Fortinet Document Library

Version:


Table of Contents

Cisco Umbrella Investigate

1.0.0
Copy Link

About the connector

Cisco Umbrella Investigate provides the most complete view of the relationships and evolution of domains, IPs, autonomous systems (ASNs), and file hashes. Investigate is accessible using a web console and an API and its rich threat intelligence adds the security context needed to uncover and predict threats.

This document provides information about the Cisco Umbrella Investigate connector, which facilitates automated interactions, with a Cisco Umbrella Investigate server using FortiSOAR™ playbooks. Add the Cisco Umbrella Investigate connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving information about a domain from Cisco Umbrella Investigate or retrieving a list of malicious domains associated with a specified IP address from Cisco Umbrella Investigate.

Version information

Connector Version: 1.0.0

Authored By: Fortinet

Certified: No

Installing the connector

All connectors provided by FortiSOAR™ are delivered using a FortiSOAR™ repository. Therefore, you must set up your FortiSOAR™ repository and use the yum command to install connectors:

yum install cyops-connector-cisco-umbrella-investigate

For the detailed procedure to install a connector, click here.

Prerequisites to configuring the connector

  • You must have the URL of the Cisco Umbrella Investigate server to which you will connect and perform the automated operations and the API key to access that server.
  • To access the FortiSOAR™ UI, ensure that port 443 is open through the firewall for the FortiSOAR™ instance.

Configuring the connector

For the procedure to configure a connector, click here.

Configuration parameters

In FortiSOAR™, on the Connectors page, click the Cisco Umbrella Investigate connector row, and in the Configuration tab enter the required configuration details.

Parameter Description
Server URL Server URL of the Cisco Umbrella Investigate server to which you will connect and perform automated operations.
API Key API key used to access the Cisco Umbrella Investigate server to which you will connect and perform automated operations.
Verify SSL Specifies whether the SSL certificate for the server is to be verified or not.
By default, this option is set as True.

Actions supported by the connector

The following automated operations can be included in playbooks, and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:

Function Description Annotation and Category
Get Information About a Domain Retrieves information such as categorization, recommendation, security, relation, and tag information for a specified domain from Cisco Umbrella Investigate, based on the domain name you have specified. domain_information
Investigation
List Malicious Domains of an IP Retrieves a list of malicious domains associated with a specified IP address from Cisco Umbrella Investigate, based on the IP address you have specified. list_malicious_domains
Investigation
Fetch WHOIS Information Retrieves WHOIS information (if available) for a specified domain from Cisco Umbrella Investigate, based on the domain name you have specified. whois
Investigation

operation: Get Information About a Domain

Input parameters

Parameter Description
Domain Name of the domain for which you want to retrieve information from Cisco Umbrella Investigate.

Output

The output contains the following populated JSON schema:

operation: List Malicious Domains of an IP

Input parameters

Parameter Description
IP Address IP address whose associates list of malicious domains you want to retrieve from Cisco Umbrella Investigate.

Output

The output contains the following populated JSON schema for each malicious domain associated with the specified IP address:

operation: Fetch WHOIS Information

Input parameters

Parameter Description
Domain Name of the domain for which you want to retrieve WHOIS information from Cisco Umbrella Investigate.

Output

The output contains the following populated JSON schema:

Included playbooks

The Sample - Cisco Umbrella Investigate - 1.0.0 playbook collection comes bundled with the Cisco Umbrella Investigate connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Cisco Umbrella Investigate connector.

  • Fetch WHOIS Information
  • Get Information About a Domain
  • List Malicious Domains of an IP

Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.

About the connector

Cisco Umbrella Investigate provides the most complete view of the relationships and evolution of domains, IPs, autonomous systems (ASNs), and file hashes. Investigate is accessible using a web console and an API and its rich threat intelligence adds the security context needed to uncover and predict threats.

This document provides information about the Cisco Umbrella Investigate connector, which facilitates automated interactions, with a Cisco Umbrella Investigate server using FortiSOAR™ playbooks. Add the Cisco Umbrella Investigate connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving information about a domain from Cisco Umbrella Investigate or retrieving a list of malicious domains associated with a specified IP address from Cisco Umbrella Investigate.

Version information

Connector Version: 1.0.0

Authored By: Fortinet

Certified: No

Installing the connector

All connectors provided by FortiSOAR™ are delivered using a FortiSOAR™ repository. Therefore, you must set up your FortiSOAR™ repository and use the yum command to install connectors:

yum install cyops-connector-cisco-umbrella-investigate

For the detailed procedure to install a connector, click here.

Prerequisites to configuring the connector

Configuring the connector

For the procedure to configure a connector, click here.

Configuration parameters

In FortiSOAR™, on the Connectors page, click the Cisco Umbrella Investigate connector row, and in the Configuration tab enter the required configuration details.

Parameter Description
Server URL Server URL of the Cisco Umbrella Investigate server to which you will connect and perform automated operations.
API Key API key used to access the Cisco Umbrella Investigate server to which you will connect and perform automated operations.
Verify SSL Specifies whether the SSL certificate for the server is to be verified or not.
By default, this option is set as True.

Actions supported by the connector

The following automated operations can be included in playbooks, and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:

Function Description Annotation and Category
Get Information About a Domain Retrieves information such as categorization, recommendation, security, relation, and tag information for a specified domain from Cisco Umbrella Investigate, based on the domain name you have specified. domain_information
Investigation
List Malicious Domains of an IP Retrieves a list of malicious domains associated with a specified IP address from Cisco Umbrella Investigate, based on the IP address you have specified. list_malicious_domains
Investigation
Fetch WHOIS Information Retrieves WHOIS information (if available) for a specified domain from Cisco Umbrella Investigate, based on the domain name you have specified. whois
Investigation

operation: Get Information About a Domain

Input parameters

Parameter Description
Domain Name of the domain for which you want to retrieve information from Cisco Umbrella Investigate.

Output

The output contains the following populated JSON schema:

operation: List Malicious Domains of an IP

Input parameters

Parameter Description
IP Address IP address whose associates list of malicious domains you want to retrieve from Cisco Umbrella Investigate.

Output

The output contains the following populated JSON schema for each malicious domain associated with the specified IP address:

operation: Fetch WHOIS Information

Input parameters

Parameter Description
Domain Name of the domain for which you want to retrieve WHOIS information from Cisco Umbrella Investigate.

Output

The output contains the following populated JSON schema:

Included playbooks

The Sample - Cisco Umbrella Investigate - 1.0.0 playbook collection comes bundled with the Cisco Umbrella Investigate connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Cisco Umbrella Investigate connector.

Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.