Get Network Security Events (Meraki)

This object returns the list of network security events from the Meraki API.

Input Parameters

Name Type Required Description
Meraki API Key String Yes The API key that will be used to pull information about the environment. The account used to obtain this key must have as a recommended minimum, full read-only access.
Network ID String Yes The unique network ID for which we want to pull the events.

Output Parameters

Name Type Description
Events List Collection The list of events found. It is populated if one or more events are found. It contains the information found in the Events List table.
Count of Events Number The total count of events returned.
Result Number Returns a success value of zero or any value other than zero to indicate failure.
Result String String Object execution error details.

Events list

Item Type Example
EventTimeStamp String 6/6/2020 4:28:00
DeviceMacАddress String 00:00:00:00:00:00
ClientMacАddress String 00:00:00:00:00:00
SourceIP String 10.0.0.1:8008
DestinationIP String 192.168.0.1:80
Protocol String TCP/IP
Priotity Int 2
Classification Int 4
WasItBlocked Boolean True
Message String SERVER-Web console access attempt
Signature String 1:34523:5
SignatureSource String Ids-vrt-bal
RuleID String Meraki:intrusion/snort

Example Input Parameters

Name Type Required Example
Meraki API Key String Yes 1a1a1a1a1a1a1a1a1a1a1a2a2a2a2a2a2a2a3a3a
Network ID String Yes L_123415