Details

This Cisco XDR workflow automates threat analysis from incoming emails. It listens for emails and checks if an XDR casebook exists for each one. It extracts URLs from the email body and performs a Secure Malware Analytics lookup for each URL's disposition. If a disposition exists, the URL is added to the casebook. If not, and the URL is valid, it's submitted for analysis. The casebook is then created or updated with all relevant URLs and their dispositions, ensuring comprehensive threat intelligence management.

Description

Installation Instructions for Workflow

  1. Prerequisites:

    • Ensure you have a Microsoft user account with access to the email inbox you intend to monitor.
    • Confirm that Secure Malware Analytics is integrated and configured for Cisco XDR.
  2. Microsoft Email Integration:

    • Log into Cisco XDR and navigate to the integrations section.
    • Select "Add Integration" and choose "Microsoft Email".
    • Enter the Microsoft user credentials and authenticate access to the email inbox.
    • Set up rules to direct relevant emails to a designated folder for monitoring.
  3. Configure Secure Malware Analytics:

    • In the Cisco XDR portal, go to the integrations settings.
    • Select "Secure Malware Analytics" and ensure it's properly configured to communicate with XDR.
    • Verify that Secure Malware Analytics is set to receive URLs for analysis and return dispositions.
  4. Create the Automation Workflow:

    • Access the automation section in Cisco XDR.
    • Create a new workflow and set it to trigger on new emails arriving in the monitored inbox.
    • Define actions to scrape email bodies for URLs, perform disposition checks, and update or create casebooks accordingly.
  5. Testing and Validation:

    • Test the workflow with sample emails to ensure URLs are extracted and processed correctly.
    • Validate that casebooks are updated with accurate threat intelligence data from Secure Malware Analytics.
  6. Finalize and Deploy:

    • Review all configurations and ensure they meet your security policies.
    • Deploy the workflow to start automated monitoring and analysis.
Required targets

This workflow requires the following targets to be available before it can be run.

Integration targets

  • Cisco XDR

Custom targets

  • Microsoft_Graph
  • SMA
About
Author
Brennan Bouchard
Version
v1.0
Average rating
No ratings yet
Authorship
Community
Contact and support information
External links
Related workflows
Community
This scheduled workflow executes a search query in Cisco Secure Malware Analytics for new private samples submitted and convinced as malicious.
Community
This Cisco XDR workflow automates threat analysis from incoming emails.