Skip to content

Tag machines in Microsoft Defender from a Microsoft Sentinel Incident

Notifications You must be signed in to change notification settings

Accelerynt-Security/AS-Compromised-Machine-Tagging

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

AS-Compromised-Machine-Tagging

Author: Accelerynt

For any technical questions, please contact info@accelerynt.com

Deploy to Azure Deploy to Azure Gov

This playbook is intended to be run from a Microsoft Sentinel incident. It will match hosts from the incident with devices in Microsoft 365 Defender. It will tag these machines as "compromised", or another tag of your choosing.

MachineTagging_Demo

Deployment

To configure and deploy this playbook:

Open your browser and ensure you are logged into your Microsoft Sentinel workspace. In a separate tab, open the link to our playbook on the Accelerynt Security GitHub Repository:

https://github.com/Accelerynt-Security/AS-Compromised-Machine-Tagging

Deploy to Azure Deploy to Azure Gov

Click the “Deploy to Azure” button at the bottom and it will bring you to the custom deployment template.

In the Project Details section:

  • Select the “Subscription” and “Resource Group” from the dropdown boxes you would like the playbook deployed to.

In the Instance Details section:

  • Playbook Name: This can be left as "AS-Compromised-Machine-Tagging" or you may change it.

  • Machine Tag Name: This can be left as "Compromised" or you may change it.

Towards the bottom, click on “Review + create”.

MachineTagging_Deploy_1

Once the resources have validated, click on "Create".

MachineTagging_Deploy_2

The resources should take around a minute to deploy. Once the deployment is complete, you can expand the "Deployment details" section to view them. Click the one corresponding to the Logic App.

MachineTagging_Deploy_3

Click on the “Edit” button. This will bring us into the Logic Apps Designer.

MachineTagging_Deploy_4

The first and seconds steps labeled "Connections" use a shared azuresentinel connection created during the deployment of this playbook. Before the playbook can be run, this connection will either need to be authorized, or an existing authorized connection may be alternatively selected for each.

MachineTagging_Deploy_5

To validate the azuresentinel connection created for this playbook, expand either of the "Connections" steps and click the exclamation point icon next to the name matching the playbook.

MachineTagging_Deploy_6

When prompted, sign in to validate the connection.

MachineTagging_Deploy_7
Since the first two steps share the same connection, there is no need to repeat the process here. Simply refresh the page to ensure the first two steps now have valid connections.

This process will need to be repeated for the two wdatp connections, responsible for communicating with Microsoft Defender. Expand the step labeled "Condition - Check for Hosts"

MachineTagging_Deploy_8

Repeat the same process above for the connection used in the indicated steps.

MachineTagging_Deploy_9

Running the Playbook

To run this playbook from a Microsoft Sentinel incident, navigate to Microsoft Sentinel:

https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/microsoft.securityinsightsarg%2Fsentinel

Select a workspace and then click the "Incidents" menu option located under "Threat management". Select an incident with compromised host entities.

Click on the "Action" list button on the bottom right of the screen and select "Run playbook".

MachineTagging_Run_1

From the "Run playbook on incident" view, type "AS-Compromised-Machine-Tagging" into the search bar, then click run.

MachineTagging_Run_2

About

Tag machines in Microsoft Defender from a Microsoft Sentinel Incident

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published