Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
When a new sentinal incident is created, this playbook gets triggered and performs below actions:
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | PaloAlto-PAN-OS |
| Source | View on GitHub |
📄 Source: PaloAltoPlaybooks/PaloAlto-PAN-OS-GetURLCategoryInfo/readme.md
When a new sentinal incident is created, this playbook gets triggered and performs below actions: 1. Fetches the address group details and URL filtering category information from PAN-OS 2. Updates all the collected information in incident
Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for PAN-OS API Connection (For authorizing the PAN-OS API connection, API Key needs to be provided)
Microsoft Sentinel incident is created. The playbook receives the incident as the input.
Get the list of risky/malicious URLs as entities from the Incident
Playbook uses "List address objects" action to get address object details from PAN-OS
Playbook uses "List URL filtering category information" action to get URL filtering category details from PAN-OS
Iterates on the URLs found in this incident (probably one) and performs the following:
a. Compose body of address object where URL is a member for updating incident with address object details
Create HTML table for URL category information such as name, location and description
Add a comment to the incident with the information below:
a. User information collected by "List address obects" action from PAN-OS such as
b. URL filtering category information collected by "List URL filtering category information" action from PAN-OS such as
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊