Skip to content
Find out how we support MDR.

Cisco Meraki API integration

You can integrate Cisco Meraki with Sophos Central so that it sends alerts to Sophos for analysis.

This page gives you an overview of the integration.

Cisco Meraki product overview

Cisco Meraki offers a cloud-managed firewall solution that integrates with Meraki's broader suite of network products. The platform itself provides centralized management, visibility, and control.

Sophos documents

Integrate Cisco Meraki (API)

What we ingest

Sample alerts seen by Sophos:

  • Malware accessed
  • Brute force login attempts
  • C2 traffic
  • Cryptocurrency Miner outbound connections
  • SQL ingestion attempts

Alerts ingested in full

We ingest all security events returned by the query set up here: Get Organization Appliance Security Events

Filtering

We query the Endpoint /organizations/{organizationId}/appliance/security/events.

We filter the results to remove data provided in a non-compliant format.

Sample threat mappings

The alert type is defined as follows:

If the field message isn't empty, search for specific regular expressions in message using the lists provided (_.referenceValues.code_translation.regex_alert_type and _.globalReferenceValues.code_translation.regex_alert_type). If a match is found, return the result; otherwise, return the original message.

If message is empty, check that the field eventType isn't empty. If it isn't empty, perform a similar search for regular expressions in eventType. If a match is found, return the result; otherwise, return the original eventType.

If both message and eventType are empty, return undefined.

Examples mapped to MITRE ATT&CK:

{"alertType": "MySQL Login Attempt", "threatId": "TA0008", "threatName": "Lateral Movement"}
{"alertType": "TFTP request", "threatId": "T1046", "threatName": "Network Service Scanning"}
{"alertType": "Canary Disconnected", "threatId": "T1489", "threatName": "Service Stop"}

Vendor documentation