Forescout-DNS_Sniff_Event_Playbook

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook will update incident with action to perform on endpoint

Attribute Value
Type Playbook
Solution ForescoutHostPropertyMonitor
Source View on GitHub

Additional Documentation

📄 Source: readme.md

ForeScout playbook templates

drawing

Table of Contents

  1. Overview
  2. Playbook Templates

Overview

"ForescoutHostPropertyMonitor" is a project that helps to check and report IP addresses of the hosts that are involved in various categories of malicious attacks. It does the checks by analyzing host properties uploaded by Forescout platform. This project analyzes number of times certain events are generated by a host to determine the classificaction and severity of activity done by the host. It forwards that severity and host information back to Forescout platform through description field or Tags of Sentinel Incident so that Coninuum platform can act upon the host.

Playbook Templates

This package includes:

action_group Indicates the category of action. Valid values are: manage, notify, remediate, and restrict.
endpoint_ip Indicates the IP address of the endpoint, which can be an IPv4 or IPv6 address.
em_ip Indicates the IP address of the Enterprise Manager to which the endpoint belongs.
info Indicates additional information

The field info is optional.

Note that the eyeExtend for Microsoft Sentinel module polls the incidents information periodically and examines the Description field and Tags of each incident. Based on the information set in the Description field and the Tags, the Forescout Platform applies the requested action set by Microsoft Sentinel playbook to the endpoints. The following is a sample description field of an incident set by the playbook: action_group="restrict";endpoint_ip=["10.16.141.130"];em_ip=["10.16.147.96"];info=block network access If Tags are used, please use corresponding tag names: action_group, endpoint_ip, em_ip, info

Following table lists valid info values for each action group:

action_group Valid info value
restrict block network access
quarantine
limit network access
remediate OS update
kill process <Skype>
manage VA scan
notify Unauthorized activity
Unauthorized app detected

Use the Microsoft Apps Designer to view or edit the playbook as needed to fulfil security requirements. The code is prepared by using the visual editor, which can be easily viewed and modified.

You can choose to deploy the playbook:

Deploy to Azure Deploy to Azure Gov


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to ForescoutHostPropertyMonitor