Merge pull request #4627 from swiftsolves-msft/riskuserwatchlist-nates

Update-RiskyUserWatchlist
This commit is contained in:
NikTripathi 2022-08-03 14:40:25 +05:30 коммит произвёл GitHub
Родитель b0465140f0 ba5b45fda0
Коммит c164cb7c18
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23
3 изменённых файлов: 1110 добавлений и 1 удалений

Просмотреть файл

@ -1185,7 +1185,7 @@
},
"type": "ApiConnection",
"inputs": {
"body": "set query_datetimescope_column = \"TimeGenerated\";\nset query_datetimescope_from = datetime(@{body('Parse_JSON_2')?['Query Start Time UTC']});\nset query_datetimescope_to = datetime(@{body('Parse_JSON_2')?['Query End Time UTC']});\n@{body('Parse_JSON_2')?['Query']} | top @{variables('EventsNumber')} by TimeGenerated desc ",
"body": "set query_datetimescope_column = \"TimeGenerated\";\nset query_datetimescope_from = datetime(@{body('Parse_JSON_2')?['Query Start Time UTC']});\nset query_datetimescope_to = datetime(@{body('Parse_JSON_2')?['Query End Time UTC']});\n@{body('Parse_JSON_2')?['Query']} | top @{variables('EventsNumber')} by timestamp desc ",
"host": {
"connection": {
"name": "@parameters('$connections')['azuremonitorlogs']['connectionId']"

Разница между файлами не показана из-за своего большого размера Загрузить разницу

Просмотреть файл

@ -0,0 +1,34 @@
# Update-RiskyUserWatchlist
Author: Jhonny Paulino, Nathan Swift
This Logic App will run weekly and create/update a Risky User watchlist with users from Microsoft Defender for cloud app with additional data for threatscore, information, and a url.
**Prerequisites for the solution**:
1. You must create a Azure AD Service Principal, record the AppId, tenantID, and create a secrets and record the secret. This service principal will be used in the solution to query the Defender for Cloud App /entities rest api
2. Be sure to add the following 'Microsoft Cloud App Security' Application Permissions to the created service principal discovery.read, investigation.read . Also be sure to grant admin consent to those application permissions.
**Deploying the solution**:
1. Add/Update the missing parameters in the ARM template deployment
The Watchlist name will be also the alias name that you will use to query the data, for example
_GetWatchlist(**'cloudappriskyusers'**)
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FWatchlists%2FUpdate-RiskyUserWatchlist%2Fazuredeploy.json)
**Post Deployment**:
1. Manually check/update the Key Vault secret called 'cloudapplist' with the Azure AD Service Principal key
The Logic App as a Managed Service Indetity - MSI needs to have the following RBAC Roles:
2. Key Vault Secrets User on the deployed Key Vault resource.
This is required for obtaining the AAD SPN secret key encrypted through Logic App.
3. Azure Sentinel Contributor Role on the Azure Sentinel Resource Group.
This is required for deleting and updating the watchlist in Microsoft Sentinel.