Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbooks sends an adaptive card to the SOC Teams channel with information about the Okta user and incident details. The SOC is allowed to take action such suspend, reset password, expire password, add to group. An informative comment will be posted to the incident.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Okta Single Sign-On |
| Source | View on GitHub |
## Summary
When a new sentinal incident is created,this playbook gets triggered and performs below actions 1. An adaptive card is sent to the SOC Teams channel with information collected from the incident and the risky user information from Okta. 2. The SOC is allowed to take action on risky user based on the information provided in the adaptive card.
This is the adaptive card SOC will recieve when playbook is triggered:
Deploy the playbook by clicking on "Deply to Azure" button. This will take you to deplyoing an ARM Template wizard.
Fill in the required paramteres:
Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for other connections such as Teams connection and Okta Api Connection (For authorizing the Okta API connection, API Key needs to be provided)
Microsoft Sentinel incident is created. The playbook receives the incident as the input.
Get the list of risky/malicious accounts as entities from the Incident
Playbook uses "List Groups" action to get all the group details present in the particular Okta domain This groups list will be used later in the adaptive card dropdown when SOC wants to add user to a group
Select groups-preparing the group name and id from the list of groups to display in the adaptive card for user choice
Compose the choice set dropdown for adaptive card for group names
Iterates on the accounts found in this incident (probably one) and performs the following: 1. For the risky user account, playbook uses "Get User" action to get user details from Okta 2. Post an Adaptive Card to a SOC admin on teams channel with the incident information and risky user information and admin has a list of choices to perform different user actions on Okta 3. Switch case to perform action choices on the user in Okta
a. Case - Add user to group: When Soc admin chooses to add user to a group in Okta, playbook uses "Add user to group" action to add user to group in okta.SOC admin needs to select a group from the adaptive card
b. Case - Expire Password: When Soc admin chooses to expire password of the user in Okta, playbook uses "Expire Password" action.
c. Case - Reset Password : When Soc admin chooses to reset password of the user in Okta,playbook uses "Reset Password" action.
d. Case - Suspend User: When Soc admin chooses to suspend the user in Okta,playbook uses "Suspend User" action.
e. Case - Unsuspend User :When Soc admin chooses to unsuspend the user in Okta,playbook uses "UnSuspend User" action.
f. Ignore
[Content truncated...]
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊