What allows the use of predetermined Palo Alto Networks roles to assign access rights to Cortex XDR users?
Which service helps uncover attackers wherever they hide by combining world-class threat hunters with Cortex XDR technology that runs on integrated endpoint, network, and cloud data sources?
What is used to display only file entries in a War Room?
A customer wants to modify the retention periods of their Threat logs in Cortex Data Lake.
Where would the user configure the ratio of storage for each log type?
How can Cortex XSOAR save time when a phishing incident occurs?
Which two types of lOCs are available for creation in Cortex XDR? (Choose two.)
A customer has 2700 endpoints. There is currently concern about recent attacks in their industry and threat intelligence from a third-party subscription. In an attempt to be proactive, phishing simulations have been prioritized, but the customer wants to gain more visibility and remediation capabilities specific to their network traffic.
Which Cortex product provides these capabilities?
Which type of log is ingested natively in Cortex XDR Pro per TB?
A Cortex XSIAM customer is unable to access their Cortex XSIAM tenant.
Which resource can the customer use to validate the uptime of Cortex XSIAM?
"Bob" is a Demisto user. Which command is used to add 'Bob" to an investigation from the War Room CLI?