Tanium-ListSecurityPatches

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


Tanium's real-time data can speed up investigations by providing important context for analysts, such as which security patches are missing on the endpoints in question. This playbook starts with a Microsoft Sentinel incident, gets the hosts associated with that incident, queries the Tanium API Gateway for applicable security patches for those endpoints, and then adds a comment to the incident with that information. See [Tanium Help](https://help.tanium.com/bundle/ConnectAzureSentinel/page/Integ

Attribute Value
Type Playbook
Solution Tanium
Source View on GitHub

Additional Documentation

📄 Source: Tanium-SecurityPatches/readme.md

Tanium-SecurityPatches

Overview

This playbook will use the Tanium API to retrieve applicable security patches for the hosts associated with a Microsoft Sentinel incident.

The results of the playbook will be added as a comment to the incident.

Tanium-SecurityPatches screenshot

Prerequisites

[!TIP] Leverage the "Tanium Threat Response Alerts" analytics rule to generate Sentinel incidents for an Threat Response Alert from Tanium.

Get the Template

Use the links below to create the playbook from our template.

Deploy to Azure Deploy to Azure Gov

Note

With the default deployment and configuration settings of the playbooks, your Tanium API Key is stored in a secure string workflow parameter. To update your Tanium API Key you must redeploy this playbook.

To allow Tanium API Key updates it is advised to use Azure Key Vault to securely store the Tanium API Key and update this playbook to use the Tanium API Key from the Key Vault instead of the secure string parameter.

Key Vault references


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to Tanium