Skip to main content

Cisco Threat Response

cisco-threat-response

Version: 1.2
Updated: Jul 21, 2023

Gather Cisco Threat Response threat intelligence data to enrich incident artifacts.

Actions

  • Malware Search (Enrichment) - Search for specific malware strain.
  • Sightings Search (Enrichment) - Search for sightings by malware name.
  • Vulnerability Search (Enrichment) - Search for vulnerabilities by vulnerability type.
  • Enrich Observables (Enrichment) - Gather a verdict for a given cyber observable.
  • Extract Observable Type (Enrichment) - Extract Observable Type.
  • List Malware (Enrichment) - Get a list of malware signatures.
  • List Vulnerabilities (Enrichment) - Get a list of vulnerabilities.
  • List Sightings (Enrichment) - Search available sightings.

Configure Cisco Threat Response in Automation Service and Cloud SOAR

Before you can use the integration, you must configure it so that the vendor can communicate with Sumo Logic. For general guidance, see Configure Authentication for Integrations.

  1. Access App Central and install the integration.
  2. Select the installed integration in the Integrations page.
    Classic UI. In the main Sumo Logic menu, select Automation and then select Integrations in the left nav bar.
    New UI. In the main Sumo Logic menu, select Automation > Integrations. You can also click the Go To... menu at the top of the screen and select Integrations.
  3. Select the integration.
  4. Hover over the resource name and click the Edit button that appears.
    Edit a resource
  5. In the Add Resource dialog, enter the authentication needed by the resource. When done, click TEST to test the configuration, and click SAVE to save the configuration.

For information about Cisco Threat Response, see Cisco Threat Response documentation.

Change Log

  • February 21, 2020 - First upload
  • May 22, 2020 - New actions added
  • July 21, 2023 (v1.2) - Integration refactored
Status
Legal
Privacy Statement
Terms of Use

Copyright © 2025 by Sumo Logic, Inc.