What should you do to automatically convert leads into alerts after investigating a lead?
To automatically convert leads into alerts after investigating a lead, you should create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting. IOC rules are used to detect known threats based on indicators of compromise (IOCs) such as file hashes, IP addresses, domain names, etc. By creating IOC rules from the leads, you can prevent future occurrences of the same threats and generate alerts for them.Reference:
Cortex XDR 3: Handling Cortex XDR Alerts, section 3.2
Cortex XDR Documentation, section ''Create IOC Rules''
Gladis
2 months agoBlossom
2 months agoShakira
2 months agoGianna
1 months agoShawnta
1 months agoKimberely
2 months agoRodolfo
2 months agoThad
1 months agoValentin
1 months agoMargarett
1 months agoShawnna
2 months agoRodrigo
2 months agoKizzy
3 months agoGoldie
2 months agoBambi
2 months agoOcie
2 months agoKrissy
3 months ago