Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook will mark active detection as fixed associated with an entity based on choice of user provided over MS Teams. Also it adds a pre-defined but user customizable comment to an incident and also adds a pre-defined but user customizable note to Vectra Entity.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Vectra XDR |
| Source | View on GitHub |
📄 Source: VectraMarkDetectionsAsFixed/readme.md
This playbook will mark all active detection as fixed associated with an entity. Also it adds a pre-defined but user customizable comment to an incident and also adds a pre-defined but user customizable note to Vectra Entity.
Once deployment is complete, authorize each connection. 1. Go to your logic app → API connections → Select keyvault connection resource. 2. Go to General → Edit API connection. 3. Click Authorize. 4. Sign in. 5. Click Save. 6. Repeat steps for other connections.
Add access policy for the playbook's managed identity and authorized user to read and write secrets of the Key Vault. 1. Go to logic app → your Logic App → identity → System assigned Managed identity and copy Object (principal) ID. 2. Go to key vaults → your Key Vault → Access policies → create. 3. Select all keys & secrets permissions. Click next. 4. In the principal section, search by copied Object ID. Click next. 5. Click review + create. 6. Repeat the above steps 2 to 5 to add access policy for the user account using which connection is authorized.
Assign a role to this playbook. 1. Go to Log Analytics Workspace → your workspace → Access Control → Add. 2. Add role assignment. 3. Assignment type: Job function roles. 4. Role: Microsoft Sentinel Contributor. 5. Members: Select managed identity for assigned access to and add your logic app as a member. 6. Click on review+assign.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊