Fetch Threat Intel from ThreatX
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
This playbook provides/updates the threat intel and essential details in comments section of triggered incident so that SOC analysts can directly take corrective measure to stop the attack
Additional Documentation
📄 Source: ThreatXPlaybooks/ThreatX-Enrichment/readme.md
ThreatX-enrichment Info Playbook
## Summary
When a new Microsoft Sentinel incident is created, this playbook gets triggered and performs below actions
1. Fetches the list of Ip's from incident entites .
2. Make the APi call to get the latest threat information/details from cloud console and update the same incidents comments with result.
Prerequisites
- ThreatX-WAFCustomConnector needs to be deployed prior to the deployment of this playbook under the same subscription.
- API key. To get API Key, login into your ThreatX cloud instance dashboard and navigate to Settings --> API Key --> Add API Key.
- [Important Steps] Store the API secret key in Key vault and provide the key name of the stored secret during deployment
Deployment instructions
- Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deploying an ARM Template wizard.

- Fill in the required paramteres:
- Playbook Name: Enter the playbook name here (Ex: ThreatX-enrichment).
- Custom Connector Name: Enter the ThreatX custom connector name here (Ex: ThreatX-WAFCustomConnector).
- Keyvault name: Enter the key vault name where secret key is stored.
- Threatx Key name : Your Key name for the stored api secret.
Post-Deployment instructions
a. Authorize connections (Perform this action if needed)
Once deployment is complete, you will need to authorize each connection.
1. Click the Microsoft Sentinel connection resource
2. Click edit API connection
3. Click Authorize
4. Sign in
5. Click Save
6. Repeat steps for ThreatX Api Connection (For authorizing the ThreatX API connection, API Key needs to be provided)
b. Configurations in Sentinel
- In Microsoft sentinel analytical rules should be configured to trigger an incident with risky URL or IP Address.
- Configure the automation rules to trigger this playbook , mapping of IP and URL entities is necessary
c. Assign Playbook Microsoft Sentinel Responder Role
- Select the Playbook (Logic App) resource
- Click on Identity Blade
- Choose Systen assigned tab
- Click on Azure role assignments
- Click on Add role assignments
- Select Scope - Resource group
- Select Subscription - where Playbook has been created
- Select Resource group - where Playbook has been created
- Select Role - Microsoft Sentinel Responder
- Click Save (It takes 3-5 minutes to show the added role.)
D. Assign access policy on key vault for Playbook to fetch the secret key
- Select the Keyvault resource where you have stored the secret
- Click on Access policies Blade
- Click on Create
- Under Secret permissions columun , Select Get , List from "Secret Management Operations"
- Click next to go to Principal tab and choose your deployed playbook name
- Click Next leave application tab as it is .
- Click Review and create
- Click Create
References
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to ThreatXCloud