Skip to main content

AutoFocus by Palo Alto Networks

Download With Dependencies

Use the Palo Alto Networks AutoFocus integration to distinguish the most important threats from everyday commodity attacks.

Use AutoFocus to export threat intelligence data produced by AutoFocus and connected services to provide actionable data for the Palo Alto Networks firewall as well as third party TIP and SIEM solutions. In addition to using the data for investigative purposes though AutoFocus, this content pack allows you to use it for detection and prevention to better safeguard your network from malicious activity.

What does this pack do?

  • Query samples / sessions.
  • Get sample analysis.
  • Get session details.
  • Get tag details.
  • Get top tags.

This content pack includes:

  • Integrations:

    • AutoFocus Daily Feed: Fetch new, daily additions to the list created by the AutoFocus feed.
    • AutoFocus Feed: Fetch a list from AutoFocus which includes IP addresses, domains, URLs, and hash indicators
    • Palo Alto AutoFocus: (Deprecated)
      Use the Palo Alto Networks AutoFocus v2 integration instead.
    • Palo Alto Networks AutoFocus v2:
      Distinguish the most important threats from everyday commodity attacks.
  • Playbooks:

    • Autofocus Query Samples, Sessions and Tags
      Query the PANW threat intelligence Autofocus system. The playbook accepts indicators such as IPs, hashes, domains to run basic queries or mode advanced queries that can leverage several query parameters.
    • AutoFocusPolling: A sub-playbook to query PANW Autofocus Threat intelligence system. This sub-playbook is the same as the generic polling sub-playbook except that it provides outputs in the playbook.

For information about AutoFocus feeds, see https://docs.paloaltonetworks.com/autofocus/autofocus-admin/autofocus-feeds.html

Use AutoFocus to export threat intelligence data produced by AutoFocus and connected services to provide actionable data for the Palo Alto Networks firewall as well as third party TIP and SIEM solutions. In addition to using the data for investigative purposes though AutoFocus, this content pack allows you to use it for detection and prevention to better safeguard your network from malicious activity.

What does this pack do?

  • Query samples / sessions.
  • Get sample analysis.
  • Get session details.
  • Get tag details.
  • Get top tags.

This content pack includes:

  • Integrations:

    • AutoFocus Daily Feed: Fetch new, daily additions to the list created by the AutoFocus feed.
    • AutoFocus Feed: Fetch a list from AutoFocus which includes IP addresses, domains, URLs, and hash indicators
    • Palo Alto AutoFocus: (Deprecated)
      Use the Palo Alto Networks AutoFocus v2 integration instead.
    • Palo Alto Networks AutoFocus v2:
      Distinguish the most important threats from everyday commodity attacks.
  • Playbooks:

    • Autofocus Query Samples, Sessions and Tags
      Query the PANW threat intelligence Autofocus system. The playbook accepts indicators such as IPs, hashes, domains to run basic queries or mode advanced queries that can leverage several query parameters.
    • AutoFocusPolling: A sub-playbook to query PANW Autofocus Threat intelligence system. This sub-playbook is the same as the generic polling sub-playbook except that it provides outputs in the playbook.

For information about AutoFocus feeds, see https://docs.paloaltonetworks.com/autofocus/autofocus-admin/autofocus-feeds.html

PUBLISHER

Cortex

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByCortex
CreatedJuly 25, 2020
Last ReleaseFebruary 4, 2024
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.