Azure-Sentinel/Playbooks/AS-Azure-AD-Disable-User
AcceleryntSecurityDev 2b04a09c3e
Add files via upload
2023-04-21 17:17:29 -07:00
..
Images Add files via upload 2023-04-21 17:17:29 -07:00
README.md Update README.md 2023-04-21 15:54:05 -07:00
azuredeploy.json Update azuredeploy.json 2023-04-21 15:56:23 -07:00

README.md

AS-Azure-AD-Disable-User

Author: Accelerynt

For any technical questions, please contact info@accelerynt.com

Deploy to Azure Deploy to Azure Gov

This playbook is intended to be run from a Microsoft Sentinel incident. It will disable the Azure AD user accounts associated with the entities from Microsoft Sentinel incidents. This playbook is meant to be used in tandem with our AS-Azure-AD-Enable-User playbook.

Azure_AD_Disable_User_Demo_1

Deployment

To configure and deploy this playbook:

Open your browser and ensure you are logged into your Microsoft Sentinel workspace. In a separate tab, open the link to our playbook on the Accelerynt Security GitHub Repository:

https://github.com/Accelerynt-Security/AS-Azure-AD-Disable-User

Deploy to Azure Deploy to Azure Gov

Click the “Deploy to Azure” button at the bottom and it will bring you to the custom deployment template.

In the Project details section:

  • Select the Subscription and Resource group from the dropdown boxes you would like the playbook deployed to.

In the Instance details section:

  • Playbook Name: This can be left as "AS-Azure-AD-Disable-User" or you may change it.

Towards the bottom, click on "Review + create".

Azure_AD_Disable_User_Deploy_1

Once the resources have validated, click on "Create".

Azure_AD_Disable_User_Deploy_2

The resources should take around a minute to deploy. Once the deployment is complete, you can expand the "Deployment details" section to view them. Click the one corresponding to the Logic App.

Azure_AD_Disable_User_Deploy_3

Click on the "Edit" button. This will bring us into the Logic Apps Designer.

Azure_AD_Disable_User_Deploy_4

Before the playbook can be run, the Azure AD connection will either need to be authorized in the indicated step, or an existing authorized connection may be alternatively selected. This connection can be found under the third step labeled "For each".

Azure_AD_Disable_User_Deploy_5

Expand the "Connections" step and click the exclamation point icon next to the name matching the playbook.

Azure_AD_Disable_User_Deploy_6

When prompted, sign in to validate the connection.
Azure_AD_Disable_User_Deploy_7