Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Illusive Active Defense |
| Source | View on GitHub |
⚠️ Not listed in Solution JSON: This content item was discovered by scanning the solution folder but is not included in the official Solution JSON file. It may be a legacy item, under development, or excluded from the official solution package.
The Incident Enrichment playbook leverages Sentinel analytic rules to discover Illusive-based alerts and report the associated data and forensics as Sentinel incident sets.
Use this playbook to enrich Sentinel security incidents originating from Illusive with Illusive incident and forensics information. Illusive continues to enrich relevant Sentinel incidents as new events are detected. This is done using the Illusive API resource.
Deploying the Illusive Incident Enrichment playbook requires a custom deployment template.
Before deploying the custom template, download the azuredeploy.json for the Incident Enrichment playbook from the GitHub repository using this link.
| Field | Instructions |
| Region | Filled automatically based on the subscription and cannot be changed. |
| Workspace Name | Specify the Azure Sentinel Workspace Name where you want to create the playbook. |
| Illusive API URL Illusive API Key |
Supply the authentication parameters required to access the Illusive API Important: Enter the API key without the keyword |
| Azure-Sentinel Client ID: Azure-Sentinel Client Secret: Azure-Sentinel Tenant ID: |
Supply the authentication parameters required to access the Azure-Sentinel API |
[Content truncated...]
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊