M3 - Endpunkt-Risiko-Aggregator
Dies ist ein SecOps-Bereich Automatisierungsworkflow mit 9 Nodes. Hauptsächlich werden Cron, Merge, Function, HttpRequest, GoogleSheets und andere Nodes verwendet. Nutzen Sie EDR, Lückendaten und Google Sheets, um Endpunkt-Sicherheitsrisikobewertungen zu aggregieren
- •Möglicherweise sind Ziel-API-Anmeldedaten erforderlich
- •Google Sheets API-Anmeldedaten
Verwendete Nodes (9)
Kategorie
{
"id": "H2HCZMMXmK78wDkA",
"meta": {
"instanceId": "6feff41aadeb8409737e26476f9d0a45f95eec6a9c16afff8ef87a662455b6df"
},
"name": "M3 - Endpoint Risk Aggregator",
"tags": [],
"nodes": [
{
"id": "14fe3db0-79b1-48f7-b511-cf9673606a8d",
"name": "⏰ Cron-Trigger – Täglich",
"type": "n8n-nodes-base.cron",
"position": [
0,
0
],
"parameters": {},
"typeVersion": 1
},
{
"id": "6bc84d47-2c24-4f8e-ac67-bd0791073866",
"name": "🛡 EDR-Logs abrufen",
"type": "n8n-nodes-base.httpRequest",
"position": [
220,
0
],
"parameters": {},
"typeVersion": 1
},
{
"id": "47589ec4-9d8f-48b6-aa02-8cb9ec2bf26c",
"name": "🗃 Dateiintegritäts-Logs abrufen",
"type": "n8n-nodes-base.httpRequest",
"position": [
220,
400
],
"parameters": {},
"typeVersion": 1
},
{
"id": "68d90599-7f4e-43dd-b603-0a62228adb3a",
"name": "🧬 Schwachstellendaten abrufen",
"type": "n8n-nodes-base.httpRequest",
"position": [
220,
200
],
"parameters": {},
"typeVersion": 1
},
{
"id": "80f9847c-87fc-4e22-a2c5-8bec50b9be91",
"name": "🔀 Endpunkt-Signale zusammenführen",
"type": "n8n-nodes-base.merge",
"position": [
420,
140
],
"parameters": {},
"typeVersion": 1
},
{
"id": "e4a1d4c4-f9cb-48e4-8532-0d15a76860f0",
"name": "🔀 Merge + FIM-Logs",
"type": "n8n-nodes-base.merge",
"position": [
420,
360
],
"parameters": {},
"typeVersion": 3.1
},
{
"id": "ecf40cba-8067-428b-a780-d7e56d7397c1",
"name": "🧠 Risikobewertungs-Rechner",
"type": "n8n-nodes-base.function",
"position": [
220,
580
],
"parameters": {},
"typeVersion": 1
},
{
"id": "dae4094a-6907-4183-ba11-8c433d4c1356",
"name": "Google Sheets",
"type": "n8n-nodes-base.googleSheets",
"position": [
420,
580
],
"parameters": {},
"typeVersion": 4.5
},
{
"id": "767a6b21-e2a6-4c16-ba73-ee40d4c91770",
"name": "Haftnotiz",
"type": "n8n-nodes-base.stickyNote",
"position": [
-340,
220
],
"parameters": {
"content": ""
},
"typeVersion": 1
}
],
"active": false,
"pinData": {},
"settings": {
"executionOrder": "v1"
},
"versionId": "1a3b8c62-b45a-40b8-a216-ca2523bcb866",
"connections": {
"6bc84d47-2c24-4f8e-ac67-bd0791073866": {
"main": [
[
{
"node": "80f9847c-87fc-4e22-a2c5-8bec50b9be91",
"type": "main",
"index": 0
}
]
]
},
"e4a1d4c4-f9cb-48e4-8532-0d15a76860f0": {
"main": [
[
{
"node": "ecf40cba-8067-428b-a780-d7e56d7397c1",
"type": "main",
"index": 0
}
]
]
},
"14fe3db0-79b1-48f7-b511-cf9673606a8d": {
"main": [
[
{
"node": "6bc84d47-2c24-4f8e-ac67-bd0791073866",
"type": "main",
"index": 0
}
]
]
},
"ecf40cba-8067-428b-a780-d7e56d7397c1": {
"main": [
[
{
"node": "dae4094a-6907-4183-ba11-8c433d4c1356",
"type": "main",
"index": 0
}
]
]
},
"80f9847c-87fc-4e22-a2c5-8bec50b9be91": {
"main": [
[
{
"node": "e4a1d4c4-f9cb-48e4-8532-0d15a76860f0",
"type": "main",
"index": 0
}
]
]
},
"68d90599-7f4e-43dd-b603-0a62228adb3a": {
"main": [
[
{
"node": "80f9847c-87fc-4e22-a2c5-8bec50b9be91",
"type": "main",
"index": 1
}
]
]
},
"47589ec4-9d8f-48b6-aa02-8cb9ec2bf26c": {
"main": [
[
{
"node": "e4a1d4c4-f9cb-48e4-8532-0d15a76860f0",
"type": "main",
"index": 1
}
]
]
}
}
}Wie verwende ich diesen Workflow?
Kopieren Sie den obigen JSON-Code, erstellen Sie einen neuen Workflow in Ihrer n8n-Instanz und wählen Sie "Aus JSON importieren". Fügen Sie die Konfiguration ein und passen Sie die Anmeldedaten nach Bedarf an.
Für welche Szenarien ist dieser Workflow geeignet?
Fortgeschritten - Sicherheitsbetrieb
Ist es kostenpflichtig?
Dieser Workflow ist völlig kostenlos. Beachten Sie jedoch, dass Drittanbieterdienste (wie OpenAI API), die im Workflow verwendet werden, möglicherweise kostenpflichtig sind.
Verwandte Workflows
Adnan Tariq
@adnantariqFounder of CYBERPULSE AI — helping security teams and SMEs eliminate repetitive tasks through modular n8n automations. I build workflows for vulnerability triage, compliance reporting, threat intel, and Red/Blue/GRC ops. Book a session if you'd like custom automation for your use case. https://linkedin.com/in/adnan-tariq-4b2a1a47
Diesen Workflow teilen