This SecureX response workflow allows users to right click on domain
and url
observable from Cisco SecureX threat response and check whether they are reachable from ThousandEyes endpoint agents. This is important for multiple reasons. First of all, an analyst can check whether a potential harmfull destination is reachable, and thus can cause a threat (e.g. a Command&Control server). Second it can also be used to verify the policy enforcement across your organization. Cisco ThousandEyes can for example be used to verify a domain block in Cisco Umbrella, offering a good SASE use case. Obviously there are more use cases that this is usefull for.
Note: Please test this properly before implementing in a production environment. This is a sample workflow!
In the left pane menu, select Workflows. Click on IMPORT to import the workflow.
Click on Browse and copy paste the content of the workflow.json file inside of the text window. Select IMPORT AS A NEW WORKFLOW (CLONE) and click on IMPORT.
After importing, please make sure that you update the account keys for the ThousandEyes target.
Also, please fill in the Webex Token as workflow variable. The best option for this is a Webex bot, since the token will then not expire.
Note: If you prefer to use a different chat app, please change the last activities of the workflow to your liking.
You may use the response action via the drop down menu in SecureX threat response like so:
This will result in the following type of notifications in Webex Teams:
This SecureX response workflow allows users to right click on domain and url observable from Cisco SecureX threat response and check whether they are reachable from Cisco ThousandEyes endpoint agents. This is important for multiple reasons. First of all, an analyst can check whether a potential harmfull destination is reachable, and thus can cause a threat (e.g. a Command&Control server). Second it can also be used to verify the policy enforcement across your organization. Cisco ThousandEyes can for example be used to verify a domain block in Cisco Umbrella, offering a good SASE use case. Obviously there are more use cases that this is usefull for.
You may use the response action via the drop down menu in SecureX threat response like so:
This will result in the following type of notifactions in Webex Teams:
Currently there is no DevNet sandbox yet, however you can find all options to try out SecureX orchestration here!
Please check out related solutions on DevNet Ecosystem Exchange.
Owner
Contributors
Categories
Products
ThousandEyesWebexProgramming Languages
License
Code Exchange Community
Get help, share code, and collaborate with other developers in the Code Exchange community.View Community