M2 - Asset-reicher Motor
Dies ist ein SecOps-Bereich Automatisierungsworkflow mit 10 Nodes. Hauptsächlich werden Cron, Merge, Function, EmailSend, GoogleSheets und andere Nodes verwendet. CVE-Bedrohungen mit Google Tabellen und E-Mail-Erinnerungen internen Assets zuordnen
- •Google Sheets API-Anmeldedaten
Verwendete Nodes (10)
Kategorie
{
"id": "FulCIypj42nIklCO",
"meta": {
"instanceId": "6feff41aadeb8409737e26476f9d0a45f95eec6a9c16afff8ef87a662455b6df"
},
"name": "M2 - Asset Enrichment Engine",
"tags": [],
"nodes": [
{
"id": "14a7268a-be41-4a5a-a5cb-9727b1f6d814",
"name": "Merge",
"type": "n8n-nodes-base.merge",
"position": [
100,
240
],
"parameters": {},
"typeVersion": 3.1
},
{
"id": "5baea5d2-c41f-4eb1-868a-2307e2b931c2",
"name": "🔁 Täglicher Trigger",
"type": "n8n-nodes-base.cron",
"position": [
-420,
240
],
"parameters": {},
"typeVersion": 1
},
{
"id": "dabf2c97-d177-4cda-9103-df589a0f3e66",
"name": "🧠 Bedrohungen Assets zuordnen",
"type": "n8n-nodes-base.function",
"position": [
320,
240
],
"parameters": {},
"executeOnce": true,
"typeVersion": 1,
"alwaysOutputData": true
},
{
"id": "e370d6aa-be47-47a3-8a58-186dc5db4d6c",
"name": "📊 Neue Bedrohung anhängen",
"type": "n8n-nodes-base.googleSheets",
"position": [
560,
240
],
"parameters": {},
"typeVersion": 4.5
},
{
"id": "a1e771b7-6f18-4b7e-a1bb-49139dee5c75",
"name": "📊 Zeile löschen",
"type": "n8n-nodes-base.googleSheets",
"position": [
560,
420
],
"parameters": {},
"typeVersion": 4.5
},
{
"id": "621cf885-f05e-4fc3-9189-bfffe9a4f547",
"name": "📬 Zusammenfassungs-E-Mail senden",
"type": "n8n-nodes-base.emailSend",
"position": [
560,
80
],
"parameters": {},
"typeVersion": 1
},
{
"id": "700a7223-bfde-4a69-bbb4-e94999bcf444",
"name": "🗃️ Archived_Threats",
"type": "n8n-nodes-base.googleSheets",
"position": [
740,
240
],
"parameters": {},
"typeVersion": 4.5
},
{
"id": "a468d0cf-47c8-4604-8500-3ee66620f218",
"name": "📊 Threats Sheets",
"type": "n8n-nodes-base.googleSheets",
"position": [
-200,
160
],
"parameters": {},
"typeVersion": 4.5
},
{
"id": "fbe3a884-9151-44ca-92d4-7e44593f6c48",
"name": "📊 Load Asset DB",
"type": "n8n-nodes-base.googleSheets",
"position": [
-200,
360
],
"parameters": {},
"typeVersion": 1
},
{
"id": "a585c636-aec5-4b50-8f1c-68ad28b67ffa",
"name": "Sticky Note",
"type": "n8n-nodes-base.stickyNote",
"position": [
0,
0
],
"parameters": {
"content": ""
},
"typeVersion": 1
}
],
"active": false,
"pinData": {},
"settings": {
"executionOrder": "v1"
},
"versionId": "1b243f06-2e22-46c7-a269-65b35fe3cbd4",
"connections": {
"14a7268a-be41-4a5a-a5cb-9727b1f6d814": {
"main": [
[
{
"node": "dabf2c97-d177-4cda-9103-df589a0f3e66",
"type": "main",
"index": 0
}
]
]
},
"fbe3a884-9151-44ca-92d4-7e44593f6c48": {
"main": [
[
{
"node": "14a7268a-be41-4a5a-a5cb-9727b1f6d814",
"type": "main",
"index": 1
}
]
]
},
"a468d0cf-47c8-4604-8500-3ee66620f218": {
"main": [
[
{
"node": "fbe3a884-9151-44ca-92d4-7e44593f6c48",
"type": "main",
"index": 0
},
{
"node": "14a7268a-be41-4a5a-a5cb-9727b1f6d814",
"type": "main",
"index": 0
}
]
]
},
"5baea5d2-c41f-4eb1-868a-2307e2b931c2": {
"main": [
[
{
"node": "a468d0cf-47c8-4604-8500-3ee66620f218",
"type": "main",
"index": 0
}
]
]
},
"e370d6aa-be47-47a3-8a58-186dc5db4d6c": {
"main": [
[
{
"node": "700a7223-bfde-4a69-bbb4-e94999bcf444",
"type": "main",
"index": 0
}
]
]
},
"dabf2c97-d177-4cda-9103-df589a0f3e66": {
"main": [
[
{
"node": "621cf885-f05e-4fc3-9189-bfffe9a4f547",
"type": "main",
"index": 0
},
{
"node": "e370d6aa-be47-47a3-8a58-186dc5db4d6c",
"type": "main",
"index": 0
},
{
"node": "a1e771b7-6f18-4b7e-a1bb-49139dee5c75",
"type": "main",
"index": 0
}
]
]
}
}
}Wie verwende ich diesen Workflow?
Kopieren Sie den obigen JSON-Code, erstellen Sie einen neuen Workflow in Ihrer n8n-Instanz und wählen Sie "Aus JSON importieren". Fügen Sie die Konfiguration ein und passen Sie die Anmeldedaten nach Bedarf an.
Für welche Szenarien ist dieser Workflow geeignet?
Fortgeschritten - Sicherheitsbetrieb
Ist es kostenpflichtig?
Dieser Workflow ist völlig kostenlos. Beachten Sie jedoch, dass Drittanbieterdienste (wie OpenAI API), die im Workflow verwendet werden, möglicherweise kostenpflichtig sind.
Verwandte Workflows
Adnan Tariq
@adnantariqFounder of CYBERPULSE AI — helping security teams and SMEs eliminate repetitive tasks through modular n8n automations. I build workflows for vulnerability triage, compliance reporting, threat intel, and Red/Blue/GRC ops. Book a session if you'd like custom automation for your use case. https://linkedin.com/in/adnan-tariq-4b2a1a47
Diesen Workflow teilen