URL Enrichment - Cisco Meraki

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook checks if malicious URL is blocked or unblocked by Cisco Meraki network.

Attribute Value
Type Playbook
Solution CiscoMeraki
Source View on GitHub

Additional Documentation

📄 Source: URL-Enrichment/readme.md

Cisco Meraki URL Enrichment Playbook

meraki

Summary

When a new Microsoft Sentinel incident is created, this playbook gets triggered and performs the below actions: 1. Fetches a list of potentially malicious URLs. 2. For each URL in the list, checks if the URL is blocked by any of the networks of the organization. - If URL is allowed by the network, then incident comment is created saying URL is allowed. - If URL is blocked by the network, then incident comment is created saying URL is blocked. - If URL is not blocked by the network and not part of the network, then incident comment is created saying URL not found in network.

Meraki

Meraki

## Pre-requisites for deployment 1. Deploy the Cisco Meraki Custom Connector before the deployment of this playbook under the same subscription and same resource group. Capture the name of the connector during deployment. 2. Cisco Meraki API Key should be known to establish a connection with Cisco Meraki Custom Connector. Refer here 3. Organization name should be known. Refer here

## Deployment Instructions 1. Deploy the playbook by clicking on the "Deploy to Azure" button. This will take you to deploy an ARM Template wizard.

Deploy to Azure Deploy to Azure Gov

  1. Fill in the required parameters for deploying the playbook.
Parameter Description
Playbook Name Enter the playbook name without spaces
Cisco Meraki Connector name Enter the name of Cisco Meraki custom connector without spaces
Organization Name Enter organization name

Post-Deployment Instructions

a. Authorize API connection

b. Configurations in Sentinel

Playbook steps explained

When Microsoft Sentinel incident creation rule is triggered

Captures potentially malicious or malware URL incident information.

Entities - Get URLs

Get the list of URLs as entities from the Incident.

Check if Organization exists

For each malicious URL received from the incident

Incident Comment

meraki

meraki


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to CiscoMeraki