Download page Alerts Using Cisco Secure Application.
Alerts Using Cisco Secure Application
This page focuses on the Alerts feature using Cisco Secure Application. The Alerts tab allows you to configure email and HTTP based alerts. You can set up Actions to get alerted when new vulnerabilities or business risks are detected.
Only users with the Edit permission can access Alerts.
Create an HTTP Alert
From the Cisco Secure Application dashboard, navigate to Alerts.
From the HTTP tab, click + Add Action.
Enter the Action Name. Do not use special characters in the Action Name.
Select the Event Type:Vulnerability, Business Risk, or Attack.
Click Next.
Enter following Action Details:
Method Type: POST
Encoding: UTF-8
Raw URL: Enter the Raw URL of your HTTP request.
Click Next.
For Authentication Type, select:
None – if the communication is not encrypted
Basic and enter your username and password
Bearer Token and enter your token
Click Next.
(Optional) Specify custom headers for the request.
Click Next.
Add Payload. The payload must be valid JSON. You can copy Business Risk as the Event Type, then you can view business transaction variables when you Add Payload.
Select the predefined variable $attack.events to include details related to any vulnerability associated with the attack in the payload.
Select the predefined variable $attack.events to include up to 256 lines of the stack trace in the payload.
Confirm and review the following information: cURL, General Information, Actions, Security, Custom Headers, and Payload. Example payload for ServiceNow:
Click Save. Once you click Save, default Rules are automatically generated.
Create an Email Alert
You can also view <= 100 vulnerabilities, business risks, or attacks per email notification. To view > 100 vulnerabilities, business risks, or attacks, sign in to the UI.
From the Cisco Secure Application dashboard, navigate to Alerts.
Click the Email tab, then click + Add Action.
Enter the Action Name. Do not use special characters in the Action Name.
Select the Event Type:Vulnerability, Business Risk, or Attack.
Click Next.
Enter following Action Details:
(Optional) Select Notify directly in case of an exploited attack, if you would like to receive email alerts for exploited attacks.
Email
Email Digest
Click Next.
Select fields to report and click Next.
Confirm and review the following information: General Information,Actions, Fields.
Click Save. Once you click Save, default Rules are automatically generated.