What is Palo Alto Networks Device Security with a Cohosted, limited-featured Cortex XSOAR instance?

What is Palo Alto Networks Device Security with a Cohosted, limited-featured Cortex XSOAR instance?

5578
Created On 12/16/24 19:10 PM - Last Modified 06/10/25 22:58 PM


Question


What is Palo Alto Networks Device Security with a Cohosted, limited-featured Cortex XSOAR instance ?



Environment


Palo Alto Networks Device Security with a Cohosted, limited-featured Cortex XSOAR 6 instance



Answer


Following is a background on Palo Alto Networks Device Security and the different methods of IoT integration with Cortex XSOAR, followed by details on Cohosted, limited-feature Cortex XSOAR instance

Palo Alto Networks Device Security - Integrate with Third-party Systems

In addition to coordinating with Palo Alto Networks next-generation firewalls, Device Security integrates with third-party systems, augmenting their inventory, network management, network security, and vulnerability detection by making them IoT aware and by gathering device and network data from other sources to enrich its own inventory and capabilities.
IOT third party.png

There are three options for Device Security to leverage Cortex XSOAR technology to integrate with third-party systems, they are listed below. Note that more information about these options is available in Device Security Integration Guide and Third-party integrations Using Cohosted XSOAR.

Device Security with a Cohosted, limited-featured Cortex XSOAR instance

If you want to integrate Device Security with third-party systems but do not have a Cortex XSOAR server, you can buy an Device Security Third-party Add-on license, which comes with an automatically generated, cloud-hosted Cortex XSOAR module. Additional information for this option can be found at Third-party Integrations Using Cohosted XSOAR

Device Security with a full-featured Cortex XSOAR server

If you already have a full-featured Cortex XSOAR server deployed on premises or in the cloud, you can use that to integrate Device Security with third-party systems without needing to buy an add-on license and use a limited cloud-hosted Cortex XSOAR module. The setup of a full-featured XSOAR server to work with Device Security is described in Third-party Integrations Using a Full-featured XSOAR Server

Cortex XSOAR with access to the Device Security API

If you have a Cortex XSOAR instance and your goal is to integrate it with Device Security, check the Palo Alto Networks IoT integration guide, which explains how to configure the integration on the XSOAR and run the integration commands

How to find out the Serial Number of Cohosted Cortex XSOAR instance

When using a Cohosted limited feature Cortex XSOAR instance, you can find out the serial # of the XSOAR using the Knowledgebase article: How to find out the Serial Number of a IoT Co-Hosted Cortex XSOAR instance
 

Additional details on Device Security with Cohosted, limited-featured Cortex XSOAR

 

Post Deployment


Single Sign on

Once the XSOAR instance is up, IoT side (CronJob) sets up SSO. This allows customers to log into XSOAR only via the launch button on the IoT UI. This involves setting up the "SAML 2.0" integration on the XSOAR.
Note: The end users can only access the XSOAR through the IoT UI. IF the SAML integration is disabled, the launch button will not work. IoT also provides an option to download XSOAR logs directly via the IoT UI.
 
SSO1.png
SSO2.png

Pre-Populating Jobs and Integration instances


Another set of actions done post deployment is creating integration instances and jobs with specific parameters for customers on XSOAR. These actions are shared between XSOAR ops team and IoT backend team. In addition to adding integration instances, XSOAR ops team also creates the IoT Role for customers which define user privileges and UI access limitations .
 

Limited XSOAR functionality

When users log into the XSOAR via the IoT portal through SSO they are assigned a special IoT role. Some noteworthy limitations enforced by this role:
      • Users can only access Settings and Jobs pages
      • Users are not allowed to download XSOAR logs - IoT UI has a dedicated button to download logs
      • Users do not have access to Market place
      • Users can not run any XSOAR commands via CLI
      • Users cannot set configuration flags

LXF1.png LXF2.png 

Content pack and Upgrades

 

Content pack management

IoT manages their own content packs and these packs are not available on the XSOAR market place. Once developers have a content pack ready, they upload it to "staging" which is nothing but an AWS S3 location (s3://contentpack-staging/). A golden image is created based on the IoT provided content packs and used to deploy the XSOAR instances. All new customers get the latest content in this way. For existing customers the IoT team has Jenkins jobs (One for each IoT Region) which programmatically via API uploads the IoT content packs to all existing customer XSOARs.

For existing customers of XSOAR, IoT requires them to download the content pack via IoT UI and upload them manually. Customer would need to set the "content.pack.verify" flag to "false" and upload the packs manually. Reference: https://docs.paloaltonetworks.com/iot/iot-security-integration/get-started-with-iot-security-integrations/third-party-integrations-using-a-full-featured-xsoar-server

 
XSOAR Server upgrades
Currently XSOAR 6.X upgrades are done on a ad-hoc basis. IoT displays a UI notification message to inform of downtime during specified outage time window.
 

Licensing

IoT supports 3rd party integrations via an 3P add-on license or if the customer is already an existing XSOAR customer. The 3P add-on license comes in the following flavors:
      • Advance - Customers can have unlimited integrations
      • Basic - Customers can only enable 3 integrations at a time

For existing XSOAR customers, IoT does not require a license for integration. All license enforcement is done inside the playbooks.



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000sd79CAA&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language