Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook is triggered by HTTP POST requests with entity information and performs automated investigation and enrichment of URL and User entities with asynchronous processing.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | SentinelSOARessentials |
| Source | View on GitHub |
📄 Source: Http-Trigger-Entity-Analyzer/readme.md
Activating the 'Deploy' button initiates the deployment of an Azure Logic App integrated with Microsoft Sentinel MCP Actions, utilizing an HTTP request trigger. The Logic App is configured to run when an HTTP POST request is received with entity information. This Logic App automatically analyzes URL and User entities and provides detailed security insights including classification, analysis results, and recommendations for each entity type.
The playbook automatically triggers when: - An HTTP POST request is received with entity information - External systems need to analyze URLs or User accounts - Integration with custom applications or workflows is required - On-demand entity analysis is needed via API calls
After the analysis is complete, the MCP Entity Analyzer conducts a comprehensive investigation of the entity and returns results asynchronously: - Initial Response (202 Accepted): Immediate acknowledgment with runId for tracking - Background Processing: Analysis continues without timeout constraints - URL Analysis: Security classification, threat intelligence, and URL reputation analysis - User Analysis: Behavioral analysis, risk assessment, and user activity patterns - Classification: Security classification for each entity - Analysis Results: Detailed security analysis findings - Recommendations: Security recommendations based on the analysis - Disclaimer: AI-generated analysis disclaimer
Prior to beginning the installation process, it's crucial to confirm that you have met the following prerequisites: - The user deploying this Logic App needs to have a Contributor Role - The user has permissions to access Microsoft Sentinel workspace - Microsoft Sentinel data connector lake must be enabled in your workspace for entity data collection - The SentinelMCP connector is available in your environment - You need to provide a valid Sentinel workspace ID during deployment - Authentication support for the Entity Analyzer connection includes: - Entra ID Authentication (OAuth) - Service Principal (Application ID and Secret) - Managed Identity (System-assigned or User-assigned)
This playbook includes two deployment files:
The main ARM template file that defines the Azure resources to be deployed: - Logic App Workflow: The main playbook with HTTP trigger and conditional logic - API Connection: SentinelMCP connection for Microsoft Sentinel MCP integration - Workflow Definition: Complete Logic App structure with triggers, actions, and conditions
The parameters file that contains the configuration values for deployment. This file should be customized before deployment:
Parameters explained: - PlaybookName: - Description: The name that will be assigned to your Logic App in Azure - Default Value: "Http-Trigger-Entity-Analyzer" - Type: String - Usage: This name will appear in your Azure Portal and be used to identify the Logic App
<Your-Sentinel-Workspace-ID> (must be replaced)How to find: Azure Portal → Microsoft Sentinel → Settings → Workspace settings → Copy the Workspace ID
lookBackDays:
During deployment, you'll need to provide: - PlaybookName: Name for the Logic App (default: "Http-Trigger-Entity-Analyzer") - workspaceId: Your Azure Sentinel workspace ID (required) - lookBackDays: Number of days to look back for entity analysis (default: 40 days)
Option 1: Deploy via Azure Portal (Recommended)
To deploy the Entity Analyzer HTTP Trigger Logic App using the Deploy to Azure button: 1. Press on the Deploy button below 2. Select your subscription and resource group (use the same tenant where Microsoft Sentinel is configured) 3. Provide your Sentinel workspace ID 4. Configure the lookBackDays parameter if needed (default is 40 days)
[Content truncated...]
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊