Skip to content

Facilitate incident response by sending an approval email to the manager(s) of the user(s) associated with a Microsoft Sentinel incident

Notifications You must be signed in to change notification settings

Accelerynt-Security/AS-Incident-Response-Approval-Email

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 
 
 
 
 

Repository files navigation

AS-Incident-Response-Approval-Email

Author: Accelerynt

For any technical questions, please contact info@accelerynt.com

Deploy to Azure Deploy to Azure Gov

This playbook is intended to be run from a Microsoft Sentinel incident. It will facilitate incident response by sending an approval email to the manager(s) of the user(s) associated with the Microsoft Sentinel incident.

ApprovalEmail_Demo

Requirements

The following items are required under the template settings during deployment:

Setup

Create an App Registration:

Navigate to the Navigate to the Microsoft Azure Active Directory App Registrations page:

https://portal.azure.com/#view/Microsoft_AAD_RegisteredApps/ApplicationsListBlade

From there, click "New registration".

ApprovalEmail_Create_App_Registration_1

Select a name for your App Registration, such as "AS-Incident-Response-Approval-Email-AR", then click "Register".

ApprovalEmail_Create_App_Registration_2

From the application menu blade, select "API permissions" and then click "Add a permission". Click the "Microsoft Graph" category.

ApprovalEmail_Create_App_Registration_3

Under "Application permissions", search for "User.Read.All", then select the corresponding checkbox. Click "Add permissions".

ApprovalEmail_Create_App_Registration_4

In order for these permissions to be applied, admin consent must also be granted. Click the indicated "Grant admin consent" button on the "API permissions" page. ApprovalEmail_Create_App_Registration_5_consent

Navigate back to the "Overview" section on the menu and take note of the "Application (client) ID" and "Directory (tenant) ID, as each will be needed for the deployment of this playbook. Click "Add a certificate or secret".

ApprovalEmail_Create_App_Registration_6

Click "New client secret"". After adding a description and selecting an expiration date, click "Add".

ApprovalEmail_Create_App_Registration_7

Copy the generated "Value" and save it for the next step, Create an Azure Key Vault Secret.

ApprovalEmail_Create_App_Registration_8

Create an Azure Key Vault Secret:

Navigate to the Azure Key Vaults page: https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.KeyVault%2Fvaults

Navigate to an existing Key Vault or create a new one. From the Key Vault overview page, click the "Secrets" menu option, found under the "Settings" section. Click "Generate/Import".

ApprovalEmail_Key_Vault_1

Choose a name for the secret, such as "AS-Incident-Response-Approval-Email-App-Registration-Secret", and enter the App Registration Secret copied previously in the "Value" field. All other settings can be left as is. Click "Create".

ApprovalEmail_Key_Vault_2

Once your secret has been added to the vault, navigate to the "Access policies" menu option on the Key Vault page menu. Leave this page open, as you will need to return to it once the playbook has been deployed. See Granting Access to Azure Key Vault.

ApprovalEmail_Key_Vault_3

Deployment

To configure and deploy this playbook:

Open your browser and ensure you are logged into your Microsoft Sentinel workspace. In a separate tab, open the link to our playbook on the Accelerynt Security GitHub Repository:

https://github.com/Accelerynt-Security/AS-Incident-Response-Approval-Email

Deploy to Azure Deploy to Azure Gov

Click the "Deploy to Azure" button at the bottom and it will bring you to the custom deployment template.

In the Project Details section:

  • Select the "Subscription" and "Resource Group" from the dropdown boxes you would like the playbook deployed to.

In the Instance Details section:

Towards the bottom, click on "Review + create".

ApprovalEmail_Deploy_1

Once the resources have validated, click on "Create".

ApprovalEmail_Deploy_2

The resources should take around a minute to deploy. Once the deployment is complete, you can expand the "Deployment details" section to view them. Click the one corresponding to the Logic App.

ApprovalEmail_Deploy_3

Click on the "Edit" button. This will bring us into the Logic Apps Designer.

ApprovalEmail_Deploy_4

The step labeled "Connections" uses an Office365 connection created during the deployment of this playbook. Before the playbook can be run, this connection will either need to be authorized in the indicated step, or an existing authorized connection may be alternatively selected.

ApprovalEmail_Deploy_5

To validate the connection, expand the "Connections" step and click the exclamation point icon next to the name matching the playbook.

ApprovalEmail_Deploy_6

When prompted, sign in to validate the connection.

ApprovalEmail_Deploy_7

Microsoft Sentinel Contributor Role

After deployment, you will need to give the system assigned managed identity the "Microsoft Sentinel Contributor" role. This will enable it to add comments to incidents. Navigate to the Log Analytics Workspaces page and select the same workspace the playbook is located in:

https://portal.azure.com/#view/HubsExtension/BrowseResource/resourceType/Microsoft.OperationalInsights%2Fworkspaces

Select the "Access control (IAM)" option from the menu blade, then click "Add role assignment".

ApprovalEmail_Add_Contributor_Role_1

Select the "Microsoft Sentinel Contributor" role, then click "Next".

ApprovalEmail_Add_Contributor_Role_2

Select the "Managed identity" option, then click "Select Members". Under the subscription the logic app is located, set the value of "Managed identity" to "Logic app". Next, enter "AS-Incident-Response-Approval-Email", or the alternative playbook name used during deployment, in the field labeled "Select". Select the playbook, then click "Select".

ApprovalEmail_Add_Contributor_Role_3

Continue on to the "Review + assign" tab and click "Review + assign".

ApprovalEmail_Add_Contributor_Role_4

Alternatively, if you wish to do this through PowerShell, run the following commands, replacing the managed identity object id and resource group name. You can find the managed identity object id on the Identity blade under Settings for the Logic App.

ApprovalEmail_Add_Contributor_Role_5

You will not need to run the Install-Module if this has been done before. More documentation on this module can be found here:

https://learn.microsoft.com/en-us/powershell/azure/install-az-ps?view=azps-9.3.0

Install-Module -Name Az
Connect-AzAccount
New-AzRoleAssignment -ObjectId <logic app managed identity object id> -RoleDefinitionName "Microsoft Sentinel Contributor" -ResourceGroupName "<logic app resource group name>"

Granting Access to Azure Key Vault

Before the Logic App can run successfully, the Key Vault connection created during deployment must be granted access to the Key Vault storing your App Registration Secret.

From the Key Vault "Access policies" page, click "Create".

ApprovalEmail_Access_1

Select the "Get" checkbox in the "Secret permissions" section. Then click "Next".

ApprovalEmail_Access_2

From the "Principal" page, paste "AS-Incident-Response-Approval-Email", or the alternative playbook name you used, into the search box and click the option that appears. Click "Next".

  • Note that if the same name is used for the app registration and playbook, you will see two options here, which can be hard to differentiate. In this case, you would want to select the option whose ID does not match the app registration (client) ID.

ApprovalEmail_Access_3

Click "Next" in the application section. Then from the "Review + create" page, click "Create".

ApprovalEmail_Access_4

About

Facilitate incident response by sending an approval email to the manager(s) of the user(s) associated with a Microsoft Sentinel incident

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published