Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook search for indicators in Minemeld related to the entities(IP, filehash, URL) gathered from Sentinel incident. If the search result is positive a comment will be added to enrich the incident, if not a comment stating no information available on Minemeld for searched indicator will be added to the incident.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Minemeld |
| Source | View on GitHub |
📄 Source: MinemeldPlaybooks/Minemeld-EnrichIncident/readme.md
## Summary When a new Microsoft Sentinel incident is created, this playbook gets triggered and performs below actions 1. For each Entity (IP Address, FileHash, URL) available in Sentinel incident, it searches for a match in in Minemeld indicators list 2. If it finds the match, this playbook adds a rich comment to the incident with all the collected information
Deploy the playbook by clicking on "Deploy to Azure" button. This will take you to deploying an ARM Template wizard.
Fill in the required parameters:
Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for Minemeld Api Connection (For authorizing the Minemeld API connection, user and password needs to be provided)
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊