Skip to main content

Access Investigation

Download With Dependencies

This Content Pack automates response to unauthorised access incidents and contains customer access incident views and layouts to aid investigation.

An unauthorised access to a cloud asset, a server or a physical endpoint can compromise an entire organization.
Access investigations require security teams to reconcile data from multiple sources, gather user and network data, and communicate with users and other relevant parties. Valuable time is lost shuttling between screens and executing repeatable tasks while an attack continues to manifest.
This Access Investigation content pack contains the ‘Access Investigation - Generic’ playbook, that automates response to an unauthorised access incident. The pack also contains the corresponding custom Access incident type to facilitate analyst investigation.
The Access playbook orchestrates across multiple products to extract and enrich IOCs, interact with the suspected user and calculate the incident’s severity.

What does this pack do?

The playbooks included in this pack help you save time and automate repetitive tasks associated with Malware incidents:

  • Create an Access incident within Cortex XSOAR associated with the unauthorized access.
  • Extract and enrich user information, and retrieve the user’s manager details.
  • Extract and enrich IP information.
  • Interact with the user to gather more information regarding the suspected access.
  • Calculate the incident’s severity based on the enriched information and information received from the user.
  • Assign the investigation to an analyst.

As part of this pack, you will also get out-of-the-box Access incident type, which is easily customizable to suit the needs of your organization.

For more information, visit our Cortex XSOAR Developer Docs

Access_Investigation_-_Generic

An unauthorised access to a cloud asset, a server or a physical endpoint can compromise an entire organization.
Access investigations require security teams to reconcile data from multiple sources, gather user and network data, and communicate with users and other relevant parties. Valuable time is lost shuttling between screens and executing repeatable tasks while an attack continues to manifest.
This Access Investigation content pack contains the ‘Access Investigation - Generic’ playbook, that automates response to an unauthorised access incident. The pack also contains the corresponding custom Access incident type to facilitate analyst investigation.
The Access playbook orchestrates across multiple products to extract and enrich IOCs, interact with the suspected user and calculate the incident’s severity.

What does this pack do?

The playbooks included in this pack help you save time and automate repetitive tasks associated with Malware incidents:

  • Create an Access incident within Cortex XSIAM associated with the unauthorized access.
  • Extract and enrich user information, and retrieve the user’s manager details.
  • Extract and enrich IP information.
  • Interact with the user to gather more information regarding the suspected access.
  • Calculate the incident’s severity based on the enriched information and information received from the user.
  • Assign the investigation to an analyst.

As part of this pack, you will also get out-of-the-box Access incident type, which is easily customizable to suit the needs of your organization.

For more information, visit our Cortex XSIAM Developer Docs

Access_Investigation_-_Generic

PUBLISHER

Cortex

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByCortex
CreatedJuly 26, 2020
Last ReleaseMarch 18, 2024
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.