Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
This Playbook will be triggered when an spycloud malware incident is created.
Additional Documentation
📄 Source: SpyCloud-Malware-Playbook/readme.md
SpyCloud Enterprise Malware Playbook

Table of Contents
- Overview
- Prerequisites
- Deployment
- Post Deployment Steps
Overview
This playbook gets triggered when an incident is created from the "SpyCloud Malware Rule" and can perform the following actions
- Check if the hostname is a managed asset. If no hostname exists in the record, skip this check.
- For the specific machine ID, if the organization has access to compass data, pull all the additional records for the specific machine ID from the appropriate compass endpoint and add them to the incident.
- Escalate the incident for someone to handle the malware infection.

Prerequisites
- A SpyCloud Enterprise API Key
- SpyCloud Enterprise custom connector needs to be deployed prior to the deployment of this playbook, in the same resource group and region. Relevant instructions can be found on the connector documentation page.
- SpyCloud-Monitor-Watchlist-Data-Playbook needs to be deployed prior to the deployment of this playbook, in the same resource group and region. Relevant instructions can be found on the playbook document page.
Deployment Instructions
- Deploy the playbooks by clicking on the "Deploy to Azure" button. This will take you to the Deploy an ARM Template wizard.
- Fill in the required parameters for deploying the playbook.

- Click "Review + create". Once the validation is successful, click on "Create".

Post Deployment Instructions
Authorize connections
Once deployment is complete, you will need to authorize each connection:
- As a best practice, we have used the Sentinel connection in Logic Apps that use "ManagedSecurityIdentity" permissions. Please refer to this document and provide permissions to the Logic App accordingly.
- Provide connection details for the SpyCloud Enterprise Custom Connector.
- Save the Logic App. If the Logic App prompts any missing connections, please update the connections similarly.
b.Configurations in Sentinel:
- In Microsoft Sentinel, configure the SpyCloud Malware rule automation rules to trigger this playbook.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to SpyCloud Enterprise Protection