Get Network Security Events (Meraki)
This object returns the list of network security events from the Meraki API.
Input Parameters
| Meraki API Key |
String |
Yes |
The API key that will be used to pull information about the environment. The account used to obtain this key must have as a recommended minimum, full read-only access. |
| Network ID |
String |
Yes |
The unique network ID for which we want to pull the events. |
Output Parameters
| Events List |
Collection
|
The list of events found. It is populated if one or more events are found. It contains the information found in the Events List table. |
| Count of Events |
Number |
The total count of events returned. |
| Result |
Number |
Returns a success value of zero or any value other than zero to indicate failure. |
| Result String |
String |
Object execution error details. |
Events list
| EventTimeStamp |
String |
6/6/2020 4:28:00 |
| DeviceMacАddress |
String |
00:00:00:00:00:00 |
| ClientMacАddress |
String |
00:00:00:00:00:00 |
| SourceIP |
String |
10.0.0.1:8008 |
| DestinationIP |
String |
192.168.0.1:80 |
| Protocol |
String |
TCP/IP |
| Priotity |
Int |
2 |
| Classification |
Int |
4 |
| WasItBlocked |
Boolean |
True |
| Message |
String |
SERVER-Web console access attempt |
| Signature |
String |
1:34523:5 |
| SignatureSource |
String |
Ids-vrt-bal |
| RuleID |
String |
Meraki:intrusion/snort |
Example Input Parameters
| Meraki API Key |
String |
Yes |
1a1a1a1a1a1a1a1a1a1a1a2a2a2a2a2a2a2a3a3a |
| Network ID |
String |
Yes |
L_123415 |