CiscoSDWANReport
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
This playbook provides an end-to-end example of sending an email for suspicious activity found in the data.
Additional Documentation
📄 Source: CiscoSDWANReport/readme.md
Cisco SDWAN Report
Summary
This playbook provides an end-to-end example of sending an email for suspicious activity found in the data.
Deployment instructions
- To deploy the Playbook, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
- Fill in the required parameters:
- Playbook Name: Enter the playbook name here
- Azure Resource Group: The Azure Resource Group name in which you want to deploy the Logic App.
- Azure Subscription ID: Azure Subscription ID which is present in the subscription tab in Microsoft Sentinel.
- Azure Workspace Name: Microsoft Sentinel Workspace Name of Log Analytics workspace.
- Email: Enter comma-separated email addresses on which reports will be sent.

Post-Deployment instructions
a. Authorize connections
Once deployment is complete, authorize each connection like AzureMonitorLogs.
- Click the connection resource
- Click edit API connection
- Click Authorize
- Sign in
- Click Save
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to Cisco SD-WAN