Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
This playbook will add pre-defined or user customizable comment to an incident generated based on tags and add pre-defined or user customizable note to associated Vectra Entity.
| Attribute | Value |
|---|---|
| Type | Playbook |
| Solution | Vectra XDR |
| Source | View on GitHub |
This playbook will add pre-defined or user customizable comment to an incident generated based on tags and add pre-defined or user customizable note to associated Vectra Entity.
Obtain keyvault name and tenantId where client credentials are stored using which access token will be generated. * Create a Key Vault with unique name * Go to Keyvaults → your keyvault → Overview and copy DirectoryID which will be used as tenantId * NOTE: Ensure the Permission model in the Access Configuration of Key Vault is set to 'Vault access policy'.
Make sure that VectraGenerateAccessToken playbook is deployed before deploying VectraDecorateIncidentBasedOnTag playbook.
Once deployment is complete, authorize each connection. 1. Go to your logic app → API connections → Select keyvault connection resource. 2. Go to General → Edit API connection. 3. Click Authorize. 4. Sign in. 5. Click Save. 6. Repeat steps for other connections.
After authorizing each connection, assign a role to this playbook. 1. Go to Log Analytics Workspace → your workspace → Access Control → Add 2. Add role assignment 3. Assignment type: Job function roles 4. Role: Microsoft Sentinel Contributor 5. Members: select managed identity for "assigned access to" and add your logic app as a member. 6. Click on review+assign
Add access policy for the playbook's managed identity and authorized user to read, and write secrets of key vault. 1. Go to logic app → your Logic App → identity → System assigned Managed identity and copy Object (principal) ID. 2. Go to keyvaults → your keyvault → Access policies → create. 3. Select all keys & secrets permissions. Click next. 4. In the principal section, search by copied object ID. Click next. 5. Click review + create. 6. Repeat the above step 2 to 5 to add access policy for the user account using which connection is authorized.
NOTE: If you want to manually run the playbook on a particular incident follow the below steps: - Go to Microsoft Sentinel → your workspace → Incidents - Select an incident. - In the right pane, click on Actions, and from the dropdown select the 'Run Playbook' option. - click on the Run button beside this playbook.
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊