
The playbook will query the RiskIQ passive DNS database and retrieve any domains from the last 30 days that were associated with the IP address from the security alert. Once you’ve got this configured, you can use Microsoft Sentinel’s built-in automation framework with your analytics rules to enhance context for the investigation of incidents. (This is getting fun, right?)Īnd now you will have lovely Threat Intelligence automatically added in the comments of the incident!
PAZURU AZUATTACK PASSWORD
Enter a bad password 5 times and then sign in with your actual password. Next, generate an incident in Sentinel by downloading the Tor Browser (on a spare device, not your corporate laptop) and try to log in to one of your accounts.After you’ve created at least one Incident playbook, go back to Sentinel and add the playbook automation to the Analytics rule template Create incidents based on Azure Active Directory Identity Protection.When you create the RiskIQ API connector in your first Logic Apps Playbook, make sure you use the Organization API key:.For playbooks with both Incident and Alert JSON files, append ‘Incident’ or ‘Alert’ to the Playbook name-otherwise the second import will overwrite the first.


The Deploy to Azure button is broken on most of the playbooks, so you’ll need to import the JSON files manually.Go to the GitHub playbook page: Azure-Sentinel/Solutions/RiskIQ/Playbooks at master.Get a free community account at RiskIQ Community Edition.Integrate External Attack Surface Management with Microsoft Sentinel
PAZURU AZUATTACK HOW TO
So if you’re looking to integrate them, here are updated instructions on how to do so. There’s a guide that Microsoft published to connect the two, but it’s outdated-from back before Microsoft even acquired RiskIQ.

If you integrate RiskIQ’s External Attack Surface Management (EASM) with Microsoft Sentinel (formerly called Azure Sentinel), you’ve got two of the fastest and most comprehensive security protections working together. It also offers excellent global threat intelligence-crowd-sourced from a large and diverse community of security researchers, with additional analysis from machine learning. It identifies vulnerable assets, remediating them before attackers have the chance to gain entry. This covers not only endpoints but also multiple cloud environments, SaaS platforms, and in the supply chain as well. RiskIQ, an External Attack Surface Management (EASM) company that Microsoft acquired last year, helps customers assess and monitor all of their areas of potential attack across their enterprise.
