Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook perform look up into EclecticIQ for the entities (Account, Host, IP, FileHash, URL) present result to Microsoft Sentinel incident
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | EclecticIQ |
| Source | View on GitHub |
📄 Source: EclecticIQPlaybooks/EclecticIQ-EnrichIncident/readme.md
## Summary
When a new Azure Sentinel incident is created, this playbook gets triggered and performs below actions
1. For each Entity (Accounts, Host, IP Address, FileHash, URL) available in Sentinel incident, it performs lookup for a match in EclecticIQ
2. If it finds the match, this playbook adds a rich comment to the incident with all the collected information


Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deplyoing an ARM Template wizard.
Fill in the required parameters:
Once deployment is complete, you will need to authorize each connection. 1. Click the Azure Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for EclecticIQ API Connection (For authorizing the EclecticIQ API connection, API Key needs to be provided)
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊