Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook retrieves related infrastructure details for Censys entities (hosts, certificates, or web properties) using the Censys Pivot Analysis API. It accepts an IOC Value (hosts, certificates, or web properties) and IOC type as input, creates a pivot analysis job, monitors the job status, retrieves the results, and ingests the related infrastructure data into Azure Log Analytics for further analysis and display data in the dashboard. Learn more about CensEye in the Censys documentation: ht
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Censys |
| Source | View on GitHub |
This content item queries data from the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
CensysRelatedInfrastructure_CL 🔶 |
? | ✓ | ? |
📄 Source: CensysRelatedInfrastructure/readme.md
This playbook retrieves related infrastructure details for Censys entities (hosts, certificates, or web properties) using the Censys Pivot Analysis API. It accepts an IOC Value (hosts, certificates, or web properties) and IOC type as input, creates a pivot analysis job, monitors the job status, retrieves the results, and ingests the related infrastructure data into Azure Log Analytics for further analysis and display data in the dashboard. Learn more about CensEye in the Censys documentation: https://docs.censys.com/docs/platform-threat-hunting-use-censeye-to-build-detections
Once deployment is complete, authorize each connection. 1. Go to your logic app → API connections → Select Key Vault connection resource. 2. Go to General → edit API connection. 3. Click Authorize. 4. Sign in. 5. Click Save. 6. Repeat steps for Log Analytics Data Collector connection.
Add access policy for the playbook's managed identity to read secrets from Key Vault. 1. Go to logic app → your logic app → identity → System assigned Managed identity and copy Object (principal) ID. 2. Go to keyvaults → your keyvault → Access policies → create. 3. Select Get and List permissions for Secrets. Click next. 4. In the principal section, search by copied object ID. Click next. 5. Click review + create.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊