Azure-Sentinel/Playbooks/Watchlist-Add-URLToWatchList
dicolanl 4a23af9be0 Updating Deploy buttons and links part 2 2021-06-16 01:40:49 +00:00
..
Graphics 4 new watchlist playbooks 2021-01-27 08:44:01 +02:00
azuredeploy.json 4 new watchlist playbooks 2021-01-27 08:44:01 +02:00
readme.md Updating Deploy buttons and links part 2 2021-06-16 01:40:49 +00:00

readme.md

Watchlist-Add-URLToWatchList

Author: Yaniv Shasha

This playbook will add a URL entity to a new or existing watchlist.

logical flow to use this playbook

1. The analyst finished investigating an incident one of its findings is a suspicious URL entity.
2. The analyst wants to enter this entity into a watchlist (can be from block list type or allowed list).
3. This playbook will run as a manual trigger from the full incident blade or the investigation graph blade, or automatically.

Picture0 Picture0

The playbook, available here and presented below, works as follows:

  1. Manually trigger on a alert with an URL entity.
  2. In the next step the logicApp will Get the relevant URL entity from the entety list.
  3. Create an array of the URL properties
  4. Create a CSV from the above array
  5. Check if the watchlist exists, if it does, use watchlist API and append the data, if not, create a new watchlist and append the data.

After Deploying the logicApp you will see the above workflow.

Picture1 Picture1

Deploying the solution:

  1. Add the missing properties in the ARM template deployment The Watchlist name will be also the alias name that you will use to query the data, for example

    _GetWatchlist('RiskHost')

  2. Post-deployment authenticates the Azure Sentinel connector and the API Http action with managed identity or SPN with Azure Sentinel contributor RBAC role.

Picture1

Deploy to Azure Deploy to Azure Gov