7 Palo+Alto++Cortex+XDR+ +glenn
7 Palo+Alto++Cortex+XDR+ +glenn
7 Palo+Alto++Cortex+XDR+ +glenn
Glenn Hårseide
System Engineer – Major Accounts
Palo Alto Networks
@GlennHarseide
https://inkontheside.com/2011/01/03/how-to-get-a-computer-virus/
How often do you log on to your security device(s) and check the logs?
SILOED TOOLS SLOW DOWN INVESTIGATION & RESPONSE
ROP
X
Heap Heap
Spray Spray
Utilize OS
Functions
Local analysis to stop Machine learning to Behavioral Threat Protection WildFire to detect
unknown malware prevent new malware for advanced malware unknown malware
User opens an Attack blocked;
executable file endpoint safe
Kernel Child
Malicious
Exploit Process
DLL
Prevention Protection
Drops DoublePulsar tool
Exploits Microsoft SMB
capable of injecting and Runs malicious Runs malicious
vulnerability previously
Gains kernel level privileges running malicious code by EXE DLL
patched by Microsoft
by direct kernel exploitation calling legitimate processes
Child
Known Malicious
WildFire Malicious
Threat Process Local
Process
Intelligence Protection Analysis Analysis
DLL
Runs malicious exe to collect user Protection
credentials and passwords in case Runs malicious Runs malicious
systems are not vulnerable to SMB EXE
Gains access using stolen DLL
Exploit
credentials
12 | © 2017, Palo Alto Networks. All rights reserved.
Firewalls
• Disadvantages: • Advantages:
• Has to be rolled out to all devices • Easy to implement
• Can’t inspect where its not installed • Can inspect all network traffic
• Advantages: • Disadvantages:
• Can see ’into’ encrypted traffic • Hard to inspect encrypted traffic
• Works when user is not in the office • Remote workers
• Can see everything happening on • Can’t see what is happening on
the endpoints endpoints
• Scaling • Scaling
16 | © 2018, Palo Alto Networks. All Rights Reserved.
THE RIGHT APPROACH REQUIRES THREE INTEGRATED CAPABILITIES
CORTEX
CORTEX DATA LAKE THREAT INTEL DATA
Cortex XDR
Next-Generation Traps
Firewall
Endpoint
Network User & Host File update
TCP port User name Process name
Source IP Hostname MD5/SHA Hash
Country Organizational unit File path
Dest IP
User
Operating system Registry change
Network
Sent Bytes
Received Bytes
Mac address
& Host Endpoint
Malware verdict
Threat App CLI arguments
App name
Intelligence
Protocol
Malware hashes
URL and Domain
Malicious IPs
Response Size
Threat
Phishing URLs
Response Code
URL Categories
Intel App
Referrer
Windows PC IT administrator
Standard User
Apple iPhone
1
Identify types of users &
devices by analyzing activity
Transfers 3 TB
Uses SSH protocol
of data a day
Connects to 12 non-existent
destinations a day
Connects to 1,000
hosts a day
Connects to 30
hosts a day
1 2
Identify types of users & Profile behavior of devices,
devices by analyzing activity users and groups over time
Internal Reconnaissance:
A host attempted to connect 90 non-
existent destinations; peers typically
connect to 7 non-existent destinations
1 2 3
Identify types of users & Profile behavior of devices, Detect anomalies indicative
devices by analyzing activity users and groups over time of malware, C&C, lateral
movement & exfiltration
Endpoint
Entity
Current Time Peer Profile
Network Behavior Profile Profile • Device Type:
workstation, server,
• User activity • Past user activity • Peer profile of user
server type
• Device activity • Past device activity and device activity
• User Type: admin,
standard user
Cloud
Easiest to
E xecute
Most Sop
histicate
d & Damag
ing
ENV21\Sauron
Traps alert
2
ROOT
CAUSE
12
1 2 3
See chain of events with one Automatically understand Guide analysis with context,
click from alert dashboard the root cause intel and a forensic timeline
Security Compromised
Analyst Host
File Manager Python Shell
Extend investigations with full View & retrieve files, delete processes
remote access to an endpoint and perform unlimited commands
1 2 3
Easily respond to threats Apply knowledge gained Analyze data to improve
by integrating with to detect future threats & detection and prevention
enforcement points ease investigations
• Log everything
Email: gharseide@paloaltonetworks.com