Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
When a new Microsoft Sentinel incident is created containing CVE identifiers, this playbook enriches each CVE using the Check Point CVE Intelligence API (EPSS, CPEM score, exploitation evidence, PoC availability) and adds results as an incident comment.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Check Point Cyberint Alerts |
| Source | View on GitHub |
When a new Microsoft Sentinel incident is created containing CVE identifiers, this playbook enriches each CVE using the Check Point CVE Intelligence API and adds enrichment results (EPSS, CPEM score, CVSS, CWE, PoC availability, exploitation evidence) as an incident comment. If any CVE exceeds the configured score threshold, the incident severity is escalated.
Flow:
1. Calls Check_Point_EM_Base to retrieve API credentials.
2. Extracts CVE identifiers (e.g., CVE-2024-1234) from the incident description.
3. For each CVE, queries GET /cve-intel/get_enriched_cve/{cve_id}.
4. Adds a comment with enrichment details per CVE.
5. If the maximum CPEM CVE score exceeds the threshold, escalates incident severity to High and tags the incident.
| Parameter | Required | Description |
|---|---|---|
| PlaybookName | No | Name of the Logic App (default: Check_Point_EM_VulnerabilityMonitoring) |
| Check_Point_EM_Base_PlaybookName | No | Name of the base playbook (default: Check_Point_EM_Base) |
| SeverityEscalationThreshold | No | CPEM CVE score threshold for escalation (default: 7.0) |
| Action | Endpoint |
|---|---|
| CVE Enrichment | GET /cve-intel/get_enriched_cve/{cve_id} |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊