Skip to main content

Cyware Orchestrate

Palo Alto Cortex XDR

App Vendor: Palo Alto

App Category: Endpoint

Connector Version: 1.2.0

API Version: 6.6

About App

Cortex XDR integrates endpoint, network, and cloud data for detection and response to stop sophisticated attacks.

The Palo Alto Cortex XDR connector app is configured with the CSOL application to perform the following actions:

Action Name

Description

List All Incidents 

This action retrieves the list of all incidents.

Get Incidents 

This action retrieves incidents filtered by a list of incident IDs, modification time, or creation time.

List All Alerts 

This action retrieves a list of all the alerts.

Get Alerts 

This action retrieves a list of alerts with multiple events.

List All Endpoints 

This action retrieves a list of host endpoints.

Get Filtered Endpoints 

This action retrieves endpoints filtered by the specified fields.

Isolate Endpoints 

This action isolates more than one endpoint.

Unisolate Endpoint 

This action removes an endpoint from isolation.

Quarantine Files 

This action quarantines files on selected endpoints. You can select up to 1000 endpoints.

Restore Files 

This action restores a quarantined file on requested endpoints.

Upload Indicators in CSV Format 

This action uploads a list of indicators in a CSV format.

Upload Indicators in JSON Format 

This action uploads indicators in a JSON format. You can also upload as an array of JSON objects.

Generic Action 

This is a generic action performs any additional use case that you want on Cortex XDR.

Start a XQL Query 

This action starts a new XQL query.

Get XQL Query Result Stream 

This action retrieves XQL query results with more than 1000 results.

Get XQL Query Result 

This action retrieves the results of an executed XQL query.

Get Extra Incident Data

This action retrieves extra data fields of a specific incident including alerts and key artifacts.

Configuration Parameters

The following configuration parameters are required for the Palo Alto Cortex XDR connector app to communicate with the Palo Alto Cortex XDR enterprise application. The parameters can be configured by creating instances in the connector app.

Parameter

Description

Field Type

Required/Optional

Comments

Base URL 

Enter the base URL.

Example:

"https://api-{fqdn}.xdr.in.paloaltonetworks.com"

Text

Required

 

API Key 

Enter the API key.

Password

Required

 

API ID Key 

Enter the API key ID. The key ID is your unique token to authenticate the API endpoint.

Text

Required

 

Verify 

Enter your preference to either verify or skip the TLS certificate verification.

Example:

Yes/No

Boolean

Optional

Allowed values:

  • Yes

  • No

Default value:

  • No

Timeout

Enter the timeout values in seconds.

Integer

Optional

Allowed values:

15-120 secs

Default value:

15 secs

Action: List All Incidents

This action retrieves the list of all incidents.

Action Input Parameters

This action does not require any input parameter.

Action: Get Incidents

This action retrieves incidents filtered by a list of incident IDs, modification time, or creation time.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Incident list

Enter the list of incident IDs.

Example:

$LIST[Incident ID1, Incident ID2, Incident ID3]

List

Required

Search from

Enter search from integer representing the starting offset within the query result set.

Example:

3

Integer

Optional

Default value:

  • 0

Search to

Enter the Search to integer value representing the end offset within the result set.

Example:

90

Integer

Optional

Default value:

  • 100

Sort field

Enter the field to sort.

Example:

"modification_time"

Text

Optional

Allowed values:

  • modification_time

  • creation_time

Default value:

  • creation_time

Sort order

Enter the sort order.

Example:

"desc"

Text

Optional

Allowed values:

  • asc

  • desc

Default value:

  • asc

Example Request

{
    "incident_list": [incident ID1, incident ID2],
    "search_from": 3,
    "search_to": 90,
    "sort_field": "modification_time",
    "sort_order": "desc"
}
Action: List All Alerts

This action retrieves a list of all the alerts.

Action Input Parameters

This action does not require any input parameter.

Action: Get Alerts

This action retrieves a list of alerts with multiple events.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Filter field

Enter the field to filter with.

Example:

"alert_id_list"

Text

Required

Allowed values:

  • alert_id_list

  • alert_source

  • severity

  • creation_time

Value list

Enter the value of the list associated with the selected filter field. An example of the "severity" filter field and the associated value is shown below.

Example:

$LIST["low", "medium", "high"]

List

Required

Search from

Enter search from integer representing the starting offset within the query result set.

Example:

4

Integer

Optional

Default value:

  • 0

Search to

Enter the search to integer value representing the end offset within the result set.

Example:

80

Integer

Optional

Default value:

  • 100

Sort field

Enter the field to sort.

Example:

"modification_time"

Text

Optional

Allowed values:

  • modification_time

  • creation_time

Default values:

  • creation_time

Sort order

Enter the sort order.

Example:

"asc"

Text

Optional

Allowed values:

  • asc

  • desc

Default value:

  • asc

Example Request

{
    "filter_field": "alert_id_list",
    "value_list": [low, medium, high],
    "search_from": 4,
    "search_to": 90,
    "sort_field": "modification_time",
    "sort_order": "asc"
}
Action: List All Endpoints

This action retrieves a list of host endpoints.

Action Input Parameters

This action does not require any input parameter.

Action: Get Filtered Endpoints

This action retrieves endpoints filtered by the specified fields.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Filter field

Enter the field to filter with.

Example:

"endpoint_id_list"

Text

Required

Value list

Enter the value of the list associated with the field to filter.

Example:

$LIST["endpoint1", "endpoint2"]

List

Required

Search from

Enter search from integer representing the starting offset within the query result set.

Example:

4

Integer

Optional

Default value:

  • 0

Search to

Enter the search to an integer value representing the end offset within the result set.

Example:

80

Integer

Optional

Default value:

  • 100

Sort field

Enter the field to sort.

Example:

"first_seen"

Text

Optional

Default value:

  • first_seen

Sort order

Enter the sort order.

Example:

"asc"

Text

Optional

Allowed values:

  • asc

  • desc

Default value:

  • asc

Example Request

{
    "filter_field": "endpoint_id_list",
    "value_list": [endpoint1, endpoint2],
    "search_from": 4,
    "search_to": 80,
    "sort_field": "first_seen",
    "sort_order": "asc"
}
Action: Isolate Endpoints

This action isolates more than one endpoint.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Endpoint list

Enter the list of endpoint IDs.

Example:

$LIST["endpoint_id1", "endpoint_id2"]

Any

Required

Example Request

{
    "filter_field": "alert_id_list",
    "value_list": [endpoint_id1, endpoint_id2],
}
Action: Unisolate Endpoint

This action removes an endpoint from isolation.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Endpoint ID

Enter the endpoint ID.

Example:

"sample_endpoint_ID"

Text

Required

Example Request

{
    "endpoint_id": "sample_endpoint_ID"
}
Action: Quarantine Files

This action quarantines files on selected endpoints. You can select up to 1000 endpoints.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Endpoint list

Enter the list of endpoint IDs.

Example:

"sample_endpoint_ID"

Text

Required

File path

Enter the path of the file you want to quarantine.

Example:

"C:\\<file path>\\test_x64.msi"

Text

Required

File hash

Enter file hash. The hash value must be a valid sha256.

Example:

"sample_sha256_hash"

Text

Required

Example Request:

{
    "endpoint_list": [incident ID1, incident ID2],
    "file_path": "C:\\<file path>\\test_x64.msi",
    "file_hash": "sample_sha256_hash"
}
Action: Restore Files

This action restores a quarantined file on requested endpoints.

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Incident ID

Enter the incident ID.

Example:

"sample_incident_ID"

Text

Required

File hash

Enter the file hash. The hash must be a valid sha256.

Example:

"sample_sha256_hash"

Text

Required

Example Request:

{
    "incident_id": "sample_incident_ID",
    "file_hash": "sample_sha256_hash"
}
Action: Generic Action

This is a generic action to perform any additional use case that you want on cortex xdr.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Endpoint 

Enter the endpoint to perform the use case. Example: /public_api/v1/endpoints/

Text

Required

 

Payload 

Enter the JSON payload to pass to the API. 

Example: 

{"name": "phishing_attack"}

Key Value

Optional

 

Query params 

Enter the query parameters to pass to the API. 

Example: 

{"limit": "10"}

Key Value

Optional

 

Headers 

Enter the headers to pass to the API. 

Example: 

{"content-type": "application/json"}

Key Value

Optional

 

Action: Get XQL Query Result

This action retrieves the results of an executed XQL query.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Query id 

Enter the query id of the XQL query. 

Example: 

5f9b1b1a-5f9b-11eb-8c9f-0242ac130002.

Text

Required

 

Format 

Enter the format. 

Text

Optional

Allowed values: 

  • json

  • csv

Pending flag 

Choose whether the api call must operate in synchronous/blocking mode, or in asynchronous/non-blocking mode. 

Boolean

Optional

Default value: 

True

Limit 

Enter the maximum number of results to return. Example: 

10

Integer

Optional

 

Action: Get XQL Query Result Stream

This action retrieves XQL query results with more than 1000 results.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Stream id 

Enter the stream id to return the response.

Text

Required

 

Is gzip compressed 

Choose whether the response should be compressed and gzipped.

Boolean

Optional

 

Action: Upload Indicators in CSV Format

This action uploads a list of indicators in a CSV format.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Request data 

Enter the CSV file data as a string value. 

Text

Required

Allowed values: 

indicator, type, severity, expiration_date, comment, reputation, reliability, class, vendor.name,

vendor.reputation, vendor.reliability

Validate 

Choose to return an array of errors in the case of an unsuccessful update indicator API request. 

Boolean

Optional

Default value:

true

Action: Upload Indicators in JSON Format

This action uploads indicators in a json format. you can also upload as an array of json objects.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Indicator 

Enter the indicator value. Example: 

192.0.2.146

Text

Required

 

Type 

Enter the type of the indicator. 

Text

Required

Allowed values:

  • hash

  • ip

  • domain_name

  • filename.

Severity 

Enter the severity of the indicator. 

Text

Required

Allowed values: 

  • info

  • low

  • medium

  • high

  • critical

  • unknown

Validate 

Choose to return an array of errors in the case of an unsuccessful update indicator api request. 

Boolean

Optional

Default value:

true

Vendors 

Enter the list of vendors. Example:[{"vendor":"test_vendor","reputation":"malicious","reliability":"a"}]

List

Optional

 

Extra params 

Add additional parameters to upload indicators. Example:

{"expiration_date": "2020-12-31t23:59:59.000z","comment": "test comment"}

Key Value

Optional

 

Action: Get Extra Incident Data

This action retrieves extra data fields of a specific incident including alerts and key artifacts. 

Action Input Parameters

Parameter

Description

Field Type

Required/Optional

Comments

Incident ID

Enter the ID of the incident for which you want to retrieve extra data.

Text

Required

 

Alerts Limit

Enter the maximum number of related alerts in the incident that you want to retrieve. 

Integer 

Optional

Default value:

1000

Action: Start a XQL Query

This action starts a new XQL query.

Action Input Parameters 

Parameter

Description

Field Type

Required/Optional

Comments

Query 

Enter the XQL query. Example: 

dataset=xdr_data

Text

Required

 

Tenants 

Enter the list of tenants. Example: 

12345678, 87654321. 

List

Optional

 

Start Time 

Enter the start time in UNIX to run this query. 

Example: 

1610630400.

Text

Optional

 

End Time 

Enter the end time in UNIX up to which the query should run. 

Example: 

2010716800.

Text

Optional

 

Relative Time 

Enter the relative time in UNIX representing the last 24 hours. 

Example: 

2110630400. 

Text

Optional