CiscoSDWANReport

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook provides an end-to-end example of sending an email for suspicious activity found in the data.

Attribute Value
Type Playbook
Solution Cisco SD-WAN
Source View on GitHub

Additional Documentation

📄 Source: CiscoSDWANReport/readme.md

Cisco SDWAN Report

Summary

This playbook provides an end-to-end example of sending an email for suspicious activity found in the data.

Deployment instructions

  1. To deploy the Playbook, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
  2. Fill in the required parameters:
    • Playbook Name: Enter the playbook name here
    • Azure Resource Group: The Azure Resource Group name in which you want to deploy the Logic App.
    • Azure Subscription ID: Azure Subscription ID which is present in the subscription tab in Microsoft Sentinel.
    • Azure Workspace Name: Microsoft Sentinel Workspace Name of Log Analytics workspace.
    • Email: Enter comma-separated email addresses on which reports will be sent.

Deploy to Azure Deploy to Azure

Post-Deployment instructions

a. Authorize connections

Once deployment is complete, authorize each connection like AzureMonitorLogs.

  1. Click the connection resource
  2. Click edit API connection
  3. Click Authorize
  4. Sign in
  5. Click Save

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to Cisco SD-WAN