What should you do to automatically convert leads into alerts after investigating a lead?
To automatically convert leads into alerts after investigating a lead, you should create IOC rules based on the set of the collected attribute-value pairs over the affected entities concluded during the lead hunting. IOC rules are used to detect known threats based on indicators of compromise (IOCs) such as file hashes, IP addresses, domain names, etc. By creating IOC rules from the leads, you can prevent future occurrences of the same threats and generate alerts for them.Reference:
Cortex XDR 3: Handling Cortex XDR Alerts, section 3.2
Cortex XDR Documentation, section ''Create IOC Rules''
Dorsey
3 months agoMattie
3 months agoFrederic
3 months agoLeila
4 months agoAdell
4 months agoTitus
4 months agoDorothy
4 months agoTeri
4 months agoAyesha
5 months agoBok
5 months agoDomingo
5 months agoSamira
5 months agoLuisa
5 months agoMicah
5 months agoAnthony
5 months agoGladis
1 year agoBlossom
1 year agoShakira
1 year agoGianna
1 year agoShawnta
1 year agoKimberely
1 year agoRodolfo
1 year agoThad
1 year agoValentin
1 year agoMargarett
1 year agoShawnna
1 year agoRodrigo
1 year agoKizzy
1 year agoGoldie
1 year agoBambi
1 year agoOcie
1 year agoKrissy
1 year ago