{"id":12920,"date":"2016-03-28T13:00:42","date_gmt":"2016-03-28T20:00:42","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=12920"},"modified":"2016-10-11T15:39:53","modified_gmt":"2016-10-11T22:39:53","slug":"tech-docs-new-autofocus-features-make-threat-research-a-breeze","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/03\/tech-docs-new-autofocus-features-make-threat-research-a-breeze\/","title":{"rendered":"Tech Docs: New AutoFocus Features Make Threat Research a Breeze"},"content":{"rendered":"<p>A new version of the Palo Alto Networks threat intelligence portal <strong>AutoFocus<\/strong> is out! And it\u2019s packed with several nifty features that make threat research a breeze.<\/p>\n<p>The <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/autofocus\/autofocus\/new-feature-guide.html\" target=\"_blank\">AutoFocus New Features Guide<\/a> has everything you need to get started but here are some release highlights:\u00a0<!--more--><\/p>\n<p><strong>STIX for AutoFocus API<\/strong>: STIX (Structured Threat Indicator eXpression) is an XML-based standard that provides a consistent format for storing and sharing cyberthreat data. The AutoFocus API now lets you send API requests to AutoFocus and receive STIX-compliant responses. Sharing AutoFocus threat intelligence is easier than ever!<\/p>\n<p><strong>New Threat Analysis Features<\/strong>: Assess your level of coverage against malware by viewing which signatures were matched to a sample during WildFire analysis. Additionally, for behaviors observed in a sample during WildFire analysis, you can now view a list of activities exhibited by the samples that were used as evidence of the observed behavior.<\/p>\n<p><strong>AutoFocus Feedback Tool<\/strong>: A new feedback tool built into the AutoFocus navigation pane lets you get in touch with the AutoFocus team in just a couple of clicks. Send your rave reviews of AutoFocus or request features you\u2019d like to see in future releases.<strong>\u00a0<\/strong><\/p>\n<p><strong>Workflow Improvements<\/strong>: Be an AutoFocus power user in no time with various time-saving enhancements to the portal. Changes include the ability to:<\/p>\n<ul>\n<li>Start searching for an artifact from any page on AutoFocus<\/li>\n<li>View the API request for a search directly in the AutoFocus interface<\/li>\n<li>Conduct multiple searches simultaneously in different browser windows<\/li>\n<\/ul>\n<p>\u2026 <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/autofocus\/autofocus\/autofocus-release-notes.html\" target=\"_blank\">and many more<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Get Started<\/strong><\/h3>\n<p>To get started, view the <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/autofocus\/autofocus\/autofocus-release-notes.html\" target=\"_blank\">AutoFocus Release Notes<\/a> and <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/autofocus\/autofocus\/new-feature-guide.html\" target=\"_blank\">AutoFocus New Features Guide<\/a>. You can also visit the <a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/autofocus\/autofocus.html\" target=\"_blank\">documentation portal<\/a> for access to more AutoFocus resources.<\/p>\n<h3><strong>Have Questions?<\/strong><\/h3>\n<p>For questions or comments about these features, contact your SE or account representative. For questions about documentation, email us at <a href=\"mailto:documentation@paloaltonetworks.com\" target=\"_blank\">documentation@paloaltonetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new version of the Palo Alto Networks threat intelligence portal AutoFocus is out! And it\u2019s packed with several nifty features that make threat research a breeze. The AutoFocus New Features Guide &hellip;<\/p>\n","protected":false},"author":255,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[587],"tags":[1132,1684,607],"coauthors":[2775],"class_list":["post-12920","post","type-post","status-publish","format-standard","hentry","category-technical-documentation","tag-autofocus","tag-autofocus-api","tag-stix"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/255"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=12920"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12920\/revisions"}],"predecessor-version":[{"id":13005,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/12920\/revisions\/13005"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=12920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=12920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=12920"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=12920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}