8fec945098 | ||
---|---|---|
.. | ||
Images | ||
README.md | ||
azuredeploy.json |
README.md
Integrating Guardicore Incidents into Azure Sentinel
Author: Accelerynt
For any technical questions, please contact info@accelerynt.com
This playbook will give Azure Sentinel the ability to query your Guardicore Centra Cloud instance API to retrieve established incidents. The API query will be sent every 10 minutes. Incidents that have had their data copied to Sentinel logs will be marked with the “Sentinel” tag in Guardicore.
You will need the following items to enter in the playbook settings during deployment:
-
URL for your Guardicore instance.
-
A Username/Password that is a Local Administrator in your Guardicore environment.
-
The Azure Sentinel Workspace ID where you want the incidents logged.
-
The Primary or Secondary Key to your workspace.
Click the “Deploy to Azure” button and this will bring you to the Custom Deployment Template.
In the BASICS section:
- Select the “Subscription” and “Resource Group” from the dropdown boxes you would like the playbook deployed to.
In the SETTINGS section:
-
Playbook Name: This can be left as “Guardicore-Import-Incidents” or you may change it.
-
GCURL: Enter your Guardicore tenant URL here. You can replace <guardicore_instance_url> with cus-0000.cloud.guardicore, where 0000 is your 4 digit customer number or copy and paste the URL from your Guardicore instance. It must look exactly like - https://cus-0000.cloud.guardicore.com Also, ensure there is no / after the .com.
-
GC Username: Replace text with username of the Guardicore Admin account you want to use.
-
GC Password: Replace text with password of the Guardicore Admin account you want to use.
Towards the bottom ensure you check the box accepting the terms and conditions and then click on “Purchase”.
The playbook should take less than a minute to deploy. Return to your Azure Sentinel workspace and click on “Playbooks.” Next, click on your newly deployed playbook. Don’t be alarmed to see that the status of the playbook shows failed. We still need to edit the playbook to enter the Azure Sentinel Workspace ID and Key.
Click on the “Edit” button. This will bring us into the Logic Apps Designer.
Click on the bottom bar labeled “For each Guardicore incident”.
Click on the bar labeled “If no Sentinel tag was found”.
Click on “Connections”.
Click on the circled exclamation point under the word "Invalid".
In the Connection Name put GCIncidents. The next fields are Workspace Key (Primary or Secondary Key) and Workspace ID. Follow the instructions at the bottom of this page to find those values. Once you have them, copy and paste them into their respective fields. Now click the update button.
You should see the that the “Send Data” box has updated and displays “Connected to GCIncidents.” Click the X to close the Logic App Designer. There is no need to click a save button.
Depending on how many and how frequently you have incidents created in Guardicore, it could take a few minutes or several hours for the logs to show up Sentinel. You can view the incident logs by returning to your Azure Sentinel workspace and clicking on “Logs.” You should have a new custom log called “GCIncidents_CL” – type that into your query window and click run. Adjust the time range, as necessary. Each line returned contains the details for each individual incident returned from the Guardicore API.
Finding your Azure Sentinel Workspace ID and Primary/Secondary Key
To find your Workspace ID and Primary/Secondary key, start by clicking on “Settings” from the Azure Sentinel workspace you want the incidents sent to. Then click on “Workspace Settings” under the Azure Search Bar.
Click on “Advanced Settings”.
Next, click on “Connected Sources” and then “Windows Servers” to display your Workspace ID and either Primary or Secondary key.