Merge pull request #4627 from swiftsolves-msft/riskuserwatchlist-nates
Update-RiskyUserWatchlist
This commit is contained in:
Коммит
c164cb7c18
|
@ -1185,7 +1185,7 @@
|
|||
},
|
||||
"type": "ApiConnection",
|
||||
"inputs": {
|
||||
"body": "set query_datetimescope_column = \"TimeGenerated\";\nset query_datetimescope_from = datetime(@{body('Parse_JSON_2')?['Query Start Time UTC']});\nset query_datetimescope_to = datetime(@{body('Parse_JSON_2')?['Query End Time UTC']});\n@{body('Parse_JSON_2')?['Query']} | top @{variables('EventsNumber')} by TimeGenerated desc ",
|
||||
"body": "set query_datetimescope_column = \"TimeGenerated\";\nset query_datetimescope_from = datetime(@{body('Parse_JSON_2')?['Query Start Time UTC']});\nset query_datetimescope_to = datetime(@{body('Parse_JSON_2')?['Query End Time UTC']});\n@{body('Parse_JSON_2')?['Query']} | top @{variables('EventsNumber')} by timestamp desc ",
|
||||
"host": {
|
||||
"connection": {
|
||||
"name": "@parameters('$connections')['azuremonitorlogs']['connectionId']"
|
||||
|
|
Разница между файлами не показана из-за своего большого размера
Загрузить разницу
|
@ -0,0 +1,34 @@
|
|||
# Update-RiskyUserWatchlist
|
||||
|
||||
Author: Jhonny Paulino, Nathan Swift
|
||||
|
||||
This Logic App will run weekly and create/update a Risky User watchlist with users from Microsoft Defender for cloud app with additional data for threatscore, information, and a url.
|
||||
|
||||
**Prerequisites for the solution**:
|
||||
|
||||
1. You must create a Azure AD Service Principal, record the AppId, tenantID, and create a secrets and record the secret. This service principal will be used in the solution to query the Defender for Cloud App /entities rest api
|
||||
|
||||
2. Be sure to add the following 'Microsoft Cloud App Security' Application Permissions to the created service principal discovery.read, investigation.read . Also be sure to grant admin consent to those application permissions.
|
||||
|
||||
**Deploying the solution**:
|
||||
|
||||
1. Add/Update the missing parameters in the ARM template deployment
|
||||
The Watchlist name will be also the alias name that you will use to query the data, for example
|
||||
|
||||
_GetWatchlist(**'cloudappriskyusers'**)
|
||||
|
||||
|
||||
[![Deploy to Azure](https://aka.ms/deploytoazurebutton)](https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2FAzure-Sentinel%2Fmaster%2FWatchlists%2FUpdate-RiskyUserWatchlist%2Fazuredeploy.json)
|
||||
|
||||
|
||||
**Post Deployment**:
|
||||
|
||||
1. Manually check/update the Key Vault secret called 'cloudapplist' with the Azure AD Service Principal key
|
||||
|
||||
The Logic App as a Managed Service Indetity - MSI needs to have the following RBAC Roles:
|
||||
|
||||
2. Key Vault Secrets User on the deployed Key Vault resource.
|
||||
This is required for obtaining the AAD SPN secret key encrypted through Logic App.
|
||||
|
||||
3. Azure Sentinel Contributor Role on the Azure Sentinel Resource Group.
|
||||
This is required for deleting and updating the watchlist in Microsoft Sentinel.
|
Загрузка…
Ссылка в новой задаче