Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook will update status of Cybersixgill Alerts when respective incident status is updated in Microsoft Sentinel
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Cybersixgill-Actionable-Alerts |
| Source | View on GitHub |
📄 Source: CybersixgillAlertStatusUpdate/readme.md
Author: Loginsoft
This playbook will update status of Actionable alerts in Cybersixgill Portal. When incident is updated in Microsoft Sentinel, playbook will run and update status Actionable alerts from Cybersixgill Portal
We will need the following data to do one time setup. 1. Cybersixgill Client ID (client_id) 2. Cybersixgill Client Secret (client_secret)
Client ID and Client Secret can be obtained from Cybersixgill Developer Portal * You can skip below step if you already have Client ID and Client Secret. * Visit Cybersixgill Developer Portal * Click on Create an application. * Enter Application name and brief description and optional Application image * All other fields can be left to default. * Once done click on Create the app. * Copy Client ID, Client Secret and Organization ID.
Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save
Create new automation rule, ex: CybersixgillStatusUpdateAutomationRule * Trigger = When Incident is updated * Condition = Status Changed
Automation rule example
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to Cybersixgill-Actionable-Alerts