Setup Overview - Administrator Guide - Cortex XDR - Cortex - Security Operations

Cortex XDR Pro Administrator Guide

Cortex XDR
Creation date
Last date published
Administrator Guide

Before you can use Cortex XDR for advanced detection and response, you must activate the Cortex XDR app and set up related apps and services.

  1. Plan Your Deployment.

    As part of your planning, ensure that you or the person activating your tenant has the appropriate role permissions.

  2. Set up Cortex XDR.

    1. Activate

    2. Assign User Roles and Permissions

    3. Allocate Log Storage License Retention

  3. Set up Palo Alto Networks Data Ingestion.

    You can configure Cortex XDR to stream data from other Palo Alto Networks products directly to your tenant or via Cortex Data Lake. To stream data directly, you need to first deploy your network devices and then set up your Palo Alto Networks Integrations.


    Cortex Data Lake licenses created as a part of existing Cortex XDR Licenses will remain intact until the end of your remaining contract.

  4. Cortex XDR provides a built-in mail sender integration. An email integration enables the server to send emails and can be used for system notifications and playbooks. However, if you want to use a different email sender, you can configure one during your initial setup.

  5. (Optional) Set Up Cloud Identity Engine.

    1. Activate and Set Up a Cloud Identity Engine Instance.

    2. Add the Cloud Identity Engine Instance to Cortex XDR.

  6. Set up Endpoint Protection.

    1. Plan your agent deployment.

    2. Create agent installation packages.

    3. Define endpoint groups.

    4. Deploy the agent to your endpoints.

    5. Configure your endpoint security policy.

  7. Set up Network Analysis.

    1. Perform any remaining setup of your network sensors.

    2. Configure the internal networks that you want Cortex XDR to monitor.

    3. Verify that Cortex XDR is receiving alerts.

    4. If you set up a Directory Sync Service instance, enable Cortex XDR to use it.

  8. Set up your Data Sources and Alert Sensors the following:

    1. (Optional) Integrate additional threat intelligence.

    2. After 24 hours, enable Cortex XDR Analytics Analysis.

      1. Configure Network Coverage.

      2. (Recommended) Activate Pathfinder to interrogate endpoints that do not have the Cortex XDR agent installed.

    3. Define alert exclusions

    4. Prioritize incidents based on attributes by creating an incident starring policy.

    5. Import or configure rules for known BIOC and IOCs, and create any applicable Correlation Rules.

    6. (Optional) Manage External Dynamic Lists.

  9. (Optional) Set up Outbound Integration.

    • Integrate with Slack.

    • Integrate with a Syslog Server.

    • Integrate with Cortex XDR.

  10. (Optional) Set up Managed Security.

  11. Use the Interface.