Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook enriches Microsoft Sentinel incidents by querying Microsoft Defender Threat Intelligence Passive DNS data for related host and IP entities.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Microsoft Defender Threat Intelligence |
| Source | View on GitHub |
📄 Source: MDTI-PassiveDns/readme.md
This playbook uses the Microsoft Defender Threat Intelligence Passive DNS data to automatically enrich incidents generated by Microsoft Sentinel. Leverage this playbook to enrich your incidents with Passive DNS data hosted by the indicators found within the incident. Passive DNS (PDNS) is a system of record that stores DNS resolution data for a given location, record, and timeframe. This historical resolution data set allows users to view which domains resolved to an IP address and vice versa. This data set allows for time-based correlation based on domain or IP overlap. PDNS may enable the identification of previously unknown or newly stood-up threat actor infrastructure. Proactive addition of indicators to blocklists can cut off communication paths before campaigns take place. Users will find A record resolution data within the Resolutions data set tab and will find more types of DNS records in the DNS data set tab.
| Name | Description | Default |
|---|---|---|
| PlaybookName | Name of the Logic App (playbook) | MDTI-Data-PassiveDns |
| MDTI-BaseUrl | MDTI Graph API base URL (must start with https://) | https://graph.microsoft.com |
| Api-Version | MDTI Graph API version | v1.0 |
To allow the playbook to query Microsoft Defender Threat Intelligence data, you must grant the managed identity of the playbook the ThreatIntelligence.Read.All application permission in Microsoft Graph. Follow these steps:
'MDTI-Data-PassiveDns' with your playbook's name if different:```powershell
Install-Module Microsoft.Graph -Scope CurrentUser -AllowClobber -Force Import-Module Microsoft.Graph
Connect-MgGraph -Identity
$graphSp = Get-MgServicePrincipal -Filter "displayName eq 'Microsoft Graph'"
$role = $graphSp.AppRoles | Where-Object { $.Value -eq 'ThreatIntelligence.Read.All' -and $.AllowedMemberTypes -contains 'Application' }
$logicAppName = 'MDTI-Data-PassiveDns' $logicAppSp = Get-MgServicePrincipal -Filter "displayName eq '$logicAppName'"
[Content truncated...]
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to Microsoft Defender Threat Intelligence