Integrate Cisco Meraki with Red Canary
    • 24 Jul 2024
    • 1 Minute to read
    • PDF

    Integrate Cisco Meraki with Red Canary

    • PDF

    Article summary

    Integrating Cisco Meraki with Red Canary provides a robust security posture by combining cloud-managed networking with advanced threat detection and response capabilities. This integration enables organizations to efficiently monitor network activity, identify potential threats, and accelerate incident response times. To integrate Cisco Meraki with Red Canary, follow the procedure below from beginning to end.

    Prerequisite

    • You will need the Threat Protection option in Meraki, which requires the Advanced Security Edition Licensing within the The security/SD-WAN appliance product line (MX) offering.

    Step 1: Red Canary–Create your Red Canary-provided URL

    Create a Red Canary provided-URL to send Cisco Meraki alerts for ingestion. 

    1. From your Red Canary homepage, click Integrations and See all integrations.

    2. Type and select Cisco Meraki.

    3. Click Configure.

    4. Enter a Name for your external alert source.  

    5. Select a Display Category.

    6. Under the Ingest Format/Method dropdown, select Meraki via HTTP. This is the preferred ingest method and generates the best data for investigation and correlation. Please do not use the other available ingest methods.

    7. Click Save Configuration.

    8. Click Activate it to begin processing alerts. This will generate the URL you will use to send Cisco Meraki alerts to.

      Note: You may need to refresh the page for the URL to appear.

      1.png

    9. Copy and save the Red Canary-provided URL. You’ll use this URL in a later step.

      2.png

    Step 2: Cisco Meraki–Enter your Red Canary-provided URL

    Adjust your Cisco Meraki alert settings to send generated alerts to your Red Canary-provided URL.

    1. From your Cisco Meraki homepage, click Network-wide, and then click Alerts.

    2. From the Network-wide section, select A rogue AP is detected.

    3. From the Security appliance section, select Malware is blocked.

    4. From the Security appliance section, select Malware is downloaded.

      Note: Other alert types are allowed but not required.

    5. Scroll down to the Webhooks section, and then click Add an HTTPS receiver.

    6. Enter Red Canary in the name field.

    7. Enter the URL from Step 1.10.

    8. Delete the text in the shared secret field.

    9. From the Payload template dropdown select Meraki.

    10. Assign the Alert to the new webhook per Cisco Meraki’s instructions.

    11. Click Send test webhook.

    12. Click Save.

     


    Was this article helpful?