bf67d16cf2 | ||
---|---|---|
.. | ||
GoogleDirectoryAPIConnector | ||
Playbooks | ||
azuredeploy.json | ||
readme.md |
readme.md
Tenable Logic Apps connector and playbook templates
Table of Contents
- Overview
- Custom Connector + 3 Playbook templates deployment
- Authentication
- Prerequisites
- Deployment
- Post-Deployment Steps
Overview
This custom connector connects to Google Directory Users API.
Custom Connector + 3 Playbook templates deployment
This package includes:
You can choose to deploy the whole package: connector + all three playbook templates, or each one seperately from its specific folder.
Tenable connectors documentation
Authentication
- OAuth2.0 authentication
Prerequisites
To configure the connector follow the instructions:
- Deploy the connector using Deploy to Azure button.
- Create authorization credentials (see instructions). As a redirection url, use the redirection url that you can find on the connector page (in Azure go to Logic Apps Custom Connector -> GoogleDirectory -> click Edit -> Security -> copy Redirect URL). If this is your first time creating a client ID, you can also configure your consent screen by clicking Consent Screen. (The following procedure explains how to set up the Consent screen.) You won't be prompted to configure the consent screen after you do it the first time. Note that the scope
https://www.googleapis.com/auth/admin.directory.user
has to be enabled in the consent screen. - In Azure go to Logic Apps Custom Connector -> GoogleDirectory -> click Edit -> Security -> fill the Client id and Client secret, obtained in the previous step -> click Update connector.
Deployment instructions
- To deploy Custom Connectors and Playbooks, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
- Fill in the required parameters for deploying Custom Connectors and Playbooks
Parameters | Description |
---|---|
GoogleDirectoryConnectorName | Logic App Connector Name |
Google-SuspendUser | Name of the Playbook |
Google-SignOutUser | Name of the Playbook |
Google-EnrichIncidentWithUserInfo | Name of the Playbook |
TeamsGroupId | Value of TeamsGroupId parameter in Google-SuspendUser playbook. Id of the Teams Group where the adaptive card will be posted. |
TeamsChannelId | Value of TeamsChannelId parameter in Google-SuspendUser playbook. Id of the Teams Channel where the adaptive card will be posted. |
Post-Deployment instructions
a. Authorize connections
Once deployment is complete, authorize each connection. Check documentation for each Playbook.
b. Configurations in Sentinel
- In Microsoft sentinel, analytical rules should be configured to trigger an incident that contains Accounts. In the Entity maping section of the analytics rule creation workflow, user email should be mapped to FullName identitfier of the Account entity type. Check the documentation to learn more about mapping entities.
- Configure the automation rules to trigger the playbook. Check the documentation to learn more about automation rules.