Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook provides an end-to-end example of adding a comment in the generated incident.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Cisco SD-WAN |
| Source | View on GitHub |
📄 Source: CiscoSDWANIntrusionLogicAPP/readme.md
This playbook provides an end-to-end example of adding a comment in the generated incident.
Once deployment is complete, authorize each connection like MicrosoftSentinel.
- Add your deployed logic app in analytic rule to be trigger on every generated incident, to do this follow below steps
- Select the analytic rule you have deployed.
- Click on Edit
- Go to Automated response tab
- Click on Add new
- Provide name for your rule, In Actions dropdown select Run playbook
- In second dropdown select your deployed playbook
- Click on Apply
- Save the Analytic rule.
- An incident should have the signature_id - custom entity that contains SignatureId from CiscoSyslogUTD.
CiscoSyslogUTD
| where SignatureId == "1-12451"
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊