Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
On-demand playbook that fetches alert attachments and analysis report for a Sentinel incident, surfacing the results as an incident comment.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Check Point Cyberint Alerts |
| Source | View on GitHub |
On-demand playbook that fetches alert attachments and analysis report for a Sentinel incident. Analysts trigger this manually from the incident Actions menu to retrieve supporting evidence and analysis from Argos.
Flow:
1. Calls Check_Point_EM_Base to retrieve API credentials.
2. Extracts alert reference IDs from the incident.
3. For each alert, fetches the full alert details including attachments list.
4. Downloads each attachment and records metadata (name, type, fetch status).
5. Fetches the analysis report for the alert.
6. Adds a comment with attachment metadata and analysis report content.
7. Tags the incident argos-attachments-fetched.
| Parameter | Required | Description |
|---|---|---|
| PlaybookName | No | Name of the Logic App (default: Check_Point_EM_FetchAttachments) |
| Check_Point_EM_Base_PlaybookName | No | Name of the base playbook (default: Check_Point_EM_Base) |
| Action | Endpoint |
|---|---|
| Get alert details | GET /api/v1/alerts/{alert_ref_id} |
| Get attachment | GET /api/v1/alerts/{alert_ref_id}/attachments/{attachment_id} |
| Get analysis report | GET /api/v1/alerts/{alert_ref_id}/analysis_report |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊