Azure-Sentinel/Playbooks/AzureFirewall
Sreedhar Ande 8c4f371be6
Merge pull request #2351 from Azure/lior-tamir-patch-2
AzureFireWall Playbook - Update broken link
2021-05-25 17:22:41 -07:00
..
AzureFirewall-AddIPtoTIAllowList New connectors+playbooks (#2118) 2021-04-26 11:30:21 -07:00
AzureFirewall-BlockIP-addNewRule New connectors+playbooks (#2118) 2021-04-26 11:30:21 -07:00
AzureFirewall-BlockIP-addToIPGroup New connectors+playbooks (#2118) 2021-04-26 11:30:21 -07:00
AzureFirewallConnector New connectors+playbooks (#2118) 2021-04-26 11:30:21 -07:00
azuredeploy.json Adding missing linked arm template 2021-05-25 22:00:58 +03:00
readme.md Update broken link 2021-05-25 21:51:55 +03:00

readme.md

Azure Firewall Logic Apps connector and playbook templates

Azure Firewall

Table of Contents

  1. Overview
  2. Deploy Custom Connector + 3 Playbook templates
  3. Authentication
  4. Prerequisites
  5. Deployment
  6. Post Deployment Steps
  7. References

Overview

Azure Firewall is a cloud-based network security service, sitting at the edge of the Azure virtual network resources, to provide additional security beyond what is offered by NSGs.
This integration allows to automate response to Azure Sentinel incidents which contains IPs. It contains the basic connector component, with which you can create your own playbooks that interact with Azure Firewall, Azure Firewall Policy and IP Groups.
It also contains 3 playbook templates, ready to quick use, that allow direct response on Azure Firewall from Microsoft Teams together and VirusTotal enrichment.

The playbooks in this integration work with:

Playbook Name Premium Policy Standard Policy Classic Rules
AzureFirewall-BlockIP-addToIPGroup Yes Yes Yes
AzureFirewall-AddIPtoTIAllowList No Yes No
AzureFirewall-BlockIP-addNewRule No No Yes

Deploy Custom Connector + 3 Playbook templates

This package includes:

  • Custom connector for Azure Firewall
  • Three playbook templates leverage Azure Firewall custom connector

You can choose to deploy the whole package: connector + all three playbook templates (below buttons), or each one seperately from it's specific folder.

Firewall connector documentation

Authentication

This connector supports Service Principal authentication type.

Azure Active Directory Service principal

To use your own application with the Azure Sentinel connector, perform the following steps:

  1. Register the application with Azure AD and create a service principal. Learn how.

  2. Get credentials (for future authentication).

    In the registered application blade, get the application credentials for later signing in:

    • Tenant Id: under Overview
    • Client ID: under Overview
    • Client secret: under Certificates & secrets.
  3. Grant permissions to Azure Firewall, IP Groups or Azure Firewall Policies.

    • In the relevant resources of the above, go to Settings -> Access control (IAM)

    • Select Add role assignment.

    • Select the role you wish to assign to the application: Contributor role.

    • Find the required application and save. By default, Azure AD applications aren't displayed in the available options. To find your application, search for the name and select it.

  4. Authenticate

    In this step we use the app credentials to authenticate to the Sentinel connector in Logic Apps.

    In the custome connector for Azure Firewall, fill in the required parameters (can be found in the registered application blade) - Tenant Id: under Overview - Client Id: under Overview - Client Secret: under Certificates & secrets

Prerequisites for using and deploying Custom Connector

  1. Firewall service end point should be https://management.azure.com/
  2. Register an AAD app and capture the ClientID, SecretKey and TenantID
  3. Playbook templates leverage VirusTotal for IP enrichment. To use this VirusTotal capabilities,generate a Virus Total API key. Refer this link how to generate the API Key

Deployment instructions

  1. Deploy the Custom Connector and playbooks by clicking on "Deploy to Azure" button. This will take you to deplyoing an ARM Template wizard.
  2. Fill in the required parameteres:
Parameters Description
Custom Connector name Enter the Custom connector name (e.g. AzureFirewallConnector)
AzureFirewall-BlockIP-addNewRule Playbook Name Enter the playbook name here (e.g. AzureFirewall-BlockIP-addNewRule)
AzureFirewall-BlockIP-addToIPGroup Playbook Name Enter the playbook name here (e.g. AzureFirewall-BlockIP-addToIPGroup)
AzureFirewall-AddIPtoTIAllowList Playbook Name Enter the playbook name here (e.g. AzureFirewall-AddIPtoTIAllowList)
Teams GroupId Enter the Teams channel id to send the adaptive card
Teams ChannelId Enter the Teams Group id to send the adaptive card Refer the below link to get the channel id and group id
ClientId Enter the Client Id of the Service Principal which the custom connector will authenticate with
ClientSecret Enter the Client secret of the Service Principal which the custom connector will authenticate with

Post-Deployment instructions

a. Authorize connections

Once deployment is complete, you will need to authorize each connection.

  1. Click the Azure Sentinel connection resource
  2. Click edit API connection
  3. Click Authorize
  4. Sign in
  5. Click Save
  6. Repeat steps for other connection such as Teams connection and Virus Total (For authorizing the Virus Total API connection, the API Key needs to be provided)

b. Configurations in Azure Sentinel

  1. Find Azure Sentinel Analytics rules that create alerts and incidents which includes IP entities.
  2. Configure automation rule(s) to trigger the playbooks

Learn more

Reference to the playbook templates and the connector

Connector

Playbooks