Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This Playbook Provides the automation on blocking the suspicious/malicious IP and URL on fortiweb cloud waf
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Fortinet FortiWeb Cloud WAF-as-a-Service connector for Microsoft Sentinel |
| Source | View on GitHub |
## Summary
When a new Microosft Sentinel incident is created, this playbook gets triggered and performs below actions
1. Fetches the list of earlier blocked or allowed URL's and IP's .
2. Fetches the new IP's and URL's from incidents and combined them with existing one and update the access rules .

Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deplyoing an ARM Template wizard.
Fill in the required paramteres:
Once deployment is complete, you will need to authorize each connection. 1. Click the Microosft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for Fortiweb Api Connection (For authorizing the Fortiweb API connection, API Key needs to be provided)
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to Fortinet FortiWeb Cloud WAF-as-a-Service connector for Microsoft Sentinel