Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
When a new Microsoft Sentinel incident is created, this playbook enriches IOC entities (IPs, domains, file hashes, URLs) using the Check Point Exposure Management threat intelligence API and adds enrichment results as an incident comment.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Check Point Cyberint Alerts |
| Source | View on GitHub |
📄 Source: Enrichment/CPEM_IOCEnrichment/readme.md
When a new Microsoft Sentinel incident is created, this playbook automatically enriches IOC entities (IPs, domains, file hashes, URLs) using the Check Point Exposure Management threat intelligence API and adds the enrichment results as an incident comment.
Flow: 1. Extracts IP, FileHash, DNS, and URL entities from the Sentinel incident. 2. Calls Check_Point_EM_Base to retrieve API credentials. 3. For each entity, queries the appropriate Check Point Exposure Management IOC enrichment endpoint. 4. Appends enrichment details (verdict, confidence, malware family, actor attribution) as an incident comment.
| Parameter | Required | Description |
|---|---|---|
| PlaybookName | No | Name of the Logic App (default: Check_Point_EM_IOCEnrichment) |
| Check_Point_EM_Base_PlaybookName | No | Name of the base playbook (default: Check_Point_EM_Base) |
| Entity Type | Endpoint |
|---|---|
| IPv4 | GET /api/v1/file/ipv4/{ip} |
| SHA256 Hash | GET /api/v1/file/sha256/{hash} |
| Domain | GET /api/v1/file/domain/{domain} |
| URL | GET /api/v1/file/url?value={url} |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊