Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook uses the OKTA connector to prompt the risky user on Teams. User is asked action was taken by them. Based on the user confirmation the SOC admin is notified to investige on the user account. Also, comment is added to the incident with user information and summary of actions taken.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Okta Single Sign-On |
| Source | View on GitHub |
📄 Source: OktaPlaybooks/Okta-PromptUser/readme.md
## Summary
When a new Microsoft Sentinel incident is created, this playbook gets triggered and performs below actions: 1. An adaptive card is sent to the risky user asking if they have done the malicious activity 2. If user confirms yes, the incident will be closed and enriched as a comment with the user details 3. Else, the user sessions will be cleared and reset password link will be sent to user 4. An adaptive card is sent to the SOC Teams channel, providing information about the incident and risky user details. The SOC can investigate further on the user.
This is the adaptive card user will recieve when playbook is triggered:
This is the adaptive card SOC will recieve if user confirms they didn't to the malicious activity:
Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for other connections such as Teams connection and Okta Api Connection (For authorizing the Okta API connection, the API Key needs to be provided)
Microsoft Sentinel incident is created. The playbook receives the incident as the input.
Get the list of risky/malicious accounts as entities from the Incident
Iterates on the accounts found in this incident (probably one) and performs the following: For the risky user account, playbook uses "Get User" action to get user details from Okta
In this step we post a message in Microsoft Teams to the risky user with Incident details and ask for his confirmation on the malicious activity described in the incident.
a. Incident is commented with all the details below * User information collected by "Get User" action from Okta User id, User name, User login, User email, User status, User created, User activated, User statusChanged, User lastLogin, User lastUpdated, User passwordChanged * Actions taken on Sentinel
b. Close Incident
a. Playbook uses "Clear User Sessions" action to clear the user sessions in Okta
b. Playbook uses "Reset Password" action to resest the password of the user in Okta
c. SOC user will be sent an adaptive card with the user details, Incident information to investigate further
d. Add a comment to the incident with the following details:
[Content truncated...]
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊