Investigate incidents, actions, and threat intelligence reports related to a specific file or process hash on the Hash View.
Drilldown on a file or process hash on the Hash View. On this view you can investigate and take actions on SHA256 hash processes and files, and see information about a specific SHA256 hash over a defined 24-hour or 7-day time frame. In addition, you can drill down on each of the process executions, file operations, incidents, actions, and threat intelligence reports relating to the hash.
Open the Hash View.
Identify the file or process hash that you want to investigate and select Open Hash View.
In the left panel, review the overview of the hash.
Review the signature of the hash, if available.
Identify the WildFire verdict.
The color of the hash value is color-coded to indicate the WildFire report verdict:
Add an Alias or Comment to the hash value.
Review threat intelligence for the hash.
Depending on the threat intelligence sources that are integrated with Cortex XDR, the following threat intelligence might be available:
Virus Total score and report.
Note
Requires a license key. Go to
→ → → .IOC Rule, if applicable, including the IOC Severity, Number of hits, and Source according to the color-coded values:
WildFire analysis report.
Review if the hash has been added to:
Allow List or Block List.
Quarantined, select the number of endpoints to open the Quarantine Details view.
Review the recent open incidents that contain the hash as part of the incident's Key Artifacts according to the Last Updated timestamp. To dive deeper into specific incidents, select the Incident ID.
In the right hand view, use the filter criteria to refine the scope of the IP address information that you want to visualize.
Review the selected data.
To view the most recent processes executed by the hash, select Recent Process Executions. To run a query on the hash, select Search all Process Executions.
(Optional) Perform actions on the hash.