SpyCloud Malware Information - SpyCloud Enterprise

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This Playbook will be triggered when an spycloud malware incident is created.

Attribute Value
Type Playbook
Solution SpyCloud Enterprise Protection
Source View on GitHub

Additional Documentation

📄 Source: SpyCloud-Malware-Playbook/readme.md

SpyCloud Enterprise Malware Playbook

SpyCloud Enterprise

Table of Contents

  1. Overview
  2. Prerequisites
  3. Deployment
  4. Post Deployment Steps

Overview

This playbook gets triggered when an incident is created from the "SpyCloud Malware Rule" and can perform the following actions

Incident Comments

Prerequisites

Deployment Instructions

Deploy to Azure Deploy to Azure Gov

Post Deployment Instructions

Authorize connections

Once deployment is complete, you will need to authorize each connection: - As a best practice, we have used the Sentinel connection in Logic Apps that use "ManagedSecurityIdentity" permissions. Please refer to this document and provide permissions to the Logic App accordingly. - Provide connection details for the SpyCloud Enterprise Custom Connector. - Save the Logic App. If the Logic App prompts any missing connections, please update the connections similarly.

b.Configurations in Sentinel:


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to SpyCloud Enterprise Protection