DShield is a community-based collaborative firewall log correlation system. It receives logs from volunteers worldwide and uses them to analyze attack trends. It is used as the data collection engine behind the SANS Internet Storm Center (ISC).
This document provides information about the DShield connector, which facilitates automated interactions, with a DShield server using FortiSOAR™ playbooks. Add the DShield connector as a step in FortiSOAR™ playbooks and perform automated operations such as retrieving IP address details and open threat feeds from the DShield server.
Connector Version: 1.0.0
FortiSOAR™ Version Tested on: 4.11.0-1161
DShield Version Tested on: 1.3
For the procedure to install a connector, click here.
For the procedure to configure a connector, click here.
In FortiSOAR™ , on the Connectors page, select the DShield connector and click Configure to configure the following parameters:
Parameter | Description |
---|---|
Server URL | URL of the DShield server to which you will connect and perform the automated operations. |
Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. By default, this option is set as True . |
The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:
Function | Description | Annotation and Category |
---|---|---|
Lookup IP | Retrieves the details of the IP address that you specify from the DShield server. | lookup_ip Investigation |
Get Threat Feeds | Retrieves open threat feeds from the DShield server. | get_threat_feeds Investigation |
Parameter | Description |
---|---|
IP Address | IPv4 or IPv6 address for which you want to retrieve details from the DShield server. |
The JSON output contains details of the IP address that you have specified retrieved from the DShield server.
Following image displays a sample output:
None.
The JSON output contains details of the open threat feeds retrieved from the DShield server.
Following image displays a sample output:
The Sample - DShield - 1.0.0
playbook collection comes bundled with the DShield connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the DShield connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.
DShield is a community-based collaborative firewall log correlation system. It receives logs from volunteers worldwide and uses them to analyze attack trends. It is used as the data collection engine behind the SANS Internet Storm Center (ISC).
This document provides information about the DShield connector, which facilitates automated interactions, with a DShield server using FortiSOAR™ playbooks. Add the DShield connector as a step in FortiSOAR™ playbooks and perform automated operations such as retrieving IP address details and open threat feeds from the DShield server.
Connector Version: 1.0.0
FortiSOAR™ Version Tested on: 4.11.0-1161
DShield Version Tested on: 1.3
For the procedure to install a connector, click here.
For the procedure to configure a connector, click here.
In FortiSOAR™ , on the Connectors page, select the DShield connector and click Configure to configure the following parameters:
Parameter | Description |
---|---|
Server URL | URL of the DShield server to which you will connect and perform the automated operations. |
Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. By default, this option is set as True . |
The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:
Function | Description | Annotation and Category |
---|---|---|
Lookup IP | Retrieves the details of the IP address that you specify from the DShield server. | lookup_ip Investigation |
Get Threat Feeds | Retrieves open threat feeds from the DShield server. | get_threat_feeds Investigation |
Parameter | Description |
---|---|
IP Address | IPv4 or IPv6 address for which you want to retrieve details from the DShield server. |
The JSON output contains details of the IP address that you have specified retrieved from the DShield server.
Following image displays a sample output:
None.
The JSON output contains details of the open threat feeds retrieved from the DShield server.
Following image displays a sample output:
The Sample - DShield - 1.0.0
playbook collection comes bundled with the DShield connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the DShield connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.