During a sophisticated cyber attack, a company experiences a stealthy, multivector intrusion that evades detection by traditional security tools. The company requires a solution that will correlate and analyze the disparate attack indicators across its network, endpoints, and cloud environments to uncover the full scope of the breach and take immediate automated response actions. Which solution should be recommended?
In which scenario would an organization benefit from Cortex XDR compared to an EDR solution?
An analyst wants to create a detection rule that triggers when any process attempts to perform code injection into the lsass.exe process, regardless of whether the file hash of the source process is known to be malicious. Which type of rule should be created?
Which solution will minimize mean time to resolution (MTTR) when, as a result of previous malware infection, a company’s Windows endpoint is suffering a small amount of file corruption and modified registry keys?
What can be used to triage and determine if an artifact in Cortex XDR is malicious? (Choose one answer)
A customer is investigating a security incident in which unusual network traffic is observed and a malicious process is identified on an endpoint. Which Cortex XDR capability assists with correlating firewall network logs and endpoint data in this environment?
Where in Cortex XSOAR are analysts able to collaborate and converse with others for joint real-time investigations?