What should you do to automatically convert leads into alerts after investigating a lead?
To automatically convert leads into alerts after investigating a lead, you should create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting. IOC rules are used to detect known threats based on indicators of compromise (IOCs) such as file hashes, IP addresses, domain names, etc. By creating IOC rules from the leads, you can prevent future occurrences of the same threats and generate alerts for them.Reference:
Cortex XDR 3: Handling Cortex XDR Alerts, section 3.2
Cortex XDR Documentation, section ''Create IOC Rules''
Gladis
24 days agoBlossom
28 days agoShakira
28 days agoKimberely
15 days agoRodolfo
1 months agoMargarett
3 days agoShawnna
17 days agoRodrigo
1 months agoKizzy
1 months agoGoldie
21 days agoBambi
26 days agoOcie
28 days agoKrissy
1 months ago