Cisco Umbrella Investigate provides the most complete view of the relationships and evolution of domains, IPs, autonomous systems (ASNs), and file hashes. Investigate is accessible using a web console and an API and its rich threat intelligence adds the security context needed to uncover and predict threats.
This document provides information about the Cisco Umbrella Investigate connector, which facilitates automated interactions, with a Cisco Umbrella Investigate server using FortiSOAR™ playbooks. Add the Cisco Umbrella Investigate connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving information about a domain from Cisco Umbrella Investigate or retrieving a list of malicious domains associated with a specified IP address from Cisco Umbrella Investigate.
Connector Version: 1.0.0
Authored By: Fortinet
Certified: No
All connectors provided by FortiSOAR™ are delivered using a FortiSOAR™ repository. Therefore, you must set up your FortiSOAR™ repository and use the yum
command to install connectors:
yum install cyops-connector-cisco-umbrella-investigate
For the detailed procedure to install a connector, click here.
For the procedure to configure a connector, click here.
In FortiSOAR™, on the Connectors page, click the Cisco Umbrella Investigate connector row, and in the Configuration tab enter the required configuration details.
Parameter | Description |
---|---|
Server URL | Server URL of the Cisco Umbrella Investigate server to which you will connect and perform automated operations. |
API Key | API key used to access the Cisco Umbrella Investigate server to which you will connect and perform automated operations. |
Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. By default, this option is set as True . |
The following automated operations can be included in playbooks, and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:
Function | Description | Annotation and Category |
---|---|---|
Get Information About a Domain | Retrieves information such as categorization, recommendation, security, relation, and tag information for a specified domain from Cisco Umbrella Investigate, based on the domain name you have specified. | domain_information Investigation |
List Malicious Domains of an IP | Retrieves a list of malicious domains associated with a specified IP address from Cisco Umbrella Investigate, based on the IP address you have specified. | list_malicious_domains Investigation |
Fetch WHOIS Information | Retrieves WHOIS information (if available) for a specified domain from Cisco Umbrella Investigate, based on the domain name you have specified. | whois Investigation |
Parameter | Description |
---|---|
Domain | Name of the domain for which you want to retrieve information from Cisco Umbrella Investigate. |
The output contains the following populated JSON schema:
Parameter | Description |
---|---|
IP Address | IP address whose associates list of malicious domains you want to retrieve from Cisco Umbrella Investigate. |
The output contains the following populated JSON schema for each malicious domain associated with the specified IP address:
Parameter | Description |
---|---|
Domain | Name of the domain for which you want to retrieve WHOIS information from Cisco Umbrella Investigate. |
The output contains the following populated JSON schema:
The Sample - Cisco Umbrella Investigate - 1.0.0
playbook collection comes bundled with the Cisco Umbrella Investigate connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Cisco Umbrella Investigate connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.
Cisco Umbrella Investigate provides the most complete view of the relationships and evolution of domains, IPs, autonomous systems (ASNs), and file hashes. Investigate is accessible using a web console and an API and its rich threat intelligence adds the security context needed to uncover and predict threats.
This document provides information about the Cisco Umbrella Investigate connector, which facilitates automated interactions, with a Cisco Umbrella Investigate server using FortiSOAR™ playbooks. Add the Cisco Umbrella Investigate connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving information about a domain from Cisco Umbrella Investigate or retrieving a list of malicious domains associated with a specified IP address from Cisco Umbrella Investigate.
Connector Version: 1.0.0
Authored By: Fortinet
Certified: No
All connectors provided by FortiSOAR™ are delivered using a FortiSOAR™ repository. Therefore, you must set up your FortiSOAR™ repository and use the yum
command to install connectors:
yum install cyops-connector-cisco-umbrella-investigate
For the detailed procedure to install a connector, click here.
For the procedure to configure a connector, click here.
In FortiSOAR™, on the Connectors page, click the Cisco Umbrella Investigate connector row, and in the Configuration tab enter the required configuration details.
Parameter | Description |
---|---|
Server URL | Server URL of the Cisco Umbrella Investigate server to which you will connect and perform automated operations. |
API Key | API key used to access the Cisco Umbrella Investigate server to which you will connect and perform automated operations. |
Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. By default, this option is set as True . |
The following automated operations can be included in playbooks, and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:
Function | Description | Annotation and Category |
---|---|---|
Get Information About a Domain | Retrieves information such as categorization, recommendation, security, relation, and tag information for a specified domain from Cisco Umbrella Investigate, based on the domain name you have specified. | domain_information Investigation |
List Malicious Domains of an IP | Retrieves a list of malicious domains associated with a specified IP address from Cisco Umbrella Investigate, based on the IP address you have specified. | list_malicious_domains Investigation |
Fetch WHOIS Information | Retrieves WHOIS information (if available) for a specified domain from Cisco Umbrella Investigate, based on the domain name you have specified. | whois Investigation |
Parameter | Description |
---|---|
Domain | Name of the domain for which you want to retrieve information from Cisco Umbrella Investigate. |
The output contains the following populated JSON schema:
Parameter | Description |
---|---|
IP Address | IP address whose associates list of malicious domains you want to retrieve from Cisco Umbrella Investigate. |
The output contains the following populated JSON schema for each malicious domain associated with the specified IP address:
Parameter | Description |
---|---|
Domain | Name of the domain for which you want to retrieve WHOIS information from Cisco Umbrella Investigate. |
The output contains the following populated JSON schema:
The Sample - Cisco Umbrella Investigate - 1.0.0
playbook collection comes bundled with the Cisco Umbrella Investigate connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Cisco Umbrella Investigate connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.