I am looking for assistance in creating a workflow in Log360 that extracts malicious IPs detected by the Fortinet firewall and saves them in a text file at a specific network location.
Workflow Requirements:
remip
ip2.txt
\\server\blockip\
I have tried setting up a script in the workflow, but I am encountering issues with saving the IP in the text file correctly. I would appreciate detailed instructions or a sample script to achieve this functionality.