Cortex XDR Endpoint Events
Rich endpoint telemetry collected by Cortex XDR agents including process executions, file operations, network connections, registry modifications, and behavioral data for threat detection and forensic investigation
Quick Facts
Default Path (Linux)
Cortex XDR Console > Investigation > Query CenterDocker
N/A - Agent-based collectionDefault Format
JSON (via API) / CEF (via SIEM forwarding)
JSON Native
Yes
Rotation
Cloud-based retention (configurable 30-180 days)
Log Example
Default format: JSON Format (API/XQL)
Example Log Entrylog
{
"event_id": "abc123def456",
"event_type": "PROCESS",
"event_sub_type": "PROCESS_START",
"event_timestamp": 1704200000000,
"endpoint_id": "e1f2a3b4c5d6",
"endpoint_name": "WORKSTATION-01",
"endpoint_domain": "corp.local",
"endpoint_os": "Windows 10",
"agent_version": "8.2.0.12345",
"action_process_image_name": "powershell.exe",
"action_process_image_path": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"action_process_image_sha256": "a1b2c3d4e5f6...",
"action_process_command_line": "powershell.exe -ExecutionPolicy Bypass -File script.ps1",
"action_process_signature_vendor": "Microsoft Corporation",
"action_process_signature_status": "SIGNED",
"actor_process_image_name": "cmd.exe",
"actor_process_image_path": "C:\\Windows\\System32\\cmd.exe",
"actor_process_pid": 4532,
"actor_primary_user_sid": "S-1-5-21-...",
"actor_primary_username": "jsmith",
"causality_actor_process_image_name": "explorer.exe",
"causality_actor_causality_id": "xyz789"
}Structure:
Nested JSON with event-specific fields based on event typePaths by Platform
Agent Logs
/var/log/traps/Available Formats
JSON Format (API/XQL)
Default
Example:
{
"event_id": "abc123def456",
"event_type": "PROCESS",
"event_sub_type": "PROCESS_START",
"event_timestamp": 1704200000000,
"endpoint_id": "e1f2a3b4c5d6",
"endpoint_name": "WORKSTATION-01",
"endpoint_domain": "corp.local",
"endpoint_os": "Windows 10",
"agent_version": "8.2.0.12345",
"action_process_image_name": "powershell.exe",
"action_process_image_path": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"action_process_image_sha256": "a1b2c3d4e5f6...",
"action_process_command_line": "powershell.exe -ExecutionPolicy Bypass -File script.ps1",
"action_process_signature_vendor": "Microsoft Corporation",
"action_process_signature_status": "SIGNED",
"actor_process_image_name": "cmd.exe",
"actor_process_image_path": "C:\\Windows\\System32\\cmd.exe",
"actor_process_pid": 4532,
"actor_primary_user_sid": "S-1-5-21-...",
"actor_primary_username": "jsmith",
"causality_actor_process_image_name": "explorer.exe",
"causality_actor_causality_id": "xyz789"
}Structure:
Nested JSON with event-specific fields based on event typeCEF Format (SIEM Forwarding)
Example:
CEF:0|Palo Alto Networks|Cortex XDR|8.2|PROCESS|Process Execution|5|rt=1704200000000 dhost=WORKSTATION-01 duser=jsmith fname=powershell.exe fpath=C:\Windows\System32\WindowsPowerShell\1.0\powershell.exe cs1=powershell.exe -ExecutionPolicy Bypass -File script.ps1 cs1Label=CommandLine fileHash=a1b2c3d4e5f6...Structure:
Common Event Format for SIEM integration via Broker VMLEEF Format (IBM QRadar)
Example:
LEEF:2.0|Palo Alto Networks|Cortex XDR|8.2|PROCESS|devTime=1704200000000 devTimeFormat=epoch dst=WORKSTATION-01 usrName=jsmith fileName=powershell.exe filePath=C:\Windows\System32\WindowsPowerShell\1.0\powershell.exeStructure:
Log Event Extended Format for QRadar integrationFields Reference
| Field | Type | Description | Example |
|---|---|---|---|
event_id | string | Unique identifier for the event | abc123def456 |
event_type | string | Primary event type category | PROCESS |
event_sub_type | string | Specific event subtype | PROCESS_START |
event_timestamp | integer (milliseconds) | Event timestamp in epoch milliseconds | 1704200000000 |
endpoint_id | string | Unique identifier for the endpoint | e1f2a3b4c5d6 |
endpoint_name | string | Hostname of the endpoint | WORKSTATION-01 |
endpoint_domain | string | Domain the endpoint belongs to | corp.local |
endpoint_os | string | Operating system of the endpoint | Windows 10 |
endpoint_os_version | string | Full OS version string | 10.0.19045 |
agent_version | string | Version of the Cortex XDR agent | 8.2.0.12345 |
action_process_image_name | string | Name of the process being executed (target process) | powershell.exe |
action_process_image_path | string | Full path to the process executable | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe |
action_process_image_sha256 | string | SHA256 hash of the process executable | a1b2c3d4e5f67890abcdef1234567890abcdef1234567890abcdef1234567890 |
action_process_command_line | string | Full command line of the executed process | powershell.exe -ExecutionPolicy Bypass -File script.ps1 |
action_process_pid | integer | Process ID of the action process | 1234 |
action_process_signature_vendor | string | Vendor name from the digital signature | Microsoft Corporation |
action_process_signature_status | string | Digital signature verification status | SIGNED |
actor_process_image_name | string | Name of the parent process that initiated the action | cmd.exe |
actor_process_image_path | string | Full path to the parent process | C:\Windows\System32\cmd.exe |
actor_process_pid | integer | Process ID of the parent/actor process | 4532 |
actor_process_command_line | string | Command line of the parent process | cmd.exe /c start.bat |
actor_primary_user_sid | string | Windows SID of the user running the process | S-1-5-21-1234567890-1234567890-1234567890-1001 |
actor_primary_username | string | Username running the process | jsmith |
causality_actor_process_image_name | string | Root process that initiated the causality chain | explorer.exe |
causality_actor_causality_id | string | Unique identifier linking related events in a causality chain | xyz789abc123 |
action_file_name | string | Name of the file involved in file events | malware.exe |
action_file_path | string | Full path of the file involved in file events | C:\Users\jsmith\Downloads\malware.exe |
action_file_sha256 | string | SHA256 hash of the file | b2c3d4e5f67890abcdef1234567890abcdef1234567890abcdef1234567890ab |
action_file_size | integer (bytes) | Size of the file in bytes | 524288 |
action_remote_ip | ip | Remote IP address for network events | 203.0.113.50 |
action_remote_port | integer | Remote port for network events | 443 |
action_local_ip | ip | Local IP address for network events | 192.168.1.100 |
action_local_port | integer | Local port for network events | 54321 |
action_network_protocol | string | Network protocol used | TCP |
dns_query_name | string | DNS query hostname | malicious-domain.com |
action_registry_key_name | string | Registry key path for registry events | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
action_registry_value_name | string | Registry value name | MalwareStartup |
action_registry_data | string | Data written to the registry value | C:\ProgramData\malware.exe |
module_sha256 | string | SHA256 hash of loaded module/DLL | c3d4e5f67890abcdef1234567890abcdef1234567890abcdef1234567890abcd |
module_path | string | Path to the loaded module/DLL | C:\Windows\System32\kernel32.dll |
Parsing Patterns
Grok Patterns
json:
# XQL queries return JSON - use JSON parser
# Example XQL: dataset = xdr_data | filter event_type = PROCESSRegular Expressions
cef:
CEF:\d+\|Palo Alto Networks\|Cortex XDR\|(?P<version>[^|]+)\|(?P<event_type>[^|]+)\|(?P<event_name>[^|]+)\|(?P<severity>\d+)\|(?P<extensions>.*)Collector Configurations
splunkyaml
1# Cortex XDR to Splunk via SIEM Integration2[cortex:xdr:endpoint]3TIME_FORMAT = %s%3N4TIME_PREFIX = rt=5SHOULD_LINEMERGE = false6KV_MODE = none7TRUNCATE = 6553589# Search for process events10index=cortex_xdr sourcetype="cortex:xdr:endpoint" event_type=PROCESS11| stats count by action_process_image_name, actor_primary_username, endpoint_name1213# Hunt for PowerShell with suspicious flags14index=cortex_xdr sourcetype="cortex:xdr:endpoint" action_process_image_name="powershell.exe"15| search action_process_command_line IN ("*-enc*", "*-ExecutionPolicy Bypass*", "*-nop*", "*IEX*", "*DownloadString*")16| table _time, endpoint_name, actor_primary_username, action_process_command_lineConfiguration
Enable Logging
Configure Cortex XDR data collection profiles
# Via Cortex XDR Console
# Navigate to: Settings > Endpoint Security > Profiles > Agent Settings
# Enable comprehensive data collection:
1. Process Execution Data: Enable
2. Network Data Collection: Enable
3. File Access Monitoring: Enable
4. Registry Monitoring: Enable (Windows)
5. Script Execution Analysis: Enable
# Data Collection Levels:
- Standard: Basic process/file/network events
- Enhanced: Adds command line, registry, module loads
- Maximum: Full behavioral telemetry (higher storage)Higher collection levels increase storage consumption in Cortex Data Lake
Log To Syslog
Configure SIEM forwarding via Broker VM
# Deploy Cortex XDR Broker VM
# Navigate to: Settings > Configurations > Broker VMs
# 1. Download and deploy Broker VM OVA
# 2. Configure Broker VM network settings
# 3. Register Broker VM with Cortex XDR tenant
# Configure Syslog Forwarding:
# Settings > Integrations > External Applications > Add Application
Syslog Target:
- Server: <siem-ip>
- Port: 514
- Protocol: TCP/TLS
- Format: CEF or LEEF
# Select data to forward:
- Endpoint Events: Yes
- Alerts: Yes
- Incidents: YesUse Cases
Endpoint inventory
Track all endpoints with XDR agents installed
endpoint_name
endpoint_domain
endpoint_os
agent_version
dataset=xdr_data | dedup endpoint_id | stats count by endpoint_osAgent health monitoring
Monitor XDR agent connectivity and version status
endpoint_id
endpoint_name
agent_version
event_timestamp
dataset=endpoints | filter agent_status != CONNECTEDData collection verification
Verify events are being collected from all endpoints
endpoint_id
event_type
event_timestamp
dataset=xdr_data | stats count by endpoint_id, event_type | filter count < thresholdTroubleshooting
Tested On
v8.2 on Cortex XDR Agent
admin - 2026-01-03
v8.1 on Cortex XDR Agent
admin - 2026-01-03
Last updated: 2026-01-03 by admin
1 contributor
Community Discussions
Help improve this documentation
Found an error or want to add more examples? Contributions are welcome!