87d3dd6591 | ||
---|---|---|
.. | ||
CustomConnector | ||
Playbook | ||
images | ||
readme.md |
readme.md
Enrich-CIRCL-hashlookup
Add information from CIRCL hashlookup public instance about hashes found in Sentinel incident entities. MD5 and SHA1 only.
Quick Deployment
Deploy with incident trigger (recommended)
After deployment, attach this playbook to an automation rule so it runs when the incident is created.
Learn more about automation rules
Prerequisites
- No authentication to hashlookup server
- Logic Apps Custom Connector CIRCL-hashlookup
- Logic App managed identity should be given Sentinel Responder role to read incident trigger and write comment/tag to incident
Screenshots
Workflow explained
(step by step pseudo-code)
- Sentinel incident trigger
- Get FileHashes entities
- Validate entities list is not empty or terminate
- For each FileHash, bulk search for md5 and sha1, and append to comment
- Update sentinel incident with comment and appropriate tag Found/NotFound