Azure-Sentinel/Playbooks/Restrict-MDATPIPAddress
dicolanl 33c23ea841
Update azuredeploy.json
2020-05-13 13:28:43 -04:00
..
azuredeploy.json Update azuredeploy.json 2020-05-13 13:28:43 -04:00
readme.md Restrict-MDATPIPAddress 2020-04-23 16:22:14 -04:00

readme.md

Restrict-MDATPIpAddress

author: Nicholas DiCola

This playbook will take IP entities and generate alert and block threat indicators for each IP in MDATP for 90 days.

Additional Post Install Notes:

The Logic App creates and uses a Managed System Identity (MSI) to authenticate and authorize against api.securitycenter.windows.com to update threat indicators.

The MSI must be assigned API Permissions 'Ti.ReadWrite' to WindowsDefenderATP App. To assign use PowerShell and AzureAD Module. Run the following commands:

msi = Get-AzureADServicePrincipal | ?{.DisplayName -ieq "Restrict-MDATPUrl"} $graph = Get-AzureADServicePrincipal -Filter "AppId eq 'fc780465-2017-40d4-a0c5-307022471b92'" roles = $graph.AppRoles | ?{.Value -imatch "Ti.ReadWrite" }

Foreach ($role in $roles){ New-AzureADServiceAppRoleAssignment -ObjectId $msi.ObjectId -PrincipalId $msi.ObjectId -Id $role.Id -ResourceId $graph.ObjectId }