Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook is triggered automatically when a FileHash entity is detected in a Microsoft Sentinel incident, based on an automation rule. Upon triggering, it extracts the FileHash (certificate fingerprint) from the entity and queries the Censys API (v3) to retrieve detailed certificate information including location, autonomous system, WHOIS data, and associated services. The playbook retrieves the Censys API token securely from Azure Key Vault, performs the API call with retry logic and compre
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Censys |
| Source | View on GitHub |
This playbook is triggered automatically when a FileHash entity is detected in a Microsoft Sentinel incident, based on an automation rule. Upon triggering, it extracts the FileHash (certificate fingerprint) from the entity and queries the Censys API (v3) to retrieve detailed certificate information including location, autonomous system, WHOIS data, and associated services. The playbook retrieves the Censys API token securely from Azure Key Vault, performs the API call with retry logic and comprehensive error handling for HTTP status codes (200, 401, 403, 404, 422). Upon successful data retrieval, the certificate data is ingested into Azure Log Analytics (CensysCert_CL table) for historical analysis and reporting. The playbook then retrieves the associated incident and invokes the CensysIncidentEnrichment sub-playbook to add the enrichment data as a comment to the incident. If no incident is associated, the playbook terminates successfully after data ingestion.
Once deployment is complete, authorize each connection. 1. Go to your logic app → API connections → Select keyvault connection resource. 2. Go to General → Edit API connection. 3. Click Authorize. 4. Sign in. 5. Click Save. 6. Repeat steps for Microsoft Sentinel and Log Analytics Data Collector connections.
Grant the playbook's managed identity 'Key Vault Secrets User' role on the Azure Key Vault. 1. Go to Logic App → your Logic App → Identity → System assigned Managed identity and copy Object (principal) ID. 2. Go to Key Vaults → your Key Vault → Access policies → Create. 3. Select Get and List permissions for Secrets. Click Next. 4. In the principal section, search by copied Object ID. Click Next. 5. Click Review + Create.
Create an automation rule in Microsoft Sentinel to trigger this playbook for FileHash entities. 1. Go to Microsoft Sentinel → your workspace → Automation. 2. Click Create → Automation rule. 3. Configure the rule to trigger when FileHash entities are detected. 4. Add action to run this playbook. 5. Click Apply.
Ensure the CensysIncidentEnrichment (or CensysAddIncidentComment) playbook is deployed and accessible.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊