Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook enables user to download pcap file of any detections associated with a Vectra Entity to default file share of storage account. Users can provide detection ids via MS Teams AdaptiveCard.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Vectra XDR |
| Source | View on GitHub |
📄 Source: VectaDownloadPcapFileToStorage/readme.md
This playbook enables users to download pcap files of detections associated with a Vectra Entity to the default file share of a storage account. Users can provide detection IDs via Microsoft Teams Adaptive Card.
/channel and /, decode it using an online URL decoder, and copy it to use as Channel ID.
- Copy the text of the GroupId parameter from the link to use as GroupId.Once deployment is complete, authorize each connection. 1. Go to your logic app → API connections → Select keyvault connection resource. 2. Go to General → Edit API connection. 3. Click Authorize. 4. Sign in. 5. Click Save. 6. Repeat steps for other connections.
To authorize the Storage Account API connection, you will need the access key: 1. Go to Azure Portal → Storage Accounts → your storage account. 2. In the left pane, select Access keys under Security + networking. 3. Copy the value of key1 or key2. 4. Go to your logic app → API connections → Select the storage account connection resource. 5. Go to General → Edit API connection. 6. Paste the copied access key in the required field. 7. Click Save.
Add access policy for the playbook's managed identity and authorized user to read and write secrets of the Key Vault. 1. Go to Logic App → your Logic App → Identity → System assigned Managed identity and copy Object (principal) ID. 2. Go to Key Vaults → your Key Vault → Access policies → Create. 3. Select all keys & secrets permissions. Click Next. 4. In the principal section, search by copied Object ID. Click Next. 5. Click Review + Create. 6. Repeat steps 2 to 5 to add access policy for the user account used to authorize the connection.
After authorizing each connection, assign role to this playbook. 1. Go to Log Analytics Workspace → your workspace → Access Control → Add. 2. Add role assignment. 3. Assignment type: Job function roles. 4. Role: Microsoft Sentinel Contributor. 5. Members: select managed identity for assigned access to and add your logic app as member. 6. Click on review+assign.
[Content truncated...]
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊