Use the "Palo Alto Networks - Hunting And Threat Detection"\ \ playbook instead.
Deprecated. Use the "Palo Alto Networks - Hunting And Threat Detection" playbook instead. Integrations list - Cortex (Traps, PAN-OS, Analytics)\nThis is a multipurpose playbook used for hunting and threat detection. The playbook receives inputs based on hashes, IP addresses, or domain names provided manually or from outputs by other playbooks. \nWith the received indicators, the playbook leverages Palo Alto Cortex data received by products such as Traps, Analytics and Pan-OS to search for IP addresses and hosts related to that specific hash. \nThe output provided by the playbook facilitates pivoting searches for possibly affected hosts, IP addresses, or users.
This playbook uses the following sub-playbooks, integrations, and scripts.
- Autofocus Query Samples, Sessions and Tags
- PAN-OS Query Logs For Indicators
- Convert file hash to corresponding hashes
|SHA256 hash for indicator to hunt.
|MD5 hash for indicator to hunt.
|SHA1 hash for indicator to hunt.
|List of IP addresses.
|List of domains or urls.
|A list of internal IP ranges to check IP addresses against. The list should be provided in CIDR notation, separated by commas. An example of a list of ranges would be: "172.16.0.0/12,10.0.0.0/8,192.168.0.0/16" (without quotes). If a list is not provided, will use default list provided in the IsIPInRanges script (the known IPv4 private address ranges).
|User or array of users that were detected during hunting.
|Id or array of id's for traps hosts detected in the searches.
|Internal IP addresses detected based on fields and inputs in your search.
|External IP addresses detected based on fields and inputs in your search.
|Internal host names detected based on fields and inputs in your search.
|External host names detected based on fields and inputs in your search.