Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
Once a new sentinel incident is created, this playbook gets triggered and performs the following actions: 1. Disables Service Account Key by the gcp_project_id, gcp_service_account and gcp_service_acc_key, provided in the alert custom entities. 2. Adds comment to the incident. <img src='https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/GoogleCloudPlatformIAM/Playbooks/GCP-DisableSer
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | GoogleCloudPlatformIAM |
| Source | View on GitHub |
📄 Source: GCP-DisableServiceAccountKey/readme.md
Once a new sentinel incident is created, this playbook gets triggered and performs the following actions: 1. Disables Service Account Key by the gcp_project_id, gcp_service_account and gcp_service_acc_key, provided in the alert custom entities. 2. Adds comment to the incident.

Once deployment is complete, authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for GoogleCloudPlatformIAM connector API Connection.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊