Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook will create an incident for suspicious or malicious ip and notify to pre-defined or user customizable email id.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Team Cymru Scout |
| Source | View on GitHub |
This playbook will create an incident for suspicious or malicious ip and notify to pre-defined or user customizable email id.
Once deployment is complete, authorize each connection. 1. Go to your logic app → API connections → Select outlook connection resource 2. Go to General → Edit API connection. 3. Click Authorize 5. Sign in. 6. Click Save. 7. Repeat steps for other connections.
After authorizing each connection, assign a role to this playbook. 1. Go to Log Analytics Workspace → your workspace → Access Control → Add 2. Add role assignment 3. Assignment type: Job function roles 4. Role: Microsoft Sentinel Contributor 5. Members: select managed identity for "assigned access to" and add your logic app as a member. 6. Click on review+assign
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊