Fortinet Document Library

Version:


Table of Contents

1.0.0
Copy Link

About the connector

Isitphishing service helps you to secure your identity, your data, and your computer away from threats and viruses.

This document provides information about the isitPhishing connector, which facilitates automated interactions with isitPhishing using FortiSOAR™ playbooks. Add the isitPhishing connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving the reputaton of a URL that you have specified from isitPhishing.

Version information

Connector Version: 1.0.0

Authored By: Fortinet 

Certified: No

 

Installing the connector

All connectors provided by FortiSOAR™ are delivered using a FortiSOAR™ repository. Therefore, you must set up your FortiSOAR™ repository and use the yum command to install connectors:

yum install cyops-connector-isitphishing

For the detailed procedure to install a connector, click here.

 

Configuring the connector

For the procedure to configure a connector, click here.

 

Actions supported by the connector

The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:

 

Function Description Annotation and Category
Get URL Reputation Retrieves the reputaton of a URL that you have specified from isitPhishing. url_reputation
Investigation

 

Included playbooks

The Sample - isitPhishing - 1.0.0 playbook collection comes bundled with the isitPhishing connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the isitPhishing connector.

 

Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection, since the sample playbook collection gets deleted during connector upgrade and delete.

 

About the connector

Isitphishing service helps you to secure your identity, your data, and your computer away from threats and viruses.

This document provides information about the isitPhishing connector, which facilitates automated interactions with isitPhishing using FortiSOAR™ playbooks. Add the isitPhishing connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving the reputaton of a URL that you have specified from isitPhishing.

Version information

Connector Version: 1.0.0

Authored By: Fortinet 

Certified: No

 

Installing the connector

All connectors provided by FortiSOAR™ are delivered using a FortiSOAR™ repository. Therefore, you must set up your FortiSOAR™ repository and use the yum command to install connectors:

yum install cyops-connector-isitphishing

For the detailed procedure to install a connector, click here.

 

Configuring the connector

For the procedure to configure a connector, click here.

 

Actions supported by the connector

The following automated operations can be included in playbooks and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 onwards:

 

Function Description Annotation and Category
Get URL Reputation Retrieves the reputaton of a URL that you have specified from isitPhishing. url_reputation
Investigation

 

Included playbooks

The Sample - isitPhishing - 1.0.0 playbook collection comes bundled with the isitPhishing connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the isitPhishing connector.

 

Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection, since the sample playbook collection gets deleted during connector upgrade and delete.