Setup Overview - Administrator Guide - Cortex XDR - Cortex - Security Operations

Cortex XDR Pro Administrator Guide

Cortex XDR
Creation date
Last date published
Administrator Guide

Learn more about setting up Cortex XDR by activating the app and related apps and services.

Before you can use Cortex XDR for advanced detection and response, you must activate the Cortex XDR app and set up related apps and services.

  1. Plan Your Deployment.

    As part of your planning, ensure that you or the person activating your tenant has the appropriate role permissions.

  2. Set up Cortex XDR.

    1. Activate

    2. Assign User Roles and Permissions

    3. Allocate Log Storage License Retention

  3. Set up Palo Alto Networks Data Ingestion.

    You can configure Cortex XDR to stream data from other Palo Alto Networks products directly to your tenant. To stream data directly, you need to first deploy your network devices and then set up your Palo Alto Networks Integrations.

  4. (Optional) Set Up Cloud Identity Engine.

    1. Activate and Set Up a Cloud Identity Engine Instance.

    2. Add the Cloud Identity Engine Instance to Cortex XDR.

  5. Set up Endpoint Protection.

    1. Plan your agent deployment.

    2. Create agent installation packages.

    3. Define endpoint groups.

    4. Deploy the agent to your endpoints.

    5. Configure your endpoint security policy.

  6. Set up Network Analysis.

    1. Perform any remaining setup of your network sensors.

    2. Configure the internal networks that you want Cortex XDR to monitor.

    3. Verify that Cortex XDR is receiving alerts.

    4. If you set up a Directory Sync Service instance, enable Cortex XDR to use it.

  7. Set up your Data Sources and Alert Sensors the following:

    1. (Optional) Integrate additional threat intelligence.

    2. After 24 hours, enable Cortex XDR Analytics Analysis.

      1. Configure Network Coverage.

      2. (Recommended) Activate Pathfinder to interrogate endpoints that do not have the Cortex XDR agent installed.

    3. Define alert exclusions

    4. Prioritize incidents based on attributes by creating an incident starring policy.

    5. Import or configure rules for known BIOC and IOCs, and create any applicable Correlation Rules.

    6. (Optional) Manage External Dynamic Lists.

  8. (Optional) Set up Outbound Integration.

    • Integrate with Slack.

    • Integrate with a Syslog Server.

    • Integrate with Cortex XDR.

  9. (Optional) Set up Managed Security.

  10. Use the Interface.