When you review the information in the Alarm Details or Event Details, you can easily launch an action to send a tag request to the Palo Alto Networks PAN-OS API. If you want to apply an actionIn USM Anywhere you can execute an action from alarms, events, and vulnerabilities to run a scan, get forensic information, or execute a response for a configured AlienApp. to similar events that occur in the future, you can also create an orchestration rule directly from an action applied to an alarmAlarms provide notification of an event or sequence of events that require attention or investigation. or eventAny traffic or data exchange detected by AT&T Cybersecurity products through a sensor, or through external devices such as a firewall..
Note: All Group and Tag names are will default to lowercase in USM Anywhere to avoid any potential confusion over letter casing.
To launch a Palo Alto Networks orchestration action for an alarm
- Go to Activity > Alarms or Activity > Events.
- Click the alarm or event to open the details.
Click Select Action.
- In the Select Action dialog box, select the Palo Alto tile.
For the App Action, select the action you want to launch.
You can launch an action to tag the alarm destination host or source host.
Enter the Palo Alto Networks Tag Name that you want to apply to the host.
After USM Anywhere initiates the action, it displays a confirmation dialog box.
If you want to create a rule to apply the action to similar items that occur in the future, click Create rule for similar alarms or Create rule for similar events and define the new rule. If not, click OK.