Supported Cortex XSOAR versions: 6.5.0 and later.
This playbook adds new firewall rules with access only from private ip address range and blocks traffic that's exposed to public internet. For example, if RDP is exposed to the entire world, this playbook adds new firewall rules that only allows traffic from private ip address and blocks rest of the RDP traffic.
This playbook uses the following sub-playbooks, integrations, and scripts.
This playbook does not use any sub-playbooks.
- Google Cloud Compute
This playbook does not use any scripts.
|GcpInstance||The name of the GCP instance that has the public ip.||Required|
|GcpZone||The zone of the GCP instance that is hosted in.||Required|
|GcpNetwork||The VPC network of the GCP instance.||Required|
|RemotePort||The remote port that is publicly exposed to.||alert.remoteport||Required|
|RemoteProtocol||The remote protocol that is publicly exposed to.||Required|
There are no outputs for this playbook.