Infoblox-TimeRangeBased-DHCP-Lookup
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
The playbook will retrieve IP entities from an incident, search for related DHCP data in a table for a apecified time range, and if found, add the DHCP lookup data as a comment on the incident.
Additional Documentation
📄 Source: Infoblox TimeRangeBased DHCP Lookup/readme.md
Infoblox TimeRangeBased DHCP Lookup
Summary
The playbook will retrieve IP entities from an incident, search for related DHCP data in a table for a specified time range, and if found, add the DHCP lookup data as a comment on the incident.
Prerequisites
- CEF based Infoblox Data Connector should be configured to ingest DHCP lease related data in Microsoft Sentinel.
Deployment instructions
- To deploy the Playbook, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
- Fill in the required parameters:
- Playbook Name: Enter the playbook name here
- Start Date: Enter start date from which you want to perform lookup for DHCP data. Date should be in the format of yyyy-mm-dd
- End Date: Enter end date till you want to perform lookup for DHCP data. Date should be in the format of yyyy-mm-dd
- Workspace Name: Enter name of Log Analytics Workspace where DHCP data is available

Post-Deployment instructions
a. Authorize connections
Once deployment is complete, authorize each connection.
- Go to your logic app -> API connections -> Select azuremonitorlogs connection resource
- Go to General -> edit API connection
- Click Authorize
- Sign in
- Click Save
- Repeat steps for other connections
Assign role to this playbook.
- Go to Log Analytics Workspace → → Access Control → Add
- Add role assignment
- Assignment type: Job function roles -> Add 'Microsoft Sentinel Contributor' as a Role
- Members: select managed identity for assigned access to and add your logic app as member
- Click on review+assign
c. Configurations in Microsoft Sentinel
- In Microsoft sentinel, analytical rules should be configured to trigger an incident which has Entities Mapping available for IP
- To manually run the playbook on a particular incident follow the below steps:
a. Go to Microsoft Sentinel -> -> Incidents
b. Select an incident
c. In the right pane, click on Actions, and from the dropdown select the 'Run Playbook' option
d. Click on the Run button beside this playbook
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to Infoblox