Add Asset to Protection - Zero Networks Segment

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Content Index


This playbook takes a host from a Microsoft Sentinel incident and adds it to protection. The playbook is configured to add the machine to protection(learning). If you want to have it go straight to protection, remove the protectAt property in the action.

Attribute Value
Type Playbook
Solution ZeroNetworks
Source View on GitHub

Additional Documentation

📄 Source: ZeroNetworksSegment-AddAssettoProtection/readme.md

Zero Networks Segment-Add Asset to Protection

Summary

This playbook takes a host from a Microsoft Sentinel incident and adds it to protection. The playbook is configured to add the machine to protection(learning). If you want to have it go straight to protection, remove the protectAt property in the action.

When a new Microsoft Sentinel incident is created, this playbook gets triggered and performs below actions 1. For the hosts in the incident, each host is added to protection (learning). 2. A comment is added to Microsoft Sentinel incident.

Playbook overview:

playbook overview

Prerequisites

  1. Zero Networks custom connector needs to be deployed prior to the deployment of this playbook, in the same resource group and region. Relevant instructions can be found in the connector doc page.

Deployment instructions

  1. Deploy the playbook by clicking on "Depoly to Azure" button. This will take you to deplyoing an ARM Template wizard.

Deploy to Azure Deploy to Azure Gov

  1. Fill in the required paramteres:
    • Playbook Name: Enter the playbook name here (ex:ZNSegment-AddAssettoProtection)
    • Zero Networks Connector name : Enter the name of the Zero Networks custom connector (default value:ZeroNetworksConnector)

Post-Deployment instructions

a. Authorize connections

Once deployment is complete, you will need to authorize each connection. 1. Click the Microsoft Sentinel connection resource 2. Click edit API connection 3. Click Authorize 4. Sign in 5. Click Save 6. Repeat steps for other connections such as Zero Networks

c. Configurations in Sentinel

  1. In Microsoft Sentinel, analytical rules should be configured to trigger an incident with Host Entity.
  2. Configure the automation rules to trigger this playbook

Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊

Back to Playbooks · Back to ZeroNetworks