Fortinet-FortiGate-ResponseOnBlockIP

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook allows the SOC users to automatically response to Microsoft Sentinel incidents which includes IPs, by adding/removing the IPs to the Microsoft Sentinel IP blocked group.

Attribute Value
Type Playbook
Solution Fortinet FortiGate Next-Generation Firewall connector for Microsoft Sentinel
Source View on GitHub

Additional Documentation

📄 Source: Fortinet_ResponseOnIP/readme.md

Fortinet - ResponseOnIP

## Summary

This playbook allows the SOC users to automatically response to Microsoft Sentinel incidents which includes IPs, by adding/removing the IPs to the Microsoft Sentinel IP blocked group. Learn more about Threat Intelligence in Fortinet policy

Fortinet

This is the adaptive card SOC will receive when playbook is triggered for each risky IP for taking actions like block/unblock/ignore:

Fortinet

This is the consolidate adaptive card about the summary of actions taken on IP and the incident configuration:

Consolidated Adaptive Card example

Fortinet

Prerequisites

Deployment instructions

  1. Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deploying an ARM Template wizard.

Deploy to Azure Deploy to Azure

  1. Fill the required parameters:
    • Playbook Name: Enter the playbook name here (ex:Fortinet_ResponseOnIP)
    • Team Channel ID: Enter the teams channel id
    • Teams group ID: Enter the teams channel id
    • Pre-defined Group Name: Group name which is created in firewall
    • Function app Name: Enter Function app name which is created as Prerequisites
    • Managed Identities Name: Enter the managed identity name (ex: managed identities name) Create user assigned manage identity

Post-Deployment instructions

a. Authorize connections

Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource. 2. Click edit API connection. 3. Click Authorize 4. Sign in. 5. Click Save 6. Repeat steps for other connection such as Team's connection

b. Configurations in Sentinel

  1. In Microsoft sentinel analytical rules should be configured to trigger an incident with IP Entity.
  2. Configure the automation rules to trigger this playbook

Playbook steps explained

b. Configurations in Sentinel

  1. In Microsoft sentinel analytical rules should be configured to trigger an incident with IP Entity.
  2. Configure the automation rules to trigger this playbook.

When Microsoft Sentinel incident creation rule is triggered

Get Entities as IP's

Initialize variables

[Content truncated...]


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to Fortinet FortiGate Next-Generation Firewall connector for Microsoft Sentinel