Isitphishing service helps you to secure your identity, your data, and your computer away from threats and viruses.
This document provides information about the isitPhishing connector, which facilitates automated interactions with isitPhishing using FortiSOAR™ playbooks. Add the isitPhishing connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving the reputaton of a URL that you have specified from isitPhishing.
Connector Version: 1.0.0
Authored By: Fortinet
Certified: No
All connectors provided by FortiSOAR™ are delivered using a FortiSOAR™ repository. Therefore, you must set up your FortiSOAR™ repository and use the yum
command to install connectors:
yum install cyops-connector-isitphishing
For the detailed procedure to install a connector, click here.
For the procedure to configure a connector, click here.
The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:
Function | Description | Annotation and Category |
---|---|---|
Get URL Reputation | Retrieves the reputaton of a URL that you have specified from isitPhishing. | url_reputation Investigation |
The Sample - isitPhishing - 1.0.0
playbook collection comes bundled with the isitPhishing connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the isitPhishing connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection, since the sample playbook collection gets deleted during connector upgrade and delete.
Isitphishing service helps you to secure your identity, your data, and your computer away from threats and viruses.
This document provides information about the isitPhishing connector, which facilitates automated interactions with isitPhishing using FortiSOAR™ playbooks. Add the isitPhishing connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving the reputaton of a URL that you have specified from isitPhishing.
Connector Version: 1.0.0
Authored By: Fortinet
Certified: No
All connectors provided by FortiSOAR™ are delivered using a FortiSOAR™ repository. Therefore, you must set up your FortiSOAR™ repository and use the yum
command to install connectors:
yum install cyops-connector-isitphishing
For the detailed procedure to install a connector, click here.
For the procedure to configure a connector, click here.
The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:
Function | Description | Annotation and Category |
---|---|---|
Get URL Reputation | Retrieves the reputaton of a URL that you have specified from isitPhishing. | url_reputation Investigation |
The Sample - isitPhishing - 1.0.0
playbook collection comes bundled with the isitPhishing connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the isitPhishing connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection, since the sample playbook collection gets deleted during connector upgrade and delete.