Azure-Sentinel/Playbooks/Get-MDEProcessActivityWithi...
Dennis Pike a156dc2109 new playbook - initial work 2021-03-05 21:42:09 -05:00
..
azuredeploy.json new playbook - initial work 2021-03-05 21:42:09 -05:00
readme.md new playbook - initial work 2021-03-05 21:42:09 -05:00

readme.md

Deploy to Azure Deploy to Azure Gov

Get-MDEProcessActivityWithin30Mins

author: Dennis Pike

Overview

This Playbook queries Microsoft Defender for Endpoint telemetry data via the Microsoft 365 Defender Advanced Hunting API for all Process Events that occur within 30 minutes of the incident and adds a comment to the incident specifying the number of Process Events and KQL query that will list all of the events.

Required Paramaters

  • Region
  • Playbook Name
  • User Name - this is used to pre-populate the username used in the various Azure connections

An Azure AD App registration with required API permissions and secret will needed to provide the following parameters https://docs.microsoft.com/microsoft-365/security/mtp/api-advanced-hunting?view=o365-worldwide

  • Tenant ID
  • Client ID
  • Secret

The Process Events are stored in a Log Analytics Workspace (preferable the one you have Sentinel enabled on) so you will need the Workspace ID and Workspace Key which can be found under Sentinel > Settings > Workspace Settings > Agents Management

  • Workspace ID
  • Workspace Key

Necessary configuration steps

Once this Playbooks template is deployed, you will need to go into the Logic App, edit it and click on each of the steps that require an authenticated connection to your tenant and complete the connection process. These steps will have and exclamation point showing that the connection needs to be completed. Make sure to also open the "For each" step and the "Condition 2" step within it which also contains steps that require authenticated connections.