Service description
Cisco Meraki offers the only solution that provides unified management of mobile devices, Macs, PCs, and the entire network from a centralized dashboard. Enforce device security policies, deploy software and apps, and perform remote, live troubleshooting on thousands of managed devices.
Cisco Meraki products are built from the ground up for cloud management and come out of the box with centralized management, layer 7 device and application visibility, real-time web-based diagnostics, monitoring, reporting, and much, much more.
Data source description
Source | Description | Devo data tables |
---|---|---|
Meraki organization changelog | Displays changes made in any network within the current Organization since it was created. This includes configuration changes made to all types of devices, not just administrative changes to the Dashboard. Each time a change is made an event in the ChangeLog will be generated. |
|
MX security events | Display security events generated by MX Appliances for each existing network. |
|
Appliance/Switch/Wireless Event Log | Display network events generated by all managed MR/SM/MS/MV devices for each existing network. | |
For more info about the Cisco Meraki, visit the Cisco Meraki user guide.
Setup
Meraki collector works over the API to retrieve the data, so is needed to enable the access via API Key and generate a Key to allow the collector get the data following the steps below:
Log in to your Meraki account
Go to Organization → Settings.
Go to the API Access Dashboard and tick the checkbox Enable access to the Cisco Meraki Dashboard API.
Once you have enabled access to the API, we need to create the API Key. To do this, click the profile link below the checkbox, or by clicking your username and selecting your username, and clicking My Profile.
Go to API Access → API Keys and click Generate New API Key.
If Meraki dashboard IP filtering is enabled, make sure to allow access for the collector IP or IP range.
Be careful, the API key will inherit the permissions of the user who creates it, so it must be created with a user with at least "organization - read only" permissions.
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Change log for 1.x.x
Release | Released on | Release type | Details | Recommendations |
---|---|---|---|---|
| FEATURE VULNS IMPROVEMENTS | New features:
Improvements:
Vulnerabilities mitigation:
|
| |
| VULNS | Vulnerabilities mitigation:
|
| |
| IMPROVEMENTS BUG FIX | Improvements:
Bug fixes:
|
| |
| IMPROVEMENTS BUG FIX | Improvements:
Bug fixes:
|
| |
| IMPROVEMENTS BUG FIX | Improvements:
Bug fixing:
|
|