Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook checks if malicious URL is blocked or unblocked by Cisco Meraki network.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | CiscoMeraki |
| Source | View on GitHub |
📄 Source: URL-Enrichment/readme.md
![]()
When a new Microsoft Sentinel incident is created, this playbook gets triggered and performs the below actions: 1. Fetches a list of potentially malicious URLs. 2. For each URL in the list, checks if the URL is blocked by any of the networks of the organization. - If URL is allowed by the network, then incident comment is created saying URL is allowed. - If URL is blocked by the network, then incident comment is created saying URL is blocked. - If URL is not blocked by the network and not part of the network, then incident comment is created saying URL not found in network.


## Pre-requisites for deployment 1. Deploy the Cisco Meraki Custom Connector before the deployment of this playbook under the same subscription and same resource group. Capture the name of the connector during deployment. 2. Cisco Meraki API Key should be known to establish a connection with Cisco Meraki Custom Connector. Refer here 3. Organization name should be known. Refer here
## Deployment Instructions 1. Deploy the playbook by clicking on the "Deploy to Azure" button. This will take you to deploy an ARM Template wizard.
| Parameter | Description |
|---|---|
| Playbook Name | Enter the playbook name without spaces |
| Cisco Meraki Connector name | Enter the name of Cisco Meraki custom connector without spaces |
| Organization Name | Enter organization name |
Captures potentially malicious or malware URL incident information.
Get the list of URLs as entities from the Incident.


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊