ElasticSearch-EnrichIncident

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook search in Elastic Search for based on the entities (Account, Host, IP, FileHash, URL) present result to Microsoft Sentinel incident

Attribute Value
Type Playbook
Solution Elastic Search
Source View on GitHub

Additional Documentation

📄 Source: ElasticSearchPlaybooks/ElasticSearch-EnrichIncident/readme.md

Summary

When a new Azure Sentinel incident is created, this playbook gets triggered and performs below actions 1. For each Entity (Accounts, Host, IP Address, FileHash, URL) available in Sentinel incident, it searches for a match in Elastic Search 2. If it finds the match, this playbook adds a rich comment to the incident with all the collected information Comment example

Playbook Designer view

Prerequisites

  1. Elastic Search Custom Connector needs to be deployed prior to the deployment of this playbook under the same subscription.
  2. API key. To get API Key, login into your Elastic Search instance / Kibana and navigate to API Keys and generated key.To get Elastic Search API key, follow the instructions in the documentation.

Deployment instructions

  1. Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deplyoing an ARM Template wizard. Deploy to Azure Deploy to Azure Gov

  2. Fill in the required paramteres:

    • Playbook Name: Enter the playbook name here (Ex: ElasticSearch-EnrichIncident)
    • Custom Connector Name: Enter the Elastic Search custom connector name here (Ex: ElasticSearchCustomConnector)

Post-Deployment instructions

a. Authorize connections

Once deployment is complete, you will need to authorize each connection. 1. Click the Azure Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for Elastic Search Api Connection (For authorizing the Elastic Search API connection, API Key needs to be provided)

b. Configurations in Sentinel

  1. In Azure sentinel analytical rules should be configured to trigger an incident with risky user account or host or URL or FileHash or IP Address.
  2. Configure the automation rules to trigger this playbook

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to Elastic Search