Fortinet-FortiGate-ResponseOnBlockURL

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook allows the SOC users to automatically response to Microsoft Sentinel incidents which includes URL's, by adding the URLs to the Microsoft Sentinel URL blocked group.

Attribute Value
Type Playbook
Solution Fortinet FortiGate Next-Generation Firewall connector for Microsoft Sentinel
Source View on GitHub

Additional Documentation

📄 Source: Fortinet_ResponseOnURL/readme.md

Fortinet - ResponseOnURL

## Summary

This playbook allows the SOC users to automatically response to Microsoft Sentinel incidents which includes URL's, by adding the URLs to the Sentinel URL blocked group. Learn more about Threat Intelligence in Fortinet policy

Fortinet

This is the adaptive card SOC will receive when playbook is triggered for each risky IP for taking actions like block/unblock/ignore ::

Fortinet

This is the consolidate adaptive card about the summary of actions taken on IP and the incident configuration ::

Consolidated Adaptive Card example

Prerequisites

Deployment instructions

  1. Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deploying an ARM Template wizard.

Deploy to Azure Deploy to Azure

  1. Fill the required parameteres:
    • Playbook Name: Enter the playbook name here (ex:Fortinet_ResponseOnURL)
    • Team Channel ID: Enter the teams channel id
    • Teams group ID: Enter the teams channel id
    • Pre-defined Group Name: Group name which is created in firewall
    • Function app Name: Enter Function app name which is created as Prerequisite
    • Managed Identities Name: Enter the managed identity name (ex: managed identities name)

Post-Deployment instructions

a. Authorize connections

Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource. 2. Click edit API connection. 3. Click Authorize. 4. Sign in. 5. Click Save. 6. Repeat steps for other connection such as Team's connection

Playbook steps explained

b. Configurations in Sentinel

  1. In Microsoft sentinel analytical rules should be configured to trigger an incident with URL Entity.
  2. Configure the automation rules to trigger this playbook.

When Microsoft Sentinel incident creation rule is triggered

Get Entities as URLs

Initialize variables

Post an adaptive card to the SOC channel

[Content truncated...]


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to Fortinet FortiGate Next-Generation Firewall connector for Microsoft Sentinel