Ken Thompson, Dennis Ritchie, and others.
URL filtering- limits access by comparing web traffic against a database to prevent
employees from accessing harmful sites such as phishing pages.
Vulnerability- A bug or flaw that exists in a system or software and creates a security risk.
War room commands- are commands that can be entered manually in the CLI at the
bottom of the screen.
Widgets- are visual components that enable you to analyze data internally or externally from
Cortex XSOAR, in different formats such as graphs, pie charts, text from information.
Wildfire- Identifies previously unknown malware and generates signatures that Palo Alto
Networks firewalls can use to detect and block the malware.
XSOAR Marketplace- Is the central location for installing, exchanging, contributing, and
managing your content, including playbooks, integrations, automations, fields, layouts, and
more.
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
156
Continuing Your Learning Journey with Palo Alto Networks
Training from Palo Alto Networks and our Authorized Training Partners delivers the knowledge and
expertise to prepare you to protect our way of life in the digital age. Our trusted security
certifications give you the Palo Alto Networks product portfolio knowledge necessary to prevent
successful cyberattacks and to safely enable applications.
Digital Learning
For those of you who want to keep up to date on our technology, a learning library of free digital
learning is available. These on-demand, self-paced digital-learning classes are a helpful way to
reinforce the key information for those who have been to the formal hands-on classes. They also
serve as a useful overview and introduction to working with our technology for those unable to
attend a hands-on, instructor-led class.
Simply register in Beacon and you will be given access to our digital-learning portfolio. These online
classes cover foundational material and contain narrated slides, knowledge checks, and, where
applicable, demos for you to access.
New courses are being added often, so check back to see new curriculum available.
Instructor-Led Training
Looking for a hands-on, instructor-led course in your area?
Palo Alto Networks Authorized Training Partners (ATPs) are located globally and offer a breadth of
solutions from onsite training to public, open-environment classes. About 42 authorized training
centers are delivering online courses in 14 languages and at convenient times for most major
markets worldwide. For class schedule, location, and training offerings, see
https://www.paloaltonetworks.com/services/education/atc-locations.
Learning Through the Community
You also can learn from peers and other experts in the field. Check out our communities site at
https://live.paloaltonetworks.com, where you can:
●
Discover reference material
●
Learn best practices
●
Learn what is trending
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
157
Palo Alto Networks Certified Security Automation Engineer (PCSAE)
158
Download