Which two methods can be used to create and share queries into the Query Library? (Choose two.)
A SOC team member implements an incident starring configuration, but incidents created before this configuration were not starred.
What is the cause of this behavior?
A Cortex XSIAM analyst in a SOC is reviewing an incident involving a workstation showing signs of a potential breach. The incident includes an alert from Cortex XDR Analytics Alert source "Remote service command execution from an uncommon source." As part of the incident handling process, the analyst must apply response actions to contain the threat effectively.
Which initial Cortex XDR agent response action should be taken to reduce attacker mobility on the network?