Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
When a new Microsoft Sentinel incident is created for leaked credentials, this playbook queries the Check Point Exposure Management credential leak API for the affected domain, enriches the incident with exposed credential details, and adds results as an incident comment.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Check Point Cyberint Alerts |
| Source | View on GitHub |
When a new Microsoft Sentinel incident is created for leaked credentials, this playbook queries the Check Point Exposure Management credential leak API for the affected company domain, enriches the incident with exposed credential details, and escalates severity when the leak volume is high.
Flow:
1. Calls Check_Point_EM_Base to retrieve API credentials.
2. Extracts account entities from the Sentinel incident.
3. Queries POST /by_domain/ for leaked credentials matching the configured company domain.
4. Adds a comment listing each exposed credential (email, source, last seen).
5. If more than 10 credentials are found, escalates incident severity to High.
| Parameter | Required | Description |
|---|---|---|
| PlaybookName | No | Name of the Logic App (default: Check_Point_EM_CredentialLeakResponse) |
| Check_Point_EM_Base_PlaybookName | No | Name of the base playbook (default: Check_Point_EM_Base) |
| CompanyDomain | Yes | Primary company domain to check for leaked credentials (e.g., example.com) |
| Action | Endpoint |
|---|---|
| Query leaked credentials | POST /by_domain/ |
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊