e912803f90
* New connectors+playbooks * Azure Firewall * Carbon Black * Cisco ASA * CrowdStrike * Fortinet FortiGate * Palo Alto PAN-OS * Okta * remove localization from docs links * Linked templates change to refer master * remove linked templates They are depended on the playbook templates to be uploaded first Co-authored-by: liortamirmicrosoft <55202270+liortamirmicrosoft@users.noreply.github.com> |
||
---|---|---|
.. | ||
CarbonBlackConnector | ||
Playbooks | ||
azuredeploy.json | ||
readme.md |
readme.md
Carbon Black Logic Apps connector and playbook templates
Table of Contents
- Overview
- Deploy Custom Connector + 3 Playbook templates
- Authentication
- Prerequisites
- Deployment
- Post Deployment Steps
- References
- Known issues and limitations
Overview
The Carbon Black Cloud is a cloud-native endpoint protection platform (EPP) that provides what you need to secure your endpoints using a single, lightweight agent and an easy-to-use console.
Deploy Custom Connector + 3 Playbook templates
This package includes:
-
Three playbook templates leverage CarbonBlack custom connector:
- Response from Teams - allow SOC to take action on suspicious devices arrived in incidents (apply a pre-defined policy or quarantine) and change incident configuration directly from Teams channel. Post information about the incident as a comment to the incident.
- Quarantine device - move the device arrived in the incident to quarantine (if not already quarantined). Post information about the incident as a comment to the incident.
- Enrichment - collect information about the devices and post them as incident comment.
You can choose to deploy the whole package: connector + all three playbook templates, or each one seperately from it's specific folder.
CarbonBlack connector documentation
Authentication
This connector supports API Key authentication. When creating the connection for the custom connector, you will be asked to provide the API key which you generated in Carbon Black platform. API Key authentication.
Prerequisites in Carbon Black
-
CarbonBlack clound end point should be known. (e.g. https://{CarbonblackBaseURL})
-
Generate an API key (learn how), and grant it /appservices/ Access level. (For playbooks built from scratch which leverage the process API, /investigate/ Access level is also relevant.)
-
For Response from Teams playbook, a policy needs to be created, so SOC will be able to move a device to it from the Teams adaptive card.
Deployment instructions
- Deploy the Custom Connector and playbooks by clicking on "Deploy to Azure" button. This will take you to deploying an ARM Template wizard.
- Fill in the required parameters for deploying custom connector and playbooks
Parameters | Description |
---|---|
For Custom Connector | |
Custom Connector name | Enter the Custom connector name (e.g. CarbonBlackConnector) |
Service Endpoint | Enter the CarbonBlack clound end point (e.g. https://{CarbonblackBaseURL}) |
For Playbooks | |
CarbonBlack-TakeDeviceActionFromTeams Playbook Name | Enter the playbook name here (e.g. CarbonBlack-TakeDeviceActionFromTeams) |
CarbonBlack-DeviceEnrichment Playbook Name | Enter the playbook name here (e.g. CarbonBlack-QuarantineDevice) |
CarbonBlack-QuarantineDevice Playbook Name | Enter the playbook name here (e.g. CarbonBlack-DeviceEnrichment) |
OrganizationId | Enter the OrganizationId |
PolicyId | Enter the pre-defined PolicyId to which Teams adapative card will offer to move device |
Teams GroupId | Enter the Teams channel id to send the adaptive card |
Teams ChannelId | Enter the Teams Group id to send the adaptive card Refer the below link to get the channel id and group id |
Post-Deployment instructions
a. Authorize connections
Once deployment is complete, you will need to authorize each connection.
- Click the Azure Sentinel connection resource
- Click edit API connection
- Click Authorize
- Sign in
- Click Save
- Repeat steps for other connections such as Teams connection and CarbonBlack connector API Connection (For authorizing the CarbonBlack connector API connection, API Key needs to be provided. The API Key is the combination of API Key / API Id)
b. Configurations in Sentinel
- In Azure sentinel analytical rules should be configured to trigger an incident with risky user account.
- Configure the automation rules to trigger the playbooks.
Known Issues and Limitations
- Quaraninte is not support for Linux OS devices.