I have been using Cortex for my internship at Palo Alto, where I have used Cortex XDR and Snort tools to detect endpoint and endpoint detection. I have also used similar tools like threat intelligence management to analyze the alerts and suspicious activities. Cortex is the best tool for endpoint detection.
I have used Cortex in a specific scenario where there are certain types of threat intelligence management features. I have used it to verify hashes or domains to identify malicious activity. I also use Cortex XSOAR and Xnor to trigger playbooks that automate and gather endpoint logs, block malicious processes, and update incident tickets, showcasing end-to-end processes with automation in investigation and reducing the analysis workflow.
I have used Cortex for my internship and afterward in certain projects where I'm working with my college. In those projects, I have been using Cortex for automation through playbooks and using intelligence to prioritize the incidents. I have also practiced to understand the incident lifecycle management from detection to containment.
Cortex is deployed in my organization as part of a hybrid cloud setup, where Cortex XDR and Xnor components are primarily cloud-hosted by Palo Alto Networks. This arrangement allows for easier management and updates while integrating sensitive data sources with our on-premises systems for security and compliance reasons. The hybrid approach balances the scalability and availability of the cloud while maintaining control and data security with on-premises infrastructure.