Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore ZiTEqFBFQE2nZJJ8GN7I_Cortex xdr Privacy

ZiTEqFBFQE2nZJJ8GN7I_Cortex xdr Privacy

Published by Humberto Jiménez, 2023-06-07 21:09:57

Description: ZiTEqFBFQE2nZJJ8GN7I_Cortex xdr Privacy

Search

Read the Text Version

    Cortex XDR Privacy Datasheet    The purpose of this document is to provide customers of Palo Alto  Networks with information needed to assess the impact of this service  on their overall privacy posture by detailing how personal information  may be captured, processed, and stored by and within the service.  Product Summary  Cortex XDR™ by Palo Alto Networks is a cloud-based service that leverages logs, alerts, and  information from Palo Alto Networks and third-party security products. It also manages the Cortex  XDR agent, which enforces security policies on endpoints, preventing malware and data loss. Cortex  XDR performs analytics on data gathered by different sensors within the customer network and  integrates endpoint, network, and cloud data to stop sophisticated attacks; correlates security alerts  and network logs with the endpoint processes that generated the alerts; and allows customers to  investigate security alerts, search for security threats, and remotely respond to threats. Cortex XDR  can also automatically scan and analyze endpoints through an on-premises server called Cortex XDR  – Pathfinder.    Cortex XDR comprises three different product offerings:  ● Cortex XDR Prevent provides endpoint protection focused on security alerts and security  events collected by the Cortex XDR agent.  ● Cortex XDR Pro includes endpoint protection as well as detection, investigation, and  response based on agent, firewall, and cloud data.  ● Cortex XDR Managed Threat Hunting is an add-on service for Cortex XDR Pro that offers  round-the-clock monitoring from Palo Alto Networks employees on the Unit 42 threat  research team to discover advanced attacks in the customer’s organization based on data  from Cortex XDR Pro.  Information Processed by Cortex XDR Prevent  Cortex XDR Prevent processes security alerts and security events from the agent, making these  visible to the security analyst or Cortex XDR administrator, as described in the following.    Information from Endpoints  Information Collected by Cortex XDR Agents    For Cortex XDR Prevent, information collected by Cortex XDR agents includes alerts and threat  information. Alerts in the user interface include information from the endpoint that caused the  alerts, including the user and process responsible for the activity:        Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 1   

    ● Threat logs contain information about all security events logged by the Cortex XDR agent  (e.g., malware/exploit pre- ventions, post-detection events, restriction notifications).  ● Audit logs contain information about changes to the agent software, policy, or services.    Information Uploaded by Cortex XDR Administrators  To help with troubleshooting of agent functionality or security events, administrators can manually  upload the following types of information to Cortex XDR Prevent:  ● Tech support file—an aggregation of all endpoint logs and configuration files to aid  troubleshooting and diagnosis of system issues.  ● Security event data—an aggregation of all forensic data, such as memory dumps, associated  with a security event.    The Cortex XDR agent sends these files to Cortex XDR Prevent, where they are available for 30 days.  Security event data and tech support files are not transferred to Cortex™ Data Lake.    Information from Active Directory via Directory Sync Service  Optionally, customers can configure Cortex XDR Prevent to read information from the Directory  Sync service, which allows the user interface to display more accurate information about devices  and users. The Directory Sync service enables Palo Alto Networks cloud-based applications to  leverage users, computers, groups, containers, and organizational units (OUs) from customers’  on-premises Microsoft Active Directory® for use in policy and endpoint management. The Directory  Sync service uses an on-premises agent to query computer, user, and group attribute data from  Active Directory and stores said data in the Directory Sync service. A temporary instance of the  Active Directory information is stored in Cortex XDR Prevent for availability and fast response.    Information from Threat Intelligence Lookups  Information from WildFire  Palo Alto Networks WildFire® malware prevention service identifies previously unknown malware  and generates signatures that Palo Alto Networks products can use to detect and block the  malware. A Cortex XDR agent can be configured to automatically forward unknown samples to  WildFire for in-depth analysis. WildFire analyzes unknown files and email links in a scalable sandbox  environment, and then makes the report available within the user interface.    Information from AutoFocus  Palo Alto Networks AutoFocus™ contextual threat intelligence service receives threat analysis  reports and network session information from WildFire. If enabled, these reports and information are  also processed and available to view in the Cortex XDR user interface.    Information from VirusTotal  VirusTotal® is a third-party service that inspects items with more than 70 antivirus scanners and  URL/domain block-list services. If enabled, when the information in a security event matches  information from VirusTotal, that information is processed and available to view in the Cortex XDR  user interface.  Information Processed by Cortex XDR Pro  Cortex XDR Pro performs analytics and allows for deep investigation of alerts from multiple sources.  This includes logs from Palo Alto Networks Next-Generation Firewalls, Prisma™ Access logs, security        Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 2   

    events and endpoint activity logs from Cortex XDR agents, and logs and data from third-party  security products.    Information from Endpoints  Cortex XDR Pro processes all information processed by Cortex XDR Prevent as listed previously in  addition to the information listed in the following.    Information Collected by Pathfinder  If enabled, Pathfinder automatically logs in and scans end-points to collect the information shown in  table 1 when devices are newly discovered, anomalous network activity is detected, or an  administrator performs an on-demand scan. Pathfinder analyzes the collected information and  sends select processes, executables, and modules to WildFire for threat intelligence lookups.    Information Collected by Cortex XDR Agents  Cortex XDR agents can be enabled to collect endpoint activity logs, threat logs, and audit logs on an  ongoing basis. These logs can be collected from Windows®, Linux, and macOS® endpoints. To  accurately detect threats, enforce security policies, and help with troubleshooting of agent  functionality, the logs described in the following sections are forwarded to Cortex Data Lake for  processing by Cortex XDR Pro.    Process Activity Logs  Process activity logs contain data about users and how the process is executed. This includes the  user who started the process, with name and directory path. The data also contains unique  information about the process to help with analytics, including its hash values, thread IDs, and any  command line arguments the process uses on execution.    File Activity Logs  File activity logs contain information on operations to specific binaries and applications. This  information includes the user or process that renamed or wrote information of the file.    Network Activities Logs  Network activities logs contain information about outgoing and incoming network connections  performed by a user, process, or network. This includes information such as user, process, source  and destination IP addresses, ports, protocol, local hostname, remote hostname, and destination  country.    Registry Activity Logs  Registry activity logs contain information about Windows registry keys, including the value, type of  key, and any name of the key. Information about users or processes that create or change registry  keys is also logged.    Event Logs  Event logs contain records of system, security, and application notifications stored by the Windows  operating system (OS) and can aid in the investigation of a compromised system.          Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 3   

    Miscellaneous Information  Miscellaneous information that describes the operating system and hashes of files on the endpoint  is also collected. Change events related to user logins or logouts, and changes to the Windows OS,  such as reboots and agent restarts, are also collected.    Information from Firewall Logs  Cortex XDR Pro is able to process logs and security events from both Palo Alto Networks firewalls  and third-party firewalls.    Information from Palo Alto Networks Firewalls  The customer can fully configure which of the available types of logs to send to Cortex Data Lake.    Cortex XDR Pro analyzes firewall traffic logs, which contain basic information about internal and  external network connections. Cortex XDR Pro also analyzes URL Filtering logs, which contain  information about websites accessed by devices and users. Cortex XDR Pro also processes security  alerts which contain information about security violations or threats in a customer network. Finally,  Cortex XDR Pro analyzes enhanced application logs, which contain information about how devices  are connected to the internal network, such as Dynamic Host Configuration Protocol logs when a  device joins a Wi-Fi network, and the types of requests devices make to other hosts, such as DNS  queries and responses. Analysis identifies network connectivity patterns from users and devices.  Alerts are triggered and automatically grouped into incidents using detection algorithms that  compare current network and application patterns against historical and peer-group patterns.    Information from Third-Party Firewalls  Cortex XDR Pro analyzes traffic logs, sometimes called session logs, from third-party firewalls. Cortex  XDR Pro also processes security alerts from third-party firewalls.    Information from Domain Controllers  Event logs from domain controllers (DCs) can be forwarded to Cortex XDR for processing. These  event logs contain information about user authentication attempts within the network.    Information from Third-Party Authentication Providers  Logs from single-sign-on (SSO) authentication providers (Okta® Verify, PingID®, and Azure® Active  Directory) can be forwarded to Cortex XDR for processing. These logs contain information about user  authentication attempts to company resources, such as software as a service (SaaS) applications.  Information Processed by Cortex XDR Managed Threat Hunting  The Cortex XDR Managed Threat Hunting service processes, in read-only format, all information  processed by Cortex XDR Pro as listed previously.  Purpose of Information Processed by Cortex XDR  All information processed by Cortex XDR allows the customer to view on the user interface all alerts  generated by the covered customer’s security and networking products, as well as manage and  configure the endpoint agents and security policies. The interface also provides customers with the  ability to view the description of the alerts, and with options to analyze the alerts in more detail  through information in the Cortex Data Lake or from information collected by the Cortex XDR agent.        Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 4   

    For Cortex XDR Pro, the interface also allows customers to search through the logs in Cortex Data  Lake as well as create and apply rules that can generate alerts by analyzing such logs. The Cortex  XDR Pro service can identify user and device patterns across the network as well as detect anomalies  from such patterns.    For customers using the Cortex XDR Managed Threat Hunting service, Cortex XDR data from each  customer is processed by applying detection algorithms as well as manual searching, viewing, and  validation to uncover new threats. Any new threat discovered triggers an incident with a report for  review in the customer’s Cortex XDR user interface so that the customer can determine which  incidents require additional investigation and reach out to affected end users.    The information Cortex XDR processes can be grouped into five categories, described here. This  information provides context for security analysts investigating alerts or searching for threats in their  environments.    1. User Information  User information is used to associate patterns of activity with a specific user’s network account. This  helps security teams attribute anomalous network activity or processes to a more reliable source,  whether an individual or a shared account, rather than relying only on the IP address.    2. Device Information  Device information—in the form of hostnames, fully qualified hostnames, and MAC addresses—is  used to identify the source and destination of anomalous network and end-point activity, which  could be a laptop, workstation, server, internet-connected device, or network infrastructure device.    This helps security teams investigate anomalous activity even when it cannot be attributed to a  specific user.    3. Network Addresses  Network addresses—in the form of IP subnets or IP addresses—are used to identify the sources and  destinations of anomalies. This helps security teams investigate anomalous activity even when it  cannot be attributed to a specific user account or network device. It also helps security teams  investigate possible attacks targeting high-risk servers or parts of the network.    4. Endpoint Information  Endpoint information—in the form of executable files, loaded modules and processes, event and  system logs, and file and registry activity—is used to identify the digital source of anomalous  network activity and alert security teams to potential zero-day attacks. This also helps security teams  authorize network activity related to software or users performing their job functions, such as  administrators using specific tools.    5. Other Information  Other information, such as URLs and domains, can help identify the destination or possible source of  network activity. Websites often contain malicious payloads or can be used as servers to control  internal devices.        Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 5   

    Examples of Information Processed by Cortex XDR Prevent, Pro, and  Managed Threat Hunting Service  Table 1: Information Processed by Cortex XDR Prevent, Pro, and Managed Threat Hunting (MTH)  Category  Source  Info Processed by  Example(s)  Processed By  Cortex XDR  Firewall logs, Cortex XDR agent  Domain and  company\\ johnsmith   Prevent, Pro, and  logs, and Directory Sync service   username   MTH  Cortex XDR agent logs  Username  Jsmith or Jane.Doe  Prevent, Pro, and  (Windows)  MTH  Cortex XDR agent logs (Linux)   Username   root or postgres or mysql  Prevent, Pro, and  MTH  Cortex XDR agent   Workgroup   Marketing-Group  Prevent, Pro, and  MTH  Directory Sync service   User distinguished  CN=Username1, OU=Americas,  Prevent, Pro, and  name  OU=Users, OU=Company,  MTH  DC=Company, DC=Local  User Info  Directory Sync service   Full name or display  John W. Smith  Prevent, Pro, and  name   [email protected]   MTH  Firewall logs and Directory  Sync service  Email address   Pro and MTH  Directory Sync service   Organization unit  Company/Users/Americas  Prevent, Pro, and  from Active Directory   MTH  Directory Sync service   Phone number   444-555-6666  Prevent, Pro, and  MTH  Pathfinder   Username   Johnsmith  Pro and MTH  Windows Event Collector   Username   company\\ johnsmith or  Pro and MTH  Johnsmith  SSO Authentication Logs  Username  Johnsmith  Pro and MTH  SSO Authentication Logs  Email Address  [email protected]  Pro and MTH  SSO Authentication Logs  Company Name  my_company  Pro and MTH  Palo Alto Networks firewall logs  MAC address  00-11-22-AA-BB-CC  Pro and MTH  (enhanced application log)   Device  Cortex XDR agent logs   Hostname of devices   ABCD-WIN-LAPTOP  Prevent, Pro, and  Info  Hostname of devices  123-MACBOOK  MTH  Palo Alto Networks firewall logs  (enhanced application log)   ABCD-WIN-LAPTOP   Pro and MTH  123-MACBOOK  Firewall logs (enhanced  Domain name  www.google.com   Pro and MTH  application log)   www.badsite.com  internalserver.company.com          Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 6   

        Table 1: Information Processed by Cortex XDR Prevent, Pro, and Managed Threat Hunting (MTH)  (continued)  Category  Source  Info Processed by  Example(s)  Processed By  Cortex XDR  Firewall logs   Other names used by  vsys1 or trust-zone or   Pro and MTH  firewall configuration   untrust-zone or US-DMZ  Directory Sync service   Host distinguished  CN=Computer1, OU=Region,  Prevent, Pro, and  name  OU=Computers, OU=Company,  MTH  DC=Company, DC=Local  Directory Sync service   Organizational unit  Company/Computers/Region  Prevent, Pro, and  Directory Sync service   Operating system   MTH  Device  Info  Prevent, Pro, and  MTH  Windows 10 Enterprise  Directory Sync service   Operating system  10.0 (14393)  Prevent, Pro, and  version  MTH  Firewall logs   Name of firewall   NA-Firewall or DC1-Firewall  Pro and MTH  SSO Authentication Logs  Name of zone  Company_IP_Zone1  Pro and MTH  Cortex XDR agent logs  IP address or subnet  10.1.1.10, 10.10.10.10, 192.168.1.16,  Prevent, Pro, and  (e.g., source device,  172.16.0.0/16  MTH  destination device)  Cortex XDR agent logs  IP address of network  10.1.1.1, 192.168.1.254  Prevent, Pro, and  infrastructure devices  MTH  (e.g., NAT devices,  routers, DNS servers,  DHCP servers, domain  controllers, mail  servers)   Network  Firewall logs  IP address or subnet  10.1.1.10, 10.10.10.10, 192.168.1.16,  Pro and MTH  Addresses  (e.g., source device,  172.16.0.0/16  destination device)   Firewall logs   IP address of network  10.1.1.1, 192.168.1.254  Pro and MTH  infrastructure devices  (e.g., NAT devices,  routers, DNS servers,  DHCP servers, domain  controllers, mail  servers)   SSO Authentication Logs  Source IP Address  100.100.100.100  Pro and MTH  Destination IP Address                    Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 7   

      Table 1: Information Processed by Cortex XDR Prevent, Pro, and Managed Threat Hunting (MTH)  (continued)  Category  Source  Info Processed by  Example(s)  Processed By  Cortex XDR  Pathfinder  List of running  C:\\Windows\\System32\\  Pro and MTH  processes, loaded  svchost.exe   modules, installed    executables, and their  command arguments  C:\\Program Files\\Microsoft  Office\\ office15\\excel.exe -dde  Pathfinder   Installed and portable  C:\\Windows\\System32\\ping. exe  Pro and MTH  executable files,  server.company.com  loaded modules,    autoruns, and their  C:\\Program Files\\Realtek\\ audio\\  command arguments  hda\\ravbg64.exe /im  Cortex XDR agent   Installed programs,  C:\\Program  Prevent, Pro,  including working  Files\\Nmap\\Nmap.exe  and MTH  directory  Cortex XDR agent (Windows)   Process activity logs   Process:  Prevent, Pro,  c:\\Windows\\System32.net.exe”  and MTH  user Administrator MyPassword     Process: C:\\Program Files\\7-  Zip\\7zFM.exe Started with CMD:  “C:\\Program Files\\7-  Zip\\7zFM.exe” “C:\\Users\\  MarySmith\\Downloads\\  suspicious_file.zip”  Endpoint  Cortex XDR agent   Process activity logs   Process: /usr/bin/passwd   Prevent, Pro,  Info  (Linux or macOS)   Started with CMD: /usr/bin/  and MTH  passwd alincoln  Cortex XDR agent (Windows)   File activity logs   Type: File Create Path: C:\\  Pro and MTH  Users\\JDo\\ Desktop\\Data.zip.  tmp     Type: File Rename Path: C:\\  Users\\JDo\\ Desktop\\Data.zip  Cortex XDR agent   File activity logs   Type: File Read Path: /home/  Pro and MTH  (Linux or macOS)  alincoln/a.txt or     Type: File Read Path:  /Users/alincoln/a.txt  Type: Network Outgoing Source:  Cortex XDR agent (Windows,  Network activity logs   10.201.113.22:2563 to  Pro and MTH  Linux, and macOS)   192.168.1.100:443 (server.  company.com)  Cortex XDR agent (Windows)   Registry activity logs   Type: Registry Key Create Key:  Pro and MTH  HKEY_USERS\\S-1-5-21-  937295531-4040087734-  563264647-1111\\Software\\  Microsoft\\Windows\\  CurrentVersion\\Explorer\\  RunMRU Value: null         Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 8   

        Table 1: Information Processed by Cortex XDR Prevent, Pro, and Managed Threat Hunting (MTH)  (continued)  Category  Source  Info Processed by  Example(s)  Processed By  Cortex XDR  Cortex XDR agent   Endpoint event logs   Task Scheduler started  Pro and MTH  “CUSTOM-NAME” task for user  Endpoint  Info  “COMPANY\\PC1”     Starting periodic policy  processing for user  DEMO-CORP\\ Administrator  Cortex XDR agent (Windows,  Miscellaneous logs  Host Status: Logon   Pro and MTH  Linux, and macOS)    Host Status: Logoff  Palo Alto Networks firewall  URLs  https://outlook.office365.  Prevent, Pro,  logs (URL filtering logs  com/EWS/ Exchange.asmx  and MTH  and enhanced application    logs) and possibly  https://mg.mail.yahoo.com/  neo/m/ launch?&filterBy=&-  third-party firewall logs  fid=Inbox&fidx= 1&ac=DST-    VMBzTbaVaamXPZAnd cVW-  Z22g-&rand=1966219345&nsc  https://www.linked.com/  johnsmith  SSO Authentication Logs  Geolocation  San Jose, California, US  Pro and MTH  latitude: 11.111111,  Tech support file (if a  Prevent, Pro,  support case is open)  longitude:-22.2222  and MTH  Other    Agent logs, including agent settings,   Info  agent actions, security events    Windows OS event logs: Application,   HardwareEvents, Security, System    Custom event logs: ““Palo-Alto-Networks”,” Certificates  and Certificate Stores Firewall settings  Security event file  Memory dump, recently opened documents as cached  Prevent, Pro,  by the application related to the security event   and MTH    Browser open tabs    File metadata: file extension, file size, creation date, last  modified, file version, signer, trusted, last accessed           Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 9   

    Summary of Data Sources  Table 2: Data Sources Customers Can Enable and Configure*  Data Category  Configuration Possible?  Palo Alto Networks Next-Generation Firewall   Yes, by policy (source, user, destination)  Palo Alto Networks Cortex XDR agent   Yes, by policy (user, device)  Palo Alto Networks Directory Sync service   Yes, one or more Active Directory domains  Pathfinder, through Broker VM   Yes, enabled by network segment  Third-party firewalls   Yes, by firewall configuration  Domain controllers (DC) through event log forwarding   No, enabled per DC; actual event logs from the DC  cannot be changed by customer  Authentication logs from SSO providers  No, must be enabled across entire organization  Uploaded/Retrieved items (e.g., support file or retrieved  No, must be enabled by the administrator for all  files)   endpoints  *By default, these data sources are disabled.  How Cortex XDR Addresses EU Data Protection Laws  Processing personal data to ensure network and information security—for instance, through the  Security Operating Platform® and Cortex products—is broadly recognized as a legitimate interest  and is specifically called out as such in the EU General Data Protection Regulation:    (49) The processing of personal data to the extent strictly necessary and proportionate for the  purposes of ensuring network and information security, i.e. the ability of a network or an  information system to resist, at a given level of confidence, accidental events or unlawful or  malicious actions that compromise the availability, authenticity, integrity and confidentiality of  stored or transmitted personal data, and the security of the related services offered by, or accessible  via, those networks and systems, by public authorities, by computer emergency response teams  (CERTs), computer security incident response teams (CSIRTs), by providers of electronic  communications networks and services and by providers of security technologies and services,  constitutes a legitimate interest of the data controller concerned. This could, for example, include  preventing unauthorized access to electronic communications networks and malicious code  distribution and stopping ‘denial of service’ attacks and damage to computer and electronic  communication systems.1    Where a service provider, such as Palo Alto Networks, processes personal data to ensure network  and information security, this is a legitimate interest of the service provider and its customers. Such  legitimate interest provides a basis for the processing of personal data by Palo Alto Networks under  EU data protection laws. This legitimate interest generally also provides a basis for customers  1 \"GDPR, recital 49; see also Article 29 Working Party Opinion 06/2014 on the notion of legitimate interest of the data controller, WP217, adopted  9 April 2014, p. 24–25.          Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 10   

    analyzing personal data through Cortex XDR, in accordance with privacy or regulatory requirements  that may prevent customers from sharing certain data. In such an event, customers can limit data  processing or access to data by using their privacy options, as described herein, when configuring  their firewalls.  How Palo Alto Networks Complies with Data Protection Rules  Palo Alto Networks is committed to protecting personal data processed by Cortex XDR. We will not  access the content of the information in a way that would allow us to acquire meaningful  information about natural persons except where it is necessary for identifying security threats or  investigating suspicious activities indicative of attacks.    Any logs stored on or processed by Palo Alto Networks systems are secured with state-of-the-art  technologies, and Palo Alto Networks operates rigorous technical and organizational security  controls. Logs and information forwarded to a given regional data center will be kept in that region.  As Palo Alto Networks is a multinational company, there may be a need, in some cases, to share logs  and information with Palo Alto Networks offices in other regions. We will do so in compliance with  applicable requirements for transfer of personal data, including the EU Standard Contractual  Clauses as approved by the European Commission, or other legal instruments for the transfer of  personal data, provided for in EU data protection law.  Subprocessors  Data processed by Cortex XDR is hosted in Google Cloud Platform (GCP®) data centers in the  regions the customer selects.  Customer Privacy Options  Customers can designate a Cortex XDR region, among those available, for the storage and  processing of their data. Customers may also assign each Cortex XDR instance to a regional instance  of Cortex Data Lake and Directory Sync service. Accordingly, Cortex XDR, Cortex Data Lake, and  Directory Sync service data is stored in the chosen region. The Cortex XDR Managed Threat Hunting  tenant will also run in the same region. Access by the Cortex XDR Managed Threat Hunting team is  global.    While travelling, Cortex XDR agents will be able to query the closest region for a hash verdict from  WildFire, but they will only upload the files for analysis to the chosen region. Customers’ system  administrators can use the granular policy settings in Cortex XDR to manage or restrict uploads of  unknown files to WildFire as well as select which file formats to upload to WildFire.    Customers can configure job roles to limit the functions of the administrator or security analysts,  such as gathering support files from the Cortex XDR agent or allowing read-only access to the  Cortex XDR user interface.  Retention  Cortex XDR applies retention policies that purge data once it is no longer needed for the purpose for  which it was collected. Cortex XDR retains copies of the most recent three days of logs. It also  aggregates logs into summary logs for efficient processing and stores these for 30 days. To enable  customers to perform queries in a timely manner, Cortex XDR processes and stores copies of query        Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 11   

    results. Older copies will be deleted as the temporary storage reaches capacity, and all copies are  deleted upon termination of the service.    If an algorithm or rule triggers an alert, Cortex XDR retains the processed information for 180 days for  the purposes of investigation. If enabled, endpoint and user information collected by Pathfinder will  be available in Cortex XDR for 30 days if there are no alerts attributed to that endpoint or user. If  alerts are attributed to an endpoint, information collected by Pathfinder will be available for 180 days  to give security analysts the information they need for investigation at a later time. If collected,  endpoint activity logs from Cortex XDR agents will be available in the Cortex Data Lake for 30 days or  as configured by the customer. Upon termination of the Cortex XDR service, the information  generated by Pathfinder as well as all data in Cortex XDR will be marked for deletion.    Upon expiration of the Cortex XDR Managed Threat Hunting license, the service and access to the  data by the Managed Threat Hunting team will be phased out within seven days.    Upon termination of the Cortex XDR service, access to the user interface and collection of agent logs  are disabled after two days, while firewall logs are processed by Cortex XDR for up to 30 days after  termination. Afterward, data in active systems in Cortex XDR will be marked inactive and removed  from the active systems. Permanent deletion of all data may take up to an additional 180 days.  Access and Disclosure  Access by Customers  Customers can access the information about the alerts through the Cortex XDR user interface,  including WildFire reports, if applicable to the alert. Customers can also access information about  endpoint activity logs and firewall logs through the Cortex XDR user interface. Additionally, to access  firewall and Prisma Access logs in Cortex Data Lake, customers can use the Panorama™ network  security management interface and the Explore app.  If enabled, Cortex XDR processes enhanced application logs separately from other logs within Cortex  Data Lake. Customers can view the results of such processing through the Cortex XDR user interface.  To access the Cortex XDR user interface, customers must configure roles for users in their  organization. Depending on the role assigned to the user, they will be able to only view certain  screens or can be limited to performing certain actions. For more details, see the technical  documentation about Cortex XDR roles.  Access by Palo Alto Networks  Access to information in Cortex XDR and Cortex Data Lake is restricted to Palo Alto Networks Site  Reliability Engineers (SREs), threat research and analytics teams, and—when a support case is  opened—customer support teams. Access is allowed for the purposes of troubleshooting, solving  issues, and improving the effectiveness of security protections. All access is recorded and audited.  Access privileges are managed by Engineering leadership.  When a customer initiates the Cortex XDR Managed Threat Hunting service, this automatically  grants read-only access by Palo Alto Networks to the Cortex XDR tenant. Additionally, the Cortex XDR  Managed Threat Hunting service has write access to the customer's Cortex XDR service solely to  generate incidents with reports.           Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 12   

          Security of Data  Palo Alto Networks has achieved SOC 2 Type II certification for Cortex Data Lake and Cortex XDR  to demonstrate its strong security policies and internal controls environment. For information  about security protections in the data centers where Cortex XDR data resides, please visit the Google  Compliance resource center.  Information processed by Cortex XDR is encrypted both in transit and at rest. Logs from  third-party firewalls and Windows event logs from domain controllers are sent to an on-premises  broker VM, encrypted in transit, and sent to Cortex XDR Pro in the region the customer selects.          Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 13   

    Resources  See the following resources for additional information about Cortex and related Palo Alto Networks  products and services:  ● Cortex XDR   ● Cortex Data Lake  ● Panorama  ● Palo Alto Networks hub  ● Explore app  ● Directory Sync service  ● WildFire  ● Trust Center  ● Cortex XDR Managed Threat Hunting   Other Information  Multiple elements of Palo Alto Networks services work directly with Cortex XDR.    Cortex Data Lake  Cortex Data Lake is a cloud-based logging infrastructure that lets customers centralize the  collection and storage of logs generated by Cortex XDR agents, Next-Generation Firewalls, Prisma  Access, and third-party products.    WildFire  WildFire is a malware prevention service that identifies previously unknown malware and generates  signatures that Palo Alto Networks Next-Generation Firewalls and Cortex XDR agents can use to  detect and block the malware. When an agent detects an unknown sample, such as attempts to run  a macro, DLL, or executable file, Cortex XDR can be configured to automatically forward the sample  to WildFire for in-depth analysis. WildFire analyzes unknown files and email links in a scalable  sandbox environment.  About This Datasheet  Please note that the information provided with this paper concerning technical or professional  subject matter is for general awareness only, may be subject to change, and does not constitute  legal or professional advice, warranty of fitness for a particular purpose, or compliance with  applicable laws.            3000 Tannery Way  © 2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo Alto Networks.     Santa Clara, CA 95054  A list of our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html.   All other marks mentioned herein may be trademarks of their respective companies.  Main: +1.408.753.4000  Sales: +1.866.320.4788  Support: +1.866.898.9087  www.paloaltonetworks.com          Cortex by Palo Alto Networks | Cortex XDR Privacy | Datasheet | 14   


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook