Username Breach Data - SpyCloud Enterprise

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


The SpyCloud Enterprise API is able to provide breach data for a username or set of usernames associated with an incident.

Attribute Value
Type Playbook
Solution SpyCloud Enterprise Protection
Source View on GitHub

Additional Documentation

📄 Source: SpyCloud-Get-Username-Breach-Data-Playbook/readme.md

SpyCloud Enterprise Username Breach Data Playbook

SpyCloud Enterprise

Table of Contents

  1. Overview
  2. Prerequisites
  3. Deployment
  4. Post Deployment Steps

Overview

The SpyCloud Enterprise API is able to provide breach data for a username or set of usernames associated with an incident. When a new Microsoft Sentinel Incident is created, this playbook gets triggered and performs the following actions:

Incident Comments

Prerequisites

Deployment Instructions

Deploy to Azure Deploy to Azure Gov

Post Deployment Instructions

Authorize connections

Once deployment is complete, you will need to authorize each connection: - As a best practice, we have used the Sentinel connection in Logic Apps that use "ManagedSecurityIdentity" permissions. Please refer to this document and provide permissions to the Logic App accordingly. - Provide connection details for the SpyCloud Enterprise Custom Connector. for_each - Save the Logic App. If the Logic App prompts any missing connections, please update the connections similarly.

Configurations in Sentinel:


Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to SpyCloud Enterprise Protection