Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook provides an end-to-end example of sending an email, posting a message to the Microsoft Teams channel, and creating 3rd party ticket for the suspicious activity found in the data.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Cisco SD-WAN |
| Source | View on GitHub |
📄 Source: CiscoSDWANLogicAPP/readme.md
This playbook provides an end-to-end example of sending an email, posting a message to the Microsoft Teams channel, and creating 3rd party ticket for the suspicious activity found in the data.
Once deployment is complete, authorize each connection like MicrosoftSentinel.
- Add your deployed logic app in analytic rule to be trigger on every generated incident, to do this follow below steps
- Select the analytic rule you have deployed.
- Click on Edit
- Go to Automated response tab
- Click on Add new
- Provide name for your rule, In Actions dropdown select Run playbook
- In second dropdown select your deployed playbook
- Click on Apply
- Save the Analytic rule.
CiscoSyslogUTD
| union (CiscoSDWANNetflow)
| where isnotempty(SourceIP) or isnotempty(NetflowFwSrcAddrIpv4)
| extend SourceIP = coalesce(SourceIP, NetflowFwSrcAddrIpv4)
| where ipv4_is_in_any_range(SourceIP, "172.16.101.9/24", "192.168.1.1/24", "208.67.220.220")
| summarize count() by SourceIP
CiscoSyslogUTD
| where Classification == "A Network Trojan was Detected"
| summarize count() by Classification
| where count_ > 10
CiscoSyslogUTD
| where isnotempty(Malware) and Malware != "None"
| distinct Malware, SourceIP
| join kind=inner (CiscoSDWANNetflow
| where isnotempty(NetflowUsername)
| summarize arg_max(TimeStamp, NetflowUsername) by NetflowFwSrcAddrIpv4
| distinct
["Username"] = NetflowUsername,
["SourceIP"] = NetflowFwSrcAddrIpv4) on SourceIP
| project Malware, SourceIP, Username
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊